咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 95 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 185 篇 工学
    • 136 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 92 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 231 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information processing Technology in Jiangsu"
247 条 记 录,以下是31-40 订阅
排序:
Semi-supervised learning for semantic relation classification using stratified sampling strategy
Semi-supervised learning for semantic relation classificatio...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Qian, Longhua Zhou, Guodong Kong, Fang Zhu, Qiaoming Jiangsu Provincial Key Lab for Computer Information Processing Technology School of Computer Science and Technology Soochow University 1 Shizi Street Suzhou 215006 China
This paper presents a new approach to selecting the initial seed set using stratified sampling strategy in bootstrapping-based semi-supervised learning for semantic relation classification. First, the training data is... 详细信息
来源: 评论
An access control model in lager-scale P2P file sharing systems
An access control model in lager-scale P2P file sharing syst...
收藏 引用
7th International Conference on Computational Science (ICCS 2007)
作者: Yue Guang-xue Yu Fei Chen Li-ping Chen Yi-jun College of Information Engineering Jiaxing University 314000 China Department of Computer Science and Technology Huaihua University 418000 China State Key Lab. for Novel Software Technology Nanjing University 210093 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 2150063 China
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym... 详细信息
来源: 评论
Assessment of rotamer library for protein structure prediction
Assessment of rotamer library for protein structure predicti...
收藏 引用
2nd International Conference on information Science and Engineering, ICISE2010
作者: Huang, Xu Lü, Qiang Miao, Dajun Qian, Peide School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Lab for Information Processing Technologies Suzhou 215006 China
Side chain packing is a crucial step for protein structure prediction. And the quality of rotamer library has important implications in side chain packing. This paper assess dunbrack rotamer libraries and simple sampl... 详细信息
来源: 评论
An unsupervised discriminative random vector functional link network for efficient data clustering  4
An unsupervised discriminative random vector functional link...
收藏 引用
4th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2021
作者: Zhang, Yikai Zhu, Qi Peng, Yong Kong, Wanzeng School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China Provincial Key Lab. for Computer Information Processing Technology Soochow University Suzhou215123 China
Random Vector Functional Link (RVFL) is a single hidden layer feed forward network which can be trained with non-iterative learning methods. Concretely, the input weights and hidden biases in RVFL can be randomly gene... 详细信息
来源: 评论
Improving nominal SRL in Chinese language with verbal SRL information and automatic predicate recognition
Improving nominal SRL in Chinese language with verbal SRL in...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Li, Junhui Zhou, Guodong Zhao, Hai Zhu, Qiaoming Qian, Peide Jiangsu Provincial Key Lab. for Computer Information Processing Technologies School of Computer Science and Technology Soochow University Suzhou 215006 China Department of Chinese Translation and Linguistics City University of HongKong Hong Kong
This paper explores Chinese semantic role lab.ling (SRL) for nominal predicates. Besides those widely used features in verbal SRL, various nominal SRL-specific features are first included. Then, we improve the perform... 详细信息
来源: 评论
Verifiable Fully Homomorphic Encryption scheme
Verifiable Fully Homomorphic Encryption scheme
收藏 引用
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012
作者: Jin, Fangyuan Zhu, Yanqin Luo, Xizhao Department of Computer Science and Technology Soochow University Suzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other p... 详细信息
来源: 评论
Dependency tree-based SRL with proper pruning and extensive feature engineering
Dependency tree-based SRL with proper pruning and extensive ...
收藏 引用
12th Conference on Computational Natural Language Learning, CoNLL 2008
作者: Wang, Hongling Wang, Honglin Zhou, Guodong Zhu, Qiaoming Jiang Su Provincial Key Lab for Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou 215006 China
This paper proposes a dependency tree-based SRL system with proper pruning and extensive feature engineering. Official evaluation on the CoNLL 2008 shared task shows that our system achieves 76.19 in lab.led macro F1 ... 详细信息
来源: 评论
Approaches to image retrieval using fuzzy set theory
Approaches to image retrieval using fuzzy set theory
收藏 引用
2008 IEEE International Conference Neural Networks and Signal processing, ICNNSP
作者: Li, Yang Xuelong, Hu Jun, Pan School of Information Engineering Yangzhou University Yangzhou Jiangsu 225009 China Jiangsu Province Key Lab. for Image Processing and Image Communication Nanjing University of Posts and Communications Nanjing Jiangsu 210003 China Jiangsu Prov. Key Lab. for Computer Information Processing Technology Suzhou University Suzhou Jiangsu 215006 China
This paper mainly presents two approaches for image retrieval. There is some faintness in color locating in quantification boundary when image color is quantized. The membership function in fuzzy set theory can descri... 详细信息
来源: 评论
A content-based classified hierarchical vector quantization algorithm for volume compression
Journal of Software
收藏 引用
Journal of Software 2011年 第2期6卷 322-330页
作者: Zhao, Li-Ping Yue, Guang-Xue Xiao, De-Gui Zhou, Xu Yu, Xiang Yu, Fei School of Mathematics and Information Engineering Jiaxing University Jiaxing Zhejiang China School of Computer and Communication Engineering Hunan University Changsha Hunan China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
An improved volumetric compression algorithm is presented in this paper. Histogram technique is used for analyzing the trait of volume data. The volume data is then partitioned into volume bricks which will be classif... 详细信息
来源: 评论
Genetic algorithm for pareto optimum-based route selection
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第2期18卷 360-368页
作者: Cui Xunxue Li Qin Tao Qing New Star Research Inst. of Applied Technology Hefei 230031 P. R. China Jiangsu Key Lab of Computer Information Processing Technology Soochow Univ. Suzhou 215006 P. R. China
A quality of service (QoS) or constraint-based routing selection needs to find a path subject to multiple constraints through a network. The problem of finding such a path is known as the multi-constrained path (MC... 详细信息
来源: 评论