咨询与建议

限定检索结果

文献类型

  • 142 篇 会议
  • 58 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 156 篇 工学
    • 111 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 37 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 18 篇 化学工程与技术
    • 17 篇 生物工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 农业工程
    • 10 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 7 篇 网络空间安全
    • 6 篇 仪器科学与技术
    • 5 篇 交通运输工程
  • 86 篇 理学
    • 55 篇 数学
    • 19 篇 生物学
    • 18 篇 物理学
    • 16 篇 化学
    • 13 篇 统计学(可授理学、...
    • 8 篇 系统科学
  • 48 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 12 篇 农学
    • 10 篇 作物学
  • 8 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 4 篇 法学
    • 4 篇 社会学
  • 4 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10 篇 semantics
  • 7 篇 support vector m...
  • 5 篇 image segmentati...
  • 5 篇 accuracy
  • 5 篇 privacy
  • 5 篇 training
  • 3 篇 trees (mathemati...
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 vectors
  • 3 篇 data mining
  • 3 篇 syntactics
  • 3 篇 feature extracti...
  • 3 篇 natural language...
  • 3 篇 malware
  • 3 篇 labeling
  • 3 篇 forecasting
  • 3 篇 image reconstruc...
  • 3 篇 adaptation model...
  • 3 篇 information proc...

机构

  • 15 篇 school of comput...
  • 11 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 8 篇 key laboratory o...
  • 6 篇 provincial key l...
  • 6 篇 school of cyber ...
  • 6 篇 shanghai key lab...
  • 5 篇 jiangsu provinci...
  • 5 篇 school of inform...
  • 4 篇 jiangsu provinci...
  • 4 篇 institute of inf...
  • 4 篇 first-imaging te...
  • 4 篇 key lab. of inte...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 school of comput...

作者

  • 14 篇 kong fang
  • 13 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 8 篇 huang qingming
  • 8 篇 xu qianqian
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 7 篇 cao xiaochun
  • 6 篇 yang zhiyong
  • 6 篇 huang chongwen
  • 5 篇 chen chen
  • 5 篇 li peifeng
  • 4 篇 li yang
  • 4 篇 qian longhua
  • 4 篇 yang bo
  • 4 篇 yuen chau
  • 4 篇 zhang chao
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 chen yang

语言

  • 193 篇 英文
  • 5 篇 中文
  • 4 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology"
201 条 记 录,以下是61-70 订阅
An effective iris recognition system for identification of humans  8
An effective iris recognition system for identification of h...
收藏 引用
8th International Multitopic Conference, INMIC 2004
作者: Khan, Muhammad Khurram Zhang, Jiashu Horng, Shi-Jinn Sichuan Province Key Lab. of Signal and Information Processing Southwest Jiaotong University Chengdu610031 China Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan
In this paper, identification and verification approach based on human iris pattern is presented. The system is based on several steps from capturing the iris pattern, determining and localizing the iris boundaries, t...
来源: 评论
SAR image despeckling based on edge detection and nonsubsampled second generation bandelets
收藏 引用
Journal of Systems Engineering and Electronics 2009年 第3期20卷 519-526页
作者: Zhang Wenge~(1,2),Liu Fang~(1,2),Jiao Licheng~(2,3)& Gao Xinbo~(2,3) 1.School of computer Science and technology,Xidian Univ.,Xi’an 710071,P.R.China 2.key lab.of Intelligent Perception and Image Understanding of Ministry of Education of China,Xi’an 710071,P.R.China 3.Inst,of Intelligent information processing,Xidian Univ.,Xi’an 710071,P.R.China School of Computer Science and Technology Xidian Univ. Xi'an 710071 P. R. China Key Lab. of Intelligent Perception and Image Understanding of Ministry of Education of China Xi'an 710071 P. R. China Key Lab. of Intelligent Perception and Image Understanding of Ministry of Education of China Xi'an 710071 P. R. China Inst. of Intelligent Information Processing Xidian Univ. Xi'an 710071 P. R. China
To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform ... 详细信息
来源: 评论
Parametric local multimodal hashing for cross-view similarity search
Parametric local multimodal hashing for cross-view similarit...
收藏 引用
23rd International Joint Conference on Artificial Intelligence, IJCAI 2013
作者: Zhai, Deming Chang, Hong Zhen, Yi Liu, Xianming Chen, Xilin Gao, Wen School of Computer Science and Technology Harbin Institute of Technology Harbin China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Hong Kong University of Science and Technology Hong Kong Hong Kong
Recent years have witnessed the growing popularity of hashing for efficient large-scale similarity search. It has been shown that the hashing quality could be boosted by hash function learning (HFL). In this paper, we... 详细信息
来源: 评论
Energy-efficient network routing with discrete cost functions
Energy-efficient network routing with discrete cost function...
收藏 引用
9th Annual Conference on Theory and Applications of Models of Computation, TAMC 2012
作者: Wang, Lin Fernández Anta, Antonio Zhang, Fa Hou, Chenying Liu, Zhiyong Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China Institute IMDEA Networks Spain China State Key Lab. for Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China Graduate University of Chinese Academy of Sciences China
Energy consumption is an important issue in the design and use of networks. In this paper, we explore energy savings in networks via a rate adaptation model. This model can be represented by a cost-minimization networ... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
A chunk-based multi-strategy machine translation method  5th
A chunk-based multi-strategy machine translation method
收藏 引用
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018
作者: Wang, Yiou Zhang, Fuquan Beijing Institute of Science and Technology Information Beijing100044 China Digital Performance and Simulation Technology Lab School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China
In this paper, a chunk-based multi-strategy machine translation method is proposed. Firstly, an English-Chinese bilingual tree-bank is constructed. Then, a translation strategy based on the chunk that combines statist... 详细信息
来源: 评论
Adversarial Recovery Network for Low-Light Person Re-Identification  23
Adversarial Recovery Network for Low-Light Person Re-Identif...
收藏 引用
6th International Conference on Image and Graphics processing, ICIGP 2023
作者: Xu, Liu Wang, Xiao Yuan, Xin Mao, Zhu Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology China School of Computer Science and Technology Wuhan University of Science and Technology ChinaHubei Prov. Key Lab. of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology China
Person re-identification (re-ID), which is to connect pedestrians with the same identity in different scenarios, has been more widely used in case detection of security. The re-ID datasets and technology have contribu... 详细信息
来源: 评论