咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 95 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 185 篇 工学
    • 136 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 92 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 231 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information processing Technology in Jiangsu"
247 条 记 录,以下是131-140 订阅
排序:
A Policy-Controlled Signature Scheme for end-to-end Secure Communication  12
A Policy-Controlled Signature Scheme for end-to-end Secure C...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Yu, Feng Meng, Linghui Xi, Jing Li, Xianxian Lu, Qianhui Zhu, Weidong Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology GuiLin China University of SouthEast Jiangsu Provincial Key Laboratory of Netwrok and Information Security Nanjing China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security GuiLin China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University GuiLin China
In the digitalized society, end-to-end security communication is receiving increasing attention. Issues such as ma-licious sender impersonation and over-privilege communication continue to prevail in end-to-end commun... 详细信息
来源: 评论
Robust restoration of low-dose cerebral perfusion CT images using NCS-Unet
收藏 引用
Nuclear Science and Techniques 2022年 第3期33卷 62-76页
作者: Kai Chen Li-Bo Zhang Jia-Shun Liu Yuan Gao Zhan Wu Hai-Chen Zhu Chang-Ping Du Xiao-Li Mai Chun-Feng Yang Yang Chen Southeast University Nanjing 210096China School of Cyber Science and Engineering Southeast UniversityNanjing 210096China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing 210096China Department of Radiology General Hospital of the Northern Theater of the Chinese People’s Liberation ArmyShenyang 110016China Laboratory of Image Science and Technology The School of Computer Science and EngineeringSoutheast UniversityNanjing 210096China Department of Radiology Nanjing Drum Tower HospitalThe Affiliated Hospital of Nanjing University Medical SchoolNanjing 210008China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of RadiologyZhongda HospitalSoutheast UniversityNanjing 210009China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and EngineeringSoutheast UniversityNanjing 210096China
Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke *** widespread public concern about the potential cancer risks and health hazards associat... 详细信息
来源: 评论
A Novel User Behavior Prediction and Optimization Algorithm for Single-User Multi-terminal Scenario
A Novel User Behavior Prediction and Optimization Algorithm ...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Hui Zhang Juan Chen Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China Jiangsu Key Lab of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing China
For the single-user multi-terminal scenario, a novel user service behavior prediction and optimization algorithm is proposed in this paper, which can realize the accurate prediction of service requirements and optimal... 详细信息
来源: 评论
Parallel answer set solving algorithm based on multi-core processor technology
Parallel answer set solving algorithm based on multi-core pr...
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Zhang, Xing Zhang, Zhizheng Zhai, Yuqing Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
Answer Set Programming (ASP) is widely used in many areas of Artificial Intelligence. A parallel answer set solving algorithm based on multi-core processor technology is proposed in this paper. The parallel algorithm ... 详细信息
来源: 评论
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Rui Li Rui Li Renfa Li Renfa Li Fei Yu Fei Yu Jigang Wen Jigang Wen School of Computer and Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu China
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und...
来源: 评论
Kinetics and Modeling of Chemical Leaching of Sphalerite Concentrate Using Ferric Iron in a Redox-controlled Reactor
收藏 引用
Chinese Journal of Chemical Engineering 2013年 第8期21卷 933-936页
作者: 宋健 高玲 林建群 吴洪斌 林建强 State Key Lab of Microbial Technology Shandong University Department of Pharmacy and Biotechnology Zibo Vocational Institute Shandong Provincial Key Lab for Distributed Computer Software Novel Technology School of Information Science and EngineeringShandong Normal University Institute of Agro-products Processing Science and Technology Xinjiang Academy of Agricultural and Reclamation Science
This work presents a study for chemical leaching of sphalerite concentrate under various constant Fe3+ concentrations and redox potential conditions. The effects of Fe3+ concentration and redox potential on chemical l... 详细信息
来源: 评论
A policy language for expressing access control properties in PDAC model
A policy language for expressing access control properties i...
收藏 引用
International Conference on computer Science & Education (ICCSE)
作者: Xian Wu Peide Qian School of Computer Science and Technology Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Computer Science and Technology Soochow University Suzhou China
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin... 详细信息
来源: 评论
Logic program with prioritized preference
Logic program with prioritized preference
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Wang, Jinxin Zhang, Zhizheng Zhai, Yuqing Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China
Prioritized preference based decision making is pervasive in real problems solving. We propose a new paradigm of logic programming to handle prioritized preference. The paradigm is interpreted based on answer set sema... 详细信息
来源: 评论
ADJSA: an adaptable dynamic job scheduling approach based on historical information  07
ADJSA: an adaptable dynamic job scheduling approach based on...
收藏 引用
Proceedings of the 2nd international conference on Scalab.e information systems
作者: Lan Xu Qiao-ming Zhu Zhengxian Gong Pei-feng Li Soochow University Suzhou China and Key Lab of Computer Information Processing Technology of Jiangsu Province Suzhou China
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its cha... 详细信息
来源: 评论
A Fast 2D Otsu Thresholding Algorithm Based on Improved Histogram
A Fast 2D Otsu Thresholding Algorithm Based on Improved Hist...
收藏 引用
Chinese Conference on Pattern Recognition (CCPR)
作者: Ningbo Zhu Gang Wang Gaobo Yang Weiming Dai School of Computer and Communication Hunan University Changsha Hunan China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow Jiangsu China
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computationa... 详细信息
来源: 评论