咨询与建议

限定检索结果

文献类型

  • 26 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 44 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 30 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 6 篇 控制科学与工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 3 篇 文学
    • 2 篇 外国语言文学
    • 1 篇 新闻传播学
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 44 篇 hits algorithm
  • 5 篇 pagerank algorit...
  • 4 篇 link analysis
  • 2 篇 collaborative fi...
  • 2 篇 key classes dete...
  • 2 篇 citation analysi...
  • 2 篇 pso
  • 2 篇 opics search
  • 2 篇 trust
  • 2 篇 topic drift
  • 2 篇 web mining
  • 2 篇 web structure mi...
  • 2 篇 hyperlink
  • 1 篇 outlink
  • 1 篇 manufacturing se...
  • 1 篇 computer science...
  • 1 篇 common reference
  • 1 篇 centrality
  • 1 篇 java virtual thr...
  • 1 篇 javavirtual thre...

机构

  • 1 篇 chongqing normal...
  • 1 篇 prince sultan un...
  • 1 篇 univ politehn ti...
  • 1 篇 peking univ peop...
  • 1 篇 univ hyderabad s...
  • 1 篇 south cent univ ...
  • 1 篇 college of lnfor...
  • 1 篇 zhejiang univ fi...
  • 1 篇 gustavus adolphu...
  • 1 篇 gl bajaj institu...
  • 1 篇 wuhan univ sch c...
  • 1 篇 univ qom fac eng...
  • 1 篇 univ cambridge d...
  • 1 篇 beijing univ pos...
  • 1 篇 kyushu univ fac ...
  • 1 篇 parc palo alto c...
  • 1 篇 business school ...
  • 1 篇 xihua univ sch m...
  • 1 篇 harvey mudd coll...
  • 1 篇 kakatiya univ ku...

作者

  • 2 篇 li xin
  • 2 篇 du yajun
  • 2 篇 yoshida mitsuo
  • 2 篇 chirila ciprian-...
  • 2 篇 sora ioana
  • 1 篇 jabbar qasim abd...
  • 1 篇 masuda naoki
  • 1 篇 alwan adil abbas
  • 1 篇 liu dong
  • 1 篇 maehara chihiro
  • 1 篇 singh jaiteg
  • 1 篇 yamaguchi kazuno...
  • 1 篇 sharma vikrant
  • 1 篇 yeh jieh-shan
  • 1 篇 morita hiroyuki
  • 1 篇 tian xiuxia
  • 1 篇 hong huiting
  • 1 篇 jie lian
  • 1 篇 zhan huaqun
  • 1 篇 gelbukh alexande...

语言

  • 41 篇 英文
  • 1 篇 西班牙文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=HITS algorithm"
44 条 记 录,以下是1-10 订阅
Citation recommendation using modified hits algorithm
收藏 引用
COMPUTING 2024年 第7期106卷 2239-2259页
作者: Kammari, Monachary Bhavani, S. Durga Univ Hyderabad Sch Comp & Informat Sci Hyderabad Telangana India
Over the years the number of research publications per year is growing exponentially. Finding research papers of quality from the massive literature of relevant articles is a challenging and time-consuming task. The a... 详细信息
来源: 评论
Identifying image tags from Instagram hashtags using the hits algorithm  15
Identifying image tags from Instagram hashtags using the HIT...
收藏 引用
15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
作者: Giannoulakis, Stamatios Tsapatsoulis, Nicolas Ntalianis, Klimis Cyprus Univ Technol Dept Commun & Internet Studies CY-3036 Limassol Cyprus Athens Univ Appl Sci TEI Athens Dept Mkt Athens Greece
Many automatic image annotation methods are based on the learning by example paradigm. Image tagging, through manual image inspection, is the first step towards this end. However, manual image annotation, even for cre... 详细信息
来源: 评论
An Improved hits algorithm Based on Analysis of Web Page Links and Web Content Similarity
An Improved HITS Algorithm Based on Analysis of Web Page Lin...
收藏 引用
International Conference on Cyberworlds (CW)
作者: Yang, Weiming Chongqing Normal Univ Coll Comp & Informat Sci Chongqing Peoples R China
hits (HyperLink Induced Topic Search) is a classical link analysis algorithm for analyzing WSM (Web Structure Mining). The algorithm takes into consideration of the structural information of links but ignores the corr... 详细信息
来源: 评论
Network analysis of US non-fatal opioid-involved overdose journeys, 2018-2023
收藏 引用
APPLIED NETWORK SCIENCE 2024年 第1期9卷 68页
作者: McCabe, Lucas H. Masuda, Naoki Casillas, Shannon Danneman, Nathan Alic, Alen Law, Royal LMI 7940 Jones Branch Dr Tysons VA 22102 USA George Washington Univ Dept Comp Sci 800 22nd St NW Washington DC 20052 USA SUNY Buffalo Dept Math 244 Math Bldg Buffalo NY 14260 USA SUNY Buffalo Inst Artificial Intelligence & Data Sci 215 Lockwood Hall Buffalo NY 14260 USA CDCP Natl Ctr Injury Prevent & Control 4770 Buford Highway NE Atlanta GA 30341 USA
We present a nation-wide network analysis of non-fatal opioid-involved overdose journeys in the United States. Leveraging a unique proprietary dataset of Emergency Medical Services incidents, we construct a journey-to... 详细信息
来源: 评论
Java single vs. platform vs. virtual threads runtime performance assessment in the context of key class detection  18
Java single vs. platform vs. virtual threads runtime perform...
收藏 引用
18th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)
作者: Chirila, Ciprian-Bogdan Sora, Ioana Univ Politehn Timisoara Comp & Informat Technol Dept Timisoara Romania
Key classes are considered the most important classes of a software system. They represent the starting point for reengineering or documentation processes. The detection of key classes is considered crucial in the sta... 详细信息
来源: 评论
CUDA Accelerated Graph algorithms for Key Class Detection  28
CUDA Accelerated Graph Algorithms for Key Class Detection
收藏 引用
28th International Conference on System Theory Control and Computing
作者: Chirila, Ciprian-Bogdan Sora, Ioana Univ Politehn Comp & Informat Technol Dept Timisoara Romania
Key classes are deemed as pivotal elements within a software system, serving as focal points for reengineering or documentation endeavors. The identification of these key classes holds significant importance in contem... 详细信息
来源: 评论
Recommendation system using a deep learning and graph analysis approach
收藏 引用
COMPUTATIONAL INTELLIGENCE 2022年 第5期38卷 1859-1883页
作者: Kherad, Mahdi Bidgoly, Amir Jalaly Univ Qom Fac Engn Dept Comp Engn Qom Iran
When a user connects to the Internet to fulfill his needs, he often encounters a huge amount of related information. Recommender systems are the techniques for massively filtering information and offering the items th... 详细信息
来源: 评论
Android Malware Detection Based on Functional Classification
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2022年 第3期E105D卷 656-666页
作者: Fan, Wenhao Liu, Dong WU, Fan Tang, Bihua Liu, Yuan'an Beijing Univ Posts & Telecommun Sch Elect Engn Beijing Peoples R China Beijing Univ Posts & Telecommun Beijing Key Lab Work Safety Intelligent Monitorin Beijing Peoples R China
Android operating system occupies a high share in the mobile terminal market. It promotes the rapid development of Android applications (apps). However, the emergence of Android malware greatly endangers the security ... 详细信息
来源: 评论
The Estimation of PR Method with the use of LV of Web Pages  4
The Estimation of PR Method with the use of LV of Web Pages
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2024
作者: Tarun, G. Sharma, Vikrant Mudhafar, Mustafa Pathak, Vipluv Jabbar, Qasim Abdul Alwan, Adil Abbas Alzubaidi, Laith H. Alwan, Ali Saad Hindustan Institute of Technology and Science Department of Computer Applications India Department of Cse Graphic Era Hill University Uttarakhand Dehradun248007 India Graphic Era Deemed to Be University Uttarakhand Dehradun248007 India Al-Taff University College Department of Anesthesia Techniques and Intensive Care Kerbala Iraq Gl Bajaj Institute of Technology and Management Department of Management Studies Greater Noida India Alkunooze University College Medical Instrument Department Basra Iraq National University of Science and Technology College of Technical Engineering Dhi Qar Iraq The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Kut University College Business Administration Department wasit Al kut52001 Iraq
The fast expansion of the World Wide Web has made it increasingly harder to navigate through its tremendous content, necessitating green and effective internet net page rating algorithms for serps like google. Traditi... 详细信息
来源: 评论
A framework for generating recommendations based on trust in an informal e-learning environment
收藏 引用
PEERJ COMPUTER SCIENCE 2024年 10卷 e2386-e2386页
作者: Rehman, Amjad Ahmed, Adeel Alahmadi, Tahani Jaser Mirdad, Abeer Rashad Al Ghofaily, Bayan Saleem, Khalid Prince Sultan Univ Artificial Intelligence & Data Analyt Lab AIDA CCI Riyadh Saudi Arabia Quaid I Azam Univ Dept Comp Sci Islamabad Pakistan Princess Nourah bint Abdulrahman Univ Coll Comp & Informat Sci Dept Informat Syst Riyadh Saudi Arabia
Rapid advancement in information technology promotes the growth of new online learning communities in an e-learning environment that overloads information and data sharing. When a new learner asks a question, how a sy... 详细信息
来源: 评论