咨询与建议

限定检索结果

文献类型

  • 1,933 篇 会议
  • 1,452 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 3,388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,209 篇 工学
    • 1,534 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 523 篇 信息与通信工程
    • 271 篇 控制科学与工程
    • 252 篇 生物工程
    • 193 篇 电气工程
    • 192 篇 机械工程
    • 188 篇 电子科学与技术(可...
    • 179 篇 光学工程
    • 163 篇 生物医学工程(可授...
    • 122 篇 化学工程与技术
    • 95 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 57 篇 建筑学
    • 51 篇 材料科学与工程(可...
    • 49 篇 土木工程
  • 1,231 篇 理学
    • 718 篇 数学
    • 314 篇 物理学
    • 297 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 120 篇 化学
    • 93 篇 系统科学
  • 619 篇 管理学
    • 354 篇 图书情报与档案管...
    • 281 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 122 篇 医学
    • 102 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 57 篇 法学
    • 47 篇 社会学
  • 50 篇 农学
  • 33 篇 经济学
  • 24 篇 教育学
  • 15 篇 艺术学
  • 10 篇 军事学
  • 9 篇 哲学
  • 7 篇 文学

主题

  • 154 篇 feature extracti...
  • 138 篇 semantics
  • 113 篇 training
  • 83 篇 information proc...
  • 71 篇 laboratories
  • 67 篇 deep learning
  • 64 篇 face recognition
  • 63 篇 object detection
  • 62 篇 computational mo...
  • 60 篇 computers
  • 54 篇 visualization
  • 53 篇 accuracy
  • 50 篇 data mining
  • 47 篇 convolution
  • 47 篇 humans
  • 43 篇 image segmentati...
  • 43 篇 data models
  • 43 篇 robustness
  • 42 篇 decoding
  • 39 篇 computer vision

机构

  • 432 篇 key laboratory o...
  • 319 篇 university of ch...
  • 83 篇 key laboratory o...
  • 75 篇 peng cheng labor...
  • 62 篇 key lab of intel...
  • 51 篇 key lab of intel...
  • 48 篇 key laboratory o...
  • 48 篇 fujian provincia...
  • 47 篇 the key laborato...
  • 47 篇 graduate univers...
  • 46 篇 key laboratory o...
  • 46 篇 jiangxi province...
  • 45 篇 school of comput...
  • 44 篇 chinese academy ...
  • 38 篇 key laboratory o...
  • 37 篇 hubei province k...
  • 34 篇 national enginee...
  • 33 篇 graduate univers...
  • 33 篇 institute of dig...
  • 33 篇 school of comput...

作者

  • 98 篇 zhongzhi shi
  • 92 篇 shiguang shan
  • 92 篇 xilin chen
  • 87 篇 shi zhongzhi
  • 80 篇 liu qun
  • 70 篇 huang qingming
  • 46 篇 qing he
  • 43 篇 xu qianqian
  • 41 篇 zhang fuquan
  • 40 篇 wen gao
  • 39 篇 he qing
  • 38 篇 feng yang
  • 37 篇 li hua
  • 36 篇 liu yang
  • 32 篇 jiang shuqiang
  • 31 篇 cao juan
  • 31 篇 shen linlin
  • 30 篇 chen xilin
  • 30 篇 zhuang fuzhen
  • 30 篇 gao wen

语言

  • 2,988 篇 英文
  • 338 篇 其他
  • 74 篇 中文
检索条件"机构=The Key Laboratory of Intelligent Information Processing Institute of Computing Technology"
3388 条 记 录,以下是2561-2570 订阅
排序:
Adaptive Particle Filter with Estimation Windows
Adaptive Particle Filter with Estimation Windows
收藏 引用
2013年中国智能自动化学术会议
作者: Peng Li Jian Tang College of Information and Technology Key Laboratory of Intelligent Computing and Information ProcessingMinistry of EducationXiangtan University
Particle filter is well suited to estimate the state of non-linear non-Gaussian dynamic systems,which comes at the cost of higher computational *** in many real time applications,it must deal with constraints imposed ... 详细信息
来源: 评论
Security games with surveillance cost and optimal timing of attack execution
Security games with surveillance cost and optimal timing of ...
收藏 引用
12th International Conference on Autonomous Agents and Multiagent Systems 2013, AAMAS 2013
作者: An, Bo Brown, Matthew Vorobeychik, Yevgeniy Tambe, Milind Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China University of Southern California Los Angeles CA 90089 United States Sandia National Laboratories Livermore CA 94550 United States
Stackelberg games have been used in several deployed applications to allocate limited resources for critical infrastructure protection. These resource allocation strategies are randomized to prevent a strategic attack... 详细信息
来源: 评论
A reputation management approach for resource constrained trustee agents
A reputation management approach for resource constrained tr...
收藏 引用
23rd International Joint Conference on Artificial Intelligence, IJCAI 2013
作者: Yu, Han Miao, Chunyan An, Bo Leung, Cyril Lesser, Victor R. Nanyang Technological University Singapore Singapore Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China University of British Columbia Canada University of Massachusetts Amherst United States
Trust is an important mechanism enabling agents to self-police open and dynamic multi-agent systems (ODMASs). Trusters evaluate the reputation of trustees based on their past observed performance, and use this informa... 详细信息
来源: 评论
Enhancing ability of fault detection for component systems based on object interactions graph
Enhancing ability of fault detection for component systems b...
收藏 引用
2012 International Conference on Emerging Technologies for information Systems, computing, and Management, ICM 2012
作者: Sun, Fuzhen Liao, Lejian Du, Jianguang Li, Guoqiang Beijing Eng. Res. Ctr. of High Vol. Language Information Processing and Cloud Computing Applications Beijing Key Laboratory of Intelligent Information Technology School of Computer Science Beijing China School of Computer Science and Technology Shandong University of Technology Zibo China
Test case prioritization is a technique to schedule the test case in order to maximize some objective function. Early fault detection can provide a faster feedback generating a scope for debuggers to carry out their t... 详细信息
来源: 评论
Exploit spatial relationships among pixels for saliency region detection using topic model
Exploit spatial relationships among pixels for saliency regi...
收藏 引用
19th International Conference on Advances in Multimedia Modeling, MMM 2013
作者: Jiang, Guang Liu, Xi Yue, JinPeng Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate University of Chinese Academy of Sciences Beijing 100049 China Fujitsu Research and Development Center Co. LTD Beijing 100025 China
In this paper, we describe an approach to saliency detection as a two-category (salient or not) soft clustering using topic model. In order to simulate human's paralleled visual neural perception, many subregions ... 详细信息
来源: 评论
The Sound and Complete <i>R</i>-Calculi with Respect to Pseudo-Revision and Pre-Revision
收藏 引用
International Journal of Intelligence Science 2013年 第2期3卷 110-117页
作者: Wei Li Yuefei Sui Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China State Key Laboratory of Software Development Environment Beijing University of Aeronautics and Astronautics Beijing China
The AGM postulates ([1]) are for the belief revision (revision by a single belief), and the DP postulates ([2]) are for the iterated revision (revision by a finite sequence of beliefs). Li [3] gave an R-calculus for R... 详细信息
来源: 评论
Preface-GCIS 2013
Proceedings - 2013 4th Global Congress on Intelligent System...
收藏 引用
Proceedings - 2013 4th Global Congress on intelligent Systems, GCIS 2013 2013年 xi-xii页
作者: Xu, Li Da Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China
来源: 评论
One Sound and Complete <i>R</i>-Calculus with Pseudo-Subtheory Minimal Change Property
收藏 引用
Journal of Computer and Communications 2013年 第5期1卷 20-25页
作者: Wei Li Yuefei Sui Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China. State Key Laboratory of Software Development Environment Beijing University of Aeronautics and Astronautics Beijing China
The AGM axiom system is for the belief revision (revision by a single belief), and the DP axiom system is for the iterated revision (revision by a finite sequence of beliefs). Li [1] gave an R-calculus for R-configura... 详细信息
来源: 评论
A new automatic analysis system for risk behaviors
A new automatic analysis system for risk behaviors
收藏 引用
2013 International Conference on information and Communication technology for Education (ICTE 2013)
作者: Chan Xu Xin Liu Jian Wu BoYu OuYang Key Laboratory of Intelligent Computing and Information Processing (Xiangtan University) Ministry of Education Institute of Information Engineering Xiangtan University
At present, the software's type forms present diversity, and how to automatically analyze the software's risk behaviors become an urgent problem. This paper used some software behavior crawlers and dynamic ana... 详细信息
来源: 评论
A heterogeneous-aware cooperative MIMO transmission scheme in WSN
Journal of Software
收藏 引用
Journal of Software 2013年 第3期8卷 639-644页
作者: Pei, Tingrui Xie, Da Li, Zhetao Tu, Dengbiao Choi, Youngjune College of Information Engineering Xiangtan University Xiangtan 411105 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan 411105 China School of Computer National University of Defense Technology Changsha 410073 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Department of Information and Computer Engineering Ajou University Suwon 443749 Korea Republic of
A heterogeneous-aware cooperative MIMO transmission scheme (HAMS) is proposed to optimize the network lifetime and save energy for energy heterogeneous wireless sensor networks (WSN). This scheme extends the tradition... 详细信息
来源: 评论