咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是3441-3450 订阅
排序:
A two-stage method for annotation-based image retrieval
收藏 引用
Journal of Computational Information Systems 2014年 第14期10卷 6253-6260页
作者: Kong, Wenjie Zhang, Huaxiang Liu, Li School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
To improve the accuracy of image retrieval, a two-stage method for annotation-based image retrieval is proposed. In the approach, images are ranked using their attached text information at the first stage, and Content... 详细信息
来源: 评论
Image quality assessment based on region of interest
Image quality assessment based on region of interest
收藏 引用
2nd International Conference on Mechatronics and Industrial Informatics, ICMII 2014
作者: Wang, Yue Lin, Zeng Gang Liao, Zi Cheng Shaanxi Provincial Key Laboratory of Speech and Image Information Processing School of Computer Science Northwestern Polytechnical University China
In this paper a new No-Reference (NR) image quality assessment (IQA) method based on the point wise statistics of local normalized luminance signals using region of interest (ROI) processing is proposed. This algorith... 详细信息
来源: 评论
Mining Approximate Frequent Patterns from Noisy Databases
Mining Approximate Frequent Patterns from Noisy Databases
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Xiaomei Yu Yongqin Li Hong Wang School of Information Science and Engineering Shandong Normal University Jinan Shandong China Shandong Provincial Key Laboratory for Distributed Computer software Novel Technology School of Teacher's Education Shandong Normal University Jinan Shandong China
As an important branch in the field of frequent pattern mining, approximate frequent pattern (AFP) mining attracts much attention recently. Various algorithms have been proposed to discover long true AFPs in presence ... 详细信息
来源: 评论
Mining API protocols based on a balanced probabilistic model
Mining API protocols based on a balanced probabilistic model
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Deng Chen Yanduo Zhang Rongcun Wang Wei Wei Huabing Zhou Xun Li Binbin Qu Hubei Provincial Key Laboratory of Intelligent Robot Wuhan Institute of Technology Wuhan P.R. China School of Computer Science and Technology China University of Mining and Technology Xuzhou P.R. China Industrial Robot Engineering Center Wuhan Institute of Technology Wuhan P.R. China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan P.R. China
API protocols are important for modern software development. They can be used in program testing, documentation, understanding and validation. Mining API protocols based on probabilistic models is proved to be an effe... 详细信息
来源: 评论
Research on the architecture of E-government sharing platform
Research on the architecture of E-government sharing platfor...
收藏 引用
2015 International Conference on Materials Engineering and Information technology Applications(MEITA 2015)
作者: Gang Li Qingpu Zhang Wei Wang Ming Jiang Shandong Computer Science Center Shandong Provincial Key Laboratory of computer Network School of Management Harbin Institute of Technology
At present, the resources integration and sharing efficiency between the government systems is not high in China. The phenomenon of repeated system development is common, which results in a tremendous waste of resourc... 详细信息
来源: 评论
A self-evolving method of process model in SaaS applications
A self-evolving method of process model in SaaS applications
收藏 引用
2013 International Conference on Information Engineering, ICIE 2013
作者: Xu, Meng Li, Qingzhong Cui, Lizhen School of Computer Science and Technology Shandong University Shandong Provincial Key Laboratory of Software Engineering China
SaaS applications provide different services for tenants by customization. In order to adapt to the different needs of SaaS application process and reduce the complexity of customization and instantiation of process, ... 详细信息
来源: 评论
Adaptively anonymous public-key broadcast encryption scheme without random oracle
收藏 引用
Journal of networks 2014年 第6期9卷 1656-1663页
作者: Wang, Hao Wu, Lei School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Shandong Provincial Key Laboratory of Software Engineering Jinan 250101 China
Anonymous is one of the most important security properties for kinds of Internet applications. In this paper, we consider the privacy-preserving problem in the context of public key broadcast encryption. We provide a ... 详细信息
来源: 评论
Unbounded anonymous hierarchical identity-based encryption in the standard model
收藏 引用
Journal of networks 2014年 第7期9卷 1846-1853页
作者: Wang, Hao Wu, Lei School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Shandong Provincial Key Laboratory of Software Engineering Jinan 250101 China
In this work, we present a new anonymous HIBE scheme which is unbounded in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In most of previous constructio... 详细信息
来源: 评论
Network Forensics Scenario Reconstruction Method Based on Hidden Markov Models
Network Forensics Scenario Reconstruction Method Based on Hi...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Weiping Gu Liancheng Xu Min Ren Xiaoyan Han School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Mathematics and Quantitative Economics Shandong University of Finance and Economics Jinan China
Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order ... 详细信息
来源: 评论
Multi-tenant data migration strategy in SaaS platform
收藏 引用
Research Journal of Applied sciences, Engineering and technology 2014年 第12期7卷 2421-2426页
作者: Zheng, Yongqing Ren, Xiaojun Kong, Lanju School of Computer Science and Technology Shandong University Shandong Provincial Key Laboratory of Software Engineering Shandong University Jinan China
On demand migration of tenants' data is a critical technology for elastic load balancing in SaaS application. However, different tenants have different required resource with various SLA requirements. Moreover, pr... 详细信息
来源: 评论