咨询与建议

限定检索结果

文献类型

  • 3,455 篇 会议
  • 2,465 篇 期刊文献

馆藏范围

  • 5,920 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,977 篇 工学
    • 2,722 篇 计算机科学与技术...
    • 2,270 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 497 篇 电气工程
    • 469 篇 生物工程
    • 444 篇 电子科学与技术(可...
    • 412 篇 控制科学与工程
    • 379 篇 光学工程
    • 294 篇 生物医学工程(可授...
    • 280 篇 机械工程
    • 256 篇 化学工程与技术
    • 201 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 134 篇 网络空间安全
    • 132 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 108 篇 交通运输工程
  • 2,187 篇 理学
    • 1,183 篇 数学
    • 652 篇 物理学
    • 521 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 269 篇 化学
    • 166 篇 系统科学
  • 1,058 篇 管理学
    • 563 篇 图书情报与档案管...
    • 537 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 244 篇 医学
    • 208 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 149 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 77 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 163 篇 training
  • 129 篇 accuracy
  • 120 篇 computational mo...
  • 105 篇 deep learning
  • 105 篇 convolution
  • 86 篇 data mining
  • 82 篇 image segmentati...
  • 77 篇 object detection
  • 76 篇 data models
  • 75 篇 visualization
  • 70 篇 robustness
  • 69 篇 convolutional ne...
  • 66 篇 optimization
  • 63 篇 neural networks
  • 63 篇 predictive model...
  • 59 篇 face recognition
  • 59 篇 contrastive lear...
  • 56 篇 federated learni...

机构

  • 207 篇 shandong provinc...
  • 185 篇 hubei province k...
  • 185 篇 key laboratory o...
  • 142 篇 school of inform...
  • 141 篇 key laboratory o...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 100 篇 fujian provincia...
  • 87 篇 shandong provinc...
  • 74 篇 national key lab...
  • 72 篇 university of ch...
  • 71 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 61 篇 shanghai key lab...
  • 58 篇 shanghai key lab...
  • 55 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 55 篇 huang qingming
  • 55 篇 li zhaohui
  • 52 篇 zhaohui li
  • 45 篇 zhang fuquan
  • 44 篇 li chenglong
  • 35 篇 tang jin
  • 34 篇 li wei
  • 31 篇 guo di
  • 31 篇 fan li
  • 30 篇 shen linlin
  • 29 篇 zuoyong li
  • 29 篇 wang wei
  • 29 篇 feng rui
  • 28 篇 boxin shi
  • 26 篇 wang xiao
  • 26 篇 yang zhiyong
  • 25 篇 liu yang
  • 25 篇 li fan
  • 25 篇 he liang

语言

  • 5,540 篇 英文
  • 246 篇 其他
  • 142 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
5920 条 记 录,以下是4961-4970 订阅
排序:
Semantic Features for Food Image Recognition with Geo-Constraints
Semantic Features for Food Image Recognition with Geo-Constr...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Xinhang Song Shuqiang Jiang Ruihan Xu Luis Herranz Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computer Technology CAS Beijing China
Food-related photos have become increasingly very popular, due to social networks, food recommendation and dietary assessment systems. Reliable annotation is essential in those systems, but user-contributed tags are o... 详细信息
来源: 评论
Vertical mining probabilistic frequent itemsets from uncertain database
收藏 引用
Journal of Computational information Systems 2014年 第22期10卷 9813-9820页
作者: Yu, Xiaomei Wang, Hong Zheng, Xiangwei School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan China
With the emergence of new applications, the traditional methods of mining frequent itemsets are confronted with enormous challenges in uncertain environment. As one of the most classic algorithms, Eclat algorithm is r... 详细信息
来源: 评论
Recommendation of tourist attractions based on user preferences and attractions popularity
收藏 引用
Journal of Computational information Systems 2014年 第20期10卷 8661-8668页
作者: Yu, Beijia Liu, Fangai Li, Tianlai School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Technology Jinan China
At present, the recommendation of information for travel is concentrating on two parts: personalized travel recommendations and classic travel recommendations. However, the interaction relationship between the user pr... 详细信息
来源: 评论
Predicting employee relations in enterprises by bi-directional link mining  11
Predicting employee relations in enterprises by bi-direction...
收藏 引用
2014 11th World Congress on Intelligent Control and Automation, WCICA 2014
作者: Hong, Wang Sun, Yanshen Institute of Information Science and Engineering Shandong Normal University Jinan Shandong Province China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan Shandong Province China Department of Earth Sciences ZheJiang University Hangzhou Zhejiang Province China
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do... 详细信息
来源: 评论
Adaptively anonymous public-key broadcast encryption scheme without random oracle
收藏 引用
Journal of Networks 2014年 第6期9卷 1656-1663页
作者: Wang, Hao Wu, Lei School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Shandong Provincial Key Laboratory of Software Engineering Jinan 250101 China
Anonymous is one of the most important security properties for kinds of Internet applications. In this paper, we consider the privacy-preserving problem in the context of public key broadcast encryption. We provide a ... 详细信息
来源: 评论
Improvement of Eclat Algorithm Based on Support in Frequent Itemset Mining
Improvement of Eclat Algorithm Based on Support in Frequent ...
收藏 引用
The 6th International Conference on computer Research and Development
作者: Xiaomei Yu Hong Wang School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer software Novel TechnologyShandong Normal University
Finding frequent itemsets is computationally the most expensive step in association rules mining, and most of the research attention has been focused on it. With the observation that support plays an important role in... 详细信息
来源: 评论
Unbounded anonymous hierarchical identity-based encryption in the standard model
收藏 引用
Journal of Networks 2014年 第7期9卷 1846-1853页
作者: Wang, Hao Wu, Lei School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Shandong Provincial Key Laboratory of Software Engineering Jinan 250101 China
In this work, we present a new anonymous HIBE scheme which is unbounded in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In most of previous constructio... 详细信息
来源: 评论
Physically-based Animation of Water Pollutant Diffusion
Physically-based Animation of Water Pollutant Diffusion
收藏 引用
The 6th International Conference on computer Research and Development
作者: Guijuan Zhang Dianjie Lu Hong Liu School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology
We present a physically-based animation method for simulating the diffusion of water pollutant in this paper. Our method allows animating the dynamic evolution of biological pollutants(e.g., water hyacinth, algae) on ... 详细信息
来源: 评论
A new way for path planning based on BBO in crowd animation
A new way for path planning based on BBO in crowd animation
收藏 引用
2013 International Conference on Future computer and information technology(ICFCIT 2013)
作者: Kaige Gao Xiangwei Zheng Hongwei Ma School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology
In crowd animation production, it is difficult to design realistic and natural crowd motion paths using traditional methods. In order to solve the problems in generating paths of a crowd, a new approach based on an in... 详细信息
来源: 评论
An improved outlier detection algorithm based on reverse k-nearest neighbors of adaptive parameters
An improved outlier detection algorithm based on reverse k-n...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Fangfang, Xie Liancheng, Xu Xuezhi, Chi Zhenfang, Zhu School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Shandong Poice College Jinan 250014 China School of Information Science and Electric Engineering Shandong Jiaotong University Jinan 250357 China
The outlier detection algorithm based on reverse k-nearest neighbors can detect isolated points. The time complexity of finding the k-nearest neighbor is O(kN2), which is not suitable for large data set, and the selec... 详细信息
来源: 评论