咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 107 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 289 篇 工学
    • 219 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 83 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 26 篇 电气工程
    • 22 篇 电子科学与技术(可...
    • 22 篇 生物工程
    • 17 篇 光学工程
    • 15 篇 化学工程与技术
    • 15 篇 生物医学工程(可授...
    • 14 篇 机械工程
    • 11 篇 动力工程及工程热...
    • 9 篇 建筑学
    • 8 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 网络空间安全
  • 151 篇 理学
    • 109 篇 数学
    • 35 篇 统计学(可授理学、...
    • 34 篇 物理学
    • 22 篇 生物学
    • 15 篇 化学
    • 12 篇 系统科学
  • 100 篇 管理学
    • 66 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 7 篇 药学(可授医学、理...
  • 9 篇 法学
    • 7 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 11 篇 semantics
  • 9 篇 optimization
  • 9 篇 machine learning
  • 8 篇 feature extracti...
  • 7 篇 accuracy
  • 7 篇 training
  • 6 篇 neural networks
  • 6 篇 web services
  • 5 篇 deep neural netw...
  • 5 篇 electroencephalo...
  • 5 篇 face recognition
  • 5 篇 convolution
  • 5 篇 wireless sensor ...
  • 5 篇 service computin...
  • 5 篇 forecasting
  • 5 篇 data models
  • 5 篇 mashups
  • 4 篇 collaborative fi...
  • 4 篇 deep learning
  • 4 篇 computational mo...

机构

  • 20 篇 tianjin key lab....
  • 19 篇 school of comput...
  • 12 篇 key laboratory o...
  • 12 篇 school of comput...
  • 12 篇 school of cyber ...
  • 12 篇 key lab. of inte...
  • 12 篇 state key lab. f...
  • 12 篇 school of cyber ...
  • 11 篇 state key lab. o...
  • 11 篇 department of ph...
  • 10 篇 key lab. of inte...
  • 10 篇 alibaba group
  • 10 篇 hunan provincial...
  • 9 篇 key lab. of inte...
  • 8 篇 key lab. of shan...
  • 8 篇 peng cheng labor...
  • 8 篇 department of au...
  • 6 篇 key lab. of inte...
  • 6 篇 institute of inf...
  • 6 篇 bdkm university ...

作者

  • 13 篇 huang qingming
  • 13 篇 cao xiaochun
  • 12 篇 guosheng kang
  • 12 篇 xu qianqian
  • 11 篇 zhang degan
  • 10 篇 wu xian-liang
  • 10 篇 lu bao-liang
  • 10 篇 yang zhiyong
  • 9 篇 wang zitai
  • 9 篇 leila ismail
  • 8 篇 xiaochun cao
  • 8 篇 kang guosheng
  • 8 篇 zhao hai
  • 8 篇 park dong-chul
  • 8 篇 qingming huang
  • 8 篇 qianqian xu
  • 8 篇 jianxun liu
  • 7 篇 zhiyong yang
  • 7 篇 cao jiannong
  • 7 篇 shi yuanming

语言

  • 361 篇 英文
  • 16 篇 其他
  • 10 篇 中文
检索条件"机构=Lab. of Intelligent Computing and Software Engineering"
386 条 记 录,以下是321-330 订阅
排序:
Improved blind watermarking of 3D objects based on partition
Improved blind watermarking of 3D objects based on partition
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Yao, Zhiqiang Chen, Liping Pan, Rijing Yang, Shanchao Curran, Kevin Faculty of Software Fujian Normal University China Key Lab. of Network Security and Cryptology Fujian Normal University China School of Computing and Intelligent Systems University of Ulster United Kingdom
With the development of architecture design, virtual reality, entertainment, mechanical engineering and cultural heritage, digital watermarking has played an important role in copyright protection of 3-D objects. Howe... 详细信息
来源: 评论
Noise removal using edge-preserving fourth-order partial differential equations
Noise removal using edge-preserving fourth-order partial dif...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Yuanquan, Wang Yunting, Zhang Tielian, Yu Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Dept. of Radiology General Hospital of Tianjin Medical University Tianjin 300052 China
Over the last decade, partial differential equations (PDEs) have been justified as effective tools for image smoothing;they are able to achieve a good trade-off between noise removal and edge-preserving. Among various... 详细信息
来源: 评论
An efficient image processing method based on web services for mobile devices
An efficient image processing method based on web services f...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Yi, Liang Yingyuan, Xiao Jing, Huang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
The resource limitation of mobile devices causes the problem that the existing image processing software based on the centralized computing mode had difficulty running in mobile devices. A solution is given in the pap... 详细信息
来源: 评论
A fast thinning algorithm for fingerprint image
A fast thinning algorithm for fingerprint image
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Xiang, Ming Wu, Xiaopei Hua, Quanping Key Lab. of Intelligent Computing and Signal Processing Anhui University Hefei230039 China Department of Information Engineering Zhejiang Textile and Fashion College Ningbo315211 China
Thinning algorithms can be classified into two general types: serial and parallel algorithms. Several algorithms have been proposed, but they have limitations. A new thinning algorithm based on the centroid of the blo... 详细信息
来源: 评论
Research on unified network access control architecture
Research on unified network access control architecture
收藏 引用
IEEE 9th International Conference on Computer and Information Technology, CIT 2009
作者: Liu, Yabin Zhang, Huanguo Zhang, Liqiang Zhao, Bo Computer School Wuhan University Wuhan Hubei China Key Lab. of Aerospace Information Security and Trusted Computing MOE Wuhan Hubei China State Key Lab. of Software Engineering Wuhan University Wuhan Hubei China
Border access control, network security mechanism and system access control are three separately access control procedures when user accessing the resource on network. Network access control mechanism, which adding th... 详细信息
来源: 评论
Knowledge discovery approach based on closeness relationship of FC
Knowledge discovery approach based on closeness relationship...
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Zhang, Degan Li, Miao Zhang, Xiaoli Wang, Jinhui Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
A fuzzy clustering is one of important and valid methods to knowledge discovery. One of problems in fuzzy clustering is to determine a certain fuzzy sample classification in given limited sample space. Another is its ... 详细信息
来源: 评论
An efficient web service composition approach based on improved particle swarm optimization model
An efficient web service composition approach based on impro...
收藏 引用
International Conference on Management and Service Science, MASS 2009
作者: Yi, Liang Yingyuan, Xiao Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Along with the rapid growth of the number of the availab.e web services over the internet, the quality of services (Qos) becomes an imperative concern for service consumers and providers. How to differentiate their qu... 详细信息
来源: 评论
A hybrid efficient short-term traffic flow forecast technology
A hybrid efficient short-term traffic flow forecast technolo...
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Lin, Xin Wang, Xiaoye Xiao, Yingyuan Zhang, Degan Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
This paper presents a hybrid short-term traffic flow forecast technology. For the uncertainty, the short-term traffic flow forecast is complicated, and the accuracy is not high. This strategy combines the RBF neural n... 详细信息
来源: 评论
Research on multi-dimensional association rules mining in distributed environments based on advanced SQL query
Research on multi-dimensional association rules mining in di...
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Zhang, Lei Qiao, Mei Zhang, Degan Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
This paper proposes the MDMA (Multi-dimensional Distributed Mining Association rules) algorithm based on advanced SQL query. The algorithm works on star-style structure networks. It uses CUBE operator in new standard ... 详细信息
来源: 评论
A novel two-step-deformation active contour with application to facial features extraction
A novel two-step-deformation active contour with application...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Hua, Zhang Yuanquan, Wang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
In allusion to the boundary leaking problem of traditional active contours when used to extract facial features, two kinds of local information are introduced to enhance the weak boundary, then to build new external f... 详细信息
来源: 评论