咨询与建议

限定检索结果

文献类型

  • 787 篇 期刊文献
  • 725 篇 会议

馆藏范围

  • 1,512 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 982 篇 工学
    • 736 篇 计算机科学与技术...
    • 620 篇 软件工程
    • 182 篇 信息与通信工程
    • 119 篇 控制科学与工程
    • 113 篇 生物工程
    • 89 篇 电气工程
    • 65 篇 机械工程
    • 65 篇 光学工程
    • 64 篇 电子科学与技术(可...
    • 62 篇 化学工程与技术
    • 61 篇 生物医学工程(可授...
    • 39 篇 动力工程及工程热...
    • 30 篇 仪器科学与技术
    • 30 篇 材料科学与工程(可...
    • 27 篇 土木工程
    • 25 篇 建筑学
    • 23 篇 网络空间安全
    • 22 篇 交通运输工程
  • 663 篇 理学
    • 435 篇 数学
    • 156 篇 物理学
    • 134 篇 生物学
    • 117 篇 统计学(可授理学、...
    • 65 篇 化学
    • 51 篇 系统科学
  • 273 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 40 篇 法学
    • 31 篇 社会学
  • 40 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
  • 18 篇 农学
  • 15 篇 经济学
  • 15 篇 教育学
  • 6 篇 艺术学
  • 4 篇 哲学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 67 篇 feature extracti...
  • 53 篇 semantics
  • 39 篇 training
  • 27 篇 deep learning
  • 26 篇 optimization
  • 25 篇 image segmentati...
  • 24 篇 face recognition
  • 24 篇 contrastive lear...
  • 22 篇 visualization
  • 21 篇 data mining
  • 20 篇 predictive model...
  • 20 篇 machine learning
  • 19 篇 computer science
  • 19 篇 accuracy
  • 18 篇 object detection
  • 18 篇 reinforcement le...
  • 18 篇 computer vision
  • 18 篇 robustness
  • 15 篇 support vector m...
  • 15 篇 convolution

机构

  • 171 篇 key laboratory o...
  • 90 篇 university of ch...
  • 64 篇 college of compu...
  • 57 篇 college of mathe...
  • 44 篇 school of comput...
  • 42 篇 peng cheng labor...
  • 37 篇 fujian provincia...
  • 33 篇 national enginee...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 fujian key labor...
  • 29 篇 hunan provincial...
  • 28 篇 key laboratory o...
  • 24 篇 school of comput...
  • 23 篇 key laboratory o...
  • 22 篇 fujian key labor...
  • 21 篇 the key laborato...
  • 21 篇 guangdong provin...
  • 20 篇 engineering rese...
  • 20 篇 key laboratory o...

作者

  • 64 篇 huang qingming
  • 47 篇 xu qianqian
  • 34 篇 yang zhiyong
  • 30 篇 guo wenzhong
  • 28 篇 jiang kai
  • 28 篇 cao xiaochun
  • 26 篇 shi zhongzhi
  • 25 篇 shen linlin
  • 25 篇 xilin chen
  • 24 篇 ding shifei
  • 21 篇 zou juan
  • 21 篇 shiguang shan
  • 20 篇 qingming huang
  • 19 篇 zhang xingyi
  • 19 篇 zhang juan
  • 18 篇 guo kun
  • 17 篇 shan shiguang
  • 17 篇 zu-guo yu
  • 17 篇 zhongzhi shi
  • 16 篇 chen xilin

语言

  • 1,380 篇 英文
  • 110 篇 其他
  • 31 篇 中文
检索条件"机构=Science Computing Intelligent Information Processing"
1512 条 记 录,以下是881-890 订阅
排序:
Object tracking by the least spatiotemporal searches
arXiv
收藏 引用
arXiv 2020年
作者: Yu, Zhiyong Han, Lei Chen, Chao Guo, Wenzhong Yu, Zhiwen College of Mathematics and Computer Sciences Fuzhou University Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350108 China School of Computer Science Northwestern Polytechnical University Xi'an710072 China School of Computer Science Chongqing University Chongqing400044 China
Tracking a suspicious car or a person in a city efficiently is crucial in urban safety management. But how can we complete the task with the minimal number of spatiotemporal searches when massive camera records are in... 详细信息
来源: 评论
An improved Gaussian Mixture Model algorithm for background representation
An improved Gaussian Mixture Model algorithm for background ...
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Wang, Ping Dong, Shaoxiong School of Electrical Engineering and Electronic Information Xihua University Chengdu Sichuan610039 China Artificial Intelligence Key Laboratory of Sichuan Province Sichuan University of Science and Engineering Zigong Sichuan643000 China Science Computing Intelligent Information Processing GuangXi Higher Education Key Laboratory Guangxi Teachers Education University Nanning530023 China
Initializing a background frame for Gaussian Mixture Model requires no moving objects in the background scene. In this paper, in order to obtain an initial frame when there is a moving object in the background scene, ... 详细信息
来源: 评论
Multifractal temporally weighted detrended partial cross-correlation analysis to quantify intrinsic power-law cross-correlation of two non-stationary time series affected by common external factors
arXiv
收藏 引用
arXiv 2020年
作者: Li, Bao-Gen Ling, Dian-Yi Yu, Zu-Guo Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Xiangtan Hunan411105 China School of Electrical Engineering and Computer Science Queensland University of Technology GPO Box 2434 BrisbaneQ4001 Australia
When common factors strongly influence two cross-correlated time series recorded in complex natural and social systems, the results will be biased if we use multifractal detrended cross-correlation analysis (MF-DXA) w... 详细信息
来源: 评论
A Cost-Driven Fuzzy Scheduling Strategy for intelligent Workflow Decision Making Systems in Uncertain Edge-Cloud Environments
arXiv
收藏 引用
arXiv 2021年
作者: Lin, Bing Lin, Chaowei Chen, Xing College of Physics and Energy Fujian Normal University Fujian Provincial Key Laboratory of Quantum Manipulation and New Energy Materials Fuzhou350117 China Fujian Provincial Collaborative Innovation Center for Advanced High-Field Superconducting Materials and Engineering Fuzhou350117 China School of Computer Science Peking University 100871 China College of Mathematics and Computer Science Fuzhou University Fuzhou350118 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350118 China
Workflow decision making is critical to performing many practical workflow applications. Scheduling in edge-cloud environments can address the high complexity problem of workflow applications, while decreasing the dat... 详细信息
来源: 评论
Exploring multi-loss function based attention framework for vehicle re-identification  10
Exploring multi-loss function based attention framework for ...
收藏 引用
10th International Conference on information Technology in Medicine and Education, ITME 2019
作者: Liu, Wei Zhang, Yi Luo, Zhiming Li, Shaozi East China Jiaotong University Jiangxi China Cognitive Science Department Xiamen University Fujian China Postdoc Center of Information and Communication Engineering Xiamen University China Key Lab. of Cogn. Computing and Intelligent Information Processing of Fujian Education Institutions Wuyishan China Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering Yi Chang China
Vehicle Re-identification(Re-ID) refers to the task of matching a specific vehicle across multiple non-overlapping cameras. Precise vehicle Re-ID suffers from two main challenges: (1) different vehicle identities with... 详细信息
来源: 评论
Overcoming Classifier Imbalance for Long-tail Object Detection with Balanced Group Softmax
arXiv
收藏 引用
arXiv 2020年
作者: Li, Yu Wang, Tao Kang, Bingyi Tang, Sheng Wang, Chunfeng Li, Jintao Feng, Jiashi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering National University of Singapore Singapore Institute of Data Science National University of Singapore Singapore
Solving long-tail large vocabulary object detection with deep learning based models is a challenging and demanding task, which is however under-explored. In this work, we provide the first systematic analysis on the u... 详细信息
来源: 评论
A computationally-efficient sandbox algorithm for multifractal analysis of large-scale complex networks with tens of millions of nodes
arXiv
收藏 引用
arXiv 2020年
作者: Ding, Yuemin Liu, Jin-Long Li, Xiaohui Tian, Yu-Chu Yu, Zu-Guo School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China School of Computer Science Queensland University of Technology BrisbaneQLD4000 Australia Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Xiangtan Hunan411105 China School of Information Science and Engineering Wuhan University of Science and Technology Wuhan Hubei430081 China
The fractality of complex networks has attracted much attention with extensive investigations over the last 15 years. As a generalization of fractal analysis, multifractal analysis (MFA) is a useful tool to systematic... 详细信息
来源: 评论
Overcoming Classifier Imbalance for Long-Tail Object Detection With Balanced Group Softmax
Overcoming Classifier Imbalance for Long-Tail Object Detecti...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Yu Li Tao Wang Bingyi Kang Sheng Tang Chunfeng Wang Jintao Li Jiashi Feng Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering National University of Singapore Singapore Institute of Data Science National University of Singapore Singapore
Solving long-tail large vocabulary object detection with deep learning based models is a challenging and demanding task, which is however under-explored. In this work, we provide the first systematic analysis on the u... 详细信息
来源: 评论
Asymptotic solution of a wide moving jam to a class of higher-order viscous traffic flow models
收藏 引用
Applied Mathematics and Mechanics(English Edition) 2018年 第5期39卷 609-622页
作者: Chunxiu WU College of Mathematics and Computer Science Quanzhou Normal UniversityQuanzhou 362000Fujian ProvinceChina Fujian Provincial Key Laboratory of Data Intensive Computing Quanzhou 362000Fujian ProvinceChina Key Laboratory of Intelligent Computing and Information Processing Quanzhou 362000Fujian ProvinceChina
The boundary-layer method is used to study a wide moving jam to a class of higher-order viscous models. The equations for characteristic parameters are derived to determine the asymptotic solution. The sufficient and ... 详细信息
来源: 评论
Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation  14th
Cloud-based data-sharing scheme using verifiable and CCA-sec...
收藏 引用
14th International Conference on information Security and Cryptology, Inscrypt 2018
作者: Zhang, Mingwu Jiang, Yan Shen, Hua Li, Bingbing Susilo, Willy School of Computers Hubei University of Technology Wuhan China Hubei Key Laboratory of Intelligent Geo-Information Processing China University of Geosciences Wuhan China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia
A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a ciphertext under delegator’s public-key into a ciphertext of delegatee’s. However, for an untrusted cloud proxy, as the re-encryption... 详细信息
来源: 评论