咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 95 篇 期刊文献

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 185 篇 工学
    • 136 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 92 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 230 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology in Jiangsu"
246 条 记 录,以下是121-130 订阅
An optimized band selection scheme for hyperspectral imagery analysis  5
An optimized band selection scheme for hyperspectral imagery...
收藏 引用
5th Workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing, WHISPERS 2013
作者: Su, Hongjun Du, Qian Du, Peijun School of Earth Sciences and Engineering Hohai University China Department of Electrical and Computer Engineering Mississippi State University United States Department of Geographical Information Science Nanjing University China Jiangsu Key Lab. of Spectral Imaging and Intelligent Sense Nanjing University of Science and Technology China
A particle swarm optimization (PSO)-based automatic system to determine the number of optimal band sets and corresponding bands is proposed. A simple searching criterion function, called minimum estimated abundance co... 详细信息
来源: 评论
A Fast Calculation of Metric Scores for Learning Bayesian Network
收藏 引用
International Journal of Automation and computing 2012年 第1期9卷 37-44页
作者: Qiang Lv Xiao-Yan Xia Pei-De Qian School of Computer Science and Technology Soochow University Suzhou 215006 PRC Jiangsu Provincial Key Lab for Computer Information Processing Technology Suzhou 215006 PRC
Frequent counting is a very so often required operation in machine learning algorithms. A typical machine learning task, learning the structure of Bayesian network (BN) based on metric scoring, is introduced as an e... 详细信息
来源: 评论
A reconfigurable routing method for fault-tolerant mesh-based network on chip
收藏 引用
Journal of information and Computational Science 2013年 第1期10卷 157-165页
作者: Liu, Yanhua Ruan, Ying Lai, Zongsheng Sun, Ling Institute of Microelectronics Circuit and System East China Normal University Shanghai 200241 China Jiangsu Provincial Key Lab. of ASIC Design Nantong University Nantong 226019 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
As the semiconductor industry advances to nano-technology points, Network on Chip (NoC) components are becoming vulnerable to errors during the system operation. Consequently, fault-tolerant techniques for NoC are nee... 详细信息
来源: 评论
Verifiable Fully Homomorphic Encryption scheme
Verifiable Fully Homomorphic Encryption scheme
收藏 引用
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012
作者: Jin, Fangyuan Zhu, Yanqin Luo, Xizhao Department of Computer Science and Technology Soochow University Suzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other p... 详细信息
来源: 评论
A processing method for inconsistent answer set programs based on minimal principle
A processing method for inconsistent answer set programs bas...
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Zhu, Tao Zhang, Zhizheng Zhai, Yuqing Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China
Answer set programming (ASP) has become an important tool for knowledge representation and reasoning. Inconsistency processing in ASP provides a way for reasoning of inconsistent knowledge. In this paper, we present a... 详细信息
来源: 评论
Indirect current control of active power filter using novel sliding mode controller
Indirect current control of active power filter using novel ...
收藏 引用
2012 IEEE 13th Workshop on Control and Modeling for Power Electronics, COMPEL 2012
作者: Fei, Juntao Li, Tianhua Zhang, Shenglei Jiangsu Key Lab. of Power Transmission and Distribution Equipment Technology College of Computer and Information Hohai University Changzhou 213022 China
A novel sliding mode control (SMC) method for indirect current controlled three-phase parallel active power filter is presented in this paper. There are two designed closed-loops in the system, one is the DC voltage c... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
Answer set programming with uncertain facts
Answer set programming with uncertain facts
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Sha, Lei Zhang, Zhizheng Department of Transportation Management Nanjing Institute of Railway Technology Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
We introduce a new logic programming paradigm-answer set programming with uncertain facts (LPuF for short). A LPuF program is an extension of answer set programs (ASP for short). We first define the syntax of LPuF pro... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
Pick-up tree based route recommendation from taxi trajectories
Pick-up tree based route recommendation from taxi trajectori...
收藏 引用
13th International Conference on Web-Age information Management, WAIM 2012
作者: Hu, Haoran Wu, Zhiang Mao, Bo Zhuang, Yi Cao, Jie Pan, Jingui State Key Lab. for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China College of Computer and Information Engineering Zhejiang Gongshang University Hangzhou China
Recommending suitable routes to taxi drivers for picking up passengers is helpful to raise their incomes and reduce the gasoline consumption. In this paper, a pick-up tree based route recommender system is proposed to... 详细信息
来源: 评论