咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 93 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 245 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 183 篇 工学
    • 135 篇 计算机科学与技术...
    • 112 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 土木工程
  • 91 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 blood vessels

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 10 篇 chen yang
  • 10 篇 yang chen
  • 6 篇 wu zhan
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 yang yang
  • 5 篇 qian peide
  • 5 篇 tianling lyu
  • 5 篇 wentao zhu

语言

  • 230 篇 英文
  • 13 篇 中文
  • 2 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology in Jiangsu"
245 条 记 录,以下是61-70 订阅
排序:
Indirect current control of active power filter using novel sliding mode controller
Indirect current control of active power filter using novel ...
收藏 引用
2012 IEEE 13th Workshop on Control and Modeling for Power Electronics, COMPEL 2012
作者: Fei, Juntao Li, Tianhua Zhang, Shenglei Jiangsu Key Lab. of Power Transmission and Distribution Equipment Technology College of Computer and Information Hohai University Changzhou 213022 China
A novel sliding mode control (SMC) method for indirect current controlled three-phase parallel active power filter is presented in this paper. There are two designed closed-loops in the system, one is the DC voltage c... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
Answer set programming with uncertain facts
Answer set programming with uncertain facts
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Sha, Lei Zhang, Zhizheng Department of Transportation Management Nanjing Institute of Railway Technology Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
We introduce a new logic programming paradigm-answer set programming with uncertain facts (LPuF for short). A LPuF program is an extension of answer set programs (ASP for short). We first define the syntax of LPuF pro... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
Semantic role lab.ling using Chinese dependency parsing tree
Semantic role labeling using Chinese dependency parsing tree
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hongling Wang Xiaohong Yuan Guodong Zhou Jiangsu Provincial Key Lab for Computer Information Processing Technology Soochow University Suzhou China
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b... 详细信息
来源: 评论
Adaptive resampling in particle filter based on diversity measures
Adaptive resampling in particle filter based on diversity me...
收藏 引用
International Conference on computer Science and Education
作者: Yu, Jin-Xia Liu, Wen-Jing Tang, Yong-Li College of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Jiangsu Provincial Key Lab. of Image Processing and Image Communication Nanjing University of Posts and Communication Nanjing 210003 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
It is very important to find a criterion when to perform a resampling step. Aimed at this problem, an adaptive resampling algorithm in particle filter based on diversity measures is presented. Based on the analysis an... 详细信息
来源: 评论
EFFICIENT ONLINE lab.L CONSISTENT HASHING FOR LARGE-SCALE CROSS-MODAL RETRIEVAL
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CR...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Yi, Jinhan Liu, Xin Cheung, Yiu-Ming Xu, Xing Fan, Wentao He, Yi Department of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Lab. of Computer Vision and Pattern Recognition Fujian Key Lab. of Big Data Intelligence and Security China Department of Computer Science Hong Kong Baptist University Kowloon Hong Kong School of Computer Science and Engineering University of Electronic Science and Technology of China China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Existing cross-modal hashing still faces three challenges: (1) Most batch-based methods are unsuitable for processing large-scale and streaming data. (2) Current online methods often suffer from insufficient semantic ... 详细信息
来源: 评论
The Applications of Generalized Computing In Knowledge Management
The Applications of Generalized Computing In Knowledge Manag...
收藏 引用
2005年公共管理国际会议
作者: YAO Min SHEN Bin ZHANG Yan-gu College of Computer Zhejiang University Provincial Key Lab. for Computer Information processing Technology in Jiangsu Suzhou University School of Computer Wenzhou Normal College
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe... 详细信息
来源: 评论