咨询与建议

限定检索结果

文献类型

  • 781 篇 期刊文献
  • 726 篇 会议

馆藏范围

  • 1,507 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 972 篇 工学
    • 726 篇 计算机科学与技术...
    • 612 篇 软件工程
    • 181 篇 信息与通信工程
    • 119 篇 控制科学与工程
    • 113 篇 生物工程
    • 83 篇 电气工程
    • 65 篇 机械工程
    • 63 篇 光学工程
    • 63 篇 电子科学与技术(可...
    • 62 篇 化学工程与技术
    • 61 篇 生物医学工程(可授...
    • 38 篇 动力工程及工程热...
    • 31 篇 材料科学与工程(可...
    • 30 篇 仪器科学与技术
    • 26 篇 土木工程
    • 24 篇 建筑学
    • 23 篇 网络空间安全
    • 22 篇 交通运输工程
  • 656 篇 理学
    • 433 篇 数学
    • 151 篇 物理学
    • 134 篇 生物学
    • 117 篇 统计学(可授理学、...
    • 65 篇 化学
    • 51 篇 系统科学
  • 269 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 40 篇 法学
    • 31 篇 社会学
  • 39 篇 医学
    • 31 篇 临床医学
    • 26 篇 基础医学(可授医学...
  • 18 篇 农学
  • 15 篇 经济学
  • 15 篇 教育学
  • 6 篇 艺术学
  • 4 篇 哲学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 67 篇 feature extracti...
  • 54 篇 semantics
  • 38 篇 training
  • 26 篇 deep learning
  • 26 篇 optimization
  • 25 篇 image segmentati...
  • 24 篇 face recognition
  • 23 篇 contrastive lear...
  • 22 篇 visualization
  • 21 篇 machine learning
  • 20 篇 data mining
  • 20 篇 predictive model...
  • 18 篇 object detection
  • 18 篇 reinforcement le...
  • 18 篇 accuracy
  • 18 篇 computer vision
  • 18 篇 robustness
  • 17 篇 computer science
  • 16 篇 convolution
  • 16 篇 computational mo...

机构

  • 172 篇 key laboratory o...
  • 90 篇 university of ch...
  • 64 篇 college of compu...
  • 57 篇 college of mathe...
  • 44 篇 school of comput...
  • 42 篇 peng cheng labor...
  • 36 篇 fujian provincia...
  • 33 篇 national enginee...
  • 32 篇 fujian key labor...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 29 篇 hunan provincial...
  • 26 篇 key laboratory o...
  • 24 篇 school of comput...
  • 23 篇 key laboratory o...
  • 22 篇 fujian key labor...
  • 21 篇 the key laborato...
  • 21 篇 guangdong provin...
  • 20 篇 engineering rese...
  • 20 篇 key laboratory o...

作者

  • 64 篇 huang qingming
  • 47 篇 xu qianqian
  • 34 篇 yang zhiyong
  • 29 篇 guo wenzhong
  • 28 篇 cao xiaochun
  • 27 篇 jiang kai
  • 26 篇 shen linlin
  • 25 篇 xilin chen
  • 25 篇 shi zhongzhi
  • 23 篇 ding shifei
  • 21 篇 shiguang shan
  • 20 篇 zou juan
  • 20 篇 qingming huang
  • 19 篇 zhang juan
  • 18 篇 guo kun
  • 17 篇 shan shiguang
  • 17 篇 zhang xingyi
  • 17 篇 zu-guo yu
  • 17 篇 zhongzhi shi
  • 16 篇 chen xilin

语言

  • 1,298 篇 英文
  • 188 篇 其他
  • 35 篇 中文
检索条件"机构=Science Computing Intelligent Information Processing"
1507 条 记 录,以下是1101-1110 订阅
排序:
Encoding-Aware Data Placement for Efficient Degraded Reads in XOR-Coded Storage Systems
Encoding-Aware Data Placement for Efficient Degraded Reads i...
收藏 引用
Reliable Distributed Systems
作者: Zhirong Shen Patrick P.C. Lee Jiwu Shu Wenzhong Guo College of Mathematics and Computer Science Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China Department of Computer Science and Engineering The Chinese University of Hong Kong Department of Computer Science and Technology Tsinghua University Key Laboratory of Spatial Data Mining and Information Sharing Minstry of Education Fuzhou China
Erasure coding has been increasingly used by distributed storage systems to maintain fault tolerance with low storage redundancy. However, how to enhance the performance of degraded reads in erasure-coded storage has ... 详细信息
来源: 评论
Color Image Segmentation Based on Modified Kuramoto Model
收藏 引用
Procedia Computer science 2016年 88卷 245-258页
作者: Xiaojie Liu Yuanhua Qiao Xianghui Chen Jun Miao Lijuan Duan College of Applied Sciences Beijing University of Technology Beijing 100124 China Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing 100190 China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China
A new approach for color image segmentation is proposed based on Kuramoto model in this paper. Firstly, the classic Kuramoto model which describes a global coupled oscillator network is changed to be one that is local... 详细信息
来源: 评论
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE BASED ON BLOCK HISTOGRAM SHIFTING
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE BASED ON BLOCK HIS...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Zhaoxia Yin Andrew Abel Xinpeng Zhang Bin Luo School of Communication and Information Engineering Shanghai University Shanghai 200072 P.R. China. Computing Science and Mathematics University of Stirling. Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei 230601 P.R. China.
Since there is good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection, reversible data hiding in encrypted image (RDHEI) has attracted inc... 详细信息
来源: 评论
Online hot event discovery based on Association Link Network
Online hot event discovery based on Association Link Network
收藏 引用
作者: Liu, Yang Luo, Xiangfeng Xuan, Junyu School of Computer Engineering and Science Shanghai University China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science Beijing China
Online hot event discovery has become a flourishing frontier where online document streams are monitored to discover newly occurring events or assigned to previously detected events. However, hot events have the natur... 详细信息
来源: 评论
Classification Based on Multilayer Extreme Learning Machine for Motor Imagery Task from EEG Signals
收藏 引用
Procedia Computer science 2016年 88卷 176-184页
作者: Lijuan Duan Menghu Bao Jun Miao Yanhui Xu Juncheng Chen College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing 100190 China Beijing Key Laboratory on Integration and Analysis of Large-scale Stream Data Beijing 100124 China
Classification of motor imagery electroencephalogram (EEG) is one of the most important technologies for BCI. To improve the accuracy, this paper introduces a classification system based on Multilayer Extreme Learning... 详细信息
来源: 评论
Energy-efficient VM placement algorithms for cloud data center  2nd
Energy-efficient VM placement algorithms for cloud data cent...
收藏 引用
2nd International Conference on Cloud computing and Big Data, CloudCom-Asia 2015
作者: Lin, Xiuyan Liu, Zhanghui Guo, Wenzhong Fujian Provincial Key Lab of the Network Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China
Cloud is the computing paradigm which provides computing resource as a service through network. The client can use computing resource in a convenient and on-demand way, just like the water and the electricity we use d... 详细信息
来源: 评论
An integratable verifiable secret sharing mechanism
收藏 引用
International Journal of Network Security 2016年 第4期18卷 617-624页
作者: Liu, Yanjun Chang, Chin-Chen Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University No. 111 Jiulong Rd Hefei230601 China Department of Computer Science and Information Engineering Asia University No. 500 Lioufeng Rd Wufeng Taichung413 Taiwan Department of Information Engineering and Computer Science Feng Chia University No. 100 Wenhwa Rd Seatwen Taichung413 Taiwan
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wir... 详细信息
来源: 评论
Image authentication and self-recovery scheme based on the rehashing model
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2016年 第3期7卷 460-474页
作者: Lyu, Wan-Li Chang, Chin-Chen Wang, Feng Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei230039 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Rd. Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering Asia University Taichung41354 Taiwan Department of Mathematics and Physics Fujian University of Technology FuzhouFujian350108 China
An effective image tamper localization and self-recovery scheme that uses the rehashing model is proposed in this paper. The aim of the proposed scheme was to reduce the failure rate in detecting image tamper areas an... 详细信息
来源: 评论
An improved performance metric for multiobjective evolutionary algorithms with user preferences
An improved performance metric for multiobjective evolutiona...
收藏 引用
IEEE Congress on Evolutionary Computation, CEC 2015
作者: Yu, Guo Zheng, Jinhua Li, Xiaodong School of Information Engineering Xiangtan University Hunan China Key Laboratory of Intelligent Computing Information Processing of Ministry of Education China School of Computer Science and IT RMIT University Melbourne Australia
This paper proposes an improved performance metric for multiobjective evolutionary algorithms with user preferences. This metric uses the idea of decomposition to transform the preference information into m+1 points o... 详细信息
来源: 评论
Multi-path SDN route selection subject to multi-constraints  3
Multi-path SDN route selection subject to multi-constraints
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Pan, Qingfeng Zheng, Xianghan College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350108 China
Multi-constrained optimal routing problem and disjoint path selection are NP-hard problem. The conventional single-path and single constraint routing can not meet people's needs. The reliability of network data tr... 详细信息
来源: 评论