咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是3511-3520 订阅
排序:
Hidden space discriminant neighborhood embedding
Hidden space discriminant neighborhood embedding
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Chuntao Ding Li Zhang Bangjun Wang School of Computer Science and Technology & Provincial Key laboratory for Computer Information Processing Soochow University Suzhou Jiangsu China
Discriminant neighborhood embedding (DNE) algorithm is one of supervised linear dimensionality reduction methods. Its nonlinear version kernel discriminant neighborhood embedding (KDNE) is expected to behave well on c... 详细信息
来源: 评论
A modified approach of hot topics found on micro-blog
A modified approach of hot topics found on micro-blog
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Ran, Lu Suzhi, Xue Yuanyuan, Ren Zhenfang, Zhu School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China School of Information Science and Electric Engineering Shandong Jiaotong University Jinan 250357 China
Due to the simplicity, immediacy and convenience, micro-blog is gaining more and more attention from all kinds of people, especially the researchers. Recently, topic detection on micro-blog has attracted more interest... 详细信息
来源: 评论
AN ENSEMBLE OF DEEP NEURAL networks FOR OBJECT TRACKING
AN ENSEMBLE OF DEEP NEURAL NETWORKS FOR OBJECT TRACKING
收藏 引用
IEEE International Conference on Image Processing
作者: Xiangzeng Zhou Lei Xie Peng Zhang Yanning Zhang Shaanxi Provincial Key Laboratory of Speech & Image Information Processing (SAIIP) School of Computer Science Northwestern Polytechnical University
Object tracking in complex backgrounds with dramatic appearance variations is a challenging problem in computer vision. We tackle this problem by a novel approach that incorporates a deep learning architecture with an... 详细信息
来源: 评论
ESYN: Efficient synchronization clustering algorithm based on dynamic synchronization model
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 86-93页
作者: Dong, Xue-Wen Yang, Chao Sheng, Li-Jie Ma, Jian-Feng Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China School of Computer Science and Technology Xidian University Xi'an710071 China
Clustering is an important research field in data mining. Based on dynamical synchronization model, an efficient synchronization clustering algorithm ESYN is proposed. Firstly, based on local structure information of ... 详细信息
来源: 评论
A shared pixel ambient occlusion method in ray tracing
A shared pixel ambient occlusion method in ray tracing
收藏 引用
International Conference on Wavelet Active Media technology and Information Processing (ICWAMTIP)
作者: Yuxiao Guo Leiting Chen Tao Wu Xin Li Yue Cao School of Computer Science and Engineering University of Electronic Science and Technology of China Provincial Key Laboratory of Digital Media
Ambient occlusion is an illumination simulation approach used in ray tracing for decades. However, huge consume of multiple sample times, for a high re-solution, in ambient occlusion restricts its development. We prop... 详细信息
来源: 评论
A Framework for Workload Aware SaaS Platform Data Management
A Framework for Workload Aware SaaS Platform Data Management
收藏 引用
2014全国理论计算机科学学术年会
作者: Wei Guo Xinjun Wang Shandong Provincial Key Laboratory of Software Engineering School of Computer Science and TechnologyShandong UniversityChina
Cloud computing is a new emerging way by which hardware and software resources can be shared on-demand to computers and other devices via the *** computing platform has now become a new platform for enterprises and pe... 详细信息
来源: 评论
A model based on crossed cubes for VoD services
A model based on crossed cubes for VoD services
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Haifei Shen Jianxi Fan Baolei Cheng Cheng-Kuan Lin School of Computer Science and Technology Soochow University Suzhou China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Content distribution schemes for Video on Demand (VoD) systems, based on the peer-to-peer (P2P) technology, have attracted more and more attention. Recently, people mainly focus on the latency performance, security, i... 详细信息
来源: 评论
Arranging the layout of alphanumeric buttons-the role of passwords  21
Arranging the layout of alphanumeric buttons-the role of pas...
收藏 引用
21st ACM Conference on computer and Communications Security, CCS 2014
作者: Li, Xiangxue Yu, Yu Li, Qiang Qian, Haifeng Zhou, Yuan Weng, Jian Department of Computer Science and Technology East China Normal University China State Key Laboratory of Integrated Services Networks Xidian University China School of Electronic Information and Electrical Engineering Shanghai Jiaotong University China Network Emergency Response Technical Team Coordination Center China Computer Science Department Jinan University China
A typical but trivial layout of alphanumeric buttons in the touchscreen setting is to arrange the 10 digits and 26 letters in a natural order. This arrangement does not take into account the frequencies of letters and... 详细信息
来源: 评论
Strategy of domain and cross-domain access control based on trust in cloud computing environment
Strategy of domain and cross-domain access control based on ...
收藏 引用
3rd International Conference on computer Engineering and Network, CENet 2013
作者: Li, Bo Tian, Ming Zhang, Yongsheng Lv, Shenjuan Academic Affairs Office Shandong Polytechnic Jinan 250104 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
Under the current cloud computing environment, a reasonable and practicable access control strategy is needed, which is a guarantee to protect cloud computing suppliers to provide services and many cloud users access ... 详细信息
来源: 评论
The application of trusted computing technology in the cloud security
The application of trusted computing technology in the cloud...
收藏 引用
3rd International Conference on computer Engineering and Network, CENet 2013
作者: Li, Bo Lv, Shenjuan Zhang, Yongsheng Tian, Ming Academic Affairs Office Shandong Polytechnic Jinan 250104 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
For the lack of safety and reliability of the information in the cloud computing environment, in order to create a more flexible and adaptable security mechanism, the combination of cloud computing and credible concep... 详细信息
来源: 评论