咨询与建议

限定检索结果

文献类型

  • 3,455 篇 会议
  • 2,465 篇 期刊文献

馆藏范围

  • 5,920 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,977 篇 工学
    • 2,722 篇 计算机科学与技术...
    • 2,270 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 497 篇 电气工程
    • 469 篇 生物工程
    • 444 篇 电子科学与技术(可...
    • 412 篇 控制科学与工程
    • 379 篇 光学工程
    • 294 篇 生物医学工程(可授...
    • 280 篇 机械工程
    • 256 篇 化学工程与技术
    • 201 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 134 篇 网络空间安全
    • 132 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 108 篇 交通运输工程
  • 2,187 篇 理学
    • 1,183 篇 数学
    • 652 篇 物理学
    • 521 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 269 篇 化学
    • 166 篇 系统科学
  • 1,058 篇 管理学
    • 563 篇 图书情报与档案管...
    • 537 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 244 篇 医学
    • 208 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 149 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 77 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 163 篇 training
  • 129 篇 accuracy
  • 120 篇 computational mo...
  • 105 篇 deep learning
  • 105 篇 convolution
  • 86 篇 data mining
  • 82 篇 image segmentati...
  • 77 篇 object detection
  • 76 篇 data models
  • 75 篇 visualization
  • 70 篇 robustness
  • 69 篇 convolutional ne...
  • 66 篇 optimization
  • 63 篇 neural networks
  • 63 篇 predictive model...
  • 59 篇 face recognition
  • 59 篇 contrastive lear...
  • 56 篇 federated learni...

机构

  • 207 篇 shandong provinc...
  • 185 篇 hubei province k...
  • 185 篇 key laboratory o...
  • 142 篇 school of inform...
  • 141 篇 key laboratory o...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 100 篇 fujian provincia...
  • 87 篇 shandong provinc...
  • 74 篇 national key lab...
  • 72 篇 university of ch...
  • 71 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 61 篇 shanghai key lab...
  • 58 篇 shanghai key lab...
  • 55 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 55 篇 huang qingming
  • 55 篇 li zhaohui
  • 52 篇 zhaohui li
  • 45 篇 zhang fuquan
  • 44 篇 li chenglong
  • 35 篇 tang jin
  • 34 篇 li wei
  • 31 篇 guo di
  • 31 篇 fan li
  • 30 篇 shen linlin
  • 29 篇 zuoyong li
  • 29 篇 wang wei
  • 29 篇 feng rui
  • 28 篇 boxin shi
  • 26 篇 wang xiao
  • 26 篇 yang zhiyong
  • 25 篇 liu yang
  • 25 篇 li fan
  • 25 篇 he liang

语言

  • 5,540 篇 英文
  • 246 篇 其他
  • 142 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
5920 条 记 录,以下是4811-4820 订阅
排序:
Design and Implementation of Student information Management System
Design and Implementation of Student Information Management ...
收藏 引用
2015 International Conference on Advances in Management Engineering and information technology(AMEIT 2015)
作者: Y.S.Zhang J.Ma A.Q.Bao Y.Li School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology School of History and Social Development Shandong Normal University
According to the students' independent selection of course and the management of courses and grades of administrators, it were designed two aspects. First of all, the analysis of the basic running principles of PH... 详细信息
来源: 评论
A new approach of conditions on δ2s(Φ) for s-sparse recovery
收藏 引用
Science China(information Sciences) 2014年 第4期57卷 107-113页
作者: CEN YiGang ZHAO RuiZhen MIAO ZhenJiang CEN LiHui CUI LiHong School of Computer & Information Technology Beijing Jiaotong University School of Information Science and Engineering Central South University Key Laboratory of System Control and Information Processing Ministry of Education Department of Mathematics Beijing University of Chemical Technology
In this paper,we provide a unified expression to obtain the conditions on the restricted isometry constantδ2s(Φ).These conditions cover the important results proposed by Candes et *** each of them is a sufficient co... 详细信息
来源: 评论
3D garment segmentation based on semi-supervised learning method
收藏 引用
Journal of Fiber Bioengineering and Informatics 2015年 第4期8卷 657-665页
作者: Huang, Mian Liu, Li Liu, Ruomei Fu, Xiaodong Liu, Lijun Yunnan Provincial Key Laboratory of Computer Technology Application Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China National Engineering Research Center of Digital Life State-Province Joint Laboratory of Digital Home Interactive Applications School of Data and Computer Science Sun Yat-sen University Guangzhou China
In this paper, we propose a semi-supervised learning method to simultaneous segmentation and labeling of parts in 3D garments. The key idea in this work is to analyze 3D garments using semi-supervised learning method ... 详细信息
来源: 评论
A survey of major techniques of clothing in vision
收藏 引用
Journal of Fiber Bioengineering and Informatics 2015年 第4期8卷 725-732页
作者: Huang, Dongyan Liu, Li Fu, Xiaodong Liu, Lijun Huang, Qingsong Yunnan Provincial Key Laboratory of Computer Technology Application Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China National Engineering Research Center of Digital Life State-Province Joint Laboratory of Digital Home Interactive Applications School of Data and Computer Science Sun Yat-sen University Guangzhou China
Clothing in vision plays an important role in many applications of digital clothing, virtual fitting, fashion design and manufacturing. The research of clothing in vision is full of technical challenges, such as backg... 详细信息
来源: 评论
New identity-based key-encapsulation mechanism and its applications in cloud computing
收藏 引用
International Journal of High Performance Computing and Networking 2015年 第2期8卷 124-134页
作者: Wang, Hao Zheng, Zhihua Yang, Bo School of Information Science and Engineering Shandong Normal University Jinan Shandong250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan Shandong250014 China Shandong Provincial Key Laboratory of Software Engineering Jinan Shandong250101 China Department of Electronic Engineering Yantai Vocational College Yantai Shandong264670 China
Identity-based encryption (IBE) is an important primitive of identity-based cryptography. As such, it is a type of public-key encryption in which the public key of a user is some unique information about the identity ... 详细信息
来源: 评论
Design of a configurable fixed-point FFT processor
Design of a configurable fixed-point FFT processor
收藏 引用
IET International Radar Conference 2015
作者: Chen Yang Yi-zhuang Xie Liang Chen He Chen Yi Deng Beijing Key laboratory of Embedded Real-time Information Processing Technology Beijing Institute of Technology Beijing China Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Arlington VA USA
In this paper, we focus on the widely-used radix-2 2 Decimation-In-Frequency (DIF) Fast Fourier Transform (FFT) algorithm. A variable-length, controllable-precision FFT processor is proposed. The processor can perfor... 详细信息
来源: 评论
A novel computational approach to predict activity of nuclear export signals
收藏 引用
Journal of Computational and Theoretical Nanoscience 2015年 第12期12卷 6016-6019页
作者: Chen, Zhihua Zhang, Pan Wu, Tingfang Shi, Xiaolong Wang, Xun Key Laboratory of Image Information Processing and Intelligent Control School of Automation Huazhong University of Science and Technology WuhanHubei430074 China College of Computer and Communication Engineering China University of Petroleum QingdaoShandong266580 China
A nuclear export signal (NES) is a sequence of amino acids, which is a protein localization signal, and contributes to regulate localization of cellular proteins. In recent peering works, activity of NESs were introdu... 详细信息
来源: 评论
Fusing PLSA model and Markov random fields for automatic image annotation
收藏 引用
High technology Letters 2014年 第4期20卷 409-414页
作者: 田东平 Zhao Xiaofei Shi Zhongzhi Institute of Computer Software Baoji University of Arts and Sciences Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of Sciences
A novel image auto-annotation method is presented based on probabilistic latent semantic analysis(PLSA) model and multiple Markov random fields(MRF).A PLSA model with asymmetric modalities is first constructed to esti... 详细信息
来源: 评论
An IABC based route maintaining protocol in mobile wireless sensor networks
An IABC based route maintaining protocol in mobile wireless ...
收藏 引用
International Conference on Communication technology (ICCT)
作者: Xiaoming Wu Yinglong Wang Yifan Hu Sbandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China
Recent studies have shown that utilizing a mobile sink to harvest and carry data from wireless sensor network (WSN) can enhance network operations and balance the network energy consumption. Because of the sink mobili... 详细信息
来源: 评论
Privacy preserving for network coding in smart grid  15th
Privacy preserving for network coding in smart grid
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel processing, ICA3PP 2015
作者: He, Shiming Zeng, Weini Xie, Kun Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Hunan Province Engineering Research Center of Electric Transportation and Smart Distributed Network Changsha University of Science and Technology Changsha410114 China The 716th Research Institute China Shipbuilding Industry Corporation Lianyungang222061 China College of Computer Science and Electronics Engineering Hunan University Changsha410082 China Department of Electrical and Computer Engineering State University of New York at Stony Brook New York United States
In smart grid, privacy implications to individuals and their family is an important issue, due to the fine-grained usage data collection. Wireless communications are considered by many utility companies to obtain info... 详细信息
来源: 评论