咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是3481-3490 订阅
排序:
A unified semi-supervised framework for author disambiguation in academic social network
A unified semi-supervised framework for author disambiguatio...
收藏 引用
25th International Conference on Database and Expert Systems Applications, DEXA 2014
作者: Wang, Peng Zhao, Jianyu Huang, Kai Xu, Baowen School of Computer Science and Engineering Southeast University China State Key Laboratory for Novel Software Technology Nanjing University China State Key Laboratory of Software Engineering Wuhan University China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
This paper addresses the author disambiguation problem in academic social network, namely, resolves the phenomenon of synonym problem "multiple names refer to one person" and polysemy problem "one name ... 详细信息
来源: 评论
Similarity-balanced Discriminant Neighborhood Embedding
Similarity-balanced Discriminant Neighborhood Embedding
收藏 引用
International Joint Conference on Neural networks
作者: Chuntao Ding Li Zhang Yaping Lu Shuping He School of Computer Science and Technology & Provincial Key Laboratory for Computer Information Processing School of Computer Science and Technology Provincial Key Laboratory for Computer Information Processing
The idea that with the help of proper dimensionality reduction, trying to make the samples with the same label be compact and the ones with the different labels be separate after projection, is introduced into classif... 详细信息
来源: 评论
Integrity verification of cloud data
Integrity verification of cloud data
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Kong, Fan-Xin Liu, Li School of Information Science and Engineering China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
This paper proposes a new program on the integrity of the data to the probabilistic methods when the number of documents inserted the pseudo-tuple becomes large. In this program, pseudo-tuple inserted in accordance wi... 详细信息
来源: 评论
New adaptations of classic algorithm for mining frequent itemsets from uncertain data  5
New adaptations of classic algorithm for mining frequent ite...
收藏 引用
5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
作者: Yu, Xiaomei Wang, Hong Zheng, Xiangwei School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan Shandong China
Mining frequent itemsets from traditional database is an important research topic in data mining and researchers achieved tremendous progress in this field. However, with the emergence of new applications, the traditi... 详细信息
来源: 评论
Sparse belief propagation algorithm based on latent dirichlet allocation
收藏 引用
Diangong Jishu Xuebao/Transactions of China Electrotechnical Society 2015年 30卷 506-511页
作者: Tu, Xionggang Chen, Jun Yang, Lu Yan, Jianfeng School of Design and Arts Zhejiang Industry Polytechnic College ShaoxingZhejiang312000 China School of Computer Science and Technology Soochow University Suzhou215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China
Latent Dirichlet allocation(LDA) is a popular and unsupervised tool for reducing dimension, has been applied in text mining and information retrieval. Belief propagation is competitive in both speed and accuracy compa... 详细信息
来源: 评论
Design of trust model based on behavior in cloud computing environment
Design of trust model based on behavior in cloud computing e...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Zhang, Yong Sheng Tian, Ming Lv, Shen Juan Zhang, Yan Dong School of Information Science and Engineering Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan 250014 China
This paper studies the characteristics of cloud computing environment, based on the traditional access control management technology, proposes a reference model for access control management in the cloud computing, de... 详细信息
来源: 评论
A new medical image enhancement method based on human visual characteristics
A new medical image enhancement method based on human visual...
收藏 引用
International Conference on Vehicle and Mechanical Engineering and Information technology, VMEIT 2014
作者: Dong, Ai Bin Zhang, Yun Feng Liu, Yi Fang School of Computer Science and Technology Shandong University of Finance and Economics Jinan 250014 China Shandong Provincial Key Laboratory of Digital Media Technology Jinan 250014 China
Studying of image enhancement shows that the quality of image heavily relies on human visual system. In this paper, we apply this fact to design a new image enhancement method for medical images that improves the deta... 详细信息
来源: 评论
A programming related courses' E-learning platform based on online judge
A programming related courses' E-learning platform based on ...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Fang, Xiaonan Zhang, Huaxiang Sun, Yunchen School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
Coding practice is the most efficient way in learning of programming related courses. In this paper, we propose a programming related courses' E-learning platform based on online judge. This platform is designed a... 详细信息
来源: 评论
Research on distributed data stream mining in Internet of things
Research on distributed data stream mining in Internet of th...
收藏 引用
2014 International Conference on Logistics Engineering, Management and computer science, LEMCS 2014
作者: Xu, Liancheng Xun, Jiao School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
For mining useful data from mass data generated by Internet of things, analyses shortages of the traditional Apriori algorithm which has a lower mining efficiency and occupies the larger memory space. So, MapReduce mo... 详细信息
来源: 评论
A Heuristic Method of Using the Pointers to Physical Effects in Su-Field Analysis
收藏 引用
Procedia Engineering 2015年 131卷 539-550页
作者: Wei Yan Cecilia Zanni-Merk François Rousselot Denis Cavallucci Pierre Collet School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China LGECO / INSA Strasbourg 24 Boulevard de la Victoire 67084 Strasbourg Cedex France LSIIT / BFO Team (UMR CNRS 7005) – Pôle API BP 10413 67412 Illkirch Cedex France
While TRIZ is increasingly developing both in research and education, users always encounter difficulties in their attempts to practice it, especially for one of the most complicated inventive problem solving tools, t... 详细信息
来源: 评论