咨询与建议

限定检索结果

文献类型

  • 1,008 篇 会议
  • 977 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,986 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,318 篇 工学
    • 869 篇 计算机科学与技术...
    • 704 篇 软件工程
    • 334 篇 信息与通信工程
    • 206 篇 电气工程
    • 182 篇 控制科学与工程
    • 182 篇 生物工程
    • 116 篇 电子科学与技术(可...
    • 113 篇 生物医学工程(可授...
    • 108 篇 光学工程
    • 103 篇 化学工程与技术
    • 91 篇 机械工程
    • 63 篇 交通运输工程
    • 61 篇 仪器科学与技术
    • 56 篇 土木工程
    • 54 篇 建筑学
    • 52 篇 动力工程及工程热...
    • 38 篇 材料科学与工程(可...
  • 737 篇 理学
    • 390 篇 数学
    • 203 篇 生物学
    • 169 篇 物理学
    • 115 篇 化学
    • 103 篇 统计学(可授理学、...
    • 49 篇 系统科学
  • 325 篇 管理学
    • 201 篇 管理科学与工程(可...
    • 136 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 112 篇 医学
    • 93 篇 临床医学
    • 72 篇 基础医学(可授医学...
  • 55 篇 法学
    • 38 篇 社会学
  • 47 篇 农学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 18 篇 教育学
  • 5 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 76 篇 semantics
  • 65 篇 deep learning
  • 63 篇 training
  • 62 篇 feature extracti...
  • 41 篇 computational mo...
  • 41 篇 predictive model...
  • 40 篇 data models
  • 38 篇 convolution
  • 35 篇 neural networks
  • 35 篇 accuracy
  • 33 篇 contrastive lear...
  • 32 篇 graph neural net...
  • 30 篇 convolutional ne...
  • 28 篇 machine learning
  • 27 篇 data mining
  • 26 篇 object detection
  • 24 篇 image segmentati...
  • 20 篇 visualization
  • 19 篇 three-dimensiona...
  • 18 篇 conferences

机构

  • 100 篇 fujian provincia...
  • 53 篇 shandong provinc...
  • 48 篇 school of inform...
  • 48 篇 school of softwa...
  • 45 篇 shandong enginee...
  • 43 篇 key laboratory o...
  • 42 篇 college of compu...
  • 40 篇 school of electr...
  • 40 篇 national enginee...
  • 38 篇 key laboratory o...
  • 35 篇 hunan provincial...
  • 31 篇 college of big d...
  • 31 篇 shenzhen researc...
  • 30 篇 school of comput...
  • 29 篇 institute of env...
  • 29 篇 peng cheng labor...
  • 28 篇 college of mecha...
  • 26 篇 beijing key labo...
  • 25 篇 college of big d...
  • 24 篇 department of bu...

作者

  • 46 篇 chang kuo-chi
  • 37 篇 pan jeng-shyang
  • 32 篇 xue xingsi
  • 29 篇 chu kai-chun
  • 23 篇 shen linlin
  • 21 篇 hongyan ma
  • 20 篇 chang fu-hsiang
  • 20 篇 li zuoyong
  • 20 篇 wang hsiao-chuan
  • 19 篇 nguyen trong-the
  • 18 篇 sung tien-wen
  • 18 篇 lin yuh-chung
  • 17 篇 liu jun
  • 17 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 hsu tsui-lien
  • 15 篇 wu qingyao
  • 14 篇 cai yi
  • 14 篇 qu xiaobo
  • 13 篇 shutian liu

语言

  • 1,779 篇 英文
  • 179 篇 其他
  • 36 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=Provincial Key Laboratory for Intelligent Engineering in Big Data"
1986 条 记 录,以下是1931-1940 订阅
排序:
Comments on recent proposed Cui Et Al.’s KASE and Lu Et Al.’s dIBEKS schemes
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2018年 第1期9卷 162-169页
作者: Wu, Tsu-Yang Meng, Chao Wang, King-Hang Chen, Chien-Ming Pan, Jeng-Shyang Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No3 Xueyuan Road University Town Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology No3 Xueyuan Road University Town Fuzhou350118 China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School HIT Campus of University Town of Shenzhen Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
Searchable encryption is a cryptographic primitive used to search an encrypted data in cloud storage. Recently, Cui et al. and Lu et al. proposed two variants of secure searchable encryption schemes, respectively. How... 详细信息
来源: 评论
Multi-label inductive matrix completion for joint MGMT and IDH1 status prediction for glioma patients  1
收藏 引用
20th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2017
作者: Chen, Lei Zhang, Han Thung, Kim-Han Liu, Luyan Lu, Junfeng Wu, Jinsong Wang, Qian Shen, Dinggang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Department of Radiology and BRIC University of North Carolina Chapel Hill United States School of Biomedical Engineering Med-X Research Institute Shanghai Jiao Tong University Shanghai China Department of Neurosurgery Huashan Hospital Fudan University Shanghai China Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Shanghai China
MGMT promoter methylation and IDH1 mutation in high-grade gliomas (HGG) have proven to be the two important molecular indicators associated with better prognosis. Traditionally, the statuses of MGMT and IDH1 are obtai... 详细信息
来源: 评论
Security analysis of Rhee et al.’s public encryption with keyword search schemes: A review
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2018年 第1期3卷 16-25页
作者: Wu, Tsu-Yang Chen, Chien-Ming Wang, King-Hang Pan, Jeng-Shyang Zheng, Weimin Chu, Shu-Chuan Roddick, John F. Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No33 Xuefunan Road University Town Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology No33 Xuefunan Road University Town Fuzhou350118 China School of Computer Science and Technology Harbin Institute of Technology Shenzhen HIT Campus of University Town of Shenzhen Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong College of Science and Engineering Flinders University Sturt Rd Bedford Park SA5042 Australia
Public key encryption with keyword search (PEKS) provides an efficient way to search encrypted files. Recently, Rhee et al. contributed their knowledge to propose several literatures in this research area. In this pap... 详细信息
来源: 评论
Maximizing power saving with state transition overhead for multiple mobile subscriber stations in WiMAX
收藏 引用
Frontiers of Information Technology & Electronic engineering 2016年 第10期17卷 1085-1094页
作者: Bo LI Sung-kwon PARK Department of Electronic Engineering Hanyang University Seoul 133791 Korea Guangdong Provincial Key Laboratory of Big Data Analysis and Processing Sun Yat-Sen University Guangzhou 510006 China
In the IEEE 802.16e/m standard, three power saving classes (PSCs) are defined to save the energy of a mobile sub- scriber station (MSS). However, how to set the parameters of PSCs to maximize the power saving and ... 详细信息
来源: 评论
Path ω-automaton
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2017年 第3期8卷 640-648页
作者: Jiang, Hua Zou, Fumin Lin, Rongde Li, Lingxiang Key Lab of Granular Computing Minnan Normal University ZhangzhouFujian China Beidou Navigation and Smart Traffic Innovation Center of Fujian Province FuzhouFujian China School of Mathematical Science Huaqiao university QuanzhouFujian China Fujian Provincial Key Laboratory of Big Data Mining and Applications FuzhouFujian China School of Electronics and Information Engineering Hunan University of Science and Engineering YongzhouHunan China
Automata theory is an important branch of theoretical computer science. ω-automaton is an important part of automata theory. The judgment standard for the equivalence of two automata is the equivalence of their accep... 详细信息
来源: 评论
Authoring tool of sharable question items based on QTI specification for e-learning assessment
Authoring tool of sharable question items based on QTI speci...
收藏 引用
2017 Asia-Pacific Computational Intelligence and Information Technology Conference
作者: Tien-Wen Sung You-Te Lu Chia-Jung Lee Yuan-Hsun Liao Chyun-Chyi Chen Fujian Provincial Key Laboratory of Big Data Mining and Applications College of Information Science and EngineeringFujian University of Technology Department of Information and Communication Southern Taiwan University of Science and Technology Department of Information Management Tainan University of Technology Department of Management Information System Far East University
Although online examination for e-learning is widely realized *** the production of question bank is *** paper proposes an assessment authoring tool to assist teachers in creating reusable test question *** items conf... 详细信息
来源: 评论
Authoring tool of sharable question items based on QTI specification for e-learning assessment
Authoring tool of sharable question items based on QTI speci...
收藏 引用
2017第二届亚太计算智能与信息技术学术会议 (APCIIT 2017)
作者: Tien-Wen Sung You-Te Lu Chia-Jung Lee Yuan-Hsun Liao Chyun-Chyi Chen Fujian Provincial Key Laboratory of Big Data Mining and Applications College of Information Science and EngineeringFujian University of Technology Department of Information and Communication Southern Taiwan University of Science and Technology Department of Information Management Tainan University of Technology Department of Management Information System Far East University
Although online examination for e-learning is widely realized nowadays. However the production of question bank is time-consuming. This paper proposes an assessment authoring tool to assist teachers in creating reusab... 详细信息
来源: 评论
Learning robust and discriminative low-rank representations for face recognition with occlusion
收藏 引用
Pattern Recognition 2017年 66卷 129-143页
作者: Guangwei Gao Jian Yang Xiao-Yuan Jing Fumin Shen Wankou Yang Dong Yue Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Engineering Laboratory of Big Data Analysis and Control for active distribution network Nanjing University of Posts and Telecommunications Nanjing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) Fuzhou China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Automation Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Automation Southeast University Nanjing China
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image int... 详细信息
来源: 评论
Network-coding-based video transmission via WiFi direct in local mobile networks
Network-coding-based video transmission via WiFi direct in l...
收藏 引用
International Conference on intelligent System and Knowledge engineering, ISKE
作者: Lei Wang Qing Wang Zhongwei Sun Jun Yin Lijie Xu Yuwang Yang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P.R. China School of Computer Nanjing University of Posts and Telecommunications Nanjing P.R. China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing P.R. China
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of Wi... 详细信息
来源: 评论
Preface
Advances in Intelligent Systems and Computing
收藏 引用
Advances in intelligent Systems and Computing 2018年 579卷 V页
作者: Lin, Jerry Chun-Wei Pan, Jeng-Shyang Chu, Shu-Chuan Chen, Chien-Ming School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School ShenzhenGuangdong China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology FuzhouFujian China School of Computer Science Engineering and Mathematics Flinders University Bedford Park SA Australia
来源: 评论