咨询与建议

限定检索结果

文献类型

  • 164 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 121 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 控制科学与工程
    • 9 篇 土木工程
    • 9 篇 生物工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 104 篇 理学
    • 80 篇 数学
    • 25 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 10 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
  • 74 篇 管理学
    • 51 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection

机构

  • 60 篇 college of infor...
  • 43 篇 the key laborato...
  • 35 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 46 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 202 篇 英文
  • 9 篇 中文
  • 1 篇 其他
检索条件"机构=Hebei Key Laboratory for Computer Virtual Technology and System Integration"
211 条 记 录,以下是71-80 订阅
排序:
Software fault localization via mining program dynamic execution graph
收藏 引用
Journal of Computational Information systems 2014年 第19期10卷 8563-8573页
作者: Zhang, Kai Yang, Ke Zhou, Lianbo Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining... 详细信息
来源: 评论
Community detection algorithm in signed social networks based on statistics and merger
收藏 引用
Journal of Information and Computational Science 2015年 第15期12卷 5589-5599页
作者: Guo, Jingfeng Zhao, Yue Hu, Xinzhuan Liu, Yuanying College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Researches on community detection in signed social networks focus on the assignment of positive and negative edges. However, the community detection approaches that positive and negative edges are handled separately i... 详细信息
来源: 评论
Graph-dissimilar-detect: dissimilar path detecting in complex software behavior network based on time-interval weight and dissimilarity
收藏 引用
Journal of Computational Information systems 2015年 第2期11卷 535-545页
作者: Ren, Jiadong Li, Weina Han, Gaowei College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Dissimilar path detection is an important task in software behavior detection. Previous dissimilar path mining algorithms ignore time-interval weight and dissimilarity. Therefore, a dissimilar path detecting algorithm... 详细信息
来源: 评论
Road network information based edge bundling
收藏 引用
Journal of Information and Computational Science 2015年 第13期12卷 4909-4918页
作者: Nie, Junlan Zhang, Jikai Xin, Shuyue Guo, Dongliang College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
To solve edge confusion problems in the geo-related graph visualization, here we present an edge bundling algorithm based on the road network information. First, the improved Dijkstra shortest path algorithm is employ... 详细信息
来源: 评论
New friend recommendation with user interest and socialization
收藏 引用
Journal of Information and Computational Science 2015年 第11期12卷 4253-4262页
作者: Huang, Guoyan Chang, Yixin Li, Yakun College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Friend recommendation is popular in social site to help people make new friends and expand their social networks. However, the conventional friend recommendation method is low accuracy for the sparsity of data and col... 详细信息
来源: 评论
Improving neighbourhood quality for CHUCKY: An empirical study
收藏 引用
Journal of Computational Information systems 2015年 第16期11卷 5967-5977页
作者: Zhao, Fengda Yang, Ke Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Vulnerability discovery is at the centre of attention in computer security. Most vulnerability detection methods need considerable human auditing, thus making vulnerability detection inefficient and unreliable. Simila... 详细信息
来源: 评论
Analysis on impact of node failure in software execution network
收藏 引用
Journal of Computational Information systems 2015年 第6期11卷 2217-2225页
作者: He, Haitao Ren, Rong Zhang, Bing Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
One or few failure nodes will cause cascading failure in software network, which would bring about security issues. Thus, analyzing nodes becomes an indispensable aid in software security. In this paper, software exec... 详细信息
来源: 评论
Grid resource dynamic replication strategy based on access frequency and time cost
收藏 引用
Journal of Computational Information systems 2015年 第6期11卷 1973-1982页
作者: Zhang, Zhongping He, Long The School of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Data grid provides a large amount of computing resources and storage space to handle data-intensive applications. Because of the limitation of available resources and the production of large-scale workload in grid, th... 详细信息
来源: 评论
A novel approach to efficiently mine structural patterns from software execution sequence
收藏 引用
Journal of Computational Information systems 2015年 第3期11卷 1109-1119页
作者: Huang, Guoyan Zhang, Bing Ren, Rong Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Analyzing structure of a software system is not sufficient for understanding its functionality. Certain characteristics of software are often hidden in its structure and can only be discovered when the various executi... 详细信息
来源: 评论
Non-human-like characters' facial animation driven by one or two actors
收藏 引用
Journal of Information and Computational Science 2015年 第10期12卷 3937-3944页
作者: Tang, Yong Liu, Yuhan Guo, Dan Liang, Haiyan Luo, Yanqing Lv, Mengya College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
We present a novel system that can transfer facial expressions from an actor to a non-human-like character. Compared with a lot of previous studies, our system requires no special light conditions or facial markers fo... 详细信息
来源: 评论