咨询与建议

限定检索结果

文献类型

  • 251 篇 会议
  • 157 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 281 篇 工学
    • 193 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 60 篇 信息与通信工程
    • 37 篇 机械工程
    • 37 篇 控制科学与工程
    • 26 篇 光学工程
    • 20 篇 仪器科学与技术
    • 20 篇 电气工程
    • 20 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 8 篇 建筑学
    • 8 篇 化学工程与技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 冶金工程
    • 6 篇 土木工程
    • 6 篇 航空宇航科学与技...
  • 143 篇 理学
    • 93 篇 数学
    • 35 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 系统科学
  • 90 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 6 篇 法学
  • 6 篇 教育学
  • 4 篇 经济学
  • 3 篇 农学
  • 3 篇 艺术学

主题

  • 25 篇 computer vision
  • 21 篇 educational tech...
  • 18 篇 laboratories
  • 11 篇 feature extracti...
  • 9 篇 clustering algor...
  • 8 篇 neural networks
  • 8 篇 training
  • 7 篇 servers
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 7 篇 ontology
  • 6 篇 deep learning
  • 6 篇 image segmentati...
  • 6 篇 electronic mail
  • 6 篇 algorithm design...
  • 6 篇 computer science...
  • 6 篇 web services
  • 5 篇 image enhancemen...
  • 5 篇 target tracking
  • 5 篇 association rule...

机构

  • 116 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 44 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 20 篇 school of comput...
  • 19 篇 tianjin key labo...
  • 19 篇 national enginee...
  • 16 篇 tianjin key lab ...
  • 14 篇 tianjin universi...
  • 13 篇 tianjin key lab....
  • 11 篇 school of comput...
  • 10 篇 guangdong key la...
  • 9 篇 tianjin key lab ...
  • 9 篇 tianjin universi...
  • 8 篇 shenzhen institu...
  • 8 篇 guangdong provin...
  • 7 篇 computer vision ...
  • 7 篇 key laboratory o...
  • 7 篇 tianjin key labo...

作者

  • 26 篇 zhang hua
  • 24 篇 wang chundong
  • 17 篇 shen linlin
  • 16 篇 gao zan
  • 14 篇 chen shengyong
  • 14 篇 xiao yingyuan
  • 14 篇 xu guangping
  • 13 篇 wen xianbin
  • 13 篇 wang huaibin
  • 13 篇 xue yanbing
  • 12 篇 zhang degan
  • 12 篇 zhang de-gan
  • 11 篇 de-gan zhang
  • 10 篇 wang xiaoye
  • 10 篇 guangping xu
  • 9 篇 shi fan
  • 9 篇 hua zhang
  • 9 篇 degan zhang
  • 8 篇 shengyong chen
  • 8 篇 yanbing xue

语言

  • 390 篇 英文
  • 13 篇 中文
  • 6 篇 其他
检索条件"机构=Key Laboratory of Computer Vision and System"
409 条 记 录,以下是61-70 订阅
排序:
A clustering algorithm use SOM and K-Means in Intrusion Detection
A clustering algorithm use SOM and K-Means in Intrusion Dete...
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Wang, Huai-Bin Yang, Hong-Liang Xu, Zhi-Jian Yuan, Zheng Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China
Improving detection definition is a pivotal problem for intrusion detection. Many intelligent algorithms were used to improve the detection rate and reduce the false rate. Traditional SOM cannot provide the precise cl... 详细信息
来源: 评论
Service Portfolio Optimization Algorithm Based on Value Model and Graph Theory in SOA
Service Portfolio Optimization Algorithm Based on Value Mode...
收藏 引用
2013 IEEE 4th International Conference on Software Engineering and Service Science
作者: Zhi-xin Yang Hong-yun Ning Jun-qing Sun Jia-bao Yang Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Key Laboratory of Computer Vision and System Ministry of EducationTianjin University of Technology
Business process reengineering frequently occurs in complex service systems because of its dynamic,random and varied running *** solve the problem,we proposed a novel SOA portfolio optimization algorithm based on valu... 详细信息
来源: 评论
A New Identity Authentication Scheme of Single Sign On for Multi-Database  7
A New Identity Authentication Scheme of Single Sign On for M...
收藏 引用
2016 IEEE 7th International Conference on Software Engineering and Service Science
作者: Lan Zhang Hong-yun Ning Yun-yun Du Yan-xia Cui Yang Yang Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Key Laboratory of Computer Vision and System Ministry of EducationTianjin University of Technology
At present,multi-database identity authentication is mostly based on centralized global user management *** this paper,we analyze the defects of the current identity authentication in multi-database and propose a new ... 详细信息
来源: 评论
A CNN-LSTM Network for Classification of Attention Deficit Hyperactivity Disorder from EEG Data  41
A CNN-LSTM Network for Classification of Attention Deficit H...
收藏 引用
第41届中国控制会议
作者: Yaru Zhang Xiangxin Tan Yue Gu Key Laboratory of Computer Vision and System (Ministry of Education) School of Computer Science and EngineeringTianjin University of Technology Engineering Research Center of Learning-Based Intelligent system Ministry of Education
Attention deficit hyperactivity disorder(ADHD) is one of the most common neuropsychiatric disorders in children,with core symptoms of inattention,impulsivity,and *** a result,early detection and treatment are *** this... 详细信息
来源: 评论
A pyramid image matching algorithm for chang'E-2 CCD images of the moon  4
A pyramid image matching algorithm for chang'E-2 CCD images ...
收藏 引用
4th IEEE International Conference on computer and Communications, ICCC 2018
作者: Zhou, Zhezhe Zhao, Meng Han, Ying Chen, Shengyong Key Laboratory of Computer Vision and System of Ministry of Education School of Computer Science and Engineering Tianjin University of Technology Tianjin China
The Chang'e-2(CE-2) satellite is equipped with a three-line Charge-coupled Device (CCD) stereo camera with a resolution of 7 meters. Through the camera's linear array scanning images, the stereoscopic images t... 详细信息
来源: 评论
A method of detecting phishing web pages based on feature vectors matching
收藏 引用
Journal of Information and Computational Science 2012年 第15期9卷 4229-4235页
作者: Wang, Huaibin Zhu, Bailu Wang, Chundong Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Ministry of Education Tianjin 300384 China
Phishing is a web-based attack which end users are lured to visit fraudulent websites and give away personal information unconsciously. Typically, the captured information is used to get an illegal economic profit. Al... 详细信息
来源: 评论
A robust auto-focus measure based on inner energy
收藏 引用
Optoelectronics Letters 2017年 第4期13卷 309-313页
作者: LI Yang TANG Ting-long HUANG Wei Key Laboratory of Computer Vision and System Ministry of Education School of Computer Science and Engineering Tianjin University of Technology Tianjin 300384 China China Three Gorges University Yichang 443002 China
This paper proposes a robust auto-focus(AF) measure based on inner energy. In general, the inner energy of noise pixels is close to zero because the magnitude of gradient and the direction of the noise pixels are rand... 详细信息
来源: 评论
A new watermarking approach based on BP network in wavelet domain
A new watermarking approach based on BP network in wavelet d...
收藏 引用
International Congress on Image and Signal Processing
作者: Liu, Fenglian Liu, Lili Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technolog Tianjin China
This paper proposes a novel digital watermarking technique based on BP neural networks in wavelet domain. Firstly, the original image is decomposed by DTCWT, and then the watermark bits are added to the selected coeff... 详细信息
来源: 评论
Efficient Distributed Skyline Queries for Mobile Applications
收藏 引用
计算机科学技术学报(英文版) 2010年 第3期25卷 523-536页
作者: Ying-Yuan Xiao Yue-Guo Chen Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191China Key Laboratory of Computer Vision and System Tianjin University of TechnologyTianjin 300191China School of Computing National University of Singapore117417Singapore Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of ChinaBeijing 100872China
In this paper,we consider skyline queries in a mobile and distributed environment,where data objects are distributed in some sites(database servers)which are interconnected through a high-speed wired network,and queri... 详细信息
来源: 评论
Stackelberg Game-Driven Computational Offloading in Edge Computing Scenarios  15
Stackelberg Game-Driven Computational Offloading in Edge Com...
收藏 引用
15th International Conference on Communication Software and Networks, ICCSN 2023
作者: Zhang, Lan Bu, Chao School of Computer Science and Engineering Tianjin University of Technology Key Laboratory of Computer Vision and System of Ministry of Education Tianjin China
With the number of users that use mobile devices for frequent transactions increasing rapidly, it is a great challenge to guarantee the credibility of transactions. Blockchain is regarded as a practical technology for... 详细信息
来源: 评论