咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 823 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,039 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,448 篇 工学
    • 1,160 篇 计算机科学与技术...
    • 964 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 software enginee...
  • 23 篇 monitoring
  • 22 篇 task analysis

机构

  • 511 篇 state key labora...
  • 209 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 77 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 50 篇 state key lab fo...
  • 46 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,827 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2039 条 记 录,以下是1181-1190 订阅
排序:
Emotion recognition from thermal infrared images using deep Boltzmann machine
收藏 引用
Frontiers of computer science 2014年 第4期8卷 609-618页
作者: Shangfei WANG Menghua HE Zhen GAO Shan HE Qiang JI School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Lab of Computing and Communicating Software of Anhui Province Hefei 230027 China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY 12180-3590 USA
Facial expression and emotion recognition from thermal infrared images has attracted more and more attentions in recent years. However, the features adopted in current work are either temperature statistical parameter... 详细信息
来源: 评论
New identity-based key-encapsulation mechanism and its applications in cloud computing
收藏 引用
International Journal of High Performance Computing and Networking 2015年 第2期8卷 124-134页
作者: Wang, Hao Zheng, Zhihua Yang, Bo School of Information Science and Engineering Shandong Normal University Jinan Shandong250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan Shandong250014 China Shandong Provincial Key Laboratory of Software Engineering Jinan Shandong250101 China Department of Electronic Engineering Yantai Vocational College Yantai Shandong264670 China
Identity-based encryption (IBE) is an important primitive of identity-based cryptography. As such, it is a type of public-key encryption in which the public key of a user is some unique information about the identity ... 详细信息
来源: 评论
Fusion of visible and thermal images for facial expression recognition
收藏 引用
Frontiers of computer science 2014年 第2期8卷 232-242页
作者: Shangfei WANG Shan HE Yue WU Menghua HE Qiang JI School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Lab of Computing and Communicating Software of Anhui Province Hefei 230027 China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY12180-3590 USA
Most present research into facial expression recognition focuses on the visible spectrum, which is sen- sitive to illumination change. In this paper, we focus on in- tegrating thermal infrared data with visible spectr... 详细信息
来源: 评论
CIRM: A candidate item reduce method on mapreduce for meteorological big data application
收藏 引用
Energy Education science and technology Part A: Energy science and Research 2014年 第6期32卷 6209-6220页
作者: Xue, Shengjun Huang, Junsheng Xu, Xiaolong Zhang, Jie Jing, Lu Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University Department of Computer Science and Technology Nanjing China Shanghai Meteorological Information and Technical Support Centre Shanghai China Computer Science Department Oklahoma State University StillwaterOK United States
With the increase of the number of meteorological stations, the meteorological data is growing rapidly. Association analysis algorithm is widely applied to the analysis of meteorological data. The traditional associat... 详细信息
来源: 评论
GAIN: GPU-based constraint checking for context consistency  21
GAIN: GPU-based constraint checking for context consistency
收藏 引用
21st Asia-Pacific software Engineering Conference, APSEC 2014
作者: Sui, Jun Xu, Chang Xi, Wang Jiang, Yanyan Cao, Chun Ma, Xiaoxin Lu, Jian State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Applications in pervasive computing are often context-Aware. However, due to uncontrollable environmental noises, contexts collected by applications can be distorted or even conflicting with each other. This is known ... 详细信息
来源: 评论
SHAP: Suppressing the detection of inconsistency hazards by pattern learning  21
SHAP: Suppressing the detection of inconsistency hazards by ...
收藏 引用
21st Asia-Pacific software Engineering Conference, APSEC 2014
作者: Xi, Wang Xu, Chang Yang, Wenhua Yu, Ping Ma, Xiaoxing Lu, Jian State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Context-Aware applications rely on contexts derived from sensory data to adapt their behavior. However, contexts can be inconsistent and cause application anomaly or crash. One popular solution is to detect and resolv... 详细信息
来源: 评论
Distributed stochastic ADMM for matrix factorization  14
Distributed stochastic ADMM for matrix factorization
收藏 引用
23rd ACM International Conference on Information and Knowledge Management, CIKM 2014
作者: Yu, Zhi-Qin Shi, Xing-Jian Yan, Ling Li, Wu-Jun Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Matrix factorization (MF) has become the most popular technique for recommender systems due to its promising performance. Recently, distributed (parallel) MF models have received much attention from researchers of big... 详细信息
来源: 评论
Album quickview in comic-like layout via quartet analysis  22
Album quickview in comic-like layout via quartet analysis
收藏 引用
22nd Pacific Conference on computer Graphics and Applications, PG 2014
作者: Zheng, Zhibin Zhang, Yan Miao, Zheng Sun, Zhengxing State Key Lab for Novel Software Technology Nanjing University Jiangsu Nanjing210093 China Department of Computer Science and Technology Nanjing University Jiangsu Nanjing210093 China
For clear summary and efficient search of images for album, which carries a story of life record, we propose a new approach for quickview of album in comic-like layout via quartet analysis. How to organize the images ... 详细信息
来源: 评论
Coupled group lasso for web-scale CTR prediction in display advertising  31
Coupled group lasso for web-scale CTR prediction in display ...
收藏 引用
31st International Conference on Machine Learning, ICML 2014
作者: Yan, Ling Li, Wu-Jun Xue, Gui-Rong Han, Dingyi Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China Department of Computer Science and Technology National Key Laboratory for Novel Software Technology Nanjing University China Alibaba Group China
In display advertising, click through rate (CTR) prediction is the problem of estimating the probability that an advertisement (ad) is clicked when displayed to a user in a specific context. Due to its easy implementa... 详细信息
来源: 评论
A GA-based approach for SQL-injection detection
A GA-based approach for SQL-injection detection
收藏 引用
2013 International Conference on Information Engineering, ICIE 2013
作者: Chen, Jianmin Yang, Lin Zhang, Honghao Liu, Yan College of Computer Science Beijing University of Technology Beijing China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China National Computer Virus Emergency Response Center Tianjin China
In order to deal with serious security threats of SQL injection to Web applications, this paper proposes a novel SQL-injection detection method based on genetic algorithm (GA). A unified description for characteristic... 详细信息
来源: 评论