咨询与建议

限定检索结果

文献类型

  • 3,473 篇 会议
  • 2,501 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,998 篇 工学
    • 2,737 篇 计算机科学与技术...
    • 2,270 篇 软件工程
    • 1,038 篇 信息与通信工程
    • 500 篇 电气工程
    • 469 篇 生物工程
    • 445 篇 电子科学与技术(可...
    • 411 篇 控制科学与工程
    • 382 篇 光学工程
    • 294 篇 生物医学工程(可授...
    • 282 篇 机械工程
    • 256 篇 化学工程与技术
    • 201 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 134 篇 网络空间安全
    • 132 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 108 篇 交通运输工程
  • 2,190 篇 理学
    • 1,184 篇 数学
    • 655 篇 物理学
    • 521 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 269 篇 化学
    • 166 篇 系统科学
  • 1,057 篇 管理学
    • 563 篇 图书情报与档案管...
    • 536 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 246 篇 医学
    • 209 篇 临床医学
    • 185 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 149 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 77 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 258 篇 feature extracti...
  • 235 篇 semantics
  • 165 篇 training
  • 130 篇 accuracy
  • 121 篇 computational mo...
  • 105 篇 deep learning
  • 105 篇 convolution
  • 86 篇 data mining
  • 82 篇 image segmentati...
  • 77 篇 object detection
  • 77 篇 visualization
  • 76 篇 data models
  • 71 篇 robustness
  • 69 篇 convolutional ne...
  • 66 篇 optimization
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 60 篇 face recognition
  • 59 篇 contrastive lear...
  • 58 篇 federated learni...

机构

  • 208 篇 shandong provinc...
  • 187 篇 key laboratory o...
  • 185 篇 hubei province k...
  • 142 篇 key laboratory o...
  • 141 篇 school of inform...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 99 篇 fujian provincia...
  • 87 篇 shandong provinc...
  • 74 篇 national key lab...
  • 73 篇 university of ch...
  • 73 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 65 篇 school of comput...
  • 62 篇 shanghai key lab...
  • 59 篇 shanghai key lab...
  • 56 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 55 篇 huang qingming
  • 53 篇 li zhaohui
  • 52 篇 zhaohui li
  • 45 篇 zhang fuquan
  • 44 篇 li chenglong
  • 35 篇 tang jin
  • 32 篇 li wei
  • 31 篇 guo di
  • 31 篇 fan li
  • 30 篇 zuoyong li
  • 30 篇 boxin shi
  • 30 篇 shen linlin
  • 29 篇 wang wei
  • 28 篇 feng rui
  • 26 篇 wang xiao
  • 26 篇 yang zhiyong
  • 25 篇 liu yang
  • 25 篇 li fan
  • 25 篇 he liang

语言

  • 5,594 篇 英文
  • 246 篇 其他
  • 143 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology"
5975 条 记 录,以下是4991-5000 订阅
Personalized recommendation based on link prediction in dynamic super-networks  5
Personalized recommendation based on link prediction in dyna...
收藏 引用
5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
作者: Hong, Wang Yanshen, Sun Xiaomei, Yu Institute of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China Department of Earth Sciences Zhejiang University Hangzhou310000 China
Personalized recommendation is one of the most effective methods to solve the problem of information overloading. As many real existing systems in nature, a recommendation system can also be considered as a complex ne... 详细信息
来源: 评论
The application of trusted computing technology in the cloud security
The application of trusted computing technology in the cloud...
收藏 引用
3rd International Conference on computer Engineering and Network, CENet 2013
作者: Li, Bo Lv, Shenjuan Zhang, Yongsheng Tian, Ming Academic Affairs Office Shandong Polytechnic Jinan 250104 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
For the lack of safety and reliability of the information in the cloud computing environment, in order to create a more flexible and adaptable security mechanism, the combination of cloud computing and credible concep... 详细信息
来源: 评论
Strategy of domain and cross-domain access control based on trust in cloud computing environment
Strategy of domain and cross-domain access control based on ...
收藏 引用
3rd International Conference on computer Engineering and Network, CENet 2013
作者: Li, Bo Tian, Ming Zhang, Yongsheng Lv, Shenjuan Academic Affairs Office Shandong Polytechnic Jinan 250104 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
Under the current cloud computing environment, a reasonable and practicable access control strategy is needed, which is a guarantee to protect cloud computing suppliers to provide services and many cloud users access ... 详细信息
来源: 评论
An exponential smoothing adaptive failure detector in the dual model of heartbeat and interaction
收藏 引用
Journal of Computing Science and Engineering 2014年 第1期8卷 17-24页
作者: Yang, Zhiyong Li, Chunlin Liu, Yanpei Liu, Yunchang Xu, Lijun School of Computer Science Wuhan University of Technology Wuhan China Key Laboratory of Fiber Optic Sensing Technology Information Processing Ministry of Education China
In this paper, we propose a new implementation of a failure detector. The implementation uses a dual model of heartbeat and interaction. First, the heartbeat model is adopted to shorten the detection time, if the dete... 详细信息
来源: 评论
Data Replication Placement Strategy Based On Bidding Mode for Cloud Storage Cluster
Data Replication Placement Strategy Based On Bidding Mode fo...
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Hong Zhang Bing Lin Zhanghui Liu Wenzhong Guo College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou 350116 China
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a ... 详细信息
来源: 评论
A forensics method of web browsing behavior based on association rule mining
A forensics method of web browsing behavior based on associa...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yiyun Zhang Guolong Chen College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente... 详细信息
来源: 评论
Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"
Security analysis on "Strongly secure certificateless key-in...
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal processing
作者: Feng Wang Li Xu Jeng-Shyang Pan College of Mathematics and Physics Fujian University of Technology Fuzhou Fujian 350118 China Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian 350117 Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian 350117 China College of Information Science and Engineering Fujian University of Technology Fuzhou Fujian 350118China
Certificateless signature eliminates the need of certificates in traditional public key signature and solves the inherent key escrow problem in identity-based signature. Therefore, it is an important secure requiremen... 详细信息
来源: 评论
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROSCIENCE 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
DRMST: A novel dynamic replica management strategy based on TOPSIS in cloud storage
Journal of Software Engineering
收藏 引用
Journal of Software Engineering 2014年 第4期8卷 278-286页
作者: Zhiyong, Yang Chunlin, Li Yanpei, Liu Malek, Al-Gabri Department of Computer Science Wuhan University of Technology China State Key Laboratory for Novel Software Technology Nanjing University China Key Laboratory of Fiber Optic Sensing Technology and Information Processing Ministry of Education China
The present study proposes a dynamic replica management strategy based on Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) in the cloud storage system. The replica management strategy includes t... 详细信息
来源: 评论
Adaptive weighted label propagation for local matching based face recognition
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8833卷 78-85页
作者: Guo, Yan Li, Xiaohui Yi, Yugen Wei, Yunyan Wang, Jianzhong Changchun Vocational Institute Of Technology Changchun China College of Computer Science and Information Technology Key Laboratory of Intelligent Information Processing of Jilin Universities Northeast Normal University Changchun China
In this paper, a new algorithm named Adaptive Weighted Label Propagation (AWLP) which explores the complementary property among subpatterns from the same face image is proposed for local matching based face recognitio... 详细信息
来源: 评论