咨询与建议

限定检索结果

文献类型

  • 163 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 163 篇 工学
    • 118 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 控制科学与工程
    • 9 篇 土木工程
    • 9 篇 生物工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 5 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 103 篇 理学
    • 79 篇 数学
    • 25 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 10 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
  • 72 篇 管理学
    • 50 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection
  • 2 篇 multi-valued dep...

机构

  • 60 篇 college of infor...
  • 43 篇 the key laborato...
  • 32 篇 school of inform...
  • 20 篇 key laboratory f...
  • 16 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 46 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 jin shunfu
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 201 篇 英文
  • 9 篇 中文
  • 1 篇 其他
检索条件"机构=Hebei Key Laboratory of Computer Virtual Technology and System Integration"
210 条 记 录,以下是61-70 订阅
排序:
Position Measurement Based Slave Torque Feedback Control for Teleoperation systems With Time-Varying Communication Delays
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 388-402页
作者: Xian Yang Jing Yan Changchun Hua Xinping Guan the Institute of Information Science and Engineering Yanshan University the Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004China IEEE the Institute of Electrical Engineering Yanshan UniversityQinhuangdao 066004China the Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Bilateral teleoperation system is referred to as a promising technology to extend human actions and intelligence to manipulating objects *** the tracking control of teleoperation systems,velocity measurements are nece... 详细信息
来源: 评论
Collosion detection research based on capsule bounding volume
收藏 引用
Journal of Computational Information systems 2014年 第7期10卷 2743-2750页
作者: Kong, Dehan Liu, Yongshan Cui, Na Department of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China The Data Industry Research Lab. Qinhuangdao 066004 China
A collision detection algorithm based on capsule bounding volume (CBV for short) is presented improve the efficiency of Collision detection in three-dimensional scene. This algorithm use CBV to encircle roles and achi... 详细信息
来源: 评论
A new estimator analysis method to synchronization among multivariate neural series of mild cognitive impairment
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第23期6卷 868-874页
作者: Wen, Dong Guan, Xinyong Chen, Ruihong The Key Laboratory for Computer Virtual Technology System Integration of HeBei Province Yanshan University Qinhuangdao Hebei 066004 China Liren College Yanshan University Qinhuangdao Hebei 066004 China Division of General Internal Medicine Xiantao First People's Hospital Xiantao Hubei 433000 China
Synchronization decay of resting state EEG has shown that cognitive dysfunction in mild cognitive impairment (MCI) was relevant to a loss of functional connectivity in intermediate frequency bands. A new estimator ana... 详细信息
来源: 评论
An algorithm based on bit vector decomposition and hash linklist for mining frequent patterns in data streams
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第22期6卷 570-579页
作者: Ren, Jiadong Zhang, Yuanyuan Yu, Shiying College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Hebei Provincial S and T Management Information Center 159 Dongfeng Road Shijiazhuang 050021 China
Most of algorithms based on bit vector for mining frequent pattern always produce candidate itemsets and scan the same data repeatedly;this increases the running time and the space consumption. In this paper, an algor... 详细信息
来源: 评论
Mining Important Functions in Software Network by Node Vulnerability  2
Mining Important Functions in Software Network by Node Vulne...
收藏 引用
2019 2nd International Conference on computer Information Science and Artificial Intelligence, CISAI 2019
作者: Zhang, Bing Sun, Shengting Hao, Xiaobing School of Information Science and Engineering Yanshan University Hebei Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City066004 China
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in differ... 详细信息
来源: 评论
Capacity planning of the registration server in cloud storage
收藏 引用
International Journal of High Performance systems Architecture 2017年 第2期7卷 105-112页
作者: Gu, Rui Jin, Shunfu Wu, Haixing School of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Avenue Qinhuangdao066004 China Science and Technology on Communication Networks Laboratory No. 589 West Zhongshan Road Shijiazhuang050081 China
Cloud storage is one of the key services in cloud computing. In order to appeal more users to the cloud storage, free cloud experience is provided to potential users. A registration server is set specially for intenti... 详细信息
来源: 评论
Adaptive multilevel meshes for cloth simulation
收藏 引用
Journal of Information and Computational Science 2014年 第11期11卷 3865-3872页
作者: Zhao, Jing Pei, Shanshan Lv, Mengya Li, Ying Tang, Yong Yang, Meiling Zhang, Mingmin Pan, Zhigeng The College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Qinhuangdao China The College of Computer Science and Technology Zhejiang University Hangzhou China Institute of Service Engineering Hangzhou Normal University Hangzhou China
A novel method based on multilevel meshes is proposed to simulate the cloth draping process rapidly on a complex model. Considering of the difficulty of computing the realtime collision between cloth and complex model... 详细信息
来源: 评论
Model for Software Behaviour Detection Based on Process Algebra and system Call
收藏 引用
China Communications 2013年 第11期10卷 24-36页
作者: 申利民 王涛 马川 College of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Hebei Normal University of Science and Technology
Behaviour detection models based on automata have been studied widely. By add- ing edge ε, the local automata are combined into global automata to describe and detect soft- ware behaviour. However, these methods in- ... 详细信息
来源: 评论
The study of a hierarchical hadoop architecture in multiple data centers environment
收藏 引用
Open Cybernetics and systemics Journal 2015年 第1期9卷 131-137页
作者: Shengtao, Sun Aizhi, Wu Xiaoyang, Liu School of Information Science and Engineering Yanshan University QinhuangdaoHebei066004 China College of Vehicles and Energy Yanshan University QinhuangdaoHebei066004 China Data Industry Research Institute Limited Company QinhuangdaoHebei066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei066004 China
Hadoop is a reasonable tool for cloud computing in big data era and MapReduce paradigm may be a highly successful programming model for large-scale data-intensive computing application, but the conventional MapReduce ... 详细信息
来源: 评论
A load balancing algorithm for multi-root ONS
收藏 引用
Journal of Computational Information systems 2014年 第7期10卷 2735-2742页
作者: Hao, Fengzhai Liu, Yongshan Chen, Wei College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao 066004 China Data Industry Research Lab. Qinhuangdao 066004 China
In order to solve the overload problem of root ONS in the EPC network, a load balancing algorithm based on multi-root ONS is proposed. Based on the proposed load balancing ONS (LB ONS) architecture, the ONS Root is de... 详细信息
来源: 评论