咨询与建议

限定检索结果

文献类型

  • 2,005 篇 期刊文献
  • 1,807 篇 会议
  • 1 册 图书

馆藏范围

  • 3,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,507 篇 工学
    • 1,601 篇 计算机科学与技术...
    • 1,333 篇 软件工程
    • 639 篇 信息与通信工程
    • 333 篇 电气工程
    • 281 篇 电子科学与技术(可...
    • 280 篇 生物工程
    • 252 篇 光学工程
    • 240 篇 控制科学与工程
    • 194 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 154 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 84 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 63 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 61 篇 安全科学与工程
  • 1,465 篇 理学
    • 688 篇 数学
    • 555 篇 物理学
    • 306 篇 生物学
    • 219 篇 统计学(可授理学、...
    • 164 篇 化学
    • 100 篇 系统科学
  • 597 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 156 篇 医学
    • 127 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 89 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 111 篇 semantics
  • 93 篇 deep learning
  • 79 篇 accuracy
  • 79 篇 training
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 52 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 40 篇 object detection
  • 40 篇 visualization
  • 38 篇 image segmentati...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 37 篇 convolutional ne...
  • 36 篇 machine learning
  • 34 篇 contrastive lear...

机构

  • 271 篇 university of ch...
  • 269 篇 iccub universita...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 258 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 254 篇 h.h. wills physi...
  • 254 篇 infn sezione di ...
  • 253 篇 van swinderen in...
  • 250 篇 horia hulubei na...
  • 245 篇 department of ph...
  • 239 篇 institute of par...
  • 238 篇 imperial college...
  • 237 篇 stfc rutherford ...
  • 223 篇 shandong provinc...
  • 222 篇 infn sezione di ...
  • 208 篇 infn sezione di ...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 154 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 152 篇 bencivenni g.
  • 151 篇 bowcock t.j.v.
  • 151 篇 byczynski w.
  • 150 篇 barbetti m.

语言

  • 3,528 篇 英文
  • 198 篇 其他
  • 93 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3813 条 记 录,以下是3691-3700 订阅
排序:
A General Sharing Model Based on Proxy Re-encryption
A General Sharing Model Based on Proxy Re-encryption
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Guojun Ma Qingqi Pei Yuchen Wang Xiaohong Jiang The State Key Laboratory of Integrated Services Networks Xidian University Xi'an China School of Electronic Engineering University of Electronic Science and Technology of China Chengdu China Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t... 详细信息
来源: 评论
Polite water-filling for weighted sum-rate maximization in MIMO B-MAC networks under multiple linear constraints
Polite water-filling for weighted sum-rate maximization in M...
收藏 引用
IEEE International Symposium on Information Theory
作者: An Liu Youjian Liu Vincent K. N. Lau Haige Xiang Wu Luo State Key Laboratory of Advanced Optical Communication Systems & Networks School of EECS Peking University China Department of Electrical and Computer Engineering University of Colorado Boulder USA Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong China
The algorithms in this paper exploit optimal input structure in interference networks and is a major advance from the state-of-the-art. Optimization under multiple linear constraints is important for interference netw... 详细信息
来源: 评论
Existence of ternary perfect sequences with a few zero elements
Existence of ternary perfect sequences with a few zero eleme...
收藏 引用
International Workshop on Signal Design and Its Applications in Communications (IWSDA)
作者: Xudong Li Pingzhi Fan Wai Ho Mow School of Mathematics and Computer Engineering Xihua University Chengdu China Provincial Key Laboratory of Information Coding and Transmission Institute of Mobile Communications Southwest Jiaotong University Chengdu China Department of Electronic & Computer Engineering Hong Kong University of Science and Technology Hong Kong China
Ternary perfect sequences, which include the binary perfect sequences as special cases, are introduced. The new notions of elementary transformations on ternary perfect sequences are brought forward. Necessary conditi... 详细信息
来源: 评论
An improved algorithm on color image enhancement in the DCT domain
收藏 引用
ICIC Express Letters, Part B: Applications 2011年 第2期2卷 295-300页
作者: Ji, Xiuhua Song, Xudong Feng, Jiefei School of Computer Science and Technology Shandong Economic University No. 7366 Second Ring East Road Jinan 250014 China Shandong Provincial Key Laboratory of Digital Media Technology Shandong Economic University No. 7366 Second Ring East Road Jinan 250014 China
The paper proposes an improved algorithm on color image enhancement in Discrete Cosine Transform (DCT) domain, which is based on histogram equalization of the DC images composed of the DC coefficients of Y component i... 详细信息
来源: 评论
Fuzzy Entropy Clustering Using Possibilistic Approach
收藏 引用
Procedia Engineering 2011年 15卷 1993-1997页
作者: Fu Hai-Jun Wu Xiao-Hong Mao Han-Ping Wu Bin School of Electrical and Information Engineering Jiangsu University Jiangsu Zhenjiang 212013 China Jiangsu Provincial Key Laboratory of Modern Agricultural Equipment and Technology Jiangsu University Jiangsu Zhenjiang 212013 China School of Information and Computer Science Anhui Agricultural University Anhui Hefei 230036 China
Fuzzy entropy clustering (FEC) is sensitive to noises the same as fuzzy c-means (FCM) clustering because the probabilistic constraints in their memberships. To solve this noise sensitive problem of FCM, Krishnapuram a... 详细信息
来源: 评论
Evolutionary channel state information feedback control for interference alignment
Evolutionary channel state information feedback control for ...
收藏 引用
Asilomar Conference on Signals, Systems & computers
作者: Lingyang Song Zhu Han Shaohui Sun Bingli Jiao The State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Peking University Beijing China Electrical and Computer Engineering Department University of Houston Houston USA Datang Wireless Mobile Innovation Center China Academy of Telecommunication and Technology Beijing China
Interference alignment (IA) has been well recognized as a promising technique to obtain a large multiplexing gain in multiple input multiple output (MIMO) interference channels. However, most of the existing IA scheme... 详细信息
来源: 评论
自稀疏磁共振谱的快速采集与欠采重建
自稀疏磁共振谱的快速采集与欠采重建
收藏 引用
第十七届全国波谱学学术会议
作者: Xiaobo Qu 屈小波 Xue Cao 曹雪 Di Guo 郭迪 Shuhui Cai 蔡淑惠 Zhong Chen 陈忠 Dept.of Electronic Science Fujian Provincial Key Laboratory of Plasma and Magnetic Resonance Xiame 厦门大学电子科学系、福建省等离子体与磁共振研究重点实验室 厦门361005 School of Software Shanghai Jiao Tong University Shanghai 200240China 上海交通大学软件学院 上海200240 Dept.of Computer Science Xiamen University of Technology Xiamen 361024 China 厦门理工学院计算机系 厦门361024
本研究通过实例分析NMR谱中稀疏变换的稀疏性和与采样系统的相干性对重建谱的影响。 当在间接维进行部分数据采集时候,基于小波变换的传统稀疏重建方法丢失了谱峰,所陈述的方法能很好的恢复这些谱峰。
来源: 评论
Concept lattice mining algorithm using rough entropy with variable precision thresholding and co-evolution
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of ...
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of science and technology (Natural science Edition) 2011年 第1期12卷 25-30页
作者: Ding, Wei-Ping Wang, Jian-Dong Guan, Zhi-Jin College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China School of Computer Science and Technology Nantong University Nantong 226019 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
Based on some special advantages of variable precision rough sets model and co-evolutionary particle swarm algorithm, a novel concept lattice mining algorithm (REVPT)using rough entropy with variable precision thresho... 详细信息
来源: 评论
Texture image segmentation based on contourlet-domain contextual hidden Markov tree model
收藏 引用
ICIC Express Letters 2011年 第10期5卷 3707-3712页
作者: Shen, Xiaohong Zhang, Caiming Wang, Gaoshan School of Computer Science and Technology Shandong Economic University No. 7366 Erhuan Donglu Lixia District Jinan 250014 China Shandong Provincial Key Laboratory of Digital Media Technology Shandong Economic University No. 7366 Erhuan Donglu Lixia District Jinan 250014 China School of Information Management Shandong Economic University No. 7366 Erhuan Donglu Lixia District Jinan 250014 China
A new texture image segmentation algorithm based on hidden Markov tree model (HMT) in the contourlet domain with a modified context scheme is proposed. The dependencies of contourlet coefficients are modeled as HMT, w... 详细信息
来源: 评论
From the modern Web applications to the multi-tenant SaaS solution
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第9 A期32卷 133-138页
作者: Ma, Kun Yang, Bo Chen, Zhen-Xiang Ma, Bing-Xian Li, Qing-Zhong School of Computer Science and Technology Shandong University Jinan 250101 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China
Migrating existing Web applications toward SaaS (software-as-a-service) applications can reuse the legacy software assets and cut down the re-development cost and risk. However, it lacked generic migration approaches ... 详细信息
来源: 评论