咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 93 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 245 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 184 篇 工学
    • 137 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 土木工程
  • 91 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 blood vessels

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 10 篇 chen yang
  • 10 篇 yang chen
  • 6 篇 wu zhan
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 yang yang
  • 5 篇 qian peide
  • 5 篇 tianling lyu
  • 5 篇 wentao zhu

语言

  • 229 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology in Jiangsu"
245 条 记 录,以下是41-50 订阅
排序:
The system design of a node of P2P networks for intrusion detection
收藏 引用
Journal of Networks 2013年 第8期8卷 1920-1927页
作者: Ding, Lei Yu, Fei Yang, Zhenghua Yue, Guangxue School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Mathematic and Computer Jiaxin University Jiaxin 314001 China
To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, suc... 详细信息
来源: 评论
A survey on video-based vehicle behavior analysis algorithms
收藏 引用
Journal of Multimedia 2012年 第3期7卷 223-230页
作者: Wu, Jian Cui, Zhi-Ming Chen, Jian-Ming Zhang, Guang-Ming The Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China Jiangsu Yihe Traffic Engineering Co. Ltd Suzhou 215002 China
Analysis of the Vehicle Behavior is mainly to analyze and identify the vehicles' motion pattern, and describe it by the use of natural language. It is a considerable challenge to analyze and describe the vehicles&... 详细信息
来源: 评论
Assessment of rotamer library for protein structure prediction
Assessment of rotamer library for protein structure predicti...
收藏 引用
2nd International Conference on information Science and Engineering, ICISE2010
作者: Huang, Xu Lü, Qiang Miao, Dajun Qian, Peide School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Lab for Information Processing Technologies Suzhou 215006 China
Side chain packing is a crucial step for protein structure prediction. And the quality of rotamer library has important implications in side chain packing. This paper assess dunbrack rotamer libraries and simple sampl... 详细信息
来源: 评论
Assigning method for decision power based on linguisitc 2-tuple judgment matrices
Journal of Software
收藏 引用
Journal of Software 2011年 第3期6卷 508-515页
作者: Zhang, Xixiang Yue, Guangxue Zheng, Xiajie Yu, Fei Business School of Jiaxing University Jiaxing China Mathematics and Information Engineering School of Jiaxing University Jiaxing China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Decision power is very important in group decision making, which effects the final decision making result. When there exists uncertainty in group decision making, it is easy for an expert to express his/her preference... 详细信息
来源: 评论
Fuzzy inference mechanism based automatic elastic registration of two-dimensional gel electrophoresis images
收藏 引用
information technology Journal 2012年 第1期11卷 20-29页
作者: Pan, Yonghui Deng, Zhaohong Wang, Shitong Gao, Qun Jiangsu Engineering R and D Center for Information Fusion Software Jiangsu Jiangyin 214405 China School of Digital Media Jiangnan University Lihu Avenue 1800 Wuxi Jiangsu 214122 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Jiangsu Suzhou 215123 China
A key technique for protein analysis is the geometric alignment of two-dimensional polyacrylamide gel electrophoresis (2-D PAGE), i.e., 2-D PAGE image registration. In this study, the adaptability in elastic image reg... 详细信息
来源: 评论
An unsupervised discriminative random vector functional link network for efficient data clustering  4
An unsupervised discriminative random vector functional link...
收藏 引用
4th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2021
作者: Zhang, Yikai Zhu, Qi Peng, Yong Kong, Wanzeng School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China Provincial Key Lab. for Computer Information Processing Technology Soochow University Suzhou215123 China
Random Vector Functional Link (RVFL) is a single hidden layer feed forward network which can be trained with non-iterative learning methods. Concretely, the input weights and hidden biases in RVFL can be randomly gene... 详细信息
来源: 评论
Improving nominal SRL in Chinese language with verbal SRL information and automatic predicate recognition
Improving nominal SRL in Chinese language with verbal SRL in...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Li, Junhui Zhou, Guodong Zhao, Hai Zhu, Qiaoming Qian, Peide Jiangsu Provincial Key Lab. for Computer Information Processing Technologies School of Computer Science and Technology Soochow University Suzhou 215006 China Department of Chinese Translation and Linguistics City University of HongKong Hong Kong
This paper explores Chinese semantic role lab.ling (SRL) for nominal predicates. Besides those widely used features in verbal SRL, various nominal SRL-specific features are first included. Then, we improve the perform... 详细信息
来源: 评论
Verifiable Fully Homomorphic Encryption scheme
Verifiable Fully Homomorphic Encryption scheme
收藏 引用
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012
作者: Jin, Fangyuan Zhu, Yanqin Luo, Xizhao Department of Computer Science and Technology Soochow University Suzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other p... 详细信息
来源: 评论
A Survey of Game Theory in Wireless Sensor Networks Security
收藏 引用
Journal of Networks 2011年 第3期6卷 521-532页
作者: Shen, Shigen Yue, Guangxue Cao, Qiying Yu, Fei College of Information Science and Technology Donghua University Shanghai China College of Mathematics and Information Engineering Jiaxing University Jiaxing China College of Computer and Communication Hunan University Changsha China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Wireless Sensor Networks (WSNs) are becoming an integral part of our lives. There are not widespread applications of WSNs without ensuring WSNs security. Due to the limited capabilities of sensor nodes in terms of com... 详细信息
来源: 评论
Survey of DCA for abnormal detection
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2087-2094页
作者: Ding, Lei Yu, Fei Yang, Zhenghua School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Information Science and Engineering Jishou University Jishou 416000 China
As a latest immune algorithm, dendritic cell algorithm (DCA) has been successfully applied into the abnormal detection. First, this paper reviewed the research progress of DCA from the following aspects: signal extrac... 详细信息
来源: 评论