咨询与建议

限定检索结果

文献类型

  • 781 篇 期刊文献
  • 726 篇 会议

馆藏范围

  • 1,507 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 972 篇 工学
    • 726 篇 计算机科学与技术...
    • 612 篇 软件工程
    • 181 篇 信息与通信工程
    • 119 篇 控制科学与工程
    • 113 篇 生物工程
    • 83 篇 电气工程
    • 65 篇 机械工程
    • 63 篇 光学工程
    • 63 篇 电子科学与技术(可...
    • 62 篇 化学工程与技术
    • 61 篇 生物医学工程(可授...
    • 38 篇 动力工程及工程热...
    • 31 篇 材料科学与工程(可...
    • 30 篇 仪器科学与技术
    • 26 篇 土木工程
    • 24 篇 建筑学
    • 23 篇 网络空间安全
    • 22 篇 交通运输工程
  • 656 篇 理学
    • 433 篇 数学
    • 151 篇 物理学
    • 134 篇 生物学
    • 117 篇 统计学(可授理学、...
    • 65 篇 化学
    • 51 篇 系统科学
  • 269 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 40 篇 法学
    • 31 篇 社会学
  • 39 篇 医学
    • 31 篇 临床医学
    • 26 篇 基础医学(可授医学...
  • 18 篇 农学
  • 15 篇 经济学
  • 15 篇 教育学
  • 6 篇 艺术学
  • 4 篇 哲学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 67 篇 feature extracti...
  • 54 篇 semantics
  • 38 篇 training
  • 26 篇 deep learning
  • 26 篇 optimization
  • 25 篇 image segmentati...
  • 24 篇 face recognition
  • 23 篇 contrastive lear...
  • 22 篇 visualization
  • 21 篇 machine learning
  • 20 篇 data mining
  • 20 篇 predictive model...
  • 18 篇 object detection
  • 18 篇 reinforcement le...
  • 18 篇 accuracy
  • 18 篇 computer vision
  • 18 篇 robustness
  • 17 篇 computer science
  • 16 篇 convolution
  • 16 篇 computational mo...

机构

  • 172 篇 key laboratory o...
  • 90 篇 university of ch...
  • 64 篇 college of compu...
  • 57 篇 college of mathe...
  • 44 篇 school of comput...
  • 42 篇 peng cheng labor...
  • 36 篇 fujian provincia...
  • 33 篇 national enginee...
  • 32 篇 fujian key labor...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 29 篇 hunan provincial...
  • 26 篇 key laboratory o...
  • 24 篇 school of comput...
  • 23 篇 key laboratory o...
  • 22 篇 fujian key labor...
  • 21 篇 the key laborato...
  • 21 篇 guangdong provin...
  • 20 篇 engineering rese...
  • 20 篇 key laboratory o...

作者

  • 64 篇 huang qingming
  • 47 篇 xu qianqian
  • 34 篇 yang zhiyong
  • 29 篇 guo wenzhong
  • 28 篇 cao xiaochun
  • 27 篇 jiang kai
  • 26 篇 shen linlin
  • 25 篇 xilin chen
  • 25 篇 shi zhongzhi
  • 23 篇 ding shifei
  • 21 篇 shiguang shan
  • 20 篇 zou juan
  • 20 篇 qingming huang
  • 19 篇 zhang juan
  • 18 篇 guo kun
  • 17 篇 shan shiguang
  • 17 篇 zhang xingyi
  • 17 篇 zu-guo yu
  • 17 篇 zhongzhi shi
  • 16 篇 chen xilin

语言

  • 1,298 篇 英文
  • 188 篇 其他
  • 35 篇 中文
检索条件"机构=Science Computing Intelligent Information Processing"
1507 条 记 录,以下是981-990 订阅
排序:
Ai driven heterogeneous MEC system for dynamic environment - Challenges and solutions
arXiv
收藏 引用
arXiv 2020年
作者: Jiang, Feibo Wang, Kezhi Dong, Li Pan, Cunhua Xu, Wei Yang, Kun Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China department of Computer and Information Sciences Northumbria University United Kingdom Key Laboratory of Hunan Province for New Retail Virtual Reality Technology Hunan University of Commerce Changsha China School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom NCRL Southeast University Nanjing China School of Computer Sciences and Electrical Engineering University of Essex ColchesterCO4 3SQ United Kingdom University of Electronic Science and Technology of China Chengdu China
—By taking full advantage of computing, Communication and Caching (3C) resources at the network edge, Mobile Edge computing (MEC) is envisioned as one of the key enablers for the next generation network and services.... 详细信息
来源: 评论
Design and Realization of MATLAB-based Face Recognition System
Design and Realization of MATLAB-based Face Recognition Syst...
收藏 引用
1st International Conference on Advanced Algorithms and Control Engineering, ICAACE 2018
作者: Liu, Jianming College of Mathematics and Computer Science Quanzhou Normal University Fujian Quanzhou362000 China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University Quanzhou Normal University Fujian Quanzhou362000 China
Through MATLAB, the paper makes a comparison between Principal Component Analysis (PCA)face recognition algorithm and Adaboost recognition algorithm and selects the algorithm with higher recognition rates to develop a... 详细信息
来源: 评论
Systematic Resource Allocation in Cloud RAN with Caching as a Service under Two Timescales
Systematic Resource Allocation in Cloud RAN with Caching as ...
收藏 引用
作者: Tang, Jianhua Quek, Tony Q. S. Chang, Tsung-Hui Shim, Byonghyo Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Normal University Changsha410081 China Institute of New Media and Communications Department of Electrical and Computer Engineering Seoul National University Seoul08826 Korea Republic of Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore487372 Singapore Department of Electronic Engineering Kyung Hee University Yongin17104 Korea Republic of School of Science and Engineering Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big Data Shenzhen518172 China Department of Electrical and Computer Engineering Institute of New Media and Communications Seoul National University Seoul08826 Korea Republic of
Recently, cloud radio access network (C-RAN) with caching as a service (CaaS) was proposed to merge the functionalities of communication, computing, and caching (CCC) together. In this paper, we dissect the interactio... 详细信息
来源: 评论
ANDROIDOFF:Offloading android application based on cost estimation
收藏 引用
Journal of Systems and Software 2019年 158卷
作者: Chen, Xing Chen, Jiaqing Liu, Bichun Ma, Yun Zhang, Ying Zhong, Hao College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China School of Software Tsinghua University Beijing100084 China National Engineering Research Center of Software Engineering Peking University China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China
Computation offloading is a promising way of improving the performance and reducing the battery power consumption, since it moves some time-consuming computation activities to nearby servers. Although various approach... 详细信息
来源: 评论
Identification and Prediction of Key Nucleotide Sites Using Machine Learning in Bioinformatics: A Brief Overview
Identification and Prediction of Key Nucleotide Sites Using ...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Jianhua Cai Leyi Wei Kun Zeng Guobao Xiao Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou P.R. China College of Mathematics and Computer Science Fuzhou University Fuzhou P.R. China College of Intelligence and Computing Tianjin University Tianjin P.R. China
Nowadays, the burgeon of machine learning has promoted its wide application in various fields. In Bioinformatics, machine learning computational method has become an indispensable part. Its efficiency and simplicity b... 详细信息
来源: 评论
Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform
Towards Privacy-preserving Incentive for Mobile Crowdsensing...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Zhibo Wang Jingxin Li Jiahui Hu Ju Ren Zhetao Li Yanjun Li State Key Laboratory for Novel Software Technology Nanjing University P. R. China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University P. R. China School of Information Science and Engineering Central South University P. R. China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education College of Information Engineering Xiangtan University P. R. China School of Computer Science and Technology Zhejiang University of Technology P. R. China
Reverse auction-based incentive mechanisms have been commonly proposed to stimulate mobile users to participate in crowdsensing, where users submit bids to the platform to compete for tasks. Recent works pointed out t... 详细信息
来源: 评论
A chaotic artificial bee colony algorithm based on lévy search
A chaotic artificial bee colony algorithm based on lévy sea...
收藏 引用
作者: Lin, Shijie Dong, Chen Wang, Zhiqiang Guo, Wenzhong Chen, Zhenyi Ye, Yin College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Information Security of Network Systems Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China Department of Electrical Engineering University of South Florida TampaFL33620 United States
A Lévy search strategy based chaotic artificial bee colony algorithm (LABC) is proposed in this paper. The chaotic sequence, global optimal mechanism and Lévy flight mechanism were introduced respectively in... 详细信息
来源: 评论
GLA: Global-Local Attention for Image Description
GLA: Global-Local Attention for Image Description
收藏 引用
作者: Li, Linghui Tang, Sheng Zhang, Yongdong Deng, Lixi Tian, Qi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of the ChineseAcademy of Sciences BeijingTX100049 China Department of Computer Science University of Texas at San Antonio San Antonio78249-1604 United States
In recent years, the task of automatically generating image description has attracted a lot of attention in the field of artificial intelligence. Benefitting from the development of convolutional neural networks (CNNs... 详细信息
来源: 评论
Reversible data hiding in encrypted images with Two-MSB prediction  10
Reversible data hiding in encrypted images with Two-MSB pred...
收藏 引用
10th IEEE International Workshop on information Forensics and Security, WIFS 2018
作者: Puyang, Yi Yin, Zhaoxia Qian, Zhenxing Key Laboratory of Intelligent Computing Signal Processing Ministry of Education Anhui University Hefei230601 China Department of Computer Science Purdue University West lafayette47906 United States Shanghai Institute for Advanced Communication and Data Science School of Communication and Information Engineering Shanghai University Shanghai200072 China
In recent years, reversible data hiding in encrypted images (RDHEI) that embeds additional data into the encrypted image content has received more and more attention. In previous RDHEI methods, there is no one conside... 详细信息
来源: 评论
A visual self-positioning method for inspection robot based on symmetrical tangential artificial landmarks
A visual self-positioning method for inspection robot based ...
收藏 引用
2018 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2018
作者: Yang, Shu-Yu Deng, Shun-Ming Zhao, Peng-Peng Li, Jin-Ping School of Information Science and Engineering University of Jinan Jinan Shandong250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan Shandong250022 China Shandong College University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year Jinan Shandong250022 China Chongqing Vocational Institute of Engineering Chongqing400000 China
The artificial landmark positioning technology is one of the visual positioning methods of the inspection robot. Although this technology has simple algorithm and low maintenance cost, it is difficult to be widely use... 详细信息
来源: 评论