咨询与建议

限定检索结果

文献类型

  • 1,808 篇 会议
  • 1,210 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 3,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,939 篇 工学
    • 1,343 篇 计算机科学与技术...
    • 1,132 篇 软件工程
    • 451 篇 信息与通信工程
    • 223 篇 电气工程
    • 222 篇 生物工程
    • 212 篇 控制科学与工程
    • 207 篇 电子科学与技术(可...
    • 182 篇 机械工程
    • 135 篇 光学工程
    • 120 篇 生物医学工程(可授...
    • 107 篇 化学工程与技术
    • 80 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 66 篇 材料科学与工程(可...
    • 48 篇 建筑学
    • 47 篇 土木工程
    • 46 篇 网络空间安全
    • 45 篇 交通运输工程
  • 1,146 篇 理学
    • 707 篇 数学
    • 297 篇 物理学
    • 252 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 112 篇 化学
    • 91 篇 系统科学
  • 548 篇 管理学
    • 290 篇 图书情报与档案管...
    • 274 篇 管理科学与工程(可...
    • 99 篇 工商管理
  • 102 篇 医学
    • 81 篇 临床医学
    • 71 篇 基础医学(可授医学...
  • 65 篇 法学
    • 51 篇 社会学
  • 46 篇 农学
  • 31 篇 经济学
  • 20 篇 教育学
  • 9 篇 哲学
  • 7 篇 艺术学
  • 6 篇 文学
  • 6 篇 军事学

主题

  • 140 篇 feature extracti...
  • 103 篇 semantics
  • 81 篇 training
  • 70 篇 information proc...
  • 63 篇 laboratories
  • 58 篇 computational mo...
  • 51 篇 data mining
  • 51 篇 computers
  • 50 篇 visualization
  • 49 篇 image segmentati...
  • 48 篇 face recognition
  • 45 篇 optimization
  • 45 篇 accuracy
  • 43 篇 deep learning
  • 41 篇 machine learning
  • 39 篇 robustness
  • 37 篇 object detection
  • 37 篇 support vector m...
  • 36 篇 humans
  • 35 篇 three-dimensiona...

机构

  • 436 篇 key laboratory o...
  • 214 篇 university of ch...
  • 191 篇 school of inform...
  • 128 篇 shandong provinc...
  • 84 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 81 篇 shandong provinc...
  • 63 篇 college of compu...
  • 62 篇 peng cheng labor...
  • 61 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 45 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 college of infor...
  • 43 篇 key laboratory o...
  • 43 篇 graduate univers...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 40 篇 chinese academy ...
  • 38 篇 fujian provincia...

作者

  • 94 篇 zhongzhi shi
  • 91 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 71 篇 shiguang shan
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 48 篇 li yingsong
  • 41 篇 xu qianqian
  • 40 篇 huang zhixiang
  • 40 篇 feng yang
  • 37 篇 feng zhiquan
  • 36 篇 he qing
  • 35 篇 yingsong li
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 jiang kai
  • 29 篇 guo wenzhong
  • 28 篇 li hua
  • 28 篇 zhuang fuzhen
  • 28 篇 zhixiang huang

语言

  • 2,849 篇 英文
  • 101 篇 其他
  • 77 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Intelligent Information Processing"
3020 条 记 录,以下是211-220 订阅
排序:
Cryptanalysis of a Completely Anonymous Multi-recipient Signcryption Scheme with Public Verification
收藏 引用
Journal of Donghua University(English Edition) 2015年 第2期32卷 240-243页
作者: 张波 孙涛 于代荣 School of Information Science and Engineering University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Shandong Provincial Key Laboratory of Software Engineering
Anonymity is a very important security objective in network ***,Pang et *** a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeabi... 详细信息
来源: 评论
Security-Reliability Analysis and Optimization for Cognitive Two-Way Relay network with Energy Harvesting
收藏 引用
China Communications 2024年 第11期21卷 163-179页
作者: Luo Yi Zhou Lihua Dong Jian Sun Yang Xu Jiahui Xi Kaixin Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal UniversityChangsha 410081China School of Electronic Information Central South UniversityChangsha 410075China
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay *** the network,energy-constrained secondary network(SN)nodes harve... 详细信息
来源: 评论
Asymptotic solution of a wide moving jam to a class of higher-order viscous traffic flow models
收藏 引用
Applied Mathematics and Mechanics(English Edition) 2018年 第5期39卷 609-622页
作者: Chunxiu WU College of Mathematics and Computer Science Quanzhou Normal UniversityQuanzhou 362000Fujian ProvinceChina Fujian Provincial Key Laboratory of Data Intensive Computing Quanzhou 362000Fujian ProvinceChina Key Laboratory of Intelligent Computing and Information Processing Quanzhou 362000Fujian ProvinceChina
The boundary-layer method is used to study a wide moving jam to a class of higher-order viscous models. The equations for characteristic parameters are derived to determine the asymptotic solution. The sufficient and ... 详细信息
来源: 评论
SONICUMOS: An Enhanced Active Face Liveness Detection System via Ultrasonic and Video Signals
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Wu, Yihao Jiang, Peipei Cheng, Jianhao Zhao, Lingchen Shen, Chao Wang, Cong Wang, Qian Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Hubei430072 China Laboratory for AI-Powered Financial Technologies Ltd. 999077 Hong Kong Xi'An Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Xi'an710049 China Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an710049 China City University of Hong Kong Department of Computer Science 999077 Hong Kong
SONICUMOS is an enhanced behavior-based face liveness detection system that combines ultrasonic and video signals to sense the 3D head gestures. As face authentication becomes increasingly prevalent, the need for a re... 详细信息
来源: 评论
The M-computations induced by accessibility relations in nonstandard models M of Hoare logic
收藏 引用
Frontiers of Computer Science 2016年 第4期10卷 717-725页
作者: Cungen CAO Yuefei SUI Zaiyue ZHANG Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science Jiangsu University of Sciences and Technology Zhenjiang 212003 China
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program... 详细信息
来源: 评论
A Dynamic Community Detection Algorithm Based on Parallel Incremental Related Vertices  2
A Dynamic Community Detection Algorithm Based on Parallel In...
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Guohui Li Kun Guo YuZhong Chen Ling Wu Danhong Zhu College of Mathematics and Computer Sciences Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing(Fuzhou University) Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education
One of the traditional ways for detecting dynamic communities is to find the communities at each interval through the static community detection ***,it usually leads to high computation *** this paper,a novel algorith... 详细信息
来源: 评论
Understanding the Dynamical Characteristics of Neural networks by Universal Fuzzy Logical Framework
Understanding the Dynamical Characteristics of Neural Networ...
收藏 引用
2005 International Conference on Neural networks and Brain(ICNN&B’05)
作者: Hong Hu Zhongzhi Shi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science
The analytical study of a large scale nonlinear neural network is an uneasy *** try to analyze the function of neural systems by probing into the fuzzy logical framework of the neural ceUs'dynamical *** papers inv... 详细信息
来源: 评论
Gradient-Based Differential kWTA network With Application to Competitive Coordination of Multiple Robots
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1452-1463页
作者: Mei Liu Xiaoyan Zhang Mingsheng Shang Long Jin School of Information Science and Engineering Lanzhou UniversityLanzhou 730000 State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining 810016China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent TechnologyChinese Academy of SciencesChongqing 400714China Shenzhen Research Institute Lanzhou UniversityShenzhen 518063China
Aiming at the k-winners-take-all(kWTA)operation,this paper proposes a gradient-based differential kWTA(GDk WTA)*** obtaining the network,theorems and related proofs are provided to guarantee the exponential convergenc... 详细信息
来源: 评论
Parallel Multi-Label Propagation Based on Influence Model and Its Application to Overlapping Community Discovery
Parallel Multi-Label Propagation Based on Influence Model an...
收藏 引用
作者: Qiu, Qirong Guo, Wenzhong Chen, Yuzhong Guo, Kun Li, Rongrong School of Economics and Management Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350116 China
Finding communities in networks is one of the challenging issues in complex network research. We have to deal with very large networks that contain billions of vertices, which makes community discovery a computational... 详细信息
来源: 评论
Tolerance Granulation Based Community Detection Algorithm
收藏 引用
Tsinghua Science and Technology 2015年 第6期20卷 620-626页
作者: Shu Zhao Wang Ke Jie Chen Feng Liu Menghan Huang Yanping Zhang Jie Tang Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Center of Information Support & Assurance TechnologySchool of Computer Science and TechnologyAnhui University School of Computer Science and Technology Tsinghua University
Community structure is one of the most important features in real networks and reveals the internal organization of the vertices. Uncovering accurate community structure is effective for understanding and exploiting n... 详细信息
来源: 评论