咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 823 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,039 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,448 篇 工学
    • 1,160 篇 计算机科学与技术...
    • 964 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 software enginee...
  • 23 篇 monitoring
  • 22 篇 task analysis

机构

  • 511 篇 state key labora...
  • 209 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 77 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 50 篇 state key lab fo...
  • 46 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,827 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2039 条 记 录,以下是1101-1110 订阅
排序:
VIDEO SUPER-RESOLUTION BASED ON NONLINEAR MAPPING AND PATCH SIMILARITY
VIDEO SUPER-RESOLUTION BASED ON NONLINEAR MAPPING AND PATCH ...
收藏 引用
2016 4th IEEE International Conference on Cloud Computing and Intelligence Systems(IEEE CCIS2016)
作者: Linghui Li Junping Du Meiyu Liang JangM yung Lee Luoming Meng Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer ScienceBeijing University of Posts and Telecommunications Department of Electronics Engineering Pusan National University State Key Laboratory Network & Switching Technology Beijing University of Posts and Telecommunications
Aiming at recovering lost detailed information in low-resolution videos, a novel video super-resolution algorithm based on nonlinear mapping and patch similarity was proposed in this paper. Taking advantage of the str... 详细信息
来源: 评论
A simple probabilistic extension of modal Mu-calculus  24
A simple probabilistic extension of modal Mu-calculus
收藏 引用
24th International Joint Conference on Artificial Intelligence, IJCAI 2015
作者: Liu, Wanwei Song, Lei Wang, Ji Zhang, Lijun School of Computer Science National University of Defense Technology Changsha China University of Technology Sydney Australia State Key Lab. of HPC National University of Defense Technology Changsha China State Key Lab. of Computer Science Institute of Software CAS Beijing China
Probabilistic systems are an important theme in AI domain. As the specification language, PCTL is the most frequently used logic for reasoning about probabilistic properties. In this paper, we present a natural and su... 详细信息
来源: 评论
Single image-based data-driven indoor scene modeling
收藏 引用
computers & Graphics 2015年 53卷 210-223页
作者: Yan Zhang Zicheng Liu Zheng Miao Wentao Wu Kai Liu Zhengxing Sun State Key Lab for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China
With a single input indoor image (including sofa, tea table, etc.), a 3D scene can be reconstructed from a single image using an existing model library in three stages: image analysis, model retrieval and relevance fe... 详细信息
来源: 评论
Text detection in born-digital images by mass estimation  3
Text detection in born-digital images by mass estimation
收藏 引用
3rd IAPR Asian Conference on Pattern Recognition, ACPR 2015
作者: Xu, Jiamin Shivakumara, Palaiahnakote Lu, Tong Tan, Chew Lim Blumenstein, Michael National Key Lab for Novel Software Technology Nanjing University Nanjing China Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia School of Computing National University of Singapore Singapore Griffith University Gold CoastQLD4222 Australia
There is a need for effective web-document understanding due to the explosive progress of internet and network technologies. In this paper, we propose a new method for text detection in born-digital images by introduc... 详细信息
来源: 评论
Solving the Data Imbalance Problem of P300 Detection via Random Under-Sampling Bagging SVMs
Solving the Data Imbalance Problem of P300 Detection via Ran...
收藏 引用
International Joint Conference on Neural Networks
作者: Xiaofeng Shi Guoqiang Xu Furao Shen Jinxi Zhao The National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
The imbalance problem exists in P300 EEG data sets because P300 potential are collected under the condition of Oddball experimental paradigm. Hence, a P300 detection method, namely RUSBagging SVMs, is proposed in this... 详细信息
来源: 评论
PFrauDetector: A Parallelized Graph Mining Approach for Efficient Fraudulent Phone Call Detection
PFrauDetector: A Parallelized Graph Mining Approach for Effi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Josh Jia-Ching Ying Ji Zhang Che-Wei Huang Kuan-Ta Chen Vincent S. Tseng Department of Computer Science and Information Engineering Feng Chia University Taiwan ROC Faculty of Health University of Southern Queensland Australia Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Department of Computer Science and Information Engineering National Cheng Kung University Taiwan ROC Institute of Information Science Academia Sinica Taiwan ROC Department of Computer Science National Chiao Tung University Taiwan ROC
In recent years, fraud is becoming more rampant internationally with the development of modern technology and global communication. Due to the rapid growth in the volume of call logs, the task of fraudulent phone call... 详细信息
来源: 评论
The 5th International Conference on Biomedical Engineering and Biotechnology (ICBEB 2016) Abstracts
收藏 引用
BMC MEDICAL IMAGING 2016年 第SUPPL 1期16卷 65-65页
作者: [Anonymous] Department of MRI Shandong Medical Imaging Research Institute Affiliated to Shandong University Jinan Shandong 250021 People’s Republic of China Department of Interventional Radiology Shandong Provincial Hospital Affiliated to Shandong University Jinan Shandong 250021 People’s Republic of China College of Information Science and Technology Engr. Research Center of Digitized Textile & Fashion Tech. for Ministry of Education Donghua University Shanghai 201620 China Intelligent multimedia information processing Lab College of Software Northeastern University Shenyang Liaoning Province 110004 China Institute of Biomedical and Health Engineering Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen 518055 China School of Computer Science and Technology Nanjing Normal University Nanjing China Department of Electrical Engineering The City College of New York CUNY New York USA Jiangsu Key Laboratory of 3D Printing Equipment and Manufacturing Nanjing China School of Electronic Science and Engineering Nanjing University Nanjing Jiangsu 210046 China College of Engineering Nanyang Technological University Singapore 639798 Singapore School of Electronic Information Shanghai Dianji University Shanghai China School of Natural Sciences and Mathematics Shepherd University Shepherdstown WV 25443 USA Davis College of Agriculture Natural Resources and Design West Virginia University Morgantown WV 26505 USA State Key Laboratory of Millimeter Waves Southeast University Nanjing 210096 China Center of Medical Physics and Technology Hefei Institutes of Physical Science Chinese Academy of Sciences Hefei China College of Agricultural and Life Sciences University of Florida Gainesville FL 32611 USA Courant Institute of Mathematical Sciences New York University New York NY 10012 USA Translational Imaging Division & MRI Unit Columbia University and New York State Psychiatric Institute New York NY 10032 USA Guangxi Key Laboratory of Manufacturing System & Adv
来源: 评论
Hardware-assisted fine-grained code-reuse attack detection  18th
Hardware-assisted fine-grained code-reuse attack detection
收藏 引用
18th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2015
作者: Yuan, Pinghai Zeng, Qingkai Ding, Xuhua State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China School of Information Systems Singapore Management University Singapore Singapore
Code-reuse attacks have become the primary exploitation technique for system compromise despite of the recently introduced Data Execution Prevention technique in modern platforms. Different from code injection attacks... 详细信息
来源: 评论
Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking  1st
Analyzing eventual leader election protocols for dynamic sys...
收藏 引用
1st International Conference on Cloud Computing and Security, ICCCS 2015
作者: Gu, Jiayi Zhou, Yu Wu, Weigang Chen, Taolue College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing210016 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Computer Science Sun Yat-sen University Guangzhou510006 China Department of Computer Science Middlesex University London United Kingdom
Leader election protocols have been intensively studied in distributed computing, mostly in the static setting. However, it remains a challenge to design and analyze these protocols in the dynamic setting, due to its ... 详细信息
来源: 评论
Spatial mixing and the connective constant: Optimal bounds  26
Spatial mixing and the connective constant: Optimal bounds
收藏 引用
26th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015
作者: Sinclair, Alistair Srivastava, Piyush Štefankovič, Daniel Yin, Yitong Computer Science Division UC Berkeley United States Center for the Mathematics of Information Caltech United States Department of Computer Science University of Rochester United States State Key Laboratory for Novel Software Technology Nanjing University China
We study the problem of deterministic approximate counting of matchings and independent sets in graphs of bounded connective constant. More generally, we consider the problem of evaluating the partition functions of t... 详细信息
来源: 评论