咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 823 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,039 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,448 篇 工学
    • 1,160 篇 计算机科学与技术...
    • 964 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 software enginee...
  • 23 篇 monitoring
  • 22 篇 task analysis

机构

  • 511 篇 state key labora...
  • 209 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 77 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 50 篇 state key lab fo...
  • 46 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,827 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2039 条 记 录,以下是1221-1230 订阅
排序:
A single-pass algorithm for efficiently recovering sparse cluster centers of high-dimensional data  31
A single-pass algorithm for efficiently recovering sparse cl...
收藏 引用
31st International Conference on Machine Learning, ICML 2014
作者: Yi, Jinfeng Zhang, Lijun Wang, Jun Jin, Rong Jain, Anil K. IBM Thomas J. Watson Research Center Yorktown HeightsNY10598 United States National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
Learning a statistical model for high-dimensional data is an important topic in machine learning. Although this problem has been well studied in the supervised setting, little is known about its unsupervised counterpa... 详细信息
来源: 评论
Efficient algorithms for robust one-bit compressive sensing  31
Efficient algorithms for robust one-bit compressive sensing
收藏 引用
31st International Conference on Machine Learning, ICML 2014
作者: Zhang, Lijun Yi, Jinfeng Jin, Rong National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China IBM Thomas J. Watson Research Center Yorktown HeightsNY10598 United States Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
While the conventional compressive sensing assumes measurements of infinite precision, one- bit compressive sensing considers an extreme setting where each measurement is quantized to just a single bit. In this paper,... 详细信息
来源: 评论
SHAP: Suppressing the Detection of Inconsistency Hazards by Pattern Learning
SHAP: Suppressing the Detection of Inconsistency Hazards by ...
收藏 引用
Asia-Pacific Conference on software Engineering
作者: Wang Xi Chang Xu Wenhua Yang Ping Yu Xiaoxing Ma Jiang Lu Department of Computer Science and Technology Nanling University Naniinz China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Context-aware applications rely on contexts derived from sensory data to adapt their behavior. However, contexts can be inconsistent and cause application anomaly or crash. One popular solution is to detect and resolv... 详细信息
来源: 评论
Multicategory large margin classification methods: Hinge losses vs. coherence functions
收藏 引用
Artificial Intelligence 2014年 215卷 55-78页
作者: Zhihua Zhang Cheng Chen Guang Dai Wu-Jun Li Dit-Yan Yeung Key Laboratory of Shanghai Education Commission for Intelligence Interaction & Cognition Engineering Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dong Chuan Road Shanghai 200240 China National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210023 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China
Generalization of large margin classification methods from the binary classification setting to the more general multicategory setting is often found to be non-trivial. In this paper, we study large margin classificat... 详细信息
来源: 评论
Mathematical modeling of CSTR bioreactor control for production of recombinant protein
Mathematical modeling of CSTR bioreactor control for product...
收藏 引用
2014 4th International Conference on Advanced Materials Research, ICAMR 2014
作者: Jia, Xiao Yi Lin, Yu Tian Lin, Hui Bin Gao, Ling Lin, Jian Qun Lin, Jian Qiang School of Administration Shandong University Jinan 250100 China Zhejiang University Hangzhou China Shandong Academy of Chinese Medicine Jinan 250014 China Shandong Provincial Key Lab for Distributed Computer Software Novel Technology School of Information Science and Engineering Shandong Normal University Jinan 250014 China State Key Lab of Microbial Technology Shandong University Jinan 250100 China
Fermentation process using recombinant strain for production of recombinant protein is widely used in commercialization of the biotechnologies. The continuous stirred tank reactor (CSTR) is a typical microbial cultiva... 详细信息
来源: 评论
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor
EqualVisor: Providing Memory Protection in an Untrusted Comm...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Liang Deng Qingkai Zeng Weiguang Wang Yao Liu Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology(Nanjing University) Nanjing China
In cloud computing, hypervisor is the all-powerful software running in the highest privilege layer, thus attackers who compromise a hypervisor may jeopardize the whole cloud, especially cause memory corruption of any ... 详细信息
来源: 评论
Graphics and Scene Text Classification in Video
Graphics and Scene Text Classification in Video
收藏 引用
International Conference on Pattern Recognition
作者: Jiamin Xu Palaiahnakote Shivakumara Tong Lu Trung Quy Phan Chew Lim Tan National Key Lab for Novel Software Technology Nanjing University Nanjing China Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia School of Computing National University of Singapore
Achieving good accuracy for text detection and recognition is a challenging and interesting problem in the field of video document analysis because of the presences of both graphics text that has good clarity and scen... 详细信息
来源: 评论
Text Detection Using Delaunay Triangulation in Video Sequence
Text Detection Using Delaunay Triangulation in Video Sequenc...
收藏 引用
IAPR International Workshop on Document Analysis Systems, DAS
作者: Liang Wu Palaiahnakote Shivakumara Tong Lu Chew Lim Tan National Key Lab for Novel Software Technology Nanjing University Nanjing China Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia School of Computing National University of Singapore
Text detection and tracking in video sequence is gaining interest due to the challenges posed by low resolution and complex background. This paper proposes a new method for text detection by estimating trajectories be... 详细信息
来源: 评论
2D and 3D Video Scene Text Classification
2D and 3D Video Scene Text Classification
收藏 引用
International Conference on Pattern Recognition
作者: Jiamin Xu Palaiahnakote Shivakumara Tong Lu Chew Lim Tan National Key Lab for Novel Software Technology Nanjing University Nanjing China Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia School of Computing National University of Singapore
Text detection and recognition is a challenging problem in document analysis due to the presence of the unpredictable nature of video texts, such as the variations of orientation, font and size, illumination effects, ... 详细信息
来源: 评论
Predicting employee relations in enterprises by bi-directional link mining  11
Predicting employee relations in enterprises by bi-direction...
收藏 引用
2014 11th World Congress on Intelligent Control and Automation, WCICA 2014
作者: Hong, Wang Sun, Yanshen Institute of Information Science and Engineering Shandong Normal University Jinan Shandong Province China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan Shandong Province China Department of Earth Sciences ZheJiang University Hangzhou Zhejiang Province China
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do... 详细信息
来源: 评论