咨询与建议

限定检索结果

文献类型

  • 2,005 篇 期刊文献
  • 1,807 篇 会议
  • 1 册 图书

馆藏范围

  • 3,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,507 篇 工学
    • 1,601 篇 计算机科学与技术...
    • 1,333 篇 软件工程
    • 639 篇 信息与通信工程
    • 333 篇 电气工程
    • 281 篇 电子科学与技术(可...
    • 280 篇 生物工程
    • 252 篇 光学工程
    • 240 篇 控制科学与工程
    • 194 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 154 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 84 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 63 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 61 篇 安全科学与工程
  • 1,465 篇 理学
    • 688 篇 数学
    • 555 篇 物理学
    • 306 篇 生物学
    • 219 篇 统计学(可授理学、...
    • 164 篇 化学
    • 100 篇 系统科学
  • 597 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 156 篇 医学
    • 127 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 89 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 111 篇 semantics
  • 93 篇 deep learning
  • 79 篇 accuracy
  • 79 篇 training
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 52 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 40 篇 object detection
  • 40 篇 visualization
  • 38 篇 image segmentati...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 37 篇 convolutional ne...
  • 36 篇 machine learning
  • 34 篇 contrastive lear...

机构

  • 271 篇 university of ch...
  • 269 篇 iccub universita...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 258 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 254 篇 h.h. wills physi...
  • 254 篇 infn sezione di ...
  • 253 篇 van swinderen in...
  • 250 篇 horia hulubei na...
  • 245 篇 department of ph...
  • 239 篇 institute of par...
  • 238 篇 imperial college...
  • 237 篇 stfc rutherford ...
  • 223 篇 shandong provinc...
  • 222 篇 infn sezione di ...
  • 208 篇 infn sezione di ...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 154 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 152 篇 bencivenni g.
  • 151 篇 bowcock t.j.v.
  • 151 篇 byczynski w.
  • 150 篇 barbetti m.

语言

  • 3,528 篇 英文
  • 198 篇 其他
  • 93 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3813 条 记 录,以下是3671-3680 订阅
排序:
A Space Target Recognition Method Based on Compressive Sensing
A Space Target Recognition Method Based on Compressive Sensi...
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Yuemei Ren Yangning Zhang Ying Li Jianyu Huang Jianjiang Hui Shaanxi Provincial Key Laboratory of Speech & Image Information Processing School of Computer Science Northwestern Polytechnical University Xi'an China Beijing Institute of Tracking and Telecommunications Technology Beijing China
Small sample space target recognition is a difficult problem in applications because the limited training samples cannot lead to satisfactory recognition accuracy. Combined with novel compression perception theory, we... 详细信息
来源: 评论
Exploiting user-supplied tags for Flickr photos annotation
Journal of Software
收藏 引用
Journal of Software 2011年 第10期6卷 1898-1905页
作者: Liu, Zheng Yan, Hua School of Computer Science and Technology Shandong Economic University Ji'nan 250014 China Shandong Provincial Key Laboratory of Digital Media Technology Ji'nan 250014 China
The popularity of photo-sharing websites like Flickr give us a chance to observe what ordinary users do in their daily life. Particularly, Flickr allows the users to provide personalized tags when uploading photos, an... 详细信息
来源: 评论
A proxy re-encryption based sharing model for DRM
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2011年 第11期5卷 385-393页
作者: Ma, Guojun Pei, Qingqi Jiang, Xiaohong Wang, Yuchen Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China The State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China School of Electronic Engineering University of Electronic Science and Technology of Chaina Chengdu China
Content sharing is one of the most significant issues of Digital Rights Management (DRM). There are many requirements of rational content sharing between different users who are not family members. But, the main goals... 详细信息
来源: 评论
The design and FPGA implementation of FSM-based intellectual property watermark algorithm at behavioral level
收藏 引用
Information technology Journal 2011年 第4期10卷 870-876页
作者: Liang, Wei Sun, Xingming Ruan, Zhiqiang Long, Jing Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale Integration (VLSI). The proposed algorit... 详细信息
来源: 评论
A new algorithm for removing salt and pepper noise from images
收藏 引用
Journal of Information and Computational science 2011年 第16期8卷 3819-3825页
作者: Li, Fangzhen Gao, Feng Cai, Nian Shandong Provincial Key Laboratory of Digital Media Technology School of Computer Science and Technology Shandong University of Finance and Economics Jinan 250014 China School of Information Engineering Guangdong University of Technology Guangzhou 510006 China
There are always some noises in images because of the interferences existing in the process of getting and transmitting images. Salt and Pepper noise is one of the most important noise model. In order to remove this t... 详细信息
来源: 评论
Evolutionary computing method in 3D animation modeling cooperative design
Evolutionary computing method in 3D animation modeling coope...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Hanchao Yu Hong Liu Xiaopeng Yang School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China
In order to generate novel 3D animation modellings automatically, an interactive genetic algorithm HAIGA based on C/S mode was proposed. In HAIGA, HSF synergy technology and ACIS rule were brought in. The ACIS rule ex... 详细信息
来源: 评论
A role modelling approach for crowd animation in a multi-agent cooperative system
A role modelling approach for crowd animation in a multi-age...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Hong Liu Hanchao Yu Yuanyuan Li Yuling Sun School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China
This paper presents a multi-agent cooperative system for crowd animation. It analyses related work about crowd animation first. Then, a multi-agent crowd animation system architecture is introduced, which offers a pro... 详细信息
来源: 评论
Local Shape Control of a Bivariate Rational Interpolating Surface with Mixing Conditions
Local Shape Control of a Bivariate Rational Interpolating Su...
收藏 引用
International Symposium on Voronoi Diagrams in science and Engineering (ISVD)
作者: Yunfeng Zhang Fangxun Bao Caiming Zhang Duan Qi School of Computer Science & Technology Shandong Economic University Shandong Provincial Key Laboratory of Digital Media Technology Jinan China School of Mathematics and System Science Shandong University Jinan China
A bivariate rational interpolation method with parameters was created which was based on function values and partial derivatives, it is called the bivariate rational interpolation with mixing conditions. This paper wi... 详细信息
来源: 评论
Research on Policy-Based Service-Oriented Computing Security
Research on Policy-Based Service-Oriented Computing Security
收藏 引用
The International Conference on Recent Trends in Materials and Mechanical Engineering(ICRTMME 2011)
作者: Zhang Yongsheng Luo Qin Nie Xuewu Bi Xiaodong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Police College
This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web ServicesXACML is characterized by the strong ability of expansion and the favorab... 详细信息
来源: 评论
Proxy signature scheme with a semi-trusted third party
收藏 引用
Procedia Engineering 2011年 15卷 3195-3199页
作者: Liu Peiyu Cui Tao Xu Mingying School of Information Science and Engineering Shandong Normal University Jinan Shandong 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan 250014 China
Authorization mechanism is introduced to prevent the on-line original signer problem in this scheme. The semi-trusted third party's secret value in the proxy signature strengthens the unforgeability. The proxy sig... 详细信息
来源: 评论