咨询与建议

限定检索结果

文献类型

  • 1,329 篇 会议
  • 994 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,503 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 905 篇 软件工程
    • 333 篇 信息与通信工程
    • 185 篇 控制科学与工程
    • 162 篇 生物工程
    • 157 篇 电气工程
    • 146 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 102 篇 生物医学工程(可授...
    • 99 篇 光学工程
    • 77 篇 化学工程与技术
    • 62 篇 仪器科学与技术
    • 50 篇 材料科学与工程(可...
    • 46 篇 动力工程及工程热...
    • 45 篇 交通运输工程
    • 34 篇 网络空间安全
    • 29 篇 建筑学
  • 809 篇 理学
    • 466 篇 数学
    • 213 篇 物理学
    • 191 篇 生物学
    • 143 篇 统计学(可授理学、...
    • 73 篇 化学
    • 56 篇 系统科学
  • 432 篇 管理学
    • 239 篇 图书情报与档案管...
    • 205 篇 管理科学与工程(可...
    • 66 篇 工商管理
  • 79 篇 医学
    • 68 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 41 篇 法学
    • 31 篇 社会学
  • 35 篇 农学
  • 25 篇 经济学
  • 14 篇 教育学
  • 9 篇 哲学
  • 9 篇 艺术学
  • 8 篇 文学
  • 5 篇 军事学

主题

  • 110 篇 feature extracti...
  • 77 篇 semantics
  • 67 篇 training
  • 67 篇 information proc...
  • 61 篇 laboratories
  • 52 篇 face recognition
  • 50 篇 computers
  • 44 篇 computational mo...
  • 43 篇 deep learning
  • 42 篇 visualization
  • 38 篇 humans
  • 37 篇 data mining
  • 37 篇 robustness
  • 33 篇 predictive model...
  • 32 篇 machine learning
  • 32 篇 accuracy
  • 31 篇 convolution
  • 30 篇 object detection
  • 29 篇 image segmentati...
  • 29 篇 computer vision

机构

  • 432 篇 key laboratory o...
  • 221 篇 university of ch...
  • 83 篇 key laboratory o...
  • 64 篇 peng cheng labor...
  • 48 篇 key laboratory o...
  • 47 篇 the key laborato...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 graduate univers...
  • 38 篇 chinese academy ...
  • 34 篇 national enginee...
  • 32 篇 school of comput...
  • 31 篇 school of inform...
  • 28 篇 school of cyber ...
  • 28 篇 college of infor...
  • 26 篇 key laboratory o...
  • 25 篇 school of comput...
  • 25 篇 graduate univers...
  • 24 篇 faculty of infor...
  • 24 篇 beijing key labo...

作者

  • 96 篇 zhongzhi shi
  • 88 篇 shi zhongzhi
  • 73 篇 xilin chen
  • 72 篇 shiguang shan
  • 62 篇 liu qun
  • 61 篇 huang qingming
  • 43 篇 xu qianqian
  • 40 篇 feng yang
  • 33 篇 he qing
  • 31 篇 qing he
  • 31 篇 wen gao
  • 28 篇 liu yang
  • 28 篇 zhuang fuzhen
  • 27 篇 yang zhiyong
  • 27 篇 yuefei sui
  • 26 篇 li hua
  • 26 篇 fuji ren
  • 25 篇 cao xiaochun
  • 24 篇 shen linlin
  • 23 篇 jiang shuqiang

语言

  • 2,022 篇 英文
  • 258 篇 其他
  • 53 篇 中文
检索条件"机构=Key Laboratory of Intelligent Information ProcessingInstitute of Computing Technology"
2325 条 记 录,以下是2041-2050 订阅
排序:
Risk analysis of system security based on evidence theory
Risk analysis of system security based on evidence theory
收藏 引用
International Conference on Computer Design and Applications (ICCDA)
作者: Peida Xu Yong Deng Jianling Xu Xiaoyan Su Key Laboratory of Digital Agricultural Early-warning Technology Ministry of Agriculture of China Beijing China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University China School of Electronics & Information Technology Shanghai Jiaotong University China School of Electronics & Information Technology Shanghai Jiaotong University Shanghai China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Shanghai Zhejiang China Grain Economics Institute Nanjing University of Finance and Economics Nanjing China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
Adaptive generic learning for face recognition from a single sample per person
Adaptive generic learning for face recognition from a single...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Yu Su Shiguang Shan Xilin Chen Wen Gao School of Computer Science and Technology Harbin Institute of Technology China Digital Media Research Center Institute of Computing Technology CAS China Key Laboratory of Intelligent Information Processing Chinese Academy and Sciences China Institute for Digital Media Peking University China
Real-world face recognition systems often have to face the single sample per person (SSPP) problem, that is, only a single training sample for each person is enrolled in the database. In this case, many of the popular... 详细信息
来源: 评论
Design and implementation of a kind of EUPS for mobile service
收藏 引用
Journal of information and Computational Science 2010年 第11期7卷 2248-2257页
作者: Zhang, Xiaodan Zhang, Degan Qiao, Xiaodong Liang, Bing Peng, Hongtao Institute of Scientific and Technical Information of China Beijing 100038 China Tianjin Key Lab. of Intelligent Computing and Novel software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China Beijing Petroleum Managers Training Institute Beijing 100096 China
In order to support mobile service of long-distance monitoring and controlling UPS based on Web, a kind of design and implementation solution of embedded UPS (EUPS) system is brought forward in this paper. The design ... 详细信息
来源: 评论
Risk analysis of physical protection system based on evidence theory
收藏 引用
Journal of information and Computational Science 2010年 第13期7卷 2871-2878页
作者: Xu, Peida Su, Xiaoyan Wu, Jiyi Sun, Xiaohong Zhang, Yajuan Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
The distributed maximum power point tracking method and application in the PV grid-connected generation
The distributed maximum power point tracking method and appl...
收藏 引用
International Conference on intelligent System Design and Engineering Application (ISDEA)
作者: Zhao, Tingting Ju, Zhenhe Wang, Hongjiang Wei, Xiaopeng Li, Xiaoxiao Shi, Zhang School of Management Dalian University of Technology Dalian China New Energy Center Shenyang Institute of Engineering Shenyang China Department of Information and Engineering Shenyang Institute of Engineering Shenyang China Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China Department of Study Liaoning Solar Energy R and D Co. Ltd. Shenyang China Institute of Systems Engineering Northeastern University Shenyang China
In the system of the PV grid-connected generation, because of the dispersion of the PV panel, difference of the sun radiation condition and the shadow of a part of the PV panel, they will cause the serious loss of ene... 详细信息
来源: 评论
Creative design of solar energy portable lamp based on product gene and intuition models
Creative design of solar energy portable lamp based on produ...
收藏 引用
IEEE International Conference on Industrial Engineering and Engineering Management
作者: Ting-ting Zhao Zhen-he Ju Xiao-peng Wei Xiao-xiao Li Department of Information Engineering Shenyang Institute of Engineering Shenyang China Key Laboratory of Advanced Design and Intelligent Computing Ministry of education Dalian University of Technology Dalian China Liaoning Solar Energy Research and Development Company Limited Shenyang China
Intuition process is a very essential in the product creative design stage. A new creative design approach is put forward based on product gene and intuition models. The product gene model and its sequential gene mani...
来源: 评论
Solving NP-complete problems by spiking neural P systems with budding rules
Solving NP-complete problems by spiking neural P systems wit...
收藏 引用
10th International Workshop on Membrane computing, WMC 2009
作者: Ishdorj, Tseren-Onolt Leporati, Alberto Pan, Linqiang Wang, Jun Computational Biomodelling Laboratory Åbo Akademi University Department of Information Technologies 20520 Turku Finland Università degli Studi di Milano - Bicocca Dipartimento di Informatica Sistemistica e Comunicazione Viale Sarca 336/14 20126 Milano Italy Key Laboratory of Image Processing and Intelligent Control Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan 430074 Hubei China Research Group on Natural Computing Department of CS and AI University of Sevilla Avda Reina Mercedes s/n 41012 Sevilla Spain
Inspired by the growth of dendritic trees in biological neurons, we introduce spiking neural P systems with budding rules. By applying these rules in a maximally parallel way, a spiking neural P system can exponential... 详细信息
来源: 评论
Multi-error-correcting amplitude damping codes
Multi-error-correcting amplitude damping codes
收藏 引用
IEEE International Symposium on information Theory
作者: Runyao Duan Markus Grassl Zhengfeng Ji Bei Zeng State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW Australia Centre for Quantum Technologies National University of Singapore Singapore Perimeter Institute of Theoretical Physics Waterloo ONT Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China Institute for Quantum Computing and the Department of Combinatorics and Optimization University of Waterloo Waterloo ONT Canada
We construct new families of multi-error-correcting quantum codes for the amplitude damping channel. Our key observation is that, with proper encoding, two uses of the amplitude damping channel simulate a quantum eras... 详细信息
来源: 评论
Quantum State Reduction for Universal Measurement Based Computation
收藏 引用
Physical Review Letters 2010年 第2期105卷 020502-020502页
作者: Xie Chen Runyao Duan Zhengfeng Ji Bei Zeng Department of Physics Massachusetts Institute of Technology Cambridge Massachusetts USA Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW Australia Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Perimeter Institute for Theoretical Physics Waterloo Ontario Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Quantum Computing University of Waterloo Waterloo Ontario Canada Department of Combinatorics and Optimization University of Waterloo Waterloo Ontario Canada
Measurement based quantum computation, which requires only single particle measurements on a universal resource state to achieve the full power of quantum computing, has been recognized as one of the most promising mo... 详细信息
来源: 评论
Algorithm and axiomatization of rough fuzzy sets based finite dimensional fuzzy vectors
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 560-568页
作者: Mingfen WU School of Information Science Wuyi UniversityJiangmen 529020China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190Ch
Rough sets,proposed by Pawlak and rough fuzzy sets proposed by Dubois and Prade were expressed with the different computing formulas that were more complex and not conducive to computer operations,In this paper,we use... 详细信息
来源: 评论