咨询与建议

限定检索结果

文献类型

  • 200 篇 会议
  • 130 篇 期刊文献

馆藏范围

  • 330 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 235 篇 工学
    • 133 篇 计算机科学与技术...
    • 109 篇 软件工程
    • 50 篇 控制科学与工程
    • 44 篇 信息与通信工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 27 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 19 篇 仪器科学与技术
    • 19 篇 生物工程
    • 14 篇 化学工程与技术
    • 9 篇 光学工程
    • 7 篇 公安技术
    • 7 篇 网络空间安全
    • 6 篇 土木工程
    • 6 篇 生物医学工程(可授...
    • 4 篇 石油与天然气工程
    • 3 篇 材料科学与工程(可...
  • 103 篇 理学
    • 59 篇 数学
    • 20 篇 系统科学
    • 19 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 化学
    • 3 篇 大气科学
  • 60 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 4 篇 医学
  • 4 篇 军事学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 15 篇 semantics
  • 13 篇 training
  • 11 篇 feature extracti...
  • 9 篇 predictive model...
  • 9 篇 data models
  • 8 篇 deep learning
  • 7 篇 task analysis
  • 7 篇 computational mo...
  • 6 篇 throughput
  • 6 篇 recommender syst...
  • 6 篇 optimization
  • 6 篇 data mining
  • 5 篇 learning systems
  • 5 篇 random access me...
  • 5 篇 image classifica...
  • 5 篇 estimation
  • 5 篇 measurement
  • 4 篇 reliability
  • 4 篇 support vector m...
  • 4 篇 big data

机构

  • 71 篇 college of compu...
  • 62 篇 key laboratory o...
  • 53 篇 college of autom...
  • 40 篇 key laboratory o...
  • 30 篇 school of softwa...
  • 28 篇 key laboratory o...
  • 26 篇 school of big da...
  • 23 篇 school of automa...
  • 21 篇 ministry of educ...
  • 17 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 10 篇 key laboratory o...
  • 9 篇 school of automa...
  • 8 篇 key laboratory o...
  • 7 篇 college of commu...
  • 7 篇 school of big da...
  • 6 篇 college of compu...
  • 5 篇 college of softw...
  • 5 篇 the key laborato...
  • 4 篇 key laboratory o...

作者

  • 22 篇 sun dihua
  • 20 篇 zhao min
  • 15 篇 huang sheng
  • 15 篇 dan yang
  • 14 篇 shan liang
  • 13 篇 meng yan
  • 13 篇 zhang xiaohong
  • 12 篇 xiong qingyu
  • 12 篇 xiaohong zhang
  • 11 篇 ling xu
  • 11 篇 zheng linjiang
  • 10 篇 gao min
  • 10 篇 zhong jiang
  • 10 篇 min zhao
  • 10 篇 liu weining
  • 10 篇 qingyu xiong
  • 9 篇 linjiang zheng
  • 9 篇 feng yong
  • 9 篇 qingfeng zhuge
  • 9 篇 xiwang dong

语言

  • 316 篇 英文
  • 7 篇 其他
  • 7 篇 中文
检索条件"机构=the Key Laboratory of Dependable Service Computing in Cyber Physical Society"
330 条 记 录,以下是81-90 订阅
排序:
Automatic detection of pneumonia in chest X-ray images using cooperative convolutional neural networks  1
收藏 引用
2nd Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2019
作者: Wang, Kun Zhang, Xiaohong Huang, Sheng Chen, Feiyu School of Big Data and Software Engineering Chongqing University Chongqing401331 China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing University Chongqing400044 China
Chest X-ray images are currently the best available visual media for diagnosing pneumonia, which plays a crucial role in clinical care. Medical images diagnosing can be error-prone for inexperienced radiologists, whil... 详细信息
来源: 评论
Efficient scheduling with intensive in-memory file accesses considering bandwidth constraint on memory bus  15th
Efficient scheduling with intensive in-memory file accesses ...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Wu, Lin Zhuge, Qingfeng Sha, Edwin H.-M. Sun, Zhilong Key Laboratory of Dependable Service Computing in Cyber Pyhsical Society Ministry of Education Chongqing400044 China College of Computer Science Chongqing University Chongqing400044 China
The latest trend in high performance computing and big data applications inspires new solutions of in-memory filesystems to achieve high throughput of file data accesses. However, new concerns arise because intensive ... 详细信息
来源: 评论
Deep Convolutional Neural Networks with Random Subspace Learning for Short-term Traffic Flow Prediction with Incomplete Data
Deep Convolutional Neural Networks with Random Subspace Lear...
收藏 引用
International Joint Conference on Neural Networks
作者: Shijie Liao Jing Chen Jiaxin Hou Qingyu Xiong Junhao Wen Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education China
Traffic flow prediction is a fundamental component in intelligent transportation systems. However, many existing prediction models endure several shortages. Most of the methods are constructed as a shallow model, whic... 详细信息
来源: 评论
Robust Small Target Detection under Intense Noise Based on Extreme Learning Machine  2
Robust Small Target Detection under Intense Noise Based on E...
收藏 引用
2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2018
作者: Liu, Depeng Li, Zhengzhou Che, Peng Chen, Cheng Cao, Lei Chongqing University College of Communication Engineering Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing University Chongqing China Chinese Academy of Sciences Key Laboratory of Beam Control Chengdu China
T211 robust detection of dim small targets is the key problem in infrared search and track systems. However, the intense noise in infrared image has similar appearance and intensity distribution with the dim small tar... 详细信息
来源: 评论
MoNet3D: Towards accurate monocular 3d object localization in real time  37
MoNet3D: Towards accurate monocular 3d object localization i...
收藏 引用
37th International Conference on Machine Learning, ICML 2020
作者: Zhou, Xichuan Peng, Yicong Long, Chunqiao Ren, Fengbo Shi, Cong Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education College of Microelectronics and Communication Engineering Chongqing University Chongqing400044 China Arizona State University TempeAZ United States
Monocular multi-object detection and localization in 3D space has been proven to be a challenging task. The MoNet3D algorithm is a novel and effective framework that can predict the 3D position of each object in a mon... 详细信息
来源: 评论
Bus penetration rate estimation of road segment using bus GPS data  30
Bus penetration rate estimation of road segment using bus GP...
收藏 引用
30th Chinese Control and Decision Conference, CCDC 2018
作者: Sun, Dihua Chen, Qiuqu Zhao, Min Zheng, Linjiang Liu, Weining Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing China College of Automation Chongqing University Chongqing400044 China College of Computer Science Chongqing University Chongqing400044 China
To realize the estimation of bus penetration rate in road segment using bus GPS data, a method is proposed in this paper to estimate bus penetration rate in single signal cycle, according to the bus position at the en... 详细信息
来源: 评论
Assessment of security and vulnerability of home wireless networks
Assessment of security and vulnerability of home wireless ne...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Stimpson, Thomas Liu, Lu Zhang, Jianjun Hill, Richard Liu, Weining Zhan, Yongzhao DISYS Research Group School of Computing and Mathematics University of Derby United Kingdom Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Chongqing China School of Computer Science and Telecommunication Engineering Jiangsu University Jiangsu China
Wireless networks are being used in homes far more extensively than ever before. With the growth of the Internet, coupled with wireless devices such as laptops and Wi-Fi enabled phones, their usage has increased great... 详细信息
来源: 评论
High-payload completely reversible data hiding in encrypted images by an interpolation technique
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2017年 第11期18卷 1732-1743页
作者: Di XIAO Ying WANG Tao XIANG Sen BAI MOE Key Laboratory of Dependable Service Computing in Cyber Physical Society College of Computer Science Chongqing University Chongqing 400044 China Department of lnformation Engineering Chongqing Communication Institute Chongqing 400035 China
We present a new high-payload joint reversible data-hiding scheme for encrypted images. Instead of embedding data in the encrypted image directly, the content owner first uses an interpolation technique to estimate wh... 详细信息
来源: 评论
Short-term load forecasting for electric vehicle charging stations based on time series distance measuring  13
Short-term load forecasting for electric vehicle charging st...
收藏 引用
2017 13th IEEE International Conference on Electronic Measurement & Instruments (ICEMI)
作者: Shi Xin Qiu Lei Tian Li Liang Miaozhu Yi Lizheng Key Laboratory of Service Computing in Cyber Physical Society MOE College of Automation Chongqing University State Grid Chongqing Electric Power Company
To improve the efficiency and the precision of short-term load forecasting of the electric vehicle charging stations, this paper proposed a new algorithm for short-term load forecasting for electric vehicle charging s... 详细信息
来源: 评论
Identify Online Fraudster with Extended Cellular Automata
Identify Online Fraudster with Extended Cellular Automata
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on cyber, physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Ji Li Yueliang Xiao Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing China
Auction fraud and anomalies detection is proved to be a troublesome task. The fraudulent cliques can easily forge lots of unreal transactions, to improve their reputation and cheat the auction reputation system. By ap... 详细信息
来源: 评论