咨询与建议

限定检索结果

文献类型

  • 2,232 篇 会议
  • 1,447 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,319 篇 工学
    • 1,475 篇 计算机科学与技术...
    • 1,221 篇 软件工程
    • 590 篇 信息与通信工程
    • 380 篇 电子科学与技术(可...
    • 314 篇 电气工程
    • 274 篇 控制科学与工程
    • 191 篇 生物工程
    • 181 篇 机械工程
    • 169 篇 光学工程
    • 127 篇 生物医学工程(可授...
    • 122 篇 化学工程与技术
    • 114 篇 仪器科学与技术
    • 82 篇 动力工程及工程热...
    • 68 篇 材料科学与工程(可...
    • 56 篇 网络空间安全
    • 51 篇 建筑学
    • 45 篇 土木工程
  • 1,397 篇 理学
    • 895 篇 数学
    • 402 篇 物理学
    • 225 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 131 篇 化学
    • 124 篇 系统科学
  • 565 篇 管理学
    • 299 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 94 篇 医学
    • 78 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 42 篇 药学(可授医学、理...
  • 58 篇 法学
    • 45 篇 社会学
  • 49 篇 农学
  • 33 篇 经济学
  • 21 篇 教育学
  • 11 篇 军事学
  • 9 篇 哲学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 139 篇 feature extracti...
  • 105 篇 semantics
  • 86 篇 training
  • 78 篇 laboratories
  • 68 篇 information proc...
  • 65 篇 computational mo...
  • 64 篇 image segmentati...
  • 55 篇 optimization
  • 54 篇 data mining
  • 53 篇 computers
  • 50 篇 face recognition
  • 49 篇 signal processin...
  • 48 篇 visualization
  • 48 篇 accuracy
  • 47 篇 robustness
  • 46 篇 signal processin...
  • 43 篇 deep learning
  • 42 篇 support vector m...
  • 42 篇 humans
  • 40 篇 bandwidth

机构

  • 435 篇 key laboratory o...
  • 220 篇 university of ch...
  • 210 篇 key laboratory o...
  • 101 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 64 篇 peng cheng labor...
  • 63 篇 school of comput...
  • 62 篇 key laboratory o...
  • 62 篇 college of compu...
  • 53 篇 anhui university...
  • 53 篇 college of mathe...
  • 53 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 46 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 key laboratory o...
  • 43 篇 graduate univers...
  • 42 篇 school of comput...
  • 41 篇 college of infor...
  • 39 篇 chinese academy ...

作者

  • 91 篇 zhongzhi shi
  • 86 篇 huang zhixiang
  • 85 篇 shi zhongzhi
  • 74 篇 li yingsong
  • 73 篇 shiguang shan
  • 72 篇 xilin chen
  • 69 篇 zhixiang huang
  • 62 篇 liu qun
  • 61 篇 huang qingming
  • 57 篇 yingsong li
  • 56 篇 xianliang wu
  • 52 篇 shi minjia
  • 41 篇 wu xianliang
  • 41 篇 xu qianqian
  • 39 篇 wu xian-liang
  • 38 篇 feng yang
  • 36 篇 he qing
  • 34 篇 luo bin
  • 33 篇 bin luo
  • 32 篇 wen gao

语言

  • 3,476 篇 英文
  • 116 篇 其他
  • 99 篇 中文
检索条件"机构=the Key Laboratory of Intelligent Computing and Signal Processing"
3684 条 记 录,以下是3451-3460 订阅
排序:
3D Haar-like features for pedestrian detection
3D Haar-like features for pedestrian detection
收藏 引用
IEEE International Conference onMultimedia and Expo, ICME 2007
作者: Xinyi, Cui Yazhou, Liu Shiguang, Shan Xilin, Chen Wen, Gao Harbin Institute of Technology Harbin China Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Chinese Academy of Sciences Beijing China
One basic observation for pedestrian detection in video sequences is that both appearance and motion information are important to model the moving people. Based on this observation, we propose a new kind of features, ... 详细信息
来源: 评论
RETRACTED ARTICLE: Geometrical issues for representing protein structure
RETRACTED ARTICLE: Geometrical issues for representing prote...
收藏 引用
2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
作者: Liu, Jianhui Department of Basic Science Beijing University of Agriculture Beijing 102206 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Predicting functional properties of proteins is needed in a number of applications. A protein is represented as an ordered list of amino acids, where each amino acid has a sequence and a structure component (the terms... 详细信息
来源: 评论
Fuzzy Clustering Ensemble Based on Dual Boosting
Fuzzy Clustering Ensemble Based on Dual Boosting
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Su-lan Zhai Bin Luo Yu-tang Guo School of Mathematics and Computing Anhui University of Science and Technology Hefei China Key Laboratory of Intelligent Computing Signal Processing of Anhui University Hefei China
It is widely recognized that clustering ensemble is fit for any shape and any distribution dataset and that the boosting method provides superior results for classification problems. In the paper, a dual boosting is p... 详细信息
来源: 评论
Immune genetic algorithm for weapon-target assignment problem
Immune genetic algorithm for weapon-target assignment proble...
收藏 引用
2007 Workshop on intelligent Information Technology Application, IITA 2007
作者: Gao, Shang Zhang, Zaiyue Zhang, Xiaoru Cao, Cungen School of Electronics and Information Jiangsu University of Science and Technology Zhenjiang 212003 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
An Immune Genetic Algorithm (IGA) is used to solve weapon-target assignment problem (WTA). The used immune system serves as a local search mechanism for genetic algorithm. Besides, in our implementation, a new crossov... 详细信息
来源: 评论
The ICT Statistical Machine Translation Systems for IWSLT 2007  4
The ICT Statistical Machine Translation Systems for IWSLT 20...
收藏 引用
4th International Workshop on Spoken Language Translation, IWSLT 2007
作者: He, Zhongjun Mi, Haitao Liu, Yang Xiong, Deyi Luo, Weihua Huang, Yun Ren, Zhixiang Lu, Yajuan Liu, Qun Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences No.6 Kexueyuan South Road Haidian District P.O. Box 2704 Beijing100080 China
In this paper, we give an overview of the ICT statistical machine translation systems for the evaluation campaign of the International Workshop on Spoken Language Translation (IWSLT) 2007. In this year’s evaluation, ... 详细信息
来源: 评论
Fractional Fourier digital holography
收藏 引用
通讯和计算机(中英文版) 2007年 第5期4卷 52-56页
作者: CAO Yu-ru WEI Sui Department of Education Technique Shanghai Institute of Foreign Trade Shanghai 201620 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University. Hefei 230039 China
来源: 评论
Good Lattice Swarm Algorithm for Constrained Engineering Design Optimization
Good Lattice Swarm Algorithm for Constrained Engineering Des...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Shoubao Su Jiwen Wang Wangkang Fan Xibing Yin Key Lab of Intelligent Computing & Signal Processing of the National Education Ministry Anhui Unive Key Lab of Intelligent Computing & Signal Processing of the National Education Ministry Anhui Unive Gear Institute of Lu'an Automotive Gear Manufacture Co. Ltd Anhui Jianghuai Automotive Group Lu'an
Engineering optimization in the intelligence swarm remains to be a challenge. Recently, a novel optimization method based on number-theory and particle swarm, good lattice swarm optimization algorithm(GLSO), is introd... 详细信息
来源: 评论
Good Lattice Points-Based Particle Swarm Optimizer
Good Lattice Points-Based Particle Swarm Optimizer
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Shoubao Su Jiwen Wang Key Laboratory of Intelligent Computing & Signal Processing of Ministry of Education Anhui University Hefei China Department of Computer Science & Technology West Anhui University Luan China
The mechanism of the classical particle swarm optimization and the comparison criterion of different natural computing methods is investigated by introducing the discrepancy and good lattice points in number theory an... 详细信息
来源: 评论
A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP
A (t, n)-Threshold Verified Multi-secret Sharing Scheme Base...
收藏 引用
ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Ruanhua Shi Hong Zhong Liusheng Huang Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Department of Computer Science and Technology University of Science and Technology Hefei China
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as ... 详细信息
来源: 评论
Granular computing in the Information Transformation of Pattern Recognition
Granular Computing in the Information Transformation of Patt...
收藏 引用
IEEE International Conference on Granular computing (GRC)
作者: Hong Hu Zhongzhi Shi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy and Sciences Beijing China
In the past decade, many papers about granular computing(GrC) have been published, but the key points about granular computing(GrC) are still unclear. In this paper, we try to find the key points of GrC in the informa... 详细信息
来源: 评论