咨询与建议

限定检索结果

文献类型

  • 1,329 篇 会议
  • 1,019 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,536 篇 工学
    • 1,089 篇 计算机科学与技术...
    • 917 篇 软件工程
    • 338 篇 信息与通信工程
    • 201 篇 控制科学与工程
    • 165 篇 生物工程
    • 162 篇 电气工程
    • 147 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 106 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 77 篇 化学工程与技术
    • 65 篇 仪器科学与技术
    • 48 篇 材料科学与工程(可...
    • 47 篇 动力工程及工程热...
    • 46 篇 交通运输工程
    • 35 篇 网络空间安全
    • 29 篇 建筑学
  • 810 篇 理学
    • 460 篇 数学
    • 216 篇 物理学
    • 192 篇 生物学
    • 141 篇 统计学(可授理学、...
    • 75 篇 化学
    • 56 篇 系统科学
  • 439 篇 管理学
    • 243 篇 图书情报与档案管...
    • 208 篇 管理科学与工程(可...
    • 66 篇 工商管理
  • 83 篇 医学
    • 72 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 39 篇 药学(可授医学、理...
  • 41 篇 法学
    • 31 篇 社会学
  • 35 篇 农学
  • 25 篇 经济学
  • 13 篇 教育学
  • 10 篇 艺术学
  • 9 篇 哲学
  • 8 篇 文学
  • 5 篇 军事学

主题

  • 110 篇 feature extracti...
  • 77 篇 semantics
  • 69 篇 training
  • 66 篇 information proc...
  • 61 篇 laboratories
  • 52 篇 face recognition
  • 50 篇 computers
  • 43 篇 deep learning
  • 43 篇 computational mo...
  • 41 篇 visualization
  • 38 篇 humans
  • 36 篇 data mining
  • 36 篇 robustness
  • 34 篇 machine learning
  • 33 篇 predictive model...
  • 32 篇 accuracy
  • 30 篇 image segmentati...
  • 30 篇 convolution
  • 30 篇 clustering algor...
  • 30 篇 computer vision

机构

  • 439 篇 key laboratory o...
  • 222 篇 university of ch...
  • 83 篇 key laboratory o...
  • 64 篇 peng cheng labor...
  • 49 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 46 篇 the key laborato...
  • 44 篇 school of comput...
  • 43 篇 graduate univers...
  • 39 篇 chinese academy ...
  • 34 篇 national enginee...
  • 32 篇 school of comput...
  • 32 篇 school of inform...
  • 30 篇 graduate univers...
  • 28 篇 school of cyber ...
  • 26 篇 key laboratory o...
  • 26 篇 school of comput...
  • 26 篇 college of infor...
  • 25 篇 guangdong labora...
  • 24 篇 faculty of infor...

作者

  • 98 篇 zhongzhi shi
  • 93 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 72 篇 shiguang shan
  • 62 篇 liu qun
  • 61 篇 huang qingming
  • 42 篇 xu qianqian
  • 42 篇 feng yang
  • 36 篇 he qing
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 liu yang
  • 28 篇 li hua
  • 28 篇 zhuang fuzhen
  • 27 篇 yang zhiyong
  • 27 篇 yuefei sui
  • 26 篇 fuji ren
  • 25 篇 cao xiaochun
  • 24 篇 ding shifei
  • 23 篇 shen linlin

语言

  • 2,128 篇 英文
  • 170 篇 其他
  • 56 篇 中文
检索条件"机构=Key Laboratory of Intelligent Information ProcessingInstitute of Computing Technology"
2350 条 记 录,以下是2251-2260 订阅
排序:
Divergence-based supervised information feature compression algorithm
Divergence-based supervised information feature compression ...
收藏 引用
3rd International Symposium on Neural Networks, ISNN 2006 - Advances in Neural Networks
作者: Ding, Shi-Fei Shi, Zhong-Zhi College of Information Science and Engineering Shandong Agricultural University Taian 271018 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
In this paper, a novel supervised information feature compression algorithm based on divergence is set up. Firstly, according to the information theory, the concept and its properties of the divergence, i.e. average s... 详细信息
来源: 评论
Default Description Logics with Reversing Inference Rules
Default Description Logics with Reversing Inference Rules
收藏 引用
Firth IEEE International Conference on Cognitive Informatics(第五届认知信息国际会议)
作者: Yu Sun Yuefei Sui Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Acade Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Acade
Default description logics are extensions of description logics by Reiter's default logic in order to represent and reason about non-monotonic knowledge. A default says that if its prerequisite is provable, and th... 详细信息
来源: 评论
Context optimization of AI planning for services composition
Context optimization of AI planning for services composition
收藏 引用
IEEE International Conference on e-Business Engineering, ICEBE 2006
作者: Lirong, Qiu Zhongzhi, Shi Fen, Lin Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences 100080 Beijing China Graduate School Chinese Academy of Sciences 100039 Beijing China
Web services composition techniques are gaining momentum as the opportunity to establish reusable and versatile inter-op er ability applications. Many researchers propose their composition approach based on planning t... 详细信息
来源: 评论
Tolerance relation based granular space
Tolerance relation based granular space
收藏 引用
High-Power Diode Laser technology and Applications IV
作者: Zheng, Zheng Hu, Hong Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences 100080 Beijing China Graduate School Chinese Academy of Sciences 100039 Beijing China
Granular computing as an enabling technology and as such it cuts across a broad spectrum of disciplines and becomes important to many areas of applications. In this paper, the notions of tolerance relation based infor... 详细信息
来源: 评论
A multi-criteria programming model for intelligent tutoring planning
收藏 引用
10th International Conference on Knowledge-Based intelligent information and Engineering Systems, KES 2006
作者: Ruihong, Shi Peng, Lu Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China Graduate School Chinese Academy of Sciences China College of Computer Science and Technology Beijing Institute of Technology China
This paper proposed a practical approach to personalized tutoring planning by exploiting existing tutoring resources (e.g., a book, a courseware). More exactly, it does not build an instructional course from scratch -... 详细信息
来源: 评论
Network anomalous intrusion detection using Fuzzy-Bayes
Network anomalous intrusion detection using Fuzzy-Bayes
收藏 引用
4th IFIP TCI2 International Conference on intelligent information Processing, IIP 2006
作者: Adetunmbi, Adebayo O. Shi, Zhiwei Shi, Zhongzhi Adewale, Oiumide S. Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing 100080 China Department of Computer Science Federal University of Technology Ondo State Nigeria
Security of networking systems has been an issue since computer networl
来源: 评论
Description of fuzzy first-order modal logic based on constant domain semantics
Description of fuzzy first-order modal logic based on consta...
收藏 引用
High-Power Diode Laser technology and Applications IV
作者: Zhang, Zaiyue Sui, Yuefei Cao, Cungen Department of Computer Science Jiangsu University of Science and Technology Zhenjiang Jiangsu 212003 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
As an extension of the traditional modal logic, the fuzzy first-order modal logic is discussed in this paper. A description of fuzzy first-order modal logic based on constant domain semantics is given, and a formal sy... 详细信息
来源: 评论
The graph-theoretical properties of partitions and information entropy
The graph-theoretical properties of partitions and informati...
收藏 引用
High-Power Diode Laser technology and Applications IV
作者: Cao, Cungen Sui, Yuefei Xia, Youming Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Department of Computer Science Yunnan Normal University Kunming 650092 Yunnan China
The information entropy, as a measurement of the average amount of information contained in an information system, is used in the classification of objects and the analysis of information systems. The information entr... 详细信息
来源: 评论
Euclidean distance transform of digital images in arbitrary dimensions
收藏 引用
PCM 2006: 7th Pacific Rim Conference on Multimedia
作者: Dong, Xu Hua, Li Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing 100080 China Graduate University Chinese Academy of Sciences China
A new algorithm for Euclidean distance transform is proposed in this paper. It propagates from the boundary to the inner of object layer by layer, like the inverse propagation of water wave. It can be applied in every... 详细信息
来源: 评论
Optimization feature compression and FNN realization
收藏 引用
作者: Ding, Shifei Wang, Yuncheng Shi, Zhongzhi Jin, Fengxiang College of Information Science and Engineering Shandong Agricultural University Taian 271018 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China College of Geo-Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China
Feature compression is one of the most importmant steps in pattern recognition. In this paper, based on minimum squared error (MSE) rule, we first give discrete K-L transform (DKLT). According to idea of entropy funct... 详细信息
来源: 评论