咨询与建议

限定检索结果

文献类型

  • 1,688 篇 会议
  • 1,054 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 2,752 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,771 篇 工学
    • 1,285 篇 计算机科学与技术...
    • 1,068 篇 软件工程
    • 444 篇 信息与通信工程
    • 260 篇 控制科学与工程
    • 255 篇 生物工程
    • 179 篇 生物医学工程(可授...
    • 178 篇 电气工程
    • 161 篇 光学工程
    • 142 篇 电子科学与技术(可...
    • 130 篇 机械工程
    • 106 篇 网络空间安全
    • 89 篇 化学工程与技术
    • 78 篇 交通运输工程
    • 70 篇 仪器科学与技术
    • 65 篇 动力工程及工程热...
    • 65 篇 安全科学与工程
  • 936 篇 理学
    • 462 篇 数学
    • 292 篇 物理学
    • 276 篇 生物学
    • 170 篇 统计学(可授理学、...
    • 93 篇 化学
    • 69 篇 系统科学
  • 506 篇 管理学
    • 304 篇 管理科学与工程(可...
    • 229 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 144 篇 医学
    • 107 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 62 篇 公共卫生与预防医...
    • 62 篇 药学(可授医学、理...
  • 106 篇 法学
    • 93 篇 社会学
  • 44 篇 经济学
  • 39 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 8 篇 军事学
  • 7 篇 艺术学

主题

  • 97 篇 deep learning
  • 88 篇 accuracy
  • 74 篇 feature extracti...
  • 69 篇 training
  • 61 篇 machine learning
  • 58 篇 computational mo...
  • 54 篇 semantics
  • 51 篇 convolutional ne...
  • 48 篇 predictive model...
  • 47 篇 real-time system...
  • 47 篇 data models
  • 42 篇 artificial intel...
  • 40 篇 optimization
  • 35 篇 data mining
  • 30 篇 internet of thin...
  • 30 篇 forecasting
  • 29 篇 support vector m...
  • 29 篇 security
  • 27 篇 education
  • 27 篇 robustness

机构

  • 73 篇 school of comput...
  • 60 篇 tianjin key labo...
  • 50 篇 department of co...
  • 48 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 institute of phy...
  • 39 篇 ochanomizu unive...

作者

  • 44 篇 zhang yanning
  • 42 篇 xia yong
  • 38 篇 liu qi
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 chen enhong
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo

语言

  • 2,297 篇 英文
  • 419 篇 其他
  • 46 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Application and Technology"
2752 条 记 录,以下是2501-2510 订阅
排序:
Research on illegal information flow in role-based access control model based on petri net
收藏 引用
ICIC Express Letters 2012年 第1期6卷 139-144页
作者: Liu, Meng Wang, Xuan Zhao, Hainan Computer Application Research Center Harbin Institute of Technology Shenzhen Graduate School Xili Nanshan District Shenzhen 518055 China School of Mechanical Electrical and Information Engineering Shandong University at Weihai No. 180 Wenhua West Road Weihai 264209 China
Role-Based Access Control (RBAC) does not define information flow and not enforce information flow control, which can cause illegal information flow and many researchers in some literature have discussed. But some pro... 详细信息
来源: 评论
Calculating the pre-image using the kernel methods
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第22期4卷 612-618页
作者: Tan, Zhiying Feng, Yong Xu, Kejia Jia, Ke Song, Xiaobo School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Chengdu Inst. of Computer Application Chinese Academy of Sciences Chengdu China Changzhou Inst. of Advanced Manufacturing Chinese Academy of Sciences Changzhou China Chongqing Inst. of Green and Intelligent Technology Chinese Academy of Sciences Chongqing China School of electrical SouthWest JiaoTong University Chengdu China
The nonlinear features can be extracted by the kernel methods. The features play the important roles in pattern recognition and image processing. The researching on kernel methods has the great theoretical and practic... 详细信息
来源: 评论
An improved real-valued negative selection algorithm for anomaly detection
收藏 引用
International Journal of Advancements in Computing technology 2012年 第16期4卷 453-459页
作者: Zeng, Jinquan Tang, Weiwen Liu, Caiming Hu, Jianbin Peng, Lingxi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Communication Research Planning and Designing Co. ltd Chengdu China Laboratory of Intelligent Information Processing and Application Leshan Normal University Leshan China School of Electronics and Information Nantong University Nantong China Department of Computer and Education Software Guangzhou University Guangzhou China
Conventional classification algorithms need samples for all classes (e.g. normal and abnormal) during the training phase. However, in many anomaly detection application, we can only get a class samples (commonly, norm... 详细信息
来源: 评论
Analytical Drain Current Model for Organic Thin-Film Transistors
Analytical Drain Current Model for Organic Thin-Film Transis...
收藏 引用
2012 IEEE 11th International Conference on Solid-State and Integrated Circuit technology(ICSICT-2012)
作者: Hongyu He Jin He Wanling Deng Mansun Chan Yuan Liu Ruohe Yao Bin Li Xueren Zheng Peking University Shenzhen SOC Key Laboratory PKU-HKUST Shenzhen-HongKong Institution Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Science and Technology on Reliability Physics and Application of Electronic Component Laboratory School of Electronic and Information Engineering South China University of Technology
Two analytical drain current models for organic thin-film transistors(OTFTs)are *** first one is the surface potential based drain current model considering both deep and tail trap states densities within the energy g... 详细信息
来源: 评论
3D model reconstruction from video recorded with a compact camera
3D model reconstruction from video recorded with a compact c...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Pengqi Gao Xiaozhong Guo Datao Yang Ming Shen You Zhao Zunyi Xu Zhongwei Fan Jin Yu Yunfeng Ma Center for Research and Application of Space Debris National Astronomical Observatories Chinese Academy of Sciences Beijing China School of Computer Science and Technology Shandong Jianzhu University Qingdao China Academy of Opto-electronics Chinese Academy of Sciences Beijing China
3d model plays an important role in modern visualization applications. Image or video based 3d model reconstruction is being more and more widely used. In this paper, the way to reconstruct a 3d model from video colle... 详细信息
来源: 评论
Unknown malicious executables detection based on immune principles
收藏 引用
Research Journal of Applied Sciences, Engineering and technology 2012年 第1期4卷 82-85页
作者: Zeng, Jinquan Liu, Caiming Hu, Jianbin Zhang, Yu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Sichuan Communication Research Planning and Designing Co. ltd Chengdu 610041 China Laboratory of Intelligent Information Processing and Application Leshan Normal University Leshan 614004 China School of Electronics and Information Nantong University Nantong 226019 China College of Information Science and Technology Hainan Normal University 571158 Haikou China
Detecting unknown malicious executables is a challenging task. Traditional anti-virus systems use signatures to detect malicious executables. However, the method cannot detect unseen instances or variants. Inspired by... 详细信息
来源: 评论
Interference analysis of TD-SCDMA system and CDMA2000 system
收藏 引用
Journal of Networks 2012年 第1期7卷 101-109页
作者: Hao, Chen Tong, Yang Jian-Fu, Teng Hong, He School of Electronic and Information Engineering Tianjin University Tianjin 300072 China Computer Science and Information Engineering College Tianjin University of Science and Technology Tianjin 300222 China Tianjin Mobile Communications Co. Ltd Tianjin 300052 China School of Electronic and Information Engineering Tianjin University Tianjin 300072 China Tianjin Key Laboratory for Control Theory and Application in Complicated Systems Tianjin University of Technology Tianjin 300384 China
In this paper, the feasibility of co-channel coexistence of Time Division- Synchronous Code Division Multiple Access (TD-SCDMA) and Code Division Multiple Access 2000 (CDMA2000) systems operating in a macro cell envir... 详细信息
来源: 评论
Mixed precision method for GPU-based FFT
Mixed precision method for GPU-based FFT
收藏 引用
14th IEEE Int. Conf. on Computational Science and Engineering, CSE 2011, the 11th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2011, and the 10th IEEE Int. Conf. on Ubiquitous Computing and Communications, IUCC 2011
作者: Qi, Shuhan Wang, Xuan Shi, Shaohuai Computer Application Research Center Harbin Institute of Technology Shenzhen Graduate School Shenzhen China
In order to solve the low accuracy problem of GPU-based FFT, a mixed precision method is employed in this paper. A "precision cache" method is proposed as the supplement of the mixed precision method to calc... 详细信息
来源: 评论
Pedestrian detection based on combinational holistic and partial features
Pedestrian detection based on combinational holistic and par...
收藏 引用
2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011
作者: Yu, Chenglong Wang, Xuan Computer Application Research Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen China
Pedestrian detection has been widely used in many applications, however, it is a challenging task and there are many problems unsolved to be handled. Althougth Histograms of Oriented Gradients (HOG) plus Support Vecto... 详细信息
来源: 评论
Joint decoding for Chinese word segmentation and POS tagging using character-based and word-based discriminative models
Joint decoding for Chinese word segmentation and POS tagging...
收藏 引用
2011 International Conference on Asian Language Processing, IALP 2011
作者: Li, Xinxin Wang, Xuan Yao, Lin Computer Application Research Center Harbin Institute of Technology Shenzhen Graduate School Shenzhen China
For Chinese word segmentation and POS tagging problem, both character-based and word-based discriminative approaches can be used. Experiments show that these two approaches bring different errors and can complement ea... 详细信息
来源: 评论