咨询与建议

限定检索结果

文献类型

  • 404 篇 会议
  • 344 篇 期刊文献

馆藏范围

  • 748 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 518 篇 工学
    • 347 篇 计算机科学与技术...
    • 302 篇 软件工程
    • 92 篇 信息与通信工程
    • 85 篇 机械工程
    • 80 篇 生物工程
    • 74 篇 光学工程
    • 56 篇 生物医学工程(可授...
    • 39 篇 电气工程
    • 37 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 30 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 22 篇 建筑学
    • 17 篇 土木工程
    • 11 篇 材料科学与工程(可...
    • 9 篇 测绘科学与技术
    • 9 篇 交通运输工程
    • 8 篇 航空宇航科学与技...
  • 218 篇 理学
    • 96 篇 数学
    • 81 篇 生物学
    • 58 篇 物理学
    • 30 篇 化学
    • 26 篇 统计学(可授理学、...
  • 112 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 52 篇 医学
    • 46 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 教育学
  • 6 篇 法学
  • 4 篇 农学
  • 4 篇 艺术学

主题

  • 33 篇 virtual reality
  • 30 篇 training
  • 23 篇 semantics
  • 22 篇 visualization
  • 22 篇 feature extracti...
  • 21 篇 solid modeling
  • 19 篇 three-dimensiona...
  • 18 篇 computational mo...
  • 16 篇 object detection
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 11 篇 deep neural netw...
  • 11 篇 image color anal...
  • 10 篇 machine learning
  • 10 篇 computer vision
  • 10 篇 image reconstruc...
  • 10 篇 geometry
  • 9 篇 convolution
  • 8 篇 image enhancemen...
  • 8 篇 cameras

机构

  • 192 篇 state key labora...
  • 188 篇 state key labora...
  • 50 篇 zhongguancun lab...
  • 45 篇 school of comput...
  • 40 篇 guangdong provin...
  • 38 篇 peng cheng labor...
  • 24 篇 beijing key labo...
  • 23 篇 the state key la...
  • 22 篇 university of ch...
  • 22 篇 department of co...
  • 18 篇 state key labora...
  • 17 篇 zhengzhou univer...
  • 16 篇 shenzhen key lab...
  • 15 篇 state key labora...
  • 13 篇 department of co...
  • 13 篇 department of co...
  • 12 篇 pengcheng labora...
  • 12 篇 beihang universi...
  • 12 篇 state key labora...
  • 12 篇 school of comput...

作者

  • 46 篇 heng pheng-ann
  • 41 篇 li jia
  • 38 篇 jianwei niu
  • 28 篇 niu jianwei
  • 23 篇 chen xiaowu
  • 22 篇 aimin hao
  • 22 篇 hao aimin
  • 21 篇 hong qin
  • 21 篇 shuai li
  • 18 篇 qin hong
  • 18 篇 wang yunhong
  • 17 篇 tian yonghong
  • 17 篇 xiaowu chen
  • 16 篇 li shuai
  • 15 篇 xuefeng liu
  • 15 篇 zhao yifan
  • 15 篇 lu feng
  • 15 篇 liu xuefeng
  • 15 篇 wang qiong
  • 15 篇 fu chi-wing

语言

  • 650 篇 英文
  • 84 篇 其他
  • 14 篇 中文
检索条件"机构=Key Laboratory of Computer Vision and Virtual Reality Technology"
748 条 记 录,以下是711-720 订阅
排序:
Accelerate cache simulation with generic GPU
Accelerate cache simulation with generic GPU
收藏 引用
IEEE 9th International Conference on computer and Information technology, CIT 2009
作者: Han, Wan Xiaopeng, Gao Zhiqiang, Wang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Trace-driven cache simulation is the most widely used method to evaluate different cache structures. Several techniques have been proposed to reduce the simulation time of sequential trace-driven simulation. An obviou... 详细信息
来源: 评论
SimRC: An architecture modeling and simulator generation tool for reconfigurable computing development
SimRC: An architecture modeling and simulator generation too...
收藏 引用
IASTED International Conference on Modelling, Simulation, and Identification, MSI 2009
作者: Liu, Yuexiao Gao, Xiaopeng Wu, Xingbo Lv, Liangshuang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100191 China
A modeling and simulation tool called SimRC is described in this paper. It is dedicated to improve the efficiency of reconfigurable computing development. In SimRC, a new architecture description language is designed ... 详细信息
来源: 评论
Seamless virtual machine live migration on network security enhanced hypervisor
Seamless virtual machine live migration on network security ...
收藏 引用
2009 2nd IEEE International Conference on Broadband Network and Multimedia technology, IEEE IC-BNMT2009
作者: Xianqin, Chen Han, Wan Sumei, Wang Xiang, Long State Key Laboratory of Virtual Reality Technology System School of Computer Science and Technology Beijing University of Aeronautics and Astronautics Beijing 100191 China
Since the virtual network traffic is invisible outside the hypervisor, it is impossible for traditional network-base security devices to harness the attacks happened in virtual computing environment. Industry and acad... 详细信息
来源: 评论
Safe polyhedral visual hulls
Safe polyhedral visual hulls
收藏 引用
16th International Multimedia Modeling Conference on Advances in Multimedia Modeling, MMM 2010
作者: Chen, Guojun Su, Huanhuan Jiang, Jie Wu, Wei College of Computer and Communication Engineering China University of Petroleum Dongying China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing China
The visual hull is used to 3D object modeling in real-time. In this paper, we propose a novel method to remove phantom volumes produced in the polyhedral visual hull (PVH) construction. This method calculates the visu... 详细信息
来源: 评论
An algorithm for evaluating credibility of CNO intelligence information using Bayesian estimation
An algorithm for evaluating credibility of CNO intelligence ...
收藏 引用
1st International Conference on Information Science and Engineering, ICISE2009
作者: Xia, Chunhe Sun, Yunyun Yao, Shan Zhang, Songmei Li, Xiaojian State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Computer Science and Information Technology Guangxi Normal University Guilin China
Intelligence activity is one of the most important activities during computer Network Operation (CNO) command and decision-making process. Specially, evaluation of Intelligence Information credibility is the basic ele... 详细信息
来源: 评论
Rendering method for multi-attribute objects based on state transition optimization strategy
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of computer-Aided Design and computer Graphics 2009年 第3期21卷 311-318页
作者: Chen, Zhiyu Liang, Xiaohui Yu, Zhuo State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100083 China
Efficient rendering of complex scenes has receive great attention in real-time computer graphics. Current researches are mostly concentrated on reducing the geometric complexity of the scene model such as reconstructi... 详细信息
来源: 评论
A modeling approach of mobile ad hoc networks survivability model
A modeling approach of mobile ad hoc networks survivability ...
收藏 引用
1st International Conference on Information Science and Engineering, ICISE2009
作者: Wang, Haiquan Ma, Xinyi Xia, Chunhe Hao, Senshen State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Software Beihang University Beijing China Shool of Computer Science and Engineering Beihang University Beijing China
Survivability has become a focal point of research. Simulation is a common method for experimental verification to identify the advantages and deficiencies of survivability models and architectures. This paper propose... 详细信息
来源: 评论
A task-deployment model for the simulation of computer network attack and defense exercises
A task-deployment model for the simulation of computer netwo...
收藏 引用
1st International Conference on Information Science and Engineering, ICISE2009
作者: Yang, Yi Jiao, Jian Wang, Haiquan Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Software Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
The task-deployment models of simulation, is mainly used to solve the problem of the unreasonable tasks partition in the simulation of distributed computer network attack and defense exercises. This paper gives a task... 详细信息
来源: 评论
Degraded Link-disjoint multipath routing in ad hoc networks
Degraded Link-disjoint multipath routing in ad hoc networks
收藏 引用
International Symposium on Wireless Pervasive Computing (ISWPC)
作者: Junxia Cai Wei Wu State Key laboratory of Virtual Reality Technology and Systems Department of computer Beihang University Beijing China
This paper presents a multiple-path routing protocol, called as degraded link-disjoint multipath (DLDM) routing protocol, which is based on ad-hoc on-demand distance vector(AODV) routing protocol for ad-hoc networks. ... 详细信息
来源: 评论
Practice and Exploration in Multimedia technology Education
Practice and Exploration in Multimedia Technology Education
收藏 引用
International Workshop on Education technology and computer Science, ETCS
作者: Qi Yue State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science Beihang University Beijing China
Multimedia has become ubiquitous in nowadays world along with the rapid development of information technology. Yet the courses in todaypsilas colleges could not reflect this trend. In this paper we analyze the issues ... 详细信息
来源: 评论