咨询与建议

限定检索结果

文献类型

  • 3,101 篇 会议
  • 2,592 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 5,701 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,850 篇 工学
    • 1,939 篇 计算机科学与技术...
    • 1,703 篇 软件工程
    • 904 篇 控制科学与工程
    • 579 篇 信息与通信工程
    • 544 篇 机械工程
    • 506 篇 电气工程
    • 489 篇 电子科学与技术(可...
    • 322 篇 仪器科学与技术
    • 315 篇 生物工程
    • 305 篇 化学工程与技术
    • 299 篇 光学工程
    • 283 篇 材料科学与工程(可...
    • 198 篇 生物医学工程(可授...
    • 190 篇 交通运输工程
    • 175 篇 动力工程及工程热...
    • 158 篇 力学(可授工学、理...
    • 110 篇 土木工程
    • 109 篇 航空宇航科学与技...
    • 102 篇 安全科学与工程
  • 2,126 篇 理学
    • 996 篇 数学
    • 764 篇 物理学
    • 359 篇 生物学
    • 311 篇 统计学(可授理学、...
    • 266 篇 化学
    • 259 篇 系统科学
  • 797 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
    • 170 篇 工商管理
  • 159 篇 医学
    • 129 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 101 篇 法学
  • 76 篇 经济学
  • 59 篇 农学
  • 28 篇 艺术学
  • 19 篇 军事学
  • 16 篇 教育学
  • 15 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 laboratories
  • 137 篇 intelligent syst...
  • 123 篇 feature extracti...
  • 97 篇 semantics
  • 95 篇 training
  • 86 篇 neural networks
  • 82 篇 machine learning
  • 70 篇 control systems
  • 69 篇 deep learning
  • 68 篇 computer science
  • 66 篇 support vector m...
  • 63 篇 visualization
  • 61 篇 reinforcement le...
  • 58 篇 accuracy
  • 58 篇 robustness
  • 57 篇 automation
  • 55 篇 object detection
  • 54 篇 computer vision
  • 53 篇 data mining
  • 51 篇 computational mo...

机构

  • 175 篇 state key labora...
  • 136 篇 school of automa...
  • 121 篇 university of ch...
  • 116 篇 state key labora...
  • 76 篇 department of co...
  • 76 篇 state key labora...
  • 69 篇 beijing national...
  • 67 篇 qingdao academy ...
  • 65 篇 state key labora...
  • 62 篇 school of artifi...
  • 62 篇 department of au...
  • 56 篇 intelligent tran...
  • 54 篇 beijing institut...
  • 51 篇 state key labora...
  • 45 篇 state key lab of...
  • 44 篇 state key labora...
  • 43 篇 department of co...
  • 41 篇 sjtu-pinghu inst...
  • 40 篇 tsinghua univers...
  • 40 篇 beijing engineer...

作者

  • 120 篇 huang minlie
  • 92 篇 sun maosong
  • 80 篇 fuchun sun
  • 78 篇 yang jian
  • 67 篇 sun fuchun
  • 54 篇 zhou jie
  • 54 篇 liu zhiyuan
  • 51 篇 zhang bo
  • 51 篇 fei-yue wang
  • 49 篇 zhang min
  • 46 篇 changshui zhang
  • 45 篇 sun jian
  • 44 篇 wu xinyu
  • 43 篇 ma shaoping
  • 41 篇 zengqi sun
  • 40 篇 chen chen
  • 38 篇 xiong gang
  • 38 篇 zhu xiaoyan
  • 37 篇 zhen shen
  • 35 篇 xiaoqing ding

语言

  • 5,289 篇 英文
  • 229 篇 其他
  • 183 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab on Intelligent Technology and Systems"
5701 条 记 录,以下是4971-4980 订阅
排序:
Vision based ping-pong ball tracking with physical model
收藏 引用
Journal of Information and Computational Science 2008年 第5期5卷 2235-2242页
作者: Liu, Yong Xiong, Rong Zhang, Yifeng Chu, Jian State Key Lab. of Industrial Control Technology Zhejiang University Hangzhou 310027 China Institute of Cyber-Systems and Control Zhejiang University Hangzhou 310027 China
This paper proposes a novel vision based ping-pong (table tennis) ball tracking system. And it can generate the ping-pong ball trace in real time with the aiding of a transcendent trace model. Our approach only need t... 详细信息
来源: 评论
Classifying what-type questions by head noun tagging
Classifying what-type questions by head noun tagging
收藏 引用
22nd International Conference on Computational Linguistics, Coling 2008
作者: Li, Fangtao Zhang, Xian Yuan, Jinhui Zhu, Xiaoyan State Key Laboratory on Intelligent Technology and Systems Tsinghua Department of Computer Sci. and Tech. Tsinghua University Beijing 100084 China
Classifying what-type questions into proper semantic categories is found more challenging than classifying other types in question answering systems. In this paper, we propose to classify what-type questions by head n... 详细信息
来源: 评论
The isolation game: A game of distances
收藏 引用
19th International Symposium on Algorithms and Computation, ISAAC 2008
作者: Zhao, Yingchao Chen, Wei Teng, Shang-Hua Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and Systems Tsinghua University China Microsoft Research Asia China Boston University United States
We introduce a new multi-player geometric game, which we will refer to as the isolation game, and study its Nash equilibria and best or better response dynamics. The isolation game is inspired by the Voronoi game, com... 详细信息
来源: 评论
A method for detecting code security vulnerability based on variables tracking with validated-tree
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2008年 第2期3卷 162-166页
作者: Zhefei ZHANG Qinghua ZHENG Xiaohong GUAN Qing WANG Tuo WANG MOE Key Lab for Intelligent and Network Security Xi’an Jiaotong UniversityXi’an 710049China State Key Laboratory for Manufacturing Systems Engineering Xi’an Jiaotong UniversityXi’an 710049China Center for Intelligent and Networked Systems Department of AutomationTsinghua UniversityBeijing 100084China
SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these *** from traditional run time security strategies such as IDS and fire-wall,this paper ... 详细信息
来源: 评论
THUIR at TREC2008: Enterprise track
THUIR at TREC2008: Enterprise track
收藏 引用
17th Text REtrieval Conference, TREC 2008
作者: Xue, Yufei Zhu, Tong Hua, Guichun Zhang, Min Liu, Yiqun Ma, Shaoping State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing 100084 China
We participate in document search and expert search of Enterprise Track in TREC2008. The corpus and tasks are same as the year before. Different from TREC 2007, the topics come from CSIRO Enquiries, and the topic stat... 详细信息
来源: 评论
Stochastic stabilization of networked control systems with time-varying sampling periods
Stochastic stabilization of networked control systems with t...
收藏 引用
2008 11th IEEE International Conference on Communication technology, ICCT 2008
作者: Wang, Yan Sun, Zeng Qi School of Automation Science and Electrical Engineering Beihang University Beijing 100084 China State Key Lab. of Intelligent Technology and Systems Department of Computer Science Tsinghua University Beijing 100084 China
This paper presents a stochastic control method for networked control systems(NCSs) with time-varying sampling periods and random delay. The random delay of the NCS is modelled as intervals governed by a Markov chain.... 详细信息
来源: 评论
Arbitrary warped document image restoration based on segmentation and Thin-Plate Splines
Arbitrary warped document image restoration based on segment...
收藏 引用
作者: Zhang, Yu Liu, Changsong Ding, Xiaoqing Zou, Yanming Dept. of Electronic Engineering State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing 100084 China System Research Center Beijing China
Warping is a common appearance in camera captured document images. It is the primary factor that makes such kind of document images hard to be recognized. Therefore it is necessary to restore warped document image bef... 详细信息
来源: 评论
A multi-metric QoS routing method for ad hoc network
A multi-metric QoS routing method for ad hoc network
收藏 引用
4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008
作者: Wei, Wu Cao, Jing State Key Lab. of Virtual Reality Technology and Systems School of Computer Science Beihang University Beijing China
A multi-metric QoS Routing Protocol (MQOLSR) is proposed in this paper, which providing different QoS for different applications flow in an ad hoc network. The protocol, which integrates QoS measurement and packet for... 详细信息
来源: 评论
Dynamic features measurement and analysis for large-scale networks
Dynamic features measurement and analysis for large-scale ne...
收藏 引用
ICC 2008 - 2008 IEEE International Conference on Communications Workshops
作者: Qin, Tao Guan, Xiaohong Li, Wei Wang, Pinghui IEEE MOE Key Lab. for Intelligent Networks and Network Security State Key Lab. for Manufacturing Systems Xi'an Jiaotong University Xi'an China Department of Automation TNLIST Lab. Tsinghua University Beijing China
Detecting and measuring the changes of temporal traffic patterns in large scale networks are crucial for effective network management. This paper presents the concept of region flow to aggregate traffic packets. Regio... 详细信息
来源: 评论
High level architecture evolved modular federation object model
收藏 引用
Chinese Journal of systems Engineering and Electronics 2009年 第3期000卷
作者: Wang Wenguang Xu Yongping Chen Xin Li Qun Wang Weiping Coll. of Information System and Management National Univ. of Defense Technology Changsha 410073 P. R. China Beijing Key Lab. of Intelligent Telecommunications Software and Multimedia Beijing Univ. of Posts and Telecommunications Beijing 100876 P. R. China State Key Lab. for Complex Systems Simulation Beijing 100101 P. R. China
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved produ... 详细信息
来源: 评论