咨询与建议

限定检索结果

文献类型

  • 3,455 篇 会议
  • 2,472 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,928 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,980 篇 工学
    • 2,724 篇 计算机科学与技术...
    • 2,270 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 497 篇 电气工程
    • 469 篇 生物工程
    • 445 篇 电子科学与技术(可...
    • 412 篇 控制科学与工程
    • 379 篇 光学工程
    • 294 篇 生物医学工程(可授...
    • 280 篇 机械工程
    • 256 篇 化学工程与技术
    • 201 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 134 篇 网络空间安全
    • 132 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 108 篇 交通运输工程
  • 2,187 篇 理学
    • 1,183 篇 数学
    • 652 篇 物理学
    • 521 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 269 篇 化学
    • 166 篇 系统科学
  • 1,058 篇 管理学
    • 563 篇 图书情报与档案管...
    • 537 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 244 篇 医学
    • 208 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 149 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 77 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 163 篇 training
  • 129 篇 accuracy
  • 120 篇 computational mo...
  • 105 篇 deep learning
  • 105 篇 convolution
  • 86 篇 data mining
  • 82 篇 image segmentati...
  • 77 篇 object detection
  • 76 篇 data models
  • 75 篇 visualization
  • 71 篇 robustness
  • 69 篇 convolutional ne...
  • 66 篇 optimization
  • 63 篇 neural networks
  • 63 篇 predictive model...
  • 59 篇 face recognition
  • 59 篇 contrastive lear...
  • 57 篇 federated learni...

机构

  • 207 篇 shandong provinc...
  • 185 篇 hubei province k...
  • 185 篇 key laboratory o...
  • 142 篇 key laboratory o...
  • 141 篇 school of inform...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 100 篇 fujian provincia...
  • 87 篇 shandong provinc...
  • 74 篇 national key lab...
  • 72 篇 university of ch...
  • 71 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 64 篇 school of comput...
  • 61 篇 shanghai key lab...
  • 58 篇 shanghai key lab...
  • 56 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 55 篇 huang qingming
  • 55 篇 li zhaohui
  • 52 篇 zhaohui li
  • 45 篇 zhang fuquan
  • 44 篇 li chenglong
  • 35 篇 tang jin
  • 34 篇 li wei
  • 31 篇 guo di
  • 31 篇 fan li
  • 30 篇 shen linlin
  • 29 篇 zuoyong li
  • 29 篇 wang wei
  • 28 篇 boxin shi
  • 28 篇 feng rui
  • 26 篇 wang xiao
  • 26 篇 yang zhiyong
  • 25 篇 liu yang
  • 25 篇 li fan
  • 25 篇 he liang

语言

  • 5,548 篇 英文
  • 246 篇 其他
  • 142 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
5928 条 记 录,以下是4931-4940 订阅
排序:
Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks
Availability-Aware Virtual Network Embedding for Multi-tier ...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Meng Shen Xu Ke Fuliang Li Fan Li Liehuang Zhu Lei Guan Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) P. R. China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science Beijing Institute of Technology P. R. China Tsinghua University Beijing Beijing CN College of Information Science and Engineering Northeastern University P. R. China DNSLAB China Internet Network Iniormation Center Beijing P. R. China School of Management & Economics Beijing Institute of Technology P. R. China
There is a growing trend for service providers (SPs) to migrate their multi-tier applications from local clusters to public cloud networks. In the cloud environment, it is a great concern of SPs to improve the availab... 详细信息
来源: 评论
A multi-objective biogeography-based optimization with mean value migration operator
A multi-objective biogeography-based optimization with mean ...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Zheng, Xiang-Wei Gao, Kai-Ge Wang, Xiao-Guang Ma, Chi-Zhu School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Communication Shandong Normal University Jinan China
Considering its successful application in solving discrete single objective problems, biogeography-based optimization (BBO) is considered as a new promising intelligent algorithm. Therefore, many studies are conducted... 详细信息
来源: 评论
Improved access control model under cloud computing environment
Improved access control model under cloud computing environm...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Zhang, Yongsheng Zou, Jiashun Gao, Yan Li, Bo School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Academic Affairs Office Shandong Polytechnic Jinan 250104 China
With the development of cloud computing, cloud security problem has become a hot topic. Some scholars put forward the role access control based on mapping, which is used to solve the leakage problem of data storing in... 详细信息
来源: 评论
A deep neural network approach for sentence boundary detection in broadcast news  15
A deep neural network approach for sentence boundary detecti...
收藏 引用
15th Annual Conference of the International Speech Communication Association: Celebrating the Diversity of Spoken Languages, INTERSPEECH 2014
作者: Xu, Chenglin Xie, Lei Huang, Guangpu Xiao, Xiong Chng, Eng Siong Li, Haizhou Shaanxi Provincial Key Laboratory of Speech and Image Information Processing School of Computer Science Northwestern Polytechnical University China Temasek Laboratories NTU Nanyang Technological University Singapore Singapore School of Computer Engineering Nanyang Technological University Singapore Singapore Institute for Infocomm Research ASTAR Singapore Singapore
This paper presents a deep neural network (DNN) approach to sentence boundary detection in broadcast news. We extract prosodic and lexical features at each inter-word position in the transcripts and learn a sequential... 详细信息
来源: 评论
Semi-paired probabilistic canonical correlation analysis  8
Semi-paired probabilistic canonical correlation analysis
收藏 引用
8th IFIP International Conference on Intelligent information processing, IIP 2014
作者: Zhang, Bo Hao, Jie Ma, Gang Yue, Jinpeng Shi, Zhongzhi Chinese Academy of Sciences Institute of Computing Technology The Key Laboratory of Intelligent Information Processing Beijing China University of Chinese Academy of Sciences Beijing China Xuzhou Medical College School of Medicine Information Xuzhou China China University of Mining and Technology School of Computer Science and Technology Xuzhou China
CCA is a powerful tool for analyzing paired multi-view data. However, when facing semi-paired multi-view data which widely exist in real-world problems, CCA usually performs poorly due to its requirement of data pairi... 详细信息
来源: 评论
How Many Packets Are Most Effective for Early Stage Traffic Identification: An Experimental Study
收藏 引用
China Communications 2014年 第9期11卷 183-193页
作者: PENG Lizhi YANG Bo CHEN Yuehui WU Tong Shandong Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 China School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China
Accurately identifying network traffics at the early stage is very important for the application of traffic *** years,more and more research works have tried to build effective machine learning models to identify traf... 详细信息
来源: 评论
UNSUPERVISED BROADCAST NEWS STORY SEGMENTATION USING DISTANCE DEPENDENT CHINESE RESTAURANT PROCESSES
UNSUPERVISED BROADCAST NEWS STORY SEGMENTATION USING DISTANC...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Chao Yang Lei Xie Xiangzeng Zhou Shaanxi Provincial Key Laboratory of Speech and Image Information Processing School of Computer Science Northwestern Polytechnical University Xi'an China
Traditional unsupervised broadcast news story segmentation approaches have to set the segmentation number manually, while this number is often unknown in real-world applications. In this paper, we solve this problem b... 详细信息
来源: 评论
A forensics tool of Foxmail client
A forensics tool of Foxmail client
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Lili Xie Guolong Chen College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based ... 详细信息
来源: 评论
Traffic Labeller: Collecting Internet Traffic Samples with Accurate Application information
收藏 引用
China Communications 2014年 第1期11卷 69-78页
作者: PENG Lizhi ZHANG Hongli YANG Bo CHEN Yuehui WU Tong School of Computer Science and Technology Harbin Institute of Technology Harbin 150002 China Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 China School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this *** system captures all user socket calls... 详细信息
来源: 评论
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论