咨询与建议

限定检索结果

文献类型

  • 3,455 篇 会议
  • 2,465 篇 期刊文献

馆藏范围

  • 5,920 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,977 篇 工学
    • 2,722 篇 计算机科学与技术...
    • 2,270 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 497 篇 电气工程
    • 469 篇 生物工程
    • 444 篇 电子科学与技术(可...
    • 412 篇 控制科学与工程
    • 379 篇 光学工程
    • 294 篇 生物医学工程(可授...
    • 280 篇 机械工程
    • 256 篇 化学工程与技术
    • 201 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 134 篇 网络空间安全
    • 132 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 108 篇 交通运输工程
  • 2,187 篇 理学
    • 1,183 篇 数学
    • 652 篇 物理学
    • 521 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 269 篇 化学
    • 166 篇 系统科学
  • 1,058 篇 管理学
    • 563 篇 图书情报与档案管...
    • 537 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 244 篇 医学
    • 208 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 149 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 77 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 163 篇 training
  • 129 篇 accuracy
  • 120 篇 computational mo...
  • 105 篇 deep learning
  • 105 篇 convolution
  • 86 篇 data mining
  • 82 篇 image segmentati...
  • 77 篇 object detection
  • 76 篇 data models
  • 75 篇 visualization
  • 70 篇 robustness
  • 69 篇 convolutional ne...
  • 66 篇 optimization
  • 63 篇 neural networks
  • 63 篇 predictive model...
  • 59 篇 face recognition
  • 59 篇 contrastive lear...
  • 56 篇 federated learni...

机构

  • 207 篇 shandong provinc...
  • 185 篇 hubei province k...
  • 185 篇 key laboratory o...
  • 142 篇 school of inform...
  • 141 篇 key laboratory o...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 100 篇 fujian provincia...
  • 87 篇 shandong provinc...
  • 74 篇 national key lab...
  • 72 篇 university of ch...
  • 71 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 61 篇 shanghai key lab...
  • 58 篇 shanghai key lab...
  • 55 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 55 篇 huang qingming
  • 55 篇 li zhaohui
  • 52 篇 zhaohui li
  • 45 篇 zhang fuquan
  • 44 篇 li chenglong
  • 35 篇 tang jin
  • 34 篇 li wei
  • 31 篇 guo di
  • 31 篇 fan li
  • 30 篇 shen linlin
  • 29 篇 zuoyong li
  • 29 篇 wang wei
  • 29 篇 feng rui
  • 28 篇 boxin shi
  • 26 篇 wang xiao
  • 26 篇 yang zhiyong
  • 25 篇 liu yang
  • 25 篇 li fan
  • 25 篇 he liang

语言

  • 5,540 篇 英文
  • 246 篇 其他
  • 142 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
5920 条 记 录,以下是4871-4880 订阅
排序:
Visual saliency based bag of phrases for image retrival  13
Visual saliency based bag of phrases for image retrival
收藏 引用
13th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2014
作者: Duan, Lijuan Ma, Wei Miao, Jun Zhang, Xuan College of Computer Science Beijing University of Technology China Key Laboratory of Intelligent Information Processing of CAS Institute of Computing Technology CAS Beijing100190 China
This paper presents a saliency based bag-of-phrases (Saliency-BoP for short) method for image retrieval. It combines saliency detection with visual phrase construction to extract bag-of-phrase features. To achieve thi... 详细信息
来源: 评论
Towards the Independent Spanning Trees in Conditional BC Networks
Towards the Independent Spanning Trees in Conditional BC Net...
收藏 引用
2013 International Conference on Advanced computer Science and Electronics information(ICACSEI 2013)
作者: Baolei Cheng Jianxi Fan Shukui Zhang Yan Wang Xi Wang Wenjun Liu School of Computer Science and Technology Soochow University Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Independent spanning trees (ISTs for short) in networks have applications such as reliable communication protocols, the multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distr... 详细信息
来源: 评论
A Low-Power Task Mapping Method for Network on Chip
A Low-Power Task Mapping Method for Network on Chip
收藏 引用
Chinese Automation Congress
作者: Wenwen Cao Wei Hu Puzhang Wang Mengke Song Ruomiao Li College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System
When more and more processor cores are integrated onto a single chip, the computing ability has been improved dramatically. And the power consumed by the cores is also increased. More tasks can run in parallel for hig... 详细信息
来源: 评论
Integrity verification of cloud data
Integrity verification of cloud data
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Kong, Fan-Xin Liu, Li School of Information Science and Engineering China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
This paper proposes a new program on the integrity of the data to the probabilistic methods when the number of documents inserted the pseudo-tuple becomes large. In this program, pseudo-tuple inserted in accordance wi... 详细信息
来源: 评论
New adaptations of classic algorithm for mining frequent itemsets from uncertain data  5
New adaptations of classic algorithm for mining frequent ite...
收藏 引用
5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
作者: Yu, Xiaomei Wang, Hong Zheng, Xiangwei School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan Shandong China
Mining frequent itemsets from traditional database is an important research topic in data mining and researchers achieved tremendous progress in this field. However, with the emergence of new applications, the traditi... 详细信息
来源: 评论
Design of trust model based on behavior in cloud computing environment
Design of trust model based on behavior in cloud computing e...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Zhang, Yong Sheng Tian, Ming Lv, Shen Juan Zhang, Yan Dong School of Information Science and Engineering Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan 250014 China
This paper studies the characteristics of cloud computing environment, based on the traditional access control management technology, proposes a reference model for access control management in the cloud computing, de... 详细信息
来源: 评论
Encoding Spatial Context for Large-Scale Partial-Duplicate Web Image Retrieval
收藏 引用
Journal of computer Science & technology 2014年 第5期29卷 837-848页
作者: 周文罡 李厚强 卢亦娟 田奇 Chinese Academy of Sciences Key Laboratory of Technology in Geo-Spatial Information Processing and Application System University of Science and Technology of China Department of Electronic Engineering and Information Science University of Science and Technology of China Department of Computer Science Texas State UniversitySan Marcos TX 78666 U.S.A. MemberACMIEEE Department of Computer Science University of Texas at San AntonioSan Antonio TX 78249 U.S.A. Senior MemberIEEE
Many recent state-of-the-art image retrieval approaches are based on Bag-of-Visual-Words model and represent an image with a set of visual words by quantizing local SIFT(scale invariant feature transform) features. ... 详细信息
来源: 评论
Laminated paper counting algorithm based on compressive sensing and hough transform  2
Laminated paper counting algorithm based on compressive sens...
收藏 引用
2nd International Conference on information technology and Electronic Commerce, ICITEC 2014
作者: Wang, Hui Chen, Dongfang Wang, Xiaofeng College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China
According to the problem that conventional laminated paper counting algorithms have some unavoidable shortcomings such as high dependence on the quality of laminated paper and noise sensitivity, we propose a laminated... 详细信息
来源: 评论
Research and application analysis of feature binding mechanism  8
Research and application analysis of feature binding mechani...
收藏 引用
8th IFIP International Conference on Intelligent information processing, IIP 2014
作者: Han, Youzhen Ding, Shifei School of Computer Science and Technology China University of Mining and Technology XuzhouJiangsu221116 China Key Laboratory of Intelligence Information Processing Institute of Computer Technology Academy of Sciences Beijing City100190 China
In order to recognize the object of the external world, brain need to integrate the information of different cortical areas, then form a complete world. And binding problem study on a process to percept a complete obj... 详细信息
来源: 评论
A group key distribution system based on the generalized aryabhata remainder theorem for enterprise digital rights management
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2015年 第1期6卷 140-153页
作者: Liu, Yanjun Chang, Chin-Chen Chang, Shih-Chang Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University No.111 Jiulong Rd Hefei230601 China Department of Computer Science and Information Engineering Asia University No.500 Lioufeng Rd Wufeng Taichung413 Taiwan Department of Information Engineering and Computer Science Feng Chia University No.100 Wenhwa Rd Seatwen Taichung407 Taiwan Department of Computer Science and Information Engineering National Chung Cheng University No.168 Sec.1 University Rd Min-Hsiung Township Chiayi621 Taiwan
Digital Rights Management (DRM) is a type of access-control technology that is used by diverse content providers to restrict the use of digital content. Enterprise Digital Rights Management (E-DRM) is an application o... 详细信息
来源: 评论