咨询与建议

限定检索结果

文献类型

  • 849 篇 会议
  • 471 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 952 篇 工学
    • 706 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 255 篇 信息与通信工程
    • 127 篇 控制科学与工程
    • 101 篇 生物工程
    • 99 篇 电气工程
    • 85 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 35 篇 仪器科学与技术
    • 33 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 450 篇 理学
    • 243 篇 数学
    • 112 篇 生物学
    • 111 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 246 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 61 篇 医学
    • 51 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 34 篇 法学
    • 30 篇 社会学
  • 25 篇 农学
  • 16 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 69 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 deep learning
  • 30 篇 convolution
  • 28 篇 accuracy
  • 28 篇 training
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 19 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 51 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 lang li
  • 16 篇 shen linlin
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 chen yang
  • 14 篇 teng shenghua
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,203 篇 英文
  • 86 篇 其他
  • 33 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1321 条 记 录,以下是1111-1120 订阅
排序:
A TWO LAYERED DATA ASSOCIATION APPROACH FOR BALL TRACKING
A TWO LAYERED DATA ASSOCIATION APPROACH FOR BALL TRACKING
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Xiangzeng Zhou Qiang Huang Lei Xie Stephen Cox Shaanxi Provincial Key Laboratory of Speech & Image Information Processing (SAIIP) School of Computer Science Northwestern Polytechnical University Xi'an 710072 P. R. China School of Computing Sciences University of East Anglia Norwich NR4 7TJ United Kingdom
Ball-tracking is a key technology in processing and analyzing a ball game. Because of the complexity of visual scenes, a large number of objects are usually selected as candidates for the ball, leading to incorrect id... 详细信息
来源: 评论
A processing method for inconsistent answer set programs based on minimal principle
A processing method for inconsistent answer set programs bas...
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Zhu, Tao Zhang, Zhizheng Zhai, Yuqing Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China
Answer set programming (ASP) has become an important tool for knowledge representation and reasoning. Inconsistency processing in ASP provides a way for reasoning of inconsistent knowledge. In this paper, we present a... 详细信息
来源: 评论
Extending interface automata with Z notation
Extending interface automata with Z notation
收藏 引用
4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011
作者: Cao, Zining Wang, Hui National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we propose a specification approach combining interface automata and Z language. This approach can be used to describe behavioural properties and data properties of software components. We also study th... 详细信息
来源: 评论
Extracting image semantic object based on artificial bee colony algorithm
Extracting image semantic object based on artificial bee col...
收藏 引用
2nd International Conference of Electrical and Electronics Engineering, ICEEE 2011
作者: Yong-Hao, Xiao Yong-Chang, Chen Wei-Yu, Yu Jing, Tian School of Electronic and Information Engineering South China University of Technology Guangzhou 510641 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Electrical and Electronic Engineering Nanyang Technological University 639798 Singapore Singapore
In this paper, an efficient approach for extracting semantic object using artificial bee colonyalgorithm (ABCA) has been proposed. First, we reduce speckle noise in the image. Then fitness function of ABC algorithm is... 详细信息
来源: 评论
A Push/Pull scheduling algorithm in P2P VoD
A Push/Pull scheduling algorithm in P2P VoD
收藏 引用
International Conference on computer Science and Network technology (ICCSNT)
作者: Yanqin Zhu Jianjun Bian Qijin Ji School of Computer Science and Technology Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
Video-on-Demand (VoD), which is an important application in peer-to-peer (P2P) networks, attracts a lot of researchers' interest at present. Data scheduling is significant in P2P VoD applications to gain desirable... 详细信息
来源: 评论
A reliable SVD-DWT based watermarking scheme with Artificial Bee Colony Algorithm
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第22期6卷 430-439页
作者: Chen, Yongchang Yu, Weiyu Feng, Jiuchao Electronic and Information Engineering South China University of Technology Guangzhou China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
A robust image watermarking scheme based on singular value decomposition (SVD) and discrete wavelet transform (DWT) with Artificial Bee Colony Algorithm is proposed in this paper. Previous SVD based watermarking algor... 详细信息
来源: 评论
A Novel Evaluation Method Based on Entropy for Image Segmentation
收藏 引用
Procedia Engineering 2012年 29卷 3959-3965页
作者: Xiaoling Chen Riming Wang Yunfei Cao Weiyu Yu Jiuchao Feng School of Electronic and Information Engineering South China University of TechnologyGuangzhou China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhouJiangsu 215006 China
Image segmentation evaluation is still a hotspot problem. Various methods of image segmentation evaluation have been proposed. Amongst all the evaluation approaches, Segmentation Entropy Quantitative Assessment (SEQA)... 详细信息
来源: 评论
Answer set programming with uncertain facts
Answer set programming with uncertain facts
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Sha, Lei Zhang, Zhizheng Department of Transportation Management Nanjing Institute of Railway Technology Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
We introduce a new logic programming paradigm-answer set programming with uncertain facts (LPuF for short). A LPuF program is an extension of answer set programs (ASP for short). We first define the syntax of LPuF pro... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论