咨询与建议

限定检索结果

文献类型

  • 1,486 篇 会议
  • 1,371 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 2,871 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,479 篇 计算机科学与技术...
    • 1,248 篇 软件工程
    • 399 篇 信息与通信工程
    • 262 篇 控制科学与工程
    • 202 篇 生物工程
    • 190 篇 电子科学与技术(可...
    • 170 篇 光学工程
    • 153 篇 电气工程
    • 141 篇 机械工程
    • 104 篇 生物医学工程(可授...
    • 102 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 78 篇 动力工程及工程热...
    • 72 篇 材料科学与工程(可...
    • 52 篇 土木工程
    • 51 篇 建筑学
    • 48 篇 网络空间安全
    • 46 篇 交通运输工程
  • 1,122 篇 理学
    • 654 篇 数学
    • 273 篇 物理学
    • 227 篇 生物学
    • 170 篇 统计学(可授理学、...
    • 118 篇 系统科学
    • 104 篇 化学
  • 495 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 237 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 81 篇 医学
    • 73 篇 临床医学
    • 56 篇 基础医学(可授医学...
  • 63 篇 法学
    • 53 篇 社会学
  • 44 篇 经济学
  • 25 篇 农学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 8 篇 教育学
  • 6 篇 文学
  • 3 篇 哲学

主题

  • 74 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 machine learning
  • 39 篇 computer science
  • 39 篇 training
  • 38 篇 visualization
  • 31 篇 deep learning
  • 27 篇 optimization
  • 26 篇 feature extracti...
  • 24 篇 neural networks
  • 23 篇 data mining
  • 23 篇 forecasting
  • 22 篇 object detection
  • 21 篇 computer archite...
  • 21 篇 data models
  • 20 篇 conferences
  • 20 篇 servers
  • 20 篇 costs
  • 20 篇 clustering algor...
  • 19 篇 reinforcement le...

机构

  • 93 篇 state key lab of...
  • 89 篇 university of ch...
  • 79 篇 college of compu...
  • 63 篇 state key lab. f...
  • 52 篇 state key lab of...
  • 47 篇 state key lab fo...
  • 45 篇 department of co...
  • 44 篇 state key lab of...
  • 40 篇 state key labora...
  • 39 篇 state key lab. o...
  • 37 篇 school of comput...
  • 36 篇 the state key la...
  • 32 篇 state key lab of...
  • 32 篇 state key lab. o...
  • 31 篇 college of compu...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 30 篇 school of comput...
  • 28 篇 state key lab. o...
  • 28 篇 department of co...

作者

  • 59 篇 sun maosong
  • 56 篇 cai deng
  • 46 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 huang minlie
  • 39 篇 he xiaofei
  • 30 篇 wu enhua
  • 26 篇 pan gang
  • 26 篇 wei chen
  • 25 篇 xia gui-song
  • 25 篇 chen wei
  • 23 篇 fuchun sun
  • 22 篇 zhan naijun
  • 22 篇 zhu xiaoyan
  • 20 篇 zhu jun
  • 20 篇 barmpalias georg...
  • 19 篇 huang wenbing
  • 19 篇 xue bai
  • 19 篇 enhua wu
  • 17 篇 wang yikai

语言

  • 2,724 篇 英文
  • 96 篇 其他
  • 53 篇 中文
检索条件"机构=State Key Lab of Computer Science at ISCAS"
2871 条 记 录,以下是2741-2750 订阅
排序:
A novel constrained texture mapping method based on harmonic map
A novel constrained texture mapping method based on harmonic...
收藏 引用
作者: Guo, Yanwen Wang, Jin Sun, Hanqiu Cui, Xiufen Peng, Qunsheng State Key Lab of CAD and CG Zhejiang University Hangzhou 310027 China Department of Mathematics Zhejiang University Hangzhou 310027 China Department of Computer Science and Engineering CUHK Hong Kong Hong Kong
In this paper, we present a novel constrained texture mapping method based on the harmonic map. We first project the surface of a 3D model on a planar domain by an angle-based-flattening technique and perform a parame... 详细信息
来源: 评论
An optimized soft 3D mobile graphics library based on JIT backend compiler
收藏 引用
4th International Conference on Entertainment Computing - ICEC 2005
作者: Yang, Bailin Ye, Lu Pan, Zhigeng Xu, Guilin State Key Lab. of CAD and CG Zhejiang University 310027 Hangzhou China Zhejiang Gongshang University Hangzhou 310035 China Department of Computer and Electronic Engineering Zhejiang University of Science and Technology Hangzhou 310012 China
Mobile device is one of the most widespread devices with rendering capabilities now. With the improved performance of the mobile device, displaying 3D scene becomes reality. This paper implements an optimized soft 3D ... 详细信息
来源: 评论
On designing a novel PI controller for AQM routers supporting TCP flows
On designing a novel PI controller for AQM routers supportin...
收藏 引用
7th Asia-Pacific Web Conference on Web Technologies Research and Development - APWeb 2005
作者: Xiong, Nai-Xue He, Yan-Xiang Yang, Yan Xiao, Bin Jia, Xiaohua State Key Lab of Software Engineering Computer School of Wuhan University Wuhan Hubei 430079 China Computer Science Department Central China Normal University Wuhan 430079 China Department of Computing Hong Kong Polytechnic University Hung Horn Kowloon Hong Kong IEEE Communication Society Department of Computer Science City University of Hong Kong Kowloon Hong Kong
Active Queue Management (AQM) is an effective method to enhance congestion control, and to achieve tradeoff between link utilization and delay. The de facto standard, Random Early Detection (RED), and most of its vari... 详细信息
来源: 评论
Automatic image annotation based-on model space
Automatic image annotation based-on model space
收藏 引用
IEEE International Conference on Natural Language Processing and Knowledge Engineering (NLP-KE)
作者: Jing Lu Shao-ping Ma Min Zhang The State Key Lab of Intelligence Technology and System. Department of Computer Science and Technology Tsinghua University Beijing China
Automatic image annotation is an important but highly challenging problem in content-based image retrieval. This paper introduces a new procedure for providing images with semantic keywords. To bridge the semantic gap... 详细信息
来源: 评论
Integrated platform of artificial immune system for anomaly detection
收藏 引用
WSEAS Transactions on Information science and Applications 2005年 第2期2卷 144-149页
作者: Wu, Zejun Liang, Yiwen School of Computer State Key Lab. of Software Engineering Wuhan University Wuhan China School of Information Science Zhongnan University of Economics and Law Wuhan China
Originated from human immune system, artificial immune system has been widely applied in the computational fields, especially for the task of anomaly detection. Although intensively investigated in the literature, mos... 详细信息
来源: 评论
Detection of phishing webpages based on visual similarity  05
Detection of phishing webpages based on visual similarity
收藏 引用
14th International World Wide Web Conference, WWW2005
作者: Wenyin, Liu Huang, Guanglin Xiaoyue, Liu Min, Zhang Deng, Xiaotie Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Chinese Translation and Linguistics City University of Hong Kong Tat Chee Avenue Hong Kong Hong Kong State Key Lab of Intelligent Tech. and Sys. Tsinghua University Beijing 100084 China
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate webpage owner can use this approach to se... 详细信息
来源: 评论
Semantic Web enabled VHE for 3/sup rd/ generation telecommunications
Semantic Web enabled VHE for 3/sup rd/ generation telecommun...
收藏 引用
International Conference on computer and Information science (ACIS)
作者: Lin Songtao Chen Junliang State Key Lab of Networking & Switching Beijing University슠of Posts and슠Telecommunications China School of Computer Science & Technology Beijing University슠of Posts and슠Telecommunications China
Former approaches to VHE resulted in considerable traffic loads and security threats by moving service logics across networks. In order to minimize extra traffic resulted by VHE, here we employ semantic Web technology... 详细信息
来源: 评论
On the security of a digital signature with message recovery using self-certified public key
收藏 引用
Informatica (Ljubljana) 2005年 第3期29卷 343-346页
作者: Zhang, Jianhong Zou, Wei Chen, Dan Wang, Yumin Institution of Computer Science and Technology Peking University Beijing 100087 China College of Sciences North China University of Technology Beijing 10041 China State Key Lab. ISN Xidian University Xi'an Shaanxi 70071 China
Self-certified public keys are proposed to eliminate the burden of verifying the public key before using. To alleviate reliance on system authority and strengthen the security of system, Chang et al propose a new digi... 详细信息
来源: 评论
TCP enhanced scheme for broadband satellite networks
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2005年 第5期32卷 675-680页
作者: Wang, Kai-Dong Yi, Ke-Chu Tian, Bin School of Computer Science and Technology Xidian Univ. Xi'an 710071 China State Key Lab. of Integrated Service Networks Xidian Univ. Xi'an 710071 China
When a TCP stream goes through a broadband satellite network with a large bandwidth-delay product, the congestion window of the TCP stream is usually big so that there are lots of strongly bursty traffic on the networ... 详细信息
来源: 评论
Automatic generation of artistic chinese calligraphy
Automatic generation of artistic chinese calligraphy
收藏 引用
Proceedings - Nineteenth National Conference on Artificial Intelligence (AAAI-2004): Sixteenth Innovative Applications of Artificial Intelligence Conference (IAAI-2004)
作者: Xu, Songhua Lau, Francis C. M. Cheung, Kwok-Wai Pan, Yunhe CAD and CG State Key Lab. of China Zhejiang University Department of Computer Science University of Hong Kong Department of Computer Science Hong Kong Baptist University
We introduce a novel intelligent system which can generate new Chinese calligraphic artwork that meets certain aesthetic requirements automatically. In the machine learning phase, parametric representations of existen... 详细信息
来源: 评论