咨询与建议

限定检索结果

文献类型

  • 251 篇 会议
  • 157 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 281 篇 工学
    • 193 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 60 篇 信息与通信工程
    • 37 篇 机械工程
    • 37 篇 控制科学与工程
    • 26 篇 光学工程
    • 20 篇 仪器科学与技术
    • 20 篇 电气工程
    • 20 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 8 篇 建筑学
    • 8 篇 化学工程与技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 冶金工程
    • 6 篇 土木工程
    • 6 篇 航空宇航科学与技...
  • 143 篇 理学
    • 93 篇 数学
    • 35 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 系统科学
  • 90 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 6 篇 法学
  • 6 篇 教育学
  • 4 篇 经济学
  • 3 篇 农学
  • 3 篇 艺术学

主题

  • 25 篇 computer vision
  • 21 篇 educational tech...
  • 18 篇 laboratories
  • 11 篇 feature extracti...
  • 9 篇 clustering algor...
  • 8 篇 neural networks
  • 8 篇 training
  • 7 篇 servers
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 7 篇 ontology
  • 6 篇 deep learning
  • 6 篇 image segmentati...
  • 6 篇 electronic mail
  • 6 篇 algorithm design...
  • 6 篇 computer science...
  • 6 篇 web services
  • 5 篇 image enhancemen...
  • 5 篇 target tracking
  • 5 篇 association rule...

机构

  • 116 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 44 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 20 篇 school of comput...
  • 19 篇 tianjin key labo...
  • 19 篇 national enginee...
  • 16 篇 tianjin key lab ...
  • 14 篇 tianjin universi...
  • 13 篇 tianjin key lab....
  • 11 篇 school of comput...
  • 10 篇 guangdong key la...
  • 9 篇 tianjin key lab ...
  • 9 篇 tianjin universi...
  • 8 篇 shenzhen institu...
  • 8 篇 guangdong provin...
  • 7 篇 computer vision ...
  • 7 篇 key laboratory o...
  • 7 篇 tianjin key labo...

作者

  • 26 篇 zhang hua
  • 24 篇 wang chundong
  • 17 篇 shen linlin
  • 16 篇 gao zan
  • 14 篇 chen shengyong
  • 14 篇 xiao yingyuan
  • 14 篇 xu guangping
  • 13 篇 wen xianbin
  • 13 篇 wang huaibin
  • 13 篇 xue yanbing
  • 12 篇 zhang degan
  • 12 篇 zhang de-gan
  • 11 篇 de-gan zhang
  • 10 篇 wang xiaoye
  • 10 篇 guangping xu
  • 9 篇 shi fan
  • 9 篇 hua zhang
  • 9 篇 degan zhang
  • 8 篇 shengyong chen
  • 8 篇 yanbing xue

语言

  • 390 篇 英文
  • 13 篇 中文
  • 6 篇 其他
检索条件"机构=Key Laboratory of Computer Vision and System"
409 条 记 录,以下是201-210 订阅
排序:
Botnet Detection Based on Analysis of Mail Flow
Botnet Detection Based on Analysis of Mail Flow
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Chun-dong Wang Ting Li Huai-bin Wang Key Laboratory of Computer Vision and System (Tianjin University of Technology) Ministry of Education Tianjin China
With the development of network application technology, there are tremendous viruses and Trojans, especially botnet which has a great harm. It causes a large number of DDoS attacks and spread of spams. And some usual ... 详细信息
来源: 评论
Set Nearest Neighbor Query for Trajectory of Moving Objects
Set Nearest Neighbor Query for Trajectory of Moving Objects
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Yingyuan Xiao Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
To find similar trajectories of a moving object has been recently an interesting issue in moving object databases due to its diverse application fields (e.g., traffic control systems, meteorology monitoring systems, e... 详细信息
来源: 评论
Reasearch on comparison and analysis of the projector calibration
Reasearch on comparison and analysis of the projector calibr...
收藏 引用
IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Bingbing Han Shourui Yang Shengyong Chen Key Laboratory of Computer Vision and System of Ministry of Education Tianjin University of Technology Tianjin China
Projectors are widely used in high-precision industrial fields, and the accuracy of projector calibration is the key to achieve system accuracy. Therefore, it is necessary to perform high-precision calibration for the...
来源: 评论
Learning with only multiple instance positive bags
Learning with only multiple instance positive bags
收藏 引用
2016 International Joint Conference on Neural Networks, IJCNN 2016
作者: Wang, Zhigang Zhao, Zengshun Zhang, Changshui Computer and Communication Engineering School Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education China College of Electronics Communication and Physics Shandong University of Science and Technology China Automation Department Tsinghua University State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology China
In traditional multiple instance learning (MIL), both positive and negative bags are required to learn a prediction function. However, a high human cost is needed to know the label of each bag - positive or negative. ...
来源: 评论
A new watermarking algorithm based on DCT and DWT fusion
A new watermarking algorithm based on DCT and DWT fusion
收藏 引用
International Conference on Electrical and Control Engineering, ICECE 2010
作者: Wang, Huai-Bin Yang, Hong-Liang Wang, Chun-Dong Wang, Shao-Ming Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China College of Information Sciences Beijing Language and Culture 100083 Beijing China
In this paper a new blind watermarking algorithm based on DCT (discrete cosine transform) and DWT (discrete wavelet transform) was proposed. In order to enhance the security of watermarking, Arnold transform is carrie... 详细信息
来源: 评论
Vector quantization codebook design method for speech recognition based on immune cat swarm optimization algorithm
收藏 引用
Journal of Computational Information systems 2014年 第18期10卷 7931-7938页
作者: Yang, Shuying Shen, Tingting Liu, Xupeng Qi, Wenjie School of Computer and Communication Engineering Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China
In the process of Vector Quantization, the performance of traditional LBG algorithm often relies on the selection of the initial codebook and it easily falls into local optimum. In this paper, Immune Cat Swarm Optimiz... 详细信息
来源: 评论
A class of adaptive generalized projective synchronization with unknown parameter periods
收藏 引用
Journal of Computational Information systems 2014年 第14期10卷 6135-6142页
作者: Yang, Shuying Qi, Wenjie Tao, Chong Shen, Tingting School of Computer and Communication Engineering Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China
For a class of adaptive generalized projective synchronization with unknown periods of time-varying parameters, a cycle identification algorithm based on switching logic is proposed in this paper. Firstly, the adaptiv... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion  38
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent D...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
Low-Speed Injection Attack Detection on CAN Bus  3rd
Low-Speed Injection Attack Detection on CAN Bus
收藏 引用
3rd International Conference on Frontiers in Cyber Security, FCS 2020
作者: Wang, Chundong Li, Chuang An, Tongle Cheng, Xiaochun Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China Department of Computer Science Middlesex University LondonNW4 4BT United Kingdom
The car CAN (Controller Area Network) bus message injection attacks seriously affects various functions of the safety of cars, life and property. However, low-speed injection attack is detection inconspicuous in a maj... 详细信息
来源: 评论
Rapid disparity prediction for dynamic scenes
Rapid disparity prediction for dynamic scenes
收藏 引用
9th International Symposium on Advances in Visual Computing, ISVC 2013
作者: Jiang, Jun Cheng, Jun Chen, Baowen Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Chinese University of Hong Kong Hong Kong Hong Kong Shsenzhen Institute of Information Technology China Guangdong Provincial Key Laboratory of Robotics and Intelligent System China Shenzhen Key Laboratory of Computer Vision and Pattern Recognition China
Real-time 3D sensing plays a critical role in robotic navigation, video surveillance and human-computer interaction, etc. When computing 3D structures of dynamic scenes from stereo sequences, spatiotemporal stereo and... 详细信息
来源: 评论