咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66 篇 工学
    • 46 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 19 篇 信息与通信工程
    • 17 篇 机械工程
    • 7 篇 控制科学与工程
    • 5 篇 电气工程
    • 4 篇 光学工程
    • 3 篇 化学工程与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 生物工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 核科学与技术
    • 1 篇 网络空间安全
  • 37 篇 理学
    • 29 篇 数学
    • 14 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 生物学
    • 2 篇 系统科学
    • 1 篇 地球物理学
  • 17 篇 管理学
    • 12 篇 图书情报与档案管...
    • 6 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 27 篇 laboratories
  • 24 篇 multimedia compu...
  • 14 篇 feature extracti...
  • 14 篇 asia
  • 12 篇 robustness
  • 10 篇 algorithm design...
  • 8 篇 clustering algor...
  • 7 篇 face recognition
  • 7 篇 kernel
  • 6 篇 image coding
  • 6 篇 psnr
  • 5 篇 linear discrimin...
  • 5 篇 training data
  • 5 篇 speech recogniti...
  • 5 篇 degradation
  • 5 篇 streaming media
  • 4 篇 learning systems
  • 4 篇 support vector m...
  • 4 篇 computational ef...
  • 4 篇 bandwidth

机构

  • 37 篇 moe-microsoft ke...
  • 23 篇 moe-microsoft ke...
  • 19 篇 microsoft resear...
  • 8 篇 moe-ms key labor...
  • 6 篇 moe-microsoft ke...
  • 6 篇 moe-microsoft ke...
  • 5 篇 department of in...
  • 5 篇 moe-ms key labor...
  • 4 篇 department of in...
  • 4 篇 anhui institute ...
  • 3 篇 moe-ms key labor...
  • 3 篇 anhui province k...
  • 3 篇 dept. of compute...
  • 3 篇 moe microsoft ke...
  • 3 篇 national science...
  • 3 篇 department of el...
  • 3 篇 moe-microsoft ke...
  • 2 篇 moe-microsoft ke...
  • 2 篇 computer science...
  • 2 篇 moe-microsoft ke...

作者

  • 25 篇 nenghai yu
  • 16 篇 yu nenghai
  • 10 篇 liansheng zhuang
  • 9 篇 beiqian dai
  • 9 篇 yanlu xie
  • 6 篇 dong xu
  • 6 篇 shuicheng yan
  • 6 篇 xian-sheng hua
  • 5 篇 hong-jiang zhang
  • 5 篇 weihai li
  • 5 篇 xu dong
  • 5 篇 yan shuicheng
  • 5 篇 wei zhou
  • 4 篇 jun sun
  • 4 篇 minghui liu
  • 4 篇 zhiqiang yao
  • 4 篇 zhuang liansheng
  • 4 篇 li bin
  • 4 篇 bin li
  • 3 篇 xiaoou tang

语言

  • 128 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=MOE-MS Key Laboratory of Multimedia Computing and Communication"
130 条 记 录,以下是41-50 订阅
排序:
Image Classification via Semi-supervised pLSA
Image Classification via Semi-supervised pLSA
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Liansheng Zhuang Lanbo She Yuning Jiang Ketan Tang Nenghai Yu MOE-MS Key Laboratory of Multimedia Computing and Communication University of Science and Technology Hefei China
In this paper, we propose Semi-Supervised pLSA(SSpLSA) for image classification. Compared with the classic non-supervised pLSA, our method overcomes the shortcoming of poor classification performance when the features... 详细信息
来源: 评论
Low-Resolution Face Recognition via Sparse Representation of Patches
Low-Resolution Face Recognition via Sparse Representation of...
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Liansheng Zhuang Mengliao Wang Wen Yu Nenghai Yu Yangchun Qian MOE-MS Key Laboratory of Multimedia Computing and Communication University of Science and Technology Hefei China
Images resolution plays an important role during face recognition. Low-resolution face images will reduce drastically the performance of face recognition algorithms. In this paper, we propose a novel approach for low-... 详细信息
来源: 评论
A Peer Selection Mechanism in P2P Networks Based on the Collaboration of ISPs and P2P Systems
A Peer Selection Mechanism in P2P Networks Based on the Coll...
收藏 引用
International Conference on Information Science and Engineering (ICISE)
作者: Hong Zhuang Yinlong Xu Yuchong Hu Xiaobin Lin MOE-MS Key Laboratory of Multimedia Computing and Communication Department of Computer Science and Technology University of Science and Technology Hefei China
This paper studies that how can Internet Service Providers (ISPs) reduce the traffic caused by P2P applications while keeping P2P services. Based on the collaboration of ISPs and P2P, we design an ISP-aided peer selec... 详细信息
来源: 评论
iFLY system for the NIST 2008 speaker recognition evaluation
iFLY system for the NIST 2008 speaker recognition evaluation
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wu Guo Yanhua Long Yijie Li Lei Pan Eryu Wang Lirong Dai MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology China
The description of iFLY system submitted for NIST 2008 speaker recognition evaluation (SRE), which has achieved excellent performance in the 2008 SRE evaluation, is presented in this paper. Our primary system is a fus... 详细信息
来源: 评论
Fast Salient Object Detection Based on Segments
Fast Salient Object Detection Based on Segments
收藏 引用
2009 International Conference on Measuring Technology and Mechatronics Automation(ICMTMA 2009)(2009年检测技术与机械自动化国际会议)
作者: Liansheng ZHUANG Ketan TANG Nenghai YU Yangchun QIAN MOE-MS Key Laboratory of Multimedia Computing and Communication University of Science and Technology of ChinaHefei230027P.R.China
In this paper we propose a novel salient object de tection algorithm based on segments, named SODS (Salient Object Detection based on Segments). We first segment an input image, and then extract a sat of features incl... 详细信息
来源: 评论
A robust chaos-based image encryption scheme
A robust chaos-based image encryption scheme
收藏 引用
IEEE International Conference on multimedia and Expo (ICME)
作者: Weihai Li Nenghai Yu MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology Hefei China
A DCT domain image encryption scheme based on chaotic shuffling table is proposed, in which the shuffling tables are generated by several logistic maps. This scheme is robust to normal image processing, such as noisin... 详细信息
来源: 评论
On cross-language image annotations
On cross-language image annotations
收藏 引用
IEEE International Conference on multimedia and Expo (ICME)
作者: Xiaoguang Rui Nenghai Yu Mingjing Li Lei Wu MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology Hefei China
Automatic annotation of digital pictures is a key technology for managing and retrieving images from large image collections. Typical algorithms only deal with the problem of monolingual image annotation. In this pape... 详细信息
来源: 评论
Learning probabilistic structure to group image edges for object extraction
Learning probabilistic structure to group image edges for ob...
收藏 引用
IEEE International Conference on multimedia and Expo (ICME)
作者: Yangyu Tao Lin Liang Yingqing Xu MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology Hefei China Microsoft Research Asia Beijing China
We investigate exploiting the class specific information in the conventional perceptual edge grouping for the task of object extraction, since the domain information is usually available in practice. Instead of applyi... 详细信息
来源: 评论
A high-performanance remote computing platform
A high-performanance remote computing platform
收藏 引用
IEEE International Conference on Pervasive computing and communications (PerCom)
作者: Huifeng Shen Yan Lu Feng Wu Shipeng Li MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology Hefei China Internet Media Group Microsoft Research Asia Beijing China
The pervasive computing environment and the wide network bandwidth provide users more opportunities to utilize remote computing resources. In this paper, we introduce a high-performance remote computing platform to en... 详细信息
来源: 评论
Improving security of an image encryption algorithm based on chaotic circular shift
Improving security of an image encryption algorithm based on...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Weihai Li Yuan Yuan MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology Hefei China School of Engineering and Applied Science Aston University Birmingham UK
An image encryption algorithm based on chaotic circular bit shift is proposed recently. This paper analyses the security of this algorithm and point out that the key space is not as large as they alleged and the algor... 详细信息
来源: 评论