咨询与建议

限定检索结果

文献类型

  • 849 篇 会议
  • 471 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 952 篇 工学
    • 706 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 255 篇 信息与通信工程
    • 127 篇 控制科学与工程
    • 101 篇 生物工程
    • 99 篇 电气工程
    • 85 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 35 篇 仪器科学与技术
    • 33 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 450 篇 理学
    • 243 篇 数学
    • 112 篇 生物学
    • 111 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 246 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 61 篇 医学
    • 51 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 34 篇 法学
    • 30 篇 社会学
  • 25 篇 农学
  • 16 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 69 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 deep learning
  • 30 篇 convolution
  • 28 篇 accuracy
  • 28 篇 training
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 19 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 51 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 lang li
  • 16 篇 shen linlin
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 chen yang
  • 14 篇 teng shenghua
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,203 篇 英文
  • 86 篇 其他
  • 33 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1321 条 记 录,以下是1241-1250 订阅
排序:
Secure and efficient VSS scheme based on partial broadcast channels
收藏 引用
Journal of Computational information Systems 2009年 第3期5卷 1149-1155页
作者: Wang, Jialing Zhu, Yanqin Luo, Xizhao School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou 215006 China
In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ... 详细信息
来源: 评论
Extracting Protein-Protein Interaction from Biomedical Text Using Additional Shallow Parsing information
Extracting Protein-Protein Interaction from Biomedical Text ...
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Huanhuan Yu Longhua Qian Guodong Zhou Qiaoming Zhu Jiangsu Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou China
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
Semantic role labeling using Chinese dependency parsing tree
Semantic role labeling using Chinese dependency parsing tree
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hongling Wang Xiaohong Yuan Guodong Zhou Jiangsu Provincial Key Lab for Computer Information Processing Technology Soochow University Suzhou China
Although recent years have seen much progress in semantic role labeling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b... 详细信息
来源: 评论
A Fast 2D Otsu Thresholding Algorithm Based on Improved Histogram
A Fast 2D Otsu Thresholding Algorithm Based on Improved Hist...
收藏 引用
Chinese Conference on Pattern Recognition (CCPR)
作者: Ningbo Zhu Gang Wang Gaobo Yang Weiming Dai School of Computer and Communication Hunan University Changsha Hunan China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow Jiangsu China
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computationa... 详细信息
来源: 评论
Web mining of OOV translations
收藏 引用
Journal of information and Computational Science 2009年 第1期6卷 97-103页
作者: Sun, Jun Yao, Jianmin Zhang, Jing Zhu, Qiaoming Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China School of Computer Science and Engineering South China University of Technology Guangzhou 510641 China
OOV translations, including new words, collocations, as well as phrases, are the key flesh of a human language while an obstacle to machine translation. Some researchers manually compose the dictionary for OOV transla... 详细信息
来源: 评论
A policy language for expressing access control properties in PDAC model
A policy language for expressing access control properties i...
收藏 引用
International Conference on computer Science & Education (ICCSE)
作者: Xian Wu Peide Qian School of Computer Science and Technology Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Computer Science and Technology Soochow University Suzhou China
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin... 详细信息
来源: 评论
Optimal k-nearest-neighbor query in data grid
Optimal k-nearest-neighbor query in data grid
收藏 引用
Joint International Conference on Advances in Data and Web Management, APWeb/WAIM 2009
作者: Zhuang, Yi Hu, Hua Li, Xiaojun Xu, Bin Hu, Haiyang College of Computer and Information Engineering Zhejiang Gongshang University China Zhejiang Provincial Key Laboratory of Information Network Technology China Hangzhou Dianzi University China
The paper proposes an optimal distributed k Nearest Neighbor query processing algorithm based on Data Grid, called the opGkNN. Three steps are incorporated in the opGkNN. First when a user submits a query with a vecto... 详细信息
来源: 评论
Evolutionary algorithm with 2-crossovers
Evolutionary algorithm with 2-crossovers
收藏 引用
6th International Symposium on Neural Networks, ISNN 2009
作者: Xing, Zhihui Duan, Haibin Xu, Chunfang School of Automation Science and Electrical Engineering Beihang University Beijing 100191 China Provincial Key Laboratory for Information Processing Technology Suzhou University Suzhou 215006 China
Quantum evolutionary algorithm (QEA) is proposed on the basis of the concept and principles of quantum computing, which is a classical meta-heuristic algorithm for the approximate solution of combinatorial optimizatio... 详细信息
来源: 评论