咨询与建议

限定检索结果

文献类型

  • 1,213 篇 会议
  • 1,153 篇 期刊文献

馆藏范围

  • 2,366 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,643 篇 工学
    • 1,177 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 356 篇 信息与通信工程
    • 315 篇 电气工程
    • 234 篇 控制科学与工程
    • 175 篇 生物工程
    • 107 篇 光学工程
    • 107 篇 电子科学与技术(可...
    • 102 篇 生物医学工程(可授...
    • 93 篇 机械工程
    • 76 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 61 篇 交通运输工程
    • 51 篇 动力工程及工程热...
    • 51 篇 土木工程
    • 47 篇 网络空间安全
    • 46 篇 建筑学
  • 745 篇 理学
    • 399 篇 数学
    • 198 篇 生物学
    • 179 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 96 篇 化学
    • 56 篇 系统科学
  • 384 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 163 篇 图书情报与档案管...
    • 76 篇 工商管理
  • 139 篇 医学
    • 116 篇 临床医学
    • 76 篇 基础医学(可授医学...
  • 57 篇 法学
    • 43 篇 社会学
  • 43 篇 农学
  • 42 篇 教育学
    • 39 篇 教育学
  • 29 篇 经济学
  • 17 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 110 篇 feature extracti...
  • 93 篇 training
  • 89 篇 semantics
  • 85 篇 deep learning
  • 56 篇 computational mo...
  • 52 篇 predictive model...
  • 49 篇 data models
  • 47 篇 task analysis
  • 43 篇 contrastive lear...
  • 42 篇 convolution
  • 42 篇 accuracy
  • 40 篇 visualization
  • 38 篇 object detection
  • 37 篇 neural networks
  • 31 篇 machine learning
  • 30 篇 convolutional ne...
  • 29 篇 graph neural net...
  • 26 篇 data mining
  • 25 篇 reinforcement le...
  • 25 篇 image segmentati...

机构

  • 133 篇 south china univ...
  • 69 篇 key laboratory o...
  • 69 篇 minist educ key ...
  • 55 篇 south china univ...
  • 54 篇 south china univ...
  • 54 篇 school of comput...
  • 51 篇 pazhou lab peopl...
  • 46 篇 school of softwa...
  • 41 篇 south china univ...
  • 40 篇 south china univ...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of electr...
  • 39 篇 national enginee...
  • 37 篇 key laboratory o...
  • 36 篇 hong kong polyte...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 35 篇 chongqing key la...
  • 32 篇 peng cheng labor...
  • 32 篇 key laboratory o...

作者

  • 99 篇 cai yi
  • 82 篇 tan mingkui
  • 48 篇 wu qingyao
  • 43 篇 shen linlin
  • 43 篇 li qing
  • 40 篇 wang guoyin
  • 38 篇 xu xiaolong
  • 28 篇 xu xuemiao
  • 27 篇 xiaolong xu
  • 26 篇 huang qingbao
  • 24 篇 zhou zhiheng
  • 24 篇 huang qingming
  • 22 篇 xu qianqian
  • 21 篇 xie jiayuan
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 ren haopeng
  • 18 篇 niu shuaicheng
  • 18 篇 zhang yifan
  • 17 篇 xia shuyin

语言

  • 2,136 篇 英文
  • 207 篇 其他
  • 35 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=The Key Laboratory of Big Data and Intelligent Robot"
2366 条 记 录,以下是2281-2290 订阅
排序:
Acoustic and Kinematic Examination of Dysarthria in Cantonese Patients of Parkinson's Disease  11
Acoustic and Kinematic Examination of Dysarthria in Cantones...
收藏 引用
11th International Symposium on Chinese Spoken Language Processing (ISCSLP)
作者: Sun, Yue Ng, Manwa L. Lian, Chongyuan Wang, Lan Yang, Feng Yan, Nan Guizhou Univ Coll Big Data & Informat Engn Guiyang Guizhou Peoples R China Chinese Acad Sci Shenzhen Inst Adv Technol CAS Key Lab Human Machine Intelligence Synergy Sy Shenzhen Peoples R China Univ Hong Kong Speech Sci Lab Hong Kong Peoples R China Shenzhen Childrens Hosp Dept Speech Therapy Shenzhen Peoples R China Chinese Acad Sci Shenzhen Inst Adv Technol Guangdong Prov Key Lab Robot & Intelligent Syst Shenzhen Peoples R China
Hypokinetic dysarthria is one of the core symptoms of Parkinson's disease, characterized by reduced loudness, slurred speech and distorted consonant productions. Dopaminergic medication for Parkinson's disease... 详细信息
来源: 评论
Recovery and repair schemes for shift-XOR regenerating codes
arXiv
收藏 引用
arXiv 2019年
作者: Fu, Ximing Yang, Shenghao Xiao, Zhiqing School of Science and Engineering Chinese University of Hong Kong Shenzhen China University of Science and Technology of China China School of Science and Engineering Chinese University of Hong Kong Shenzhen Guangdong518172 China Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology Chinese University of Hong Kong Shenzhen Guangdong518172 China Shenzhen Research Institute of Big Data Shenzhen Guangdong518172 China Tsinghua University
Recovery and repair schemes are proposed for shift-exclusive-or (shift-XOR) product-matrix (PM) regenerating codes, which outperform those of the existing PM codes in terms of both communication and computation costs.... 详细信息
来源: 评论
Systematic Resource Allocation in Cloud RAN with Caching as a Service under Two Timescales
Systematic Resource Allocation in Cloud RAN with Caching as ...
收藏 引用
作者: Tang, Jianhua Quek, Tony Q. S. Chang, Tsung-Hui Shim, Byonghyo Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Normal University Changsha410081 China Institute of New Media and Communications Department of Electrical and Computer Engineering Seoul National University Seoul08826 Korea Republic of Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore487372 Singapore Department of Electronic Engineering Kyung Hee University Yongin17104 Korea Republic of School of Science and Engineering Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big Data Shenzhen518172 China Department of Electrical and Computer Engineering Institute of New Media and Communications Seoul National University Seoul08826 Korea Republic of
Recently, cloud radio access network (C-RAN) with caching as a service (CaaS) was proposed to merge the functionalities of communication, computing, and caching (CCC) together. In this paper, we dissect the interactio... 详细信息
来源: 评论
A java code protection scheme via dynamic recovering runtime instructions  18th
A java code protection scheme via dynamic recovering runtime...
收藏 引用
18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018
作者: Jiajia, Sun Jinbao, Gao Yu-an, Tan Yu, Zhang Xiao, Yu School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China School of Electrical and Information Engineering Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture Beijing100044 China China University of Mining and Technology Beijing100083 China Department of Computer Science and Technology Shandong University of Technology ZiboShandong255022 China
As Android operating system and applications on the device play important roles, the security requirements of Android applications increased as well. With the upgrade of Android system, Android runtime mode (ART mode)... 详细信息
来源: 评论
Research on the Brain-inspired Cross-modal Neural Cognitive Computing Framework
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Yang Key Laboratory of Big Data Analysis and Processing of Henan province Intelligent Technology and Application Engineering Research Centre of Henan province College of Computer Science and Information Engineering Henan University Kaifeng475004 China
To address modeling problems of brain-inspired intelligence, this thesis is focused on researching in the semantic-oriented framework design for multimedia and multimodal information. The Multimedia Neural Cognitive C... 详细信息
来源: 评论
Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship
收藏 引用
Peer-to-Peer Networking and Applications 2019年 第3期13卷 1069-1069页
作者: Xu, Jia Lu, Wei Xu, Lijie Yang, Dejun Li, Tao Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Department of Computer Science Colorado School of Mines Golden USA
Correction is needed in the original article. The university name in affiliation (1) is changed from “University of Posts and Telecommunications” to “Nanjing University of Posts and Telecommunications”.
来源: 评论
Impact of Prior Knowledge and data Correlation on Privacy Leakage: A Unified Analysis
arXiv
收藏 引用
arXiv 2019年
作者: Li, Yanan Ren, Xuebin Yang, Shusen Yang, Xinyu National Engineering Laboratory for Big Data Analytics [NEL-BDA Xi’an Jiaotong University Xi’an Shaanxi710049 China School of Mathematics and Statistics Xi’an Jiaotong University Xi’an Shaanxi710049 China School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an Shaanxi710049 China Ministry of Education Key Lab for Intelligent Networks and Network Security [MOE KLINNS Lab Xi’an Jiaotong University Xi’an Shaanxi710049 China
It has been widely understood that differential privacy (DP) can guarantee rigorous privacy against adversaries with arbitrary prior knowledge. However, recent studies demonstrate that this may not be true for correla... 详细信息
来源: 评论
An Improved Iterated Hybrid Search for DNA Codes Design
An Improved Iterated Hybrid Search for DNA Codes Design
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Zhenghui Liu Bin Wang Changjun Zhou Xiaopeng Wei Qiang Zhang Zhixiang Yin Xianwen Fang Zhonglong Zheng Key Laboratory of Advanced Design and Intelligent Ministry of Education Dalian China School of Mathematics and Big Data Anhui University of Science and Technology Huaian China College of Mathematics Zhejiang Normal University Jinhua China
DNA codes have a significant effect on the efficiency of DNA computing and other applications. Designing DNA codes is to obtain a certain sets of DNA codes with satisfying certain combinatorial constraints. Most works... 详细信息
来源: 评论
Bidirectional LSTM-CRF for biomedical named entity recognition
Bidirectional LSTM-CRF for biomedical named entity recogniti...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Xuemin Yang Zhihong Gao Yongmin Li Chuandi Pan Ronggen Yang Lejun Gong Geng Yang Jiangsu Key Laboratory of Big Data Security &Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Zhejiang Engineering Research Center of Intelligence Medicine Wenzhou China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing China
Bio-medical entity recognition extracts significant entities, for instance cells, proteins and genes, which is an arduous task in an automatic system that mine knowledge in bioinformatics texts. In this thesis, we uti...
来源: 评论
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jishen Tan, Shunquan Liu, Guangqing Li, Bin Huang, Jiwu Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Peng Cheng Laboratory Shenzhen518052 China
Until recently, deep steganalyzers in spatial domain have been all designed for gray-scale images. In this paper, we propose WISERNet (the wider separate-then-reunion network) for steganalysis of color images. We prov... 详细信息
来源: 评论