咨询与建议

限定检索结果

文献类型

  • 1,470 篇 会议
  • 1,368 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 2,852 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,044 篇 工学
    • 1,478 篇 计算机科学与技术...
    • 1,248 篇 软件工程
    • 399 篇 信息与通信工程
    • 262 篇 控制科学与工程
    • 202 篇 生物工程
    • 190 篇 电子科学与技术(可...
    • 170 篇 光学工程
    • 153 篇 电气工程
    • 141 篇 机械工程
    • 103 篇 生物医学工程(可授...
    • 101 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 78 篇 动力工程及工程热...
    • 72 篇 材料科学与工程(可...
    • 52 篇 土木工程
    • 51 篇 建筑学
    • 48 篇 网络空间安全
    • 46 篇 交通运输工程
  • 1,120 篇 理学
    • 654 篇 数学
    • 273 篇 物理学
    • 227 篇 生物学
    • 170 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 104 篇 化学
  • 495 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 237 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 80 篇 医学
    • 72 篇 临床医学
    • 56 篇 基础医学(可授医学...
  • 63 篇 法学
    • 53 篇 社会学
  • 44 篇 经济学
  • 25 篇 农学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 8 篇 教育学
  • 6 篇 文学
  • 3 篇 哲学

主题

  • 74 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 machine learning
  • 39 篇 computer science
  • 39 篇 training
  • 38 篇 visualization
  • 31 篇 deep learning
  • 27 篇 optimization
  • 26 篇 feature extracti...
  • 24 篇 neural networks
  • 23 篇 data mining
  • 23 篇 forecasting
  • 22 篇 object detection
  • 21 篇 computer archite...
  • 21 篇 data models
  • 20 篇 conferences
  • 20 篇 servers
  • 20 篇 costs
  • 20 篇 clustering algor...
  • 19 篇 reinforcement le...

机构

  • 93 篇 state key lab of...
  • 89 篇 university of ch...
  • 77 篇 college of compu...
  • 63 篇 state key lab. f...
  • 52 篇 state key lab of...
  • 47 篇 state key lab fo...
  • 45 篇 department of co...
  • 44 篇 state key lab of...
  • 40 篇 state key labora...
  • 39 篇 state key lab. o...
  • 37 篇 school of comput...
  • 36 篇 the state key la...
  • 32 篇 state key lab of...
  • 32 篇 state key lab. o...
  • 31 篇 college of compu...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 30 篇 school of comput...
  • 28 篇 state key lab. o...
  • 28 篇 department of co...

作者

  • 59 篇 sun maosong
  • 56 篇 cai deng
  • 46 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 huang minlie
  • 39 篇 he xiaofei
  • 30 篇 wu enhua
  • 26 篇 pan gang
  • 26 篇 wei chen
  • 25 篇 xia gui-song
  • 25 篇 chen wei
  • 23 篇 fuchun sun
  • 22 篇 zhan naijun
  • 22 篇 zhu xiaoyan
  • 20 篇 zhu jun
  • 20 篇 barmpalias georg...
  • 19 篇 huang wenbing
  • 19 篇 xue bai
  • 19 篇 enhua wu
  • 17 篇 wang yikai

语言

  • 2,705 篇 英文
  • 96 篇 其他
  • 53 篇 中文
检索条件"机构=State Key Lab of Computer Science at ISCAS"
2852 条 记 录,以下是2761-2770 订阅
排序:
Capturing semantic hierarchies to perform meaningful integration in HTML tables
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3007卷 899-902页
作者: Li, Shijun Liu, Mengchi Wang, Guoren Peng, Zhiyong School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University 1125 Colonel By Drive Ottawa Ont. K1S 5B6 Canada Department of Computer Science and Engineering Northeastern University Shengyang 110004 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China
We present a new approach that automatically captures the semantic hierarchies in HTML tables, and semi-automatically integrates HTML tables belonging to a domain. It first automatically captures the attribute-value p... 详细信息
来源: 评论
ML-based estimator for integer frequency offset estimation of OFDM systems
ML-based estimator for integer frequency offset estimation o...
收藏 引用
Wireless Telecommunications Symposium, WTS
作者: Chen Chen Jiandong Li Linjing Zhao Jun Niu Broadband Wireless Communications Lab Information Science Institute State Key Laboratory of ISN Xidian University Xi'an China Department of Electrical and Computer Engineering Polytechnic University Brooklyn NY USA
A novel estimator for integer frequency offset estimation of OFDM systems is derived, which is based on the maximum likelihood (ML) technique and exploits the differential information between two consecutive blocks of... 详细信息
来源: 评论
Optimal ramped-gate soft programming of over-erased flash EEPROM cells at given current
Optimal ramped-gate soft programming of over-erased flash EE...
收藏 引用
2004 7th International Conference on Solid-state and Integrated Circuits Technology Proceedings, ICSICT 2004
作者: Quan, Wu-Yun Baek, Chang-Ki Kim, Dae M. Gang, Ruan Huang, Yiping ASIC and System State-Key Research Lab. Department of Microelectronics Fudan University 220 Handan-road 200433 Shanghai China School of Electrical Engineering and Computer Science ISRC Seoul National University Kwanak P.O. Box 34 Seoul 151-744 Korea Republic of Korea Institute for Advanced Study 207-43 Cheongryangri Seoul Korea Republic of
Presented herein is an efficient simulation technique enabling systematic investigation of the soft programming over-erased flash EEPROM cells. The simulation provides a method by which to find the optimal soft progra... 详细信息
来源: 评论
A modal parameters identification method based on recurrent neural networks
A modal parameters identification method based on recurrent ...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jing Xu Qing-Chun Meng Dong-Ming Zhou Yan Ge Department of Civil Engineering Qingdao Institute of Architecture and Engineering Qingdao China Department of Computer Science Ocean University of China Qingdao China State Key Lab of Intelligent Technology and Systems Tsinghua University Beijing Beijing China
This paper presents a recurrent neural network-based approach for modal parameters identification of structure-unknown systems. The proposed approach involves two steps. The first step is to build a recurrent neural n... 详细信息
来源: 评论
Noncoherent reduced state differential sequence detection of continuous phase modulation
Noncoherent reduced state differential sequence detection of...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Jinhua Sun Jiandong Li Lijun Jin Xiaojun Wu State Key Lab. of Integrated Service Networks Xidian University Xi'an Shaanxi P.R. China Department of Computer Science and Engineering Northwestern Polytechnical University Xi'an Shaanxi P.R. China
A noncoherent reduced state differential sequence detection (RSDSD) for continuous phase modulation (CPM) is proposed in this paper. This method makes use of the reduced state trellis based on reduced state sequence d... 详细信息
来源: 评论
Application of fuzzy neural network in the system of concrete undamaged inspection
Application of fuzzy neural network in the system of concret...
收藏 引用
WCICA 2004 - Fifth World Congress on Intelligent Control and Automation, Conference Proceedings
作者: Xu, Jing Meng, Qingchun Yang, Songsen Zhang, Wen Song, Changhong Department of Computer Science Ocean University of China Qingdao 266071 Department of Civil Engineering Qingdao Inst. of Arch./Engineering Qingdao 266033 State Key Lab. Intelligent T./S. Tsinghua University Beijing 100084
The accuracy of concrete strength inspection has a great influence on the safety evaluation of the building. In order to increase the accuracy, Fuzzy Neural Network (FNN) was built up to evaluate concrete strength. It... 详细信息
来源: 评论
基于最优极大前缀编码的信息压缩与加密
基于最优极大前缀编码的信息压缩与加密
收藏 引用
第八届中国密码学学术会议
作者: Dongyang Long Department of Computer Science Zhongshan UniversityGuangzhouPRC510275 The State Key Lab.of Information Security Chinese Academy ot ScienceBeijingPRC100080
本文引入了一种新的最优编码方法—最优极大前缀编码。我们证明了:对于有限和无限信源字母表,最优极大前缀编码总是存在。而且也证明了Huffman编码一定是最优极大前缀编码;反之,最优极大前缀编码不一定是Huffman编码。特别地,每一个... 详细信息
来源: 评论
Research and implementation of attack simulation platform for testing intrusion detection system based on virtual machine technology
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology 2004年 第10期26卷 1668-1674页
作者: Wang, Ru-Chuan Huang, Liang-Jun Hu, Tao Sun, Zhi-Xin Dept. of Computer Sci. and Technol. Nanjing Univ. of Posts and Telecom. Nanjing 210003 China State Key Lab. of Infor. Security Graduate School Chinese Academy of Science Beijing 100039 China
Attack simulation plays a key role in testing Intrusion Detection System (IDS). From the viewpoint of attack testing, an attack simulation platform is put forward for testing IDS based on virtual machine technology. F... 详细信息
来源: 评论
受囿单向函数及其性质
受囿单向函数及其性质
收藏 引用
第八届中国密码学学术会议
作者: Rui Xue Mei Han Jian Li Dengguo Feng State Key Lab.of Information Security Institute of SoftwareCASBeijingPRC100080 Department of Applied Mathematics University of Science and Technology of BeijingBeijingPRC100039 Department of Computer Science Guang Dong Zhao Qing UniversityzhaoqingPRC526000
为了适应密码学在各种实际应用中需要,提出了一种新的单向函数-受囿单向函数的概念,形成了一个单向函数的(分层)谱,这是新方案的一个基本概念。与现行的密码学不同,我们不是将所有多项式作为一个可行类,而是将部分多项式作为一个... 详细信息
来源: 评论
Editorial
收藏 引用
International Journal of Image and Graphics 2003年 第2期3卷 231-233页
作者: Varshney, Amitabh Pan, Zhigeng Department of Computer Science UMIACS University of Maryland United States State Key Lab of CAD and CG Zhejiang University China
来源: 评论