咨询与建议

限定检索结果

文献类型

  • 1,185 篇 会议
  • 1,068 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 2,271 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,527 篇 工学
    • 1,005 篇 计算机科学与技术...
    • 825 篇 软件工程
    • 373 篇 信息与通信工程
    • 198 篇 生物工程
    • 186 篇 电气工程
    • 168 篇 控制科学与工程
    • 165 篇 生物医学工程(可授...
    • 157 篇 电子科学与技术(可...
    • 136 篇 光学工程
    • 108 篇 机械工程
    • 89 篇 化学工程与技术
    • 70 篇 材料科学与工程(可...
    • 65 篇 仪器科学与技术
    • 51 篇 动力工程及工程热...
    • 38 篇 土木工程
    • 33 篇 建筑学
    • 27 篇 安全科学与工程
  • 915 篇 理学
    • 492 篇 数学
    • 263 篇 物理学
    • 224 篇 生物学
    • 163 篇 统计学(可授理学、...
    • 95 篇 化学
    • 91 篇 系统科学
  • 392 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 118 篇 医学
    • 104 篇 临床医学
    • 87 篇 基础医学(可授医学...
    • 63 篇 药学(可授医学、理...
  • 59 篇 法学
    • 49 篇 社会学
  • 36 篇 农学
  • 20 篇 经济学
  • 18 篇 教育学
  • 10 篇 文学
  • 6 篇 艺术学
  • 3 篇 军事学
  • 2 篇 哲学

主题

  • 63 篇 feature extracti...
  • 60 篇 computer science
  • 53 篇 training
  • 49 篇 semantics
  • 35 篇 computational mo...
  • 31 篇 image segmentati...
  • 27 篇 machine learning
  • 27 篇 robustness
  • 26 篇 support vector m...
  • 26 篇 hidden markov mo...
  • 26 篇 signal processin...
  • 25 篇 deep learning
  • 24 篇 laboratories
  • 24 篇 visualization
  • 23 篇 optimization
  • 23 篇 image processing
  • 22 篇 humans
  • 21 篇 neural networks
  • 21 篇 speech recogniti...
  • 19 篇 object detection

机构

  • 35 篇 key laboratory o...
  • 32 篇 department of co...
  • 29 篇 department of co...
  • 27 篇 shanghai key lab...
  • 26 篇 shanghai key lab...
  • 26 篇 university of ch...
  • 22 篇 department of co...
  • 20 篇 department of si...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 provincial key l...
  • 17 篇 shanghai key lab...
  • 17 篇 hubei province k...
  • 17 篇 shanghai key lab...
  • 16 篇 xinjiang key lab...
  • 15 篇 peng cheng labor...
  • 14 篇 national key lab...
  • 14 篇 shanghai key lab...
  • 14 篇 key laboratory o...
  • 13 篇 department of el...

作者

  • 28 篇 shuigeng zhou
  • 26 篇 lan man
  • 24 篇 jihong guan
  • 18 篇 zhou shuigeng
  • 17 篇 guan jihong
  • 16 篇 he liang
  • 14 篇 liang he
  • 13 篇 huang qingming
  • 13 篇 pan linqiang
  • 13 篇 shen linlin
  • 12 篇 ahmad akbari
  • 11 篇 wu yuanbin
  • 11 篇 wang wei
  • 10 篇 akbari ahmad
  • 10 篇 jaakko t. astola
  • 10 篇 ney hermann
  • 10 篇 zhongzhi zhang
  • 9 篇 hou junlin
  • 9 篇 liu yang
  • 9 篇 tian qi

语言

  • 2,044 篇 英文
  • 190 篇 其他
  • 34 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Processing Department of Computer Science and Technology"
2271 条 记 录,以下是1611-1620 订阅
排序:
Determination of sparse representations of multiple-valued logic functions by using covering codes
Determination of sparse representations of multiple-valued l...
收藏 引用
作者: Astola, Jaakko T. Stanković, Radomir S. Institute of Signal Processing Tampere University of Technology FIN-33101 Tampere Finland Department of Computer Science Faculty of Electronics 18 000 Niš Serbia
The paper points out the relationships and similarities between some problems in the theory of covering codes and the determination of sparse functional expressions for logic functions. Based on these connections we p... 详细信息
来源: 评论
Corrigendum to “Graph structure analysis based on complex network” [Digital Signal processing 22 (5) (2012) 713–725]
收藏 引用
Digital Signal processing 2013年 第4期23卷 1332-1332页
作者: Jin Tang Bo Jiang Chin-Chen Chang Bin Luo School of Computer Science and Technology Anhui University Hefei 230039 Anhui China Key lab of Image Processing & Analysis of Anhui Province Hefei 230039 Anhui China Department of Information Engineering and Computer Science Feng Chia University Taiwan
来源: 评论
Hierarchical chunk-to-string translation
Hierarchical chunk-to-string translation
收藏 引用
50th Annual Meeting of the Association for Computational Linguistics, ACL 2012
作者: Feng, Yang Zhang, Dongdong Li, Mu Zhou, Ming Liu, Qun Department of Computer Science University of Sheffield Sheffield United Kingdom Microsoft Research Asia China Key Laboratory of Intelligent Information Processing Chinese Academy of Sciences Institute of Computing Technology China
We present a hierarchical chunk-to-string translation model, which can be seen as a compromise between the hierarchical phrasebased model and the tree-to-string model, to combine the merits of the two models. With the... 详细信息
来源: 评论
Left-to-right tree-to-string decoding with prediction
Left-to-right tree-to-string decoding with prediction
收藏 引用
2012 Joint Conference on Empirical Methods in Natural Language processing and Computational Natural Language Learning, EMNLP-CoNLL 2012
作者: Feng, Yang Liu, Yang Liu, Qun Cohn, Trevor Department of Computer Science University of Sheffield Sheffield United Kingdom State Key Laboratory on Intelligent Technology and Systems Department of Computer Sci. and Tech. Tsinghua University Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
Decoding algorithms for syntax based machine translation suffer from high computational complexity, a consequence of intersecting a language model with a context free grammar. Left-to-right decoding, which generates t... 详细信息
来源: 评论
Design of multiple anti-windup loops for multiple activations
收藏 引用
science China(Information sciences) 2012年 第9期55卷 1925-1934页
作者: WU XiongJun 1,2 & LIN Zongli 3,1 1 department of Automation,Shanghai Jiao Tong University,and Key Laboratory of System Control and Information processing,Ministry of Education of China,Shanghai 200240,China 2 No.802 Institute of Shanghai Academy of Space Flight technology,the Eighth Academy of China Aerospace science and technology Corporation,Shanghai 200090,China 3 Charles L.Brown department of Electrical and computer Engineering,University of Virginia,P.O.Box 400743,Charlottesville,VA 22904-4743,USA Department of Automation Shanghai Jiao Tong University and Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China No. 802 Institute of Shanghai Academy of Space Flight Technology the Eighth Academy of China Aerospace Science and Technology Corporation Shanghai China Charles L. Brown Department of Electrical and Computer Engineering University of Virginia Charlottesville USA
This paper considers anti-windup design for linear systems subject to actuator *** anti-windup gains are designed for activations immediately at the occurrence actuator saturation,after the saturation has reached a ce... 详细信息
来源: 评论
Dione: An integrated measurement and defect prediction solution
Dione: An integrated measurement and defect prediction solut...
收藏 引用
20th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE 2012
作者: Caglayan, Bora Misirli, Ayse Tosun Calikli, Gul Bener, Ayse Aytac, Turgay Turhan, Burak Department of Computer Engineering Bogazici University Turkey Department of Information Processing Science University of Oulu Finland Ted Rogers School of Information Technology Management Ryerson University Toronto ON Canada Prescience Inc. United States
We present an integrated measurement and defect prediction tool: Dione. Our tool enables organizations to measure, monitor, and control product quality through learning based defect prediction. Similar existing tools ... 详细信息
来源: 评论
Identifying high-impact sub-structures for convolution kernels in document-level sentiment classification
Identifying high-impact sub-structures for convolution kerne...
收藏 引用
50th Annual Meeting of the Association for Computational Linguistics, ACL 2012
作者: Tu, Zhaopeng He, Yifan Foster, Jennifer Van Genabith, Josef Liu, Qun Lin, Shouxun Key Lab. of Intelligent Info. Processing Institute of Computing Technology CAS China Computer Science Department New York University United States School of Computing Dublin City University Ireland
Convolution kernels support the modeling of complex syntactic information in machinelearning tasks. However, such models are highly sensitive to the type and size of syntactic structure used. It is therefore an import... 详细信息
来源: 评论
Asynchronous extended spiking neural P systems with astrocytes
Asynchronous extended spiking neural P systems with astrocyt...
收藏 引用
12th International Conference on Membrane Computing, CMC 2011
作者: Pan, Linqiang Wang, Jun Hoogeboom, Hendrik Jan Image Processing and Intelligent Control Key Laboratory of Education Ministry Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan 430074 Hubei China Leiden Institute of Advanced Computer Science Universiteit Leiden Niels Bohrweg 1 2333 CA Leiden Netherlands
A variant of spiking neural P systems was recently investigated by the authors, using astrocytes that have excitatory and inhibitory influence on synapses. In this work, we consider this system in the non-synchronized... 详细信息
来源: 评论
Secure two-party computation of the quadratic function's extreme minimal value
Secure two-party computation of the quadratic function's ext...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Fen, Wu Hong, Zhong Runhua, Shi Hongsheng, Huang School of Computer Science and Technology Anhui University Anhui China Key Laboratory of Intelligent Computing and Signal Processing Anhui University Ministry of Education Anhui China Department of Operation and Maintence in China Mobile Xuancheng China
Privacy-Preserving Computational Geometry (PPCG) is a special Secure Multi-party Computation, which is a hot research in information security. This paper presented a special PPCG problem of secure two-party computing ... 详细信息
来源: 评论
VIQI: A new approach for visual interpretation of deep web query interfaces
VIQI: A new approach for visual interpretation of deep web q...
收藏 引用
2012 International Conference on Information technology and e-Services, ICITeS 2012
作者: Boughammoura, Radhouane Hlaoua, Lobna Omri, Mohamed Nazih Department of Sciences of Data Processing Faculty of Sciences of Monastir Research Unit MARS Monastir Tunisia Department of Electronic and Computer Science High School of Sciences and Technology of H. Sousse Research Unit MARS H. Sousse Tunisia
Deep Web databases contain more than 90% of pertinent information of the Web. Despite their importance, users don't profit of this treasury. Many deep web services are offering competitive services in term of pric... 详细信息
来源: 评论