咨询与建议

限定检索结果

文献类型

  • 251 篇 会议
  • 157 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 281 篇 工学
    • 193 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 60 篇 信息与通信工程
    • 37 篇 机械工程
    • 37 篇 控制科学与工程
    • 26 篇 光学工程
    • 20 篇 仪器科学与技术
    • 20 篇 电气工程
    • 20 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 8 篇 建筑学
    • 8 篇 化学工程与技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 冶金工程
    • 6 篇 土木工程
    • 6 篇 航空宇航科学与技...
  • 143 篇 理学
    • 93 篇 数学
    • 35 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 系统科学
  • 90 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 6 篇 法学
  • 6 篇 教育学
  • 4 篇 经济学
  • 3 篇 农学
  • 3 篇 艺术学

主题

  • 25 篇 computer vision
  • 21 篇 educational tech...
  • 18 篇 laboratories
  • 11 篇 feature extracti...
  • 9 篇 clustering algor...
  • 8 篇 neural networks
  • 8 篇 training
  • 7 篇 servers
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 7 篇 ontology
  • 6 篇 deep learning
  • 6 篇 image segmentati...
  • 6 篇 electronic mail
  • 6 篇 algorithm design...
  • 6 篇 computer science...
  • 6 篇 web services
  • 5 篇 image enhancemen...
  • 5 篇 target tracking
  • 5 篇 association rule...

机构

  • 116 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 44 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 20 篇 school of comput...
  • 19 篇 tianjin key labo...
  • 19 篇 national enginee...
  • 16 篇 tianjin key lab ...
  • 14 篇 tianjin universi...
  • 13 篇 tianjin key lab....
  • 11 篇 school of comput...
  • 10 篇 guangdong key la...
  • 9 篇 tianjin key lab ...
  • 9 篇 tianjin universi...
  • 8 篇 shenzhen institu...
  • 8 篇 guangdong provin...
  • 7 篇 computer vision ...
  • 7 篇 key laboratory o...
  • 7 篇 tianjin key labo...

作者

  • 26 篇 zhang hua
  • 24 篇 wang chundong
  • 17 篇 shen linlin
  • 16 篇 gao zan
  • 14 篇 chen shengyong
  • 14 篇 xiao yingyuan
  • 14 篇 xu guangping
  • 13 篇 wen xianbin
  • 13 篇 wang huaibin
  • 13 篇 xue yanbing
  • 12 篇 zhang degan
  • 12 篇 zhang de-gan
  • 11 篇 de-gan zhang
  • 10 篇 wang xiaoye
  • 10 篇 guangping xu
  • 9 篇 shi fan
  • 9 篇 hua zhang
  • 9 篇 degan zhang
  • 8 篇 shengyong chen
  • 8 篇 yanbing xue

语言

  • 390 篇 英文
  • 13 篇 中文
  • 6 篇 其他
检索条件"机构=Key Laboratory of Computer Vision and System"
409 条 记 录,以下是221-230 订阅
排序:
Stackelberg Game-Driven Computational Offloading in Edge Computing Scenarios
Stackelberg Game-Driven Computational Offloading in Edge Com...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Lan Zhang Chao Bu Key Laboratory of Computer Vision and System of Ministry of Education School of Computer Science and Engineering Tianjin University of Technology Tianjin China
With the number of users that use mobile devices for frequent transactions increasing rapidly, it is a great challenge to guarantee the credibility of transactions. Blockchain is regarded as a practical technology for...
来源: 评论
Characteristic Course Reform of computer system Security
Characteristic Course Reform of Computer System Security
收藏 引用
2nd International Conference on Information and Communication Technology for Education(ICTE 2015)
作者: Chun-Dong Wang Xi-Jie Sun Shu-Gang Tang Zhao-Dong Tang Key Laboratory of Computer Vision and System Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the rapid development of Internet and constant improvement of informationization degree, all kinds of security problems become increasingly prominent. Especially computer system security is faced with serious cha... 详细信息
来源: 评论
Dynamic Services Migration Based on Dueling Deep Q-Network in MEC
Dynamic Services Migration Based on Dueling Deep Q-Network i...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Xinyang Zhang Chao Bu Key Laboratory of Computer Vision and System of Ministry of Education School of Computer Science and Engineering Tianjin University of Technology Tianjin China
As an extended computing paradigm of cloud computing, Mobile Edge Computing (MEC) facilitates real-time service responses by deploying resources near network edges. However, services should frequently move among multi...
来源: 评论
A Kind of new parallax algorithm based on symmetric continuous optimization  5
A Kind of new parallax algorithm based on symmetric continuo...
收藏 引用
2020 5th International Seminar on computer Technology, Mechanical and Electrical Engineering, ISCME 2020
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
With the fast development of 3D imaginations becomes more and more fascination, multi-view stereo based 3D reconstruction is a significant technique for those application. To facilitate the subsequent processing of 3D... 详细信息
来源: 评论
Data-driven traffic dynamic understanding and safety monitoring applications  4
Data-driven traffic dynamic understanding and safety monitor...
收藏 引用
4th IEEE International Conference on Civil Aviation Safety and Information Technology, ICCASIT 2022
作者: Zhou, Shizhong Hu, Yi Guo, Dongyue Lin, Yi Yang, Bo Sichuan University National Key Laboratory of Fundamental Science on Synthetic Vision Chengdu China Southwest Air Traffic Management Bureau CAAC Chengdu China Nanjing University of Aeronautics and Astronautics Nanjing China National Key Laboratory of Air Traffic Control Automation System Technology College of Computer Science Sichuan University Chengdu China
In this work, a novel framework is proposed to improve air traffic safety from the perspective of human factors by detecting possible risks from air-ground speech communication. In the proposed framework, the automati... 详细信息
来源: 评论
Network Risk Assessment Based on Improved MulVAL Framework and HMM  2nd
Network Risk Assessment Based on Improved MulVAL Framework a...
收藏 引用
2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019
作者: Wang, Chundong Li, Kongbo Tian, Yunkun He, Xiaonan Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin E-Hualu Information Technology Co. Ltd. Tianjin China
With the increasingly extensive applications of the network, the security of internal network of enterprises is facing more and more threats from the outside world, which implies the importance to master the network r... 详细信息
来源: 评论
Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection  2nd
Two-Level Feature Selection Method for Low Detection Rate At...
收藏 引用
2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019
作者: Wang, Chundong Ye, Xin He, Xiaonan Tian, Yunkun Gong, Liangyi Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin E-Hualu Information Technology Co. Ltd. Tianjin300350 China
In view of the fact that some attacks have low detection rates in intrusion detection dataset, a two-level feature selection method based on minimal-redundancy-maximal-relevance (mRMR) and information gain (IG) was pr... 详细信息
来源: 评论
Semi-supervised classification method of SAR images using spectral clustering in contourlet domain  4
Semi-supervised classification method of SAR images using sp...
收藏 引用
2019 4th International Seminar on computer Technology, Mechanical and Electrical Engineering, ISCME 2019
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
A new based on Semi-supervised classification theory for SAR images in contourlet domain is proposed, in this paper. Attempting to get better and faster performance, the PSO algorithm (Particle swarm optimization algo... 详细信息
来源: 评论
Study of Semantic-based Ontology Mapping Technology
Study of Semantic-based Ontology Mapping Technology
收藏 引用
Workshop on Intelligent systems and Applications
作者: Wen-jie Li Qiu-xiang Xia Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Key Laboratory of Computer Vision and System (Tianjin University of Technology)
To implement the interoperation of different ontologies in medical informatics domain and achieve the goal of the sharing and multiplexing of domain knowledge, the heterogeneous problem between ontologies must be solv... 详细信息
来源: 评论
Time Series Prediction Based on Decomposition and Synthesis
Time Series Prediction Based on Decomposition and Synthesis
收藏 引用
2019第二届算法、计算和人工智能国际会议
作者: Junguang Li Shuying Yang Key Laboratory of Computer Vision & System Ministry of Education Tianjin University of Technology School of Computer Science and Engineering Tianjin University of Technology
In recent years, the deep learning method has been widely used in the financial field, promoting the development of stock price forecasting. The time series data in reality has complex characteristics, and the traditi... 详细信息
来源: 评论