咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 93 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 245 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 183 篇 工学
    • 135 篇 计算机科学与技术...
    • 112 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 土木工程
  • 91 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 blood vessels

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 10 篇 chen yang
  • 10 篇 yang chen
  • 6 篇 wu zhan
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 yang yang
  • 5 篇 qian peide
  • 5 篇 tianling lyu
  • 5 篇 wentao zhu

语言

  • 230 篇 英文
  • 13 篇 中文
  • 2 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology in Jiangsu"
245 条 记 录,以下是91-100 订阅
排序:
Developing software using a novel event-condition-state pattern framework: Taking mobile input method system As A Case Study
Journal of Software
收藏 引用
Journal of Software 2011年 第8期6卷 1506-1512页
作者: Zhu, Fei Diao, Hongjun Huang, Wei School of Computer Science and Technology Soochow University Suzhou Jiangsu 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou Jiangsu 215006 China
Design patterns add more reliability, flexibility and reusability to a software system. Taking advantage of design patterns is usually beneficial to software design and makes software development relatively easier. Th... 详细信息
来源: 评论
Hidden space discriminant neighborhood embedding
Hidden space discriminant neighborhood embedding
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Chuntao Ding Li Zhang Bangjun Wang School of Computer Science and Technology & Provincial Key laboratory for Computer Information Processing Soochow University Suzhou Jiangsu China
Discriminant neighborhood embedding (DNE) algorithm is one of supervised linear dimensionality reduction methods. Its nonlinear version kernel discriminant neighborhood embedding (KDNE) is expected to behave well on c... 详细信息
来源: 评论
A chunk-based multi-strategy machine translation method  5th
A chunk-based multi-strategy machine translation method
收藏 引用
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018
作者: Wang, Yiou Zhang, Fuquan Beijing Institute of Science and Technology Information Beijing100044 China Digital Performance and Simulation Technology Lab School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China
In this paper, a chunk-based multi-strategy machine translation method is proposed. Firstly, an English-Chinese bilingual tree-bank is constructed. Then, a translation strategy based on the chunk that combines statist... 详细信息
来源: 评论
Towards Termination Criteria of Ant Colony Optimization
Towards Termination Criteria of Ant Colony Optimization
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Qiang Lv Xiaoyan Xia School of Computer Science and Technology Suzhou University Suzhou Jiangsu China Provincial Key Laboratory Computer Information Processing Technology Suzhou Jiangsu China
Ant colony optimization (ACO for short) has been proved a successful meta-heuristic by a huge of empirical studies. This paper discusses the termination criteria of ACO and therefore provides research ideas to other m... 详细信息
来源: 评论
Privacy preservation in role-based access control model
收藏 引用
Journal of Networks 2011年 第8期6卷 1106-1113页
作者: Chen, Zuo Yang, Qiuwei Wan, Xin Tu, Yuanyan Yu, Fei Xu, Chen School of Computer and Communication Hunan University Changsha China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Privacy preservation is a crucial problem in resource sharing and collab.rating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided th... 详细信息
来源: 评论
Adaptive Mutation particle filter based on diversity guidance
Adaptive Mutation particle filter based on diversity guidanc...
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Yu, Jin-Xia Tang, Yong-Li Liu, Wen-Jing College of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Jiangsu Provincial Key Lab of Image Processing and Image Communication Nanjing University of Posts and Communication Nanjing 210003 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Aimed at the deficiency of the resampling algorithm in PF, diversity measures ESS (effective sample size) and PDF (population diversity factor) are evaluated respectively. Combined with the estimation result, diversit... 详细信息
来源: 评论
Research on diversity measure in particle filter
Research on diversity measure in particle filter
收藏 引用
2010 International Conference on Intelligent Computation technology and Automation, ICICTA 2010
作者: Yu, Jinxia Tang, Yongli Liu, Wenjing College of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Jiangsu Provincial Key Lab of Image Processing and Image Communication Nanjing University of Posts and Communication Nanjing 210003 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
It is very important to find diversity measure when to perform a resampling step in particle filter. By analyzing the inherent deficiency in resampling algorithm of particle filter, some diversity measures including e... 详细信息
来源: 评论
A Novel Evaluation Method Based on Entropy for Image Segmentation
收藏 引用
Procedia Engineering 2012年 29卷 3959-3965页
作者: Xiaoling Chen Riming Wang Yunfei Cao Weiyu Yu Jiuchao Feng School of Electronic and Information Engineering South China University of TechnologyGuangzhou China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhouJiangsu 215006 China
Image segmentation evaluation is still a hotspot problem. Various methods of image segmentation evaluation have been proposed. Amongst all the evaluation approaches, Segmentation Entropy Quantitative Assessment (SEQA)... 详细信息
来源: 评论
Adversarial Recovery Network for Low-Light Person Re-Identification  23
Adversarial Recovery Network for Low-Light Person Re-Identif...
收藏 引用
6th International Conference on Image and Graphics processing, ICIGP 2023
作者: Xu, Liu Wang, Xiao Yuan, Xin Mao, Zhu Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology China School of Computer Science and Technology Wuhan University of Science and Technology ChinaHubei Prov. Key Lab. of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology China
Person re-identification (re-ID), which is to connect pedestrians with the same identity in different scenarios, has been more widely used in case detection of security. The re-ID datasets and technology have contribu... 详细信息
来源: 评论
Research on remote heterogeneous disaster recovery technology in grid computing security
Research on remote heterogeneous disaster recovery technolog...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Wu, Ronghui Li, Renfa Yu, Fei Yue, Guangxue Wen, Jigang School of Computer and Communication Hunan University Changsha 410082 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ... 详细信息
来源: 评论