咨询与建议

限定检索结果

文献类型

  • 1,213 篇 会议
  • 1,153 篇 期刊文献

馆藏范围

  • 2,366 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,643 篇 工学
    • 1,177 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 356 篇 信息与通信工程
    • 315 篇 电气工程
    • 234 篇 控制科学与工程
    • 175 篇 生物工程
    • 107 篇 光学工程
    • 107 篇 电子科学与技术(可...
    • 102 篇 生物医学工程(可授...
    • 93 篇 机械工程
    • 76 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 61 篇 交通运输工程
    • 51 篇 动力工程及工程热...
    • 51 篇 土木工程
    • 47 篇 网络空间安全
    • 46 篇 建筑学
  • 745 篇 理学
    • 399 篇 数学
    • 198 篇 生物学
    • 179 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 96 篇 化学
    • 56 篇 系统科学
  • 384 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 163 篇 图书情报与档案管...
    • 76 篇 工商管理
  • 139 篇 医学
    • 116 篇 临床医学
    • 76 篇 基础医学(可授医学...
  • 57 篇 法学
    • 43 篇 社会学
  • 43 篇 农学
  • 42 篇 教育学
    • 39 篇 教育学
  • 29 篇 经济学
  • 17 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 110 篇 feature extracti...
  • 93 篇 training
  • 89 篇 semantics
  • 85 篇 deep learning
  • 56 篇 computational mo...
  • 52 篇 predictive model...
  • 49 篇 data models
  • 47 篇 task analysis
  • 43 篇 contrastive lear...
  • 42 篇 convolution
  • 42 篇 accuracy
  • 40 篇 visualization
  • 38 篇 object detection
  • 37 篇 neural networks
  • 31 篇 machine learning
  • 30 篇 convolutional ne...
  • 29 篇 graph neural net...
  • 26 篇 data mining
  • 25 篇 reinforcement le...
  • 25 篇 image segmentati...

机构

  • 133 篇 south china univ...
  • 69 篇 key laboratory o...
  • 69 篇 minist educ key ...
  • 55 篇 south china univ...
  • 54 篇 south china univ...
  • 54 篇 school of comput...
  • 51 篇 pazhou lab peopl...
  • 46 篇 school of softwa...
  • 41 篇 south china univ...
  • 40 篇 south china univ...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of electr...
  • 39 篇 national enginee...
  • 37 篇 key laboratory o...
  • 36 篇 hong kong polyte...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 35 篇 chongqing key la...
  • 32 篇 peng cheng labor...
  • 32 篇 key laboratory o...

作者

  • 99 篇 cai yi
  • 82 篇 tan mingkui
  • 48 篇 wu qingyao
  • 43 篇 shen linlin
  • 43 篇 li qing
  • 40 篇 wang guoyin
  • 38 篇 xu xiaolong
  • 28 篇 xu xuemiao
  • 27 篇 xiaolong xu
  • 26 篇 huang qingbao
  • 24 篇 zhou zhiheng
  • 24 篇 huang qingming
  • 22 篇 xu qianqian
  • 21 篇 xie jiayuan
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 ren haopeng
  • 18 篇 niu shuaicheng
  • 18 篇 zhang yifan
  • 17 篇 xia shuyin

语言

  • 2,136 篇 英文
  • 207 篇 其他
  • 35 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data and Intelligent Robot "
2366 条 记 录,以下是2341-2350 订阅
排序:
REPDL: Research-oriented e-learning platform based on digital library
REPDL: Research-oriented e-learning platform based on digita...
收藏 引用
IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE)
作者: Xiaolong Xu Kun Wang Yan Deng Tao Li School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Graduate School Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
In accordance with the researchers, students, and faculty' need to use the digital library for efficient literature investigation and knowledge learning, this paper proposes REPDL, a research-oriented e-learning p... 详细信息
来源: 评论
Image representation based on multi-features
Image representation based on multi-features
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Xianzhong Long Lei Chen Qun Li College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China
As one kind of popular application in computer vision, image clustering has attracted many attentions. Some machine learning algorithms have been widely employed, such as K-Means, Non-negative Matrix Factorization (NM... 详细信息
来源: 评论
A Low-Area Overhead Secure Scan Architecture Resisting Scan-Based Attacks for Crypto Chips
A Low-Area Overhead Secure Scan Architecture Resisting Scan-...
收藏 引用
2017 International MultiConference of Engineers and Computer Scientists, IMECS 2017
作者: Weizheng, Wang Jincheng, Wang Shuo, Cai Peng, Liu Tieqiao, Liu College of Computer and Communication Engineering Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha Hunan410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China Information Science and Engineering Department Hunan University Changsha410082 China Management School Hangzhou Dianzi University Hangzhou310018 China
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b... 详细信息
来源: 评论
Corrigendum to “Manifold Adaptive Kernelized Low-Rank Representation for Semisupervised Image Classification”
收藏 引用
Complexity 2018年 第1期2018卷
作者: Yong Peng Wanzeng Kong Feiwei Qin Feiping Nie School of Computer Science Hangzhou Dianzi University Hangzhou 310018 *** Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 *** Center for OPTical IMagery Analysis and Learning (OPTIMAL) Northwestern Polytechnical University Xi’an 710072 ***
来源: 评论
An attribute reduction framework for inconsistent decision tables from view of the boundary region
An attribute reduction framework for inconsistent decision t...
收藏 引用
2016 International Conference on Machine Learning and Cybernetics, ICMLC 2016
作者: Qian, Jin Chang, Yu-Hui Lv, Ping Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City Jiangsu University of Technology Changzhou213015 China Jiangsu Key Laboratory of Big Data Analysis Technology/B-DAT Nanjing University of Information Science and Technology Nanjing China
Attribute reduction is one of the key issues for data preprocess in data mining. Many heuristic attribute reduction algorithms based on discernibility matrix have been proposed for inconsistent decision tables. Howeve... 详细信息
来源: 评论
Network-coding-based video transmission via WiFi direct in local mobile networks
Network-coding-based video transmission via WiFi direct in l...
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Lei Wang Qing Wang Zhongwei Sun Jun Yin Lijie Xu Yuwang Yang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P.R. China School of Computer Nanjing University of Posts and Telecommunications Nanjing P.R. China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing P.R. China
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of Wi... 详细信息
来源: 评论
Tri-level combination for image representation  17th
Tri-level combination for image representation
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Li, Ruiying Zhang, Chunjie Huang, Qingming School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
The context of objects can provide auxiliary discrimination beyond objects. However, this effective information has not been fully explored. In this paper, we propose Tri-level Combination for Image Representation (Tr... 详细信息
来源: 评论
Top-k Dominating Queries on Incomplete data
Top-k Dominating Queries on Incomplete Data
收藏 引用
作者: Miao, Xiaoye Gao, Yunjun Zheng, Baihua Chen, Gang Cui, Huiyong College of Computer Science Zhejiang University 38 Zheda Road Hangzhou310027 China Key Laboratory of Big Data Intelligent Computing of Zhejiang Province Zhejiang University Hangzhou China School of Information Systems Singapore Management University Singapore178902 Singapore
The top-k dominating (TKD) query returns the k objects that dominate the maximum number of objects in a given dataset. It combines the advantages of skyline and top-k queries, and plays an important role in many decis... 详细信息
来源: 评论
Vehicle appearance feature recognition based on image
Vehicle appearance feature recognition based on image
收藏 引用
2016 6th International Conference on Machinery,Materials,Environment,Biotechnology and Computer(MMEBC 2016)
作者: Deyang Shao Chao Xu Shixian Luo Bo Feng Long Jiao Anhui Engineering Laboratory of Agro-Ecological Big Data Anhui University Key Laboratory of Intelligent Computer & Signal Processing Ministry of EducationAnhui University
Now, the highway toll system still uses a single license plate recognition, this method has a problem of inaccurate identificationFor this kind of situation, this paper put forward to increase the appearance of the ve... 详细信息
来源: 评论
Learning robust and discriminative low-rank representations for face recognition with occlusion
收藏 引用
Pattern Recognition 2017年 66卷 129-143页
作者: Guangwei Gao Jian Yang Xiao-Yuan Jing Fumin Shen Wankou Yang Dong Yue Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Engineering Laboratory of Big Data Analysis and Control for active distribution network Nanjing University of Posts and Telecommunications Nanjing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) Fuzhou China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Automation Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Automation Southeast University Nanjing China
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image int... 详细信息
来源: 评论