咨询与建议

限定检索结果

文献类型

  • 1,848 篇 会议
  • 1,533 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,717 篇 计算机科学与技术...
    • 1,408 篇 软件工程
    • 508 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 242 篇 生物工程
    • 219 篇 电气工程
    • 172 篇 光学工程
    • 158 篇 机械工程
    • 156 篇 生物医学工程(可授...
    • 143 篇 电子科学与技术(可...
    • 93 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 动力工程及工程热...
    • 79 篇 仪器科学与技术
    • 77 篇 网络空间安全
    • 70 篇 建筑学
    • 69 篇 交通运输工程
  • 1,024 篇 理学
    • 582 篇 数学
    • 271 篇 生物学
    • 254 篇 物理学
    • 182 篇 统计学(可授理学、...
    • 103 篇 系统科学
    • 94 篇 化学
  • 675 篇 管理学
    • 434 篇 管理科学与工程(可...
    • 287 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 140 篇 医学
    • 129 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 58 篇 药学(可授医学、理...
  • 91 篇 法学
    • 62 篇 社会学
  • 58 篇 教育学
  • 56 篇 经济学
  • 32 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 11 篇 文学
  • 2 篇 哲学

主题

  • 103 篇 feature extracti...
  • 92 篇 deep learning
  • 87 篇 training
  • 77 篇 computational mo...
  • 75 篇 semantics
  • 71 篇 software enginee...
  • 62 篇 computer science
  • 61 篇 machine learning
  • 60 篇 accuracy
  • 58 篇 data mining
  • 49 篇 software
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 42 篇 educational inst...
  • 42 篇 convolution
  • 42 篇 optimization
  • 42 篇 convolutional ne...
  • 41 篇 image segmentati...

机构

  • 83 篇 college of compu...
  • 64 篇 school of comput...
  • 56 篇 state key labora...
  • 46 篇 school of inform...
  • 45 篇 school of comput...
  • 45 篇 school of comput...
  • 42 篇 school of comput...
  • 41 篇 university of ch...
  • 40 篇 faculty of compu...
  • 38 篇 software enginee...
  • 37 篇 state key labora...
  • 31 篇 school of comput...
  • 30 篇 institute of com...
  • 29 篇 school of softwa...
  • 29 篇 school of comput...
  • 29 篇 national enginee...
  • 27 篇 school of comput...
  • 27 篇 school of softwa...
  • 27 篇 school of comput...
  • 27 篇 institute of sof...

作者

  • 27 篇 shen linlin
  • 27 篇 quanyin zhu
  • 23 篇 shi yinghuan
  • 22 篇 gao yang
  • 18 篇 wang wei
  • 18 篇 liu wei
  • 16 篇 gao shangbing
  • 16 篇 tao dacheng
  • 16 篇 du bo
  • 16 篇 wang zheng
  • 16 篇 zhang jian
  • 14 篇 wei sun
  • 14 篇 xiaorui zhang
  • 13 篇 xiang-yang li
  • 13 篇 chen bin
  • 13 篇 tian chunwei
  • 13 篇 qi lei
  • 12 篇 wang hui
  • 12 篇 hu ruimin
  • 12 篇 yu zitong

语言

  • 2,912 篇 英文
  • 446 篇 其他
  • 70 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Software Engineering Huaiyin Institute of Technology"
3419 条 记 录,以下是3121-3130 订阅
排序:
An Efficient Certificateless Encryption Scheme in the Standard Model
An Efficient Certificateless Encryption Scheme in the Standa...
收藏 引用
International Conference on Network and System Security, NSS
作者: Hua Guo Xiyong Zhang Yi Mu Zhoujun Li School of Computer Science & Engineering Beihang University Beijing China Zhengzhou Information Science and Technology Institute Zhengzhou China CCISR School of Computer Science Software Engineering University of Wollongong NSW Australia
We propose an efficient certificateless public key encryption (CL-PKE) scheme which is provably secure against chosen ciphertext attacks without random oracles. Our scheme is more computationally efficient than the ex... 详细信息
来源: 评论
Loop-Free Forwarding Table Updates with Minimal Link Overflow
Loop-Free Forwarding Table Updates with Minimal Link Overflo...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: L. Shi J. Fu X. Fu Institute of Computer Science University of Goettingen Germany Telecommunication Software & Systems Group (TSSG) Waterford Institute of Technology Ireland School of Electrical Engineering KTH Royal Institute of Technology Sweden
The forwarding paths in an IP network may change due to a link failure, network equipment maintenance, or reconfiguration of link weights. The forwarding tables in the routers need then to be updated. These updates ma... 详细信息
来源: 评论
Enhancing cooperative behavior for online reputation systems by group selection
Enhancing cooperative behavior for online reputation systems...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, UIC-ATC 2009
作者: Ren, Yizhi Li, Mingchu Cui, Yongrui Guo, Cheng Sakurai, Kouichi School of Software Dalian University of Technology Dalian 116621 China Dept. of Computer Science and Communication Engineering Kyushu University Hakozaki Fukuoka 812-81 Japan Institute of Systems Information Technologies KYUSHU 2-1-22 Momochihama Sawara-ku Fukuoka 814-0001 Japan
Reputation systems are very useful in large online communities in which users may frequently have the opportunity to interact with users with whom they have no prior experience. Recently, how to enhance the cooperativ... 详细信息
来源: 评论
THE APPLICATION OF BINOCULAR RANGING IN THE TRAFFIC ACCIDENT PROCESSING
THE APPLICATION OF BINOCULAR RANGING IN THE TRAFFIC ACCIDENT...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: MU LI ZHEN-ZHOU WANG JING-YUN WANG JIAO-MIN LIU Editorial Department of Academic Journal Hebei University of Science and TechnologyShijiazhuang 05 Institute of Information Science & Engineering Hebei University of Science and TechnologyShijiazhu School of Computer Science and Software Hebei University of Technology Tianjin 300130 China School of Computer Science and Software Hebei University of TechnologyTianjin 300130 China
Traffic accident scene processing is a significant content to traffic supervisory work. The development and application of photographic survey and the digital picture processing technology provide the powerful tool fo... 详细信息
来源: 评论
An MLP-based face authentication technique robust to orientation
An MLP-based face authentication technique robust to orienta...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Goutam Chakraborty Basabi Chakraborty Jagdish C. Patra Chotipat Pornavalai Graduate School of Software and Information Iwate Prefectural University Japan School of Computer Engineering Nanyang Technological University Singapore Faculty of Information Technology King Mongkut''s Institute of Technology Ladkrabang Thailand
The need for stricter security, availability of sophisticated algorithms and improved hardware at cheaper price, are the driving forces for increasing popularity of biometric authentication. Machine authentication fro... 详细信息
来源: 评论
Generic Skills in software engineering Master Thesis Projects: Towards Rubric-Based Evaluation
Generic Skills in Software Engineering Master Thesis Project...
收藏 引用
Conference on software engineering Education & Training (CSEE&T)
作者: Robert Feldt Martin Höst Frank Lüders Systems and Software Engineering Blekinge Institute of Technology Ronneby Sweden Computer Science Lund University Lund Sweden School of Innovation Design and Engineering Mälardalen University Vasteras Sweden
There has been much recent interest in how to help students in higher education develop their generic skills, especially since this is a focus of the Bologna process that aims to standardize European higher education.... 详细信息
来源: 评论
Students analyzing their collaboration in an international open ended group project
Students analyzing their collaboration in an international o...
收藏 引用
Frontiers in Education (FIE) Conference
作者: Åsa Cajander Tony Clear Mats Daniels Joel Edlund Per Hamrin Cary Laxer Martin Persson Department of Information Technology University of Uppsala Sweden School of Computing & Mathematical Sciences Auckland University of Technology New Zealand Department of Computer Science and Software Engineering Rose Hulman Institute of Technology IN USA
This paper is based on a course run in the fall semester 2008 with students from Sweden and USA where they addressed an open problem in the health sector. Part of the course for the students has been to review how the... 详细信息
来源: 评论
Cheating Resistance for Secret Sharing
Cheating Resistance for Secret Sharing
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Chao-Wen Chan Chin-Chen Chang Zhi-Hui Wang Graduate School of Computer Science and Information Technology National Taichung Institute of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University FCU Taichung Taiwan Department of Software Dalian University of Technology Dalian China
In this paper we propose a notion, the (t, n)-threshold agreement certificate. The (t, n)-threshold agreement certificates of a secret are also shadows derived from the original secret using a different access structu... 详细信息
来源: 评论
A Concrete Certificateless Signature Scheme without Pairings
A Concrete Certificateless Signature Scheme without Pairings
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Aijun Ge Shaozhen Chen Xinyi Huang Department of Applied Mathematics Zhengzhou Information Science and Technology Institute Zhengzhou Henan China School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in c... 详细信息
来源: 评论
Research on the method of entity homepage recognition
收藏 引用
Journal of Computational Information Systems 2009年 第6期5卷 1617-1624页
作者: Li, Lina Yu, Zhengtao Zou, Junjie Su, Lei Xian, Yantuan Mao, Cunli The School of Information Engineering and Automation Kunming University of Science and Technology Kunming 650051 China The Institute of Intelligent Information Processing Computer Technology Application Key Laboratory of Yunnan Province Kunming 650051 China School of Software Yunnan University Kunming 650091 China
Entity Homepage Recognition(EHR) is an important part of entity finding. In this paper, a method of EHR based on AdaBoost is proposed. With the help of Google, this method recalls pages related to answer entities and ... 详细信息
来源: 评论