咨询与建议

限定检索结果

文献类型

  • 1,394 篇 会议
  • 1,043 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,528 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 909 篇 软件工程
    • 344 篇 信息与通信工程
    • 172 篇 电气工程
    • 172 篇 控制科学与工程
    • 146 篇 电子科学与技术(可...
    • 144 篇 生物工程
    • 123 篇 机械工程
    • 103 篇 光学工程
    • 81 篇 生物医学工程(可授...
    • 79 篇 化学工程与技术
    • 56 篇 仪器科学与技术
    • 54 篇 动力工程及工程热...
    • 42 篇 材料科学与工程(可...
    • 38 篇 建筑学
    • 36 篇 土木工程
    • 35 篇 网络空间安全
    • 30 篇 交通运输工程
  • 938 篇 理学
    • 596 篇 数学
    • 243 篇 物理学
    • 174 篇 生物学
    • 160 篇 统计学(可授理学、...
    • 84 篇 化学
    • 74 篇 系统科学
  • 428 篇 管理学
    • 235 篇 图书情报与档案管...
    • 206 篇 管理科学与工程(可...
    • 74 篇 工商管理
  • 70 篇 医学
    • 55 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 46 篇 法学
    • 35 篇 社会学
  • 37 篇 农学
  • 23 篇 经济学
  • 15 篇 教育学
  • 9 篇 哲学
  • 7 篇 艺术学
  • 4 篇 军事学
  • 3 篇 文学

主题

  • 108 篇 feature extracti...
  • 95 篇 semantics
  • 67 篇 information proc...
  • 62 篇 training
  • 59 篇 laboratories
  • 51 篇 computers
  • 43 篇 face recognition
  • 43 篇 computational mo...
  • 42 篇 image segmentati...
  • 42 篇 visualization
  • 40 篇 data mining
  • 38 篇 optimization
  • 37 篇 machine learning
  • 36 篇 humans
  • 35 篇 accuracy
  • 33 篇 deep learning
  • 33 篇 robustness
  • 30 篇 support vector m...
  • 29 篇 predictive model...
  • 29 篇 decoding

机构

  • 436 篇 key laboratory o...
  • 212 篇 university of ch...
  • 83 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 63 篇 peng cheng labor...
  • 63 篇 college of compu...
  • 52 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 45 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 43 篇 key laboratory o...
  • 43 篇 college of infor...
  • 43 篇 graduate univers...
  • 42 篇 school of comput...
  • 40 篇 chinese academy ...
  • 38 篇 fujian provincia...
  • 37 篇 fujian key labor...
  • 35 篇 key laboratory o...
  • 32 篇 school of comput...
  • 31 篇 anhui university...

作者

  • 95 篇 zhongzhi shi
  • 93 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 71 篇 shiguang shan
  • 62 篇 liu qun
  • 61 篇 huang qingming
  • 49 篇 li yingsong
  • 41 篇 huang zhixiang
  • 41 篇 xu qianqian
  • 40 篇 feng yang
  • 37 篇 he qing
  • 35 篇 yingsong li
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 jiang kai
  • 29 篇 zhixiang huang
  • 28 篇 li hua
  • 28 篇 zhuang fuzhen
  • 27 篇 guo wenzhong
  • 26 篇 yang zhiyong

语言

  • 2,303 篇 英文
  • 85 篇 其他
  • 57 篇 中文
检索条件"机构=The Key Laboratory of Cognitive Computing and Intelligent Information Processing"
2439 条 记 录,以下是161-170 订阅
排序:
Informative gene selection using the Algebraic Connectivity Strength of Point and Scoring Criteria
收藏 引用
Chinese Science Bulletin 2013年 第6期58卷 657-661页
作者: WANG Nian SU LiangLiang TANG Jun YE AiXia Key Laboratory of Intelligent Computing & Signal Processing Ministry of EducationAnhui University School of Electronics and Information Engineering Anhui University
This paper presents a novel method that integrates the Algebraic Connectivity Strength of Point(ACSP) and Scoring Criteria to identify genes associated with tumor ***,for each gene,the ACSP is used to identify reliabl... 详细信息
来源: 评论
Combined model assisted evolutionary algorithm with complementary fill sampling criterion for expensive multi/many-objective optimization
收藏 引用
Swarm and Evolutionary Computation 2025年 96卷
作者: Qiuzhen Wang Feng Xie Yuan Liu Juan Zou Jinhua Zheng Key Laboratory of Intelligent Computing and Information Processing Ministry of Education School of Computer Science Xiangtan Hunan Province China Faculty of School of Computer Science Xiangtan University Xiangtan 411105 China
In this paper, we design an algorithm to address the challenges of expensive multi-objective optimization problems by improving the surrogate model and sampling criterion. Firstly, we introduce a combined model which ... 详细信息
来源: 评论
DMFVAE:miRNA-disease associations prediction based on deep matrix factorization method with variational autoencoder
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 259-270页
作者: Pijing WEI Qianqian WANG Zhen GAO Ruifen CAO Chunhou ZHENG Information Materials and Intelligent Sensing Laboratory of Anhui Province Institutes of Physical Science and Information TechnologyAnhui UniversityHefei 230601China Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei 230601China Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial IntelligenceAnhui UniversityHefei 230601China
MicroRNAs(miRNAs)are closely related to numerous complex human diseases,therefore,exploring miRNA-disease associations(MDAs)can help people gain a better understanding of complex disease *** increasing number of compu... 详细信息
来源: 评论
Well limit behaviors of term rewriting systems
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第3期1卷 283-296页
作者: MA Shilong SUI Yuefei XU Ke State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100083China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of SciencesBeijing 100080China
The limit behaviors of computations have not been fully *** is necessary to consider such limit behaviors when we consider the properties of infinite objects in computer science,such as infinite logic programs,the sym... 详细信息
来源: 评论
XGRouter: high-quality global router in X-architecture with particle swarm optimization
收藏 引用
Frontiers of Computer Science 2015年 第4期9卷 576-594页
作者: Genggeng LIU Wenzhong GUO Rongrong LI Yuzhen NIU Guolong CHEN College of Mathematics and Computer Science Fuzhou University Fuzhou 350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou 350116 China
This paper presents a high-quality very large scale integration (VLSI) global router in X-architecture, called XGRouter, that heavily relies on integer linear pro- gramming (ILP) techniques, partition strategy and... 详细信息
来源: 评论
Fusing PLSA model and Markov random fields for automatic image annotation
收藏 引用
High Technology Letters 2014年 第4期20卷 409-414页
作者: 田东平 Zhao Xiaofei Shi Zhongzhi Institute of Computer Software Baoji University of Arts and Sciences Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of Sciences
A novel image auto-annotation method is presented based on probabilistic latent semantic analysis(PLSA) model and multiple Markov random fields(MRF).A PLSA model with asymmetric modalities is first constructed to esti... 详细信息
来源: 评论
Security-Reliability Analysis and Optimization for cognitive Two-Way Relay Network with Energy Harvesting
收藏 引用
China Communications 2024年 第11期21卷 163-179页
作者: Luo Yi Zhou Lihua Dong Jian Sun Yang Xu Jiahui Xi Kaixin Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal UniversityChangsha 410081China School of Electronic Information Central South UniversityChangsha 410075China
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay *** the network,energy-constrained secondary network(SN)nodes harve... 详细信息
来源: 评论
Asymptotic solution of a wide moving jam to a class of higher-order viscous traffic flow models
收藏 引用
Applied Mathematics and Mechanics(English Edition) 2018年 第5期39卷 609-622页
作者: Chunxiu WU College of Mathematics and Computer Science Quanzhou Normal UniversityQuanzhou 362000Fujian ProvinceChina Fujian Provincial Key Laboratory of Data Intensive Computing Quanzhou 362000Fujian ProvinceChina Key Laboratory of Intelligent Computing and Information Processing Quanzhou 362000Fujian ProvinceChina
The boundary-layer method is used to study a wide moving jam to a class of higher-order viscous models. The equations for characteristic parameters are derived to determine the asymptotic solution. The sufficient and ... 详细信息
来源: 评论
LMP-GAN: Out-Of-Distribution Detection For Non-Control Data Malware Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Wood, David Kapp, David Kebede, Temesgen Hirakawa, Keigo Wuhan University School of Computer Science China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering China Zhongguancun Academy China Wuhan University State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing China Sun Yat-sen University School of Geography and Planning China Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Chongqing University College of Computer Science China The University of Tokyo Japan RIKEN Center for Advanced Intelligence Project Japan Intelligent Science & Technology Academy Limited CASIC China iFlytek Company Ltd. National Engineering Research Center of Speech and Language Information Processing China Nanyang Technological University College of Computing & Data Science Singapore Henan Academy of Sciences Aerospace Information Research Institute China
Anomaly detection is a common application of machine learning. Out-of-distribution (OOD) detection in particular is a semi-supervised anomaly detection technique where the detection method is trained only on the inlie... 详细信息
来源: 评论
The M-computations induced by accessibility relations in nonstandard models M of Hoare logic
收藏 引用
Frontiers of Computer Science 2016年 第4期10卷 717-725页
作者: Cungen CAO Yuefei SUI Zaiyue ZHANG Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science Jiangsu University of Sciences and Technology Zhenjiang 212003 China
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program... 详细信息
来源: 评论