咨询与建议

限定检索结果

文献类型

  • 251 篇 会议
  • 157 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 281 篇 工学
    • 193 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 60 篇 信息与通信工程
    • 37 篇 机械工程
    • 37 篇 控制科学与工程
    • 26 篇 光学工程
    • 20 篇 仪器科学与技术
    • 20 篇 电气工程
    • 20 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 8 篇 建筑学
    • 8 篇 化学工程与技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 冶金工程
    • 6 篇 土木工程
    • 6 篇 航空宇航科学与技...
  • 143 篇 理学
    • 93 篇 数学
    • 35 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 系统科学
  • 90 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 6 篇 法学
  • 6 篇 教育学
  • 4 篇 经济学
  • 3 篇 农学
  • 3 篇 艺术学

主题

  • 25 篇 computer vision
  • 21 篇 educational tech...
  • 18 篇 laboratories
  • 11 篇 feature extracti...
  • 9 篇 clustering algor...
  • 8 篇 neural networks
  • 8 篇 training
  • 7 篇 servers
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 7 篇 ontology
  • 6 篇 deep learning
  • 6 篇 image segmentati...
  • 6 篇 electronic mail
  • 6 篇 algorithm design...
  • 6 篇 computer science...
  • 6 篇 web services
  • 5 篇 image enhancemen...
  • 5 篇 target tracking
  • 5 篇 association rule...

机构

  • 116 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 44 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 20 篇 school of comput...
  • 19 篇 tianjin key labo...
  • 19 篇 national enginee...
  • 16 篇 tianjin key lab ...
  • 14 篇 tianjin universi...
  • 13 篇 tianjin key lab....
  • 11 篇 school of comput...
  • 10 篇 guangdong key la...
  • 9 篇 tianjin key lab ...
  • 9 篇 tianjin universi...
  • 8 篇 shenzhen institu...
  • 8 篇 guangdong provin...
  • 7 篇 computer vision ...
  • 7 篇 key laboratory o...
  • 7 篇 tianjin key labo...

作者

  • 26 篇 zhang hua
  • 24 篇 wang chundong
  • 17 篇 shen linlin
  • 16 篇 gao zan
  • 14 篇 chen shengyong
  • 14 篇 xiao yingyuan
  • 14 篇 xu guangping
  • 13 篇 wen xianbin
  • 13 篇 wang huaibin
  • 13 篇 xue yanbing
  • 12 篇 zhang degan
  • 12 篇 zhang de-gan
  • 11 篇 de-gan zhang
  • 10 篇 wang xiaoye
  • 10 篇 guangping xu
  • 9 篇 shi fan
  • 9 篇 hua zhang
  • 9 篇 degan zhang
  • 8 篇 shengyong chen
  • 8 篇 yanbing xue

语言

  • 390 篇 英文
  • 13 篇 中文
  • 6 篇 其他
检索条件"机构=Key Laboratory of Computer Vision and System"
409 条 记 录,以下是101-110 订阅
排序:
Identification based on PRT gravity tunnel of continuous electrocardiogram  14
Identification based on PRT gravity tunnel of continuous ele...
收藏 引用
14th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Dai, Min Meng, Danyang Jia, Feng Ma, Miaoling Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
An electrocardiogram (ECG)identification method is proposed based on PRT triangle gravity tunnel of continuous electrocardiogram. The PRT center of gravity is defined by the P, R, T fiducial points in ECG signal, and ... 详细信息
来源: 评论
Structural controllability of optimized networks with onion-like topologies
Structural controllability of optimized networks with onion-...
收藏 引用
Chinese Intelligent systems Conference, CISC 2018
作者: Li, Manli Sun, Shiwen Wu, Yafang Xia, Chengyi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin300384 China
Recently, an optimization method has been proposed to increase the ability of complex networks to resist intentional attacks on hub nodes. The finally optimized networks exhibit a novel type of "onion-like" ... 详细信息
来源: 评论
Security analysis and improvement for kerberos based on dynamic password and diffie-hellman algorithm
Security analysis and improvement for kerberos based on dyna...
收藏 引用
4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013
作者: Wang, Chundong Feng, Chaoran Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
This paper analyses the process of Kerberos authentication protocol, and finds the existing security problems of the protocol referring to some Kerberos improvement projects proposed in some papers at home and abroad,... 详细信息
来源: 评论
Real-time detection and recognition of landmarks for mobile robot in indoor scenes
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2013年 第4期8卷 329-341页
作者: Xue, Yanbing Zhang, Hua Ju, Yucui Wang, Jin Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illu... 详细信息
来源: 评论
Rule-chain incremental mining algorithm based on directed graph
Rule-chain incremental mining algorithm based on directed gr...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Ning, Hongyun Zhang, Zhiying Zhang, Degan Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China
Aiming to discover the rule-chains directly, a novel graph-based online incremental mining algorithm (RIOMining) is proposed. Firstly, an interrelated bitmap based on a directed graph (PAGraph) is designed to compress... 详细信息
来源: 评论
Design and implementation of authentication and authorization flow in ESCP system
Design and implementation of authentication and authorizatio...
收藏 引用
4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013
作者: Wang, Chundong Bo, Guangming Zhang, Yaohui Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
ESCP is short for Enterprise Social collaboration Platform. The ESCP system, which is also known as enterprise social networking, is a platform which translates the basic elements of the social networking and twitter ... 详细信息
来源: 评论
Damping based multi-path traffic allocation algorithm for wireless networks
收藏 引用
Journal of Computational Information systems 2012年 第10期8卷 4169-4175页
作者: Lu, Xu Yu, Ruiguo Dong, Wenyong Lei, Ming Hao, Lianxiu School of Computer Science and Technology Tianjin University Tianjin 300072 China Computer School Wuhan University Wuhan 430079 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin 300191 China School of Electronic Information Engineering Tianjin University Tianjin 300072 China
In physics, damping is any effect that tends to reduce the amplitude of oscillations in an oscillatory system. Inspired by this, we present a new traffic allocation algorithm for Wireless Networks in order to limit th... 详细信息
来源: 评论
Vibration model based multi-path traffic allocation algorithm for wireless mesh networks
收藏 引用
Journal of Information and Computational Science 2013年 第5期10卷 1253-1260页
作者: Yuan, Zhenxia Yu, Ruiguo Zhao, Mankun Du, Xiuping Lei, Ming Dong, Wenyong School of Computer Science and Technology Tianjin University Tianjin 300072 China School of International Education Tianjin University Tianjin 300072 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin 300191 China Computer School Wuhan University Wuhan 430079 China
Mesh Networks (WMNs) is a promising network access technology. As WMNs' applications become more and more popular, the number of users grows quickly and the quality of service needs to be improved. When we try to ... 详细信息
来源: 评论
Research on context-aware computing with uncertainty for proactive service
收藏 引用
International Journal of Modelling, Identification and Control 2009年 第3期8卷 248-255页
作者: Zhang, De-Gan Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin 300191 China Key Lab of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a... 详细信息
来源: 评论
Classifying Personal Photo Collections: An Event-Based Approach
Classifying Personal Photo Collections: An Event-Based Appro...
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Geng, Ming Li, Yukun Liu, Fenglian Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin Tianjin China
Due to the increasing number of photos taken by mobile phone, how to improve the efficiency of re-finding personal photos becomes an important research issue. Based on the survey of the current methods to re-find expe... 详细信息
来源: 评论