咨询与建议

限定检索结果

文献类型

  • 849 篇 会议
  • 471 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 952 篇 工学
    • 706 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 255 篇 信息与通信工程
    • 127 篇 控制科学与工程
    • 101 篇 生物工程
    • 99 篇 电气工程
    • 85 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 35 篇 仪器科学与技术
    • 33 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 450 篇 理学
    • 243 篇 数学
    • 112 篇 生物学
    • 111 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 246 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 61 篇 医学
    • 51 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 34 篇 法学
    • 30 篇 社会学
  • 25 篇 农学
  • 16 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 69 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 deep learning
  • 30 篇 convolution
  • 28 篇 accuracy
  • 28 篇 training
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 19 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 51 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 lang li
  • 16 篇 shen linlin
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 chen yang
  • 14 篇 teng shenghua
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,203 篇 英文
  • 86 篇 其他
  • 33 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1321 条 记 录,以下是1291-1300 订阅
排序:
IMEWAS--A Integrated Multi-platform EAPoW-Based WLAN AAA Solution
IMEWAS--A Integrated Multi-platform EAPoW-Based WLAN AAA Sol...
收藏 引用
International Conference on Wireless and Mobile Communications (ICWMC)
作者: Ling Chen Jian-de Lu Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Suzhou Jiangsu China
As security is becoming a significant obstacle to wider deployment of wireless LANs, IEEE 802.1x and EAPoW has been put forward to enhance authentication in WLAN. At present, some existing client solution such as Xsup... 详细信息
来源: 评论
Hybrid algorithm combining ant colony optimization algorithm with genetic algorithm
Hybrid algorithm combining ant colony optimization algorithm...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Gao, Shang Jiang, Xinzi Tang, Kezong School of Electronics and Information Jiangsu University of Science and Technology Zhenjiang 212003 China Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China
By use of the properties of ant colony algorithm and genetic algorithm, a hybrid algorithm is proposed to solve the traveling salesman problems. First, it adopts genetic algorithm to give information pheromone to dist... 详细信息
来源: 评论
An Effective Approach towards Contour-Shape Retrieval
An Effective Approach towards Contour-Shape Retrieval
收藏 引用
International Conference on Computational Intelligence and Security
作者: Junding Sun Xiaosheng Wu School of Computer Science and Technology Henan Polytechnic University Jiaozuo China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
Distance histogram has been used for shape representation and retrieval. Though it is efficient and effective, it looses the spatial information of a contour. In this paper, the pixels of a contour are classified into... 详细信息
来源: 评论
Towards Termination Criteria of Ant Colony Optimization
Towards Termination Criteria of Ant Colony Optimization
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Qiang Lv Xiaoyan Xia School of Computer Science and Technology Suzhou University Suzhou Jiangsu China Provincial Key Laboratory Computer Information Processing Technology Suzhou Jiangsu China
Ant colony optimization (ACO for short) has been proved a successful meta-heuristic by a huge of empirical studies. This paper discusses the termination criteria of ACO and therefore provides research ideas to other m... 详细信息
来源: 评论
ADJSA: an adaptable dynamic job scheduling approach based on historical information  07
ADJSA: an adaptable dynamic job scheduling approach based on...
收藏 引用
Proceedings of the 2nd international conference on Scalable information systems
作者: Lan Xu Qiao-ming Zhu Zhengxian Gong Pei-feng Li Soochow University Suzhou China and Key Lab of Computer Information Processing Technology of Jiangsu Province Suzhou China
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its cha... 详细信息
来源: 评论
An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks
An Adaptive Stable Link Selection Algorithm for Mobile Ad Ho...
收藏 引用
ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Hui Zhang Yu-ning Dong State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China
An adaptive strategy based stable link selection algorithm is proposed in this paper, in which the stable neighbor metric and local movement metric are defined. On the basis, the stability probability of each link is ... 详细信息
来源: 评论
An Algorithm for 3D Image Segmentation
An Algorithm for 3D Image Segmentation
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Ding Zhi Dong Yu-ning College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Lab of Computer Information Processing Technology Suzhou University Suzhou China
We propose a new 3D image segmentation method based on prediction, block-matching and partial 3D constraint in this paper. The algorithm only needs to set a few key points in the first image. We use intensity informat... 详细信息
来源: 评论
Design and realization of evaluation environment in the performance analysis of intrusion detection system
Design and realization of evaluation environment in the perf...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Liao, Guiping Yu, Fei Shen, Yue Zhang, Linfeng Xu, Cheng School of Computer and Information Engineering Hunan Agricultural University Changsha 410128 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 2150063 China Guangdong Province Key Lab of Electronic Commerce Market Application Technology Guangdong University of Business Studies Guangzhou510320 China
With the deeply research on intrusion detection techniques and the widely use of intrusion detection products, the study of evaluation techniques of intrusion detection systems became important. In the paper, relative... 详细信息
来源: 评论
Intrusion detection based on fuzzy reasoning
Intrusion detection based on fuzzy reasoning
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Fei, Yu Yue, Shen Guiping, Liao Linfeng, Zhang Cheng, Xu School of Computer Andinformation Engineering Hunan Agricultural University Changsha 410128 China Guangdong Province Key Lab. of Electronic Commerce Market Application Technology Guangdong University of Business Studies Guangzhou 510320 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 2150063 China
The paper proposes a new network intrusion detection system based on fuzzy neural network by redesigning the intrusion detection system's architecture and arithmetic. In order to overcome the difficulty of specify... 详细信息
来源: 评论
Pyramid: Building incentive architecture for unstructured peer-to-peer network
Pyramid: Building incentive architecture for unstructured pe...
收藏 引用
Advanced International Conference on Telecommunications andInternational Conference on Internet and Web Applications and Services, AICT/ICIW'06
作者: Zhao, Jia Lu, Jian-De Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Jiangsu Suzhou 215006 China
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ... 详细信息
来源: 评论