咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 161 篇 工学
    • 117 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 29 篇 信息与通信工程
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 生物工程
    • 9 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 控制科学与工程
    • 8 篇 土木工程
    • 7 篇 建筑学
    • 5 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
  • 104 篇 理学
    • 78 篇 数学
    • 26 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 11 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
  • 71 篇 管理学
    • 50 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 4 篇 临床医学
  • 4 篇 农学
    • 4 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 10 篇 clustering algor...
  • 6 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection
  • 2 篇 multi-valued dep...

机构

  • 58 篇 college of infor...
  • 44 篇 the key laborato...
  • 32 篇 school of inform...
  • 20 篇 key laboratory f...
  • 16 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 yanshan universi...
  • 4 篇 college of infor...
  • 4 篇 hebei key labora...

作者

  • 43 篇 ren jiadong
  • 15 篇 dong jun
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 jin shunfu
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 6 篇 han gaowei
  • 6 篇 zhang zhongping
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 liu linlin

语言

  • 194 篇 英文
  • 11 篇 中文
  • 5 篇 其他
检索条件"机构=Hebei Key Laboratory of Computer Virtual Technology and SystemIntegration"
208 条 记 录,以下是191-200 订阅
排序:
A RIHS-tree-based algorithm of mining frequent closed itemsets in high dimensional datasets
收藏 引用
Journal of Convergence Information technology 2012年 第21期7卷 467-476页
作者: Huang, Guoyan Chen, Shuai Ren, Shenyuan Dong, Jun College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China College of Computer Science Sichuan University Chengdu Sichuan 610000 China
In order to fully utilize the minimum support threshold to prune the rowset search space and avoid scanning the whole dataset in close-checking, we proposed two new data structure, Rowset-Itemset-Hybrid-Search-Tree (R... 详细信息
来源: 评论
An identity authentication algorithm in the object name service of the internet of things for heat meter
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第22期4卷 174-181页
作者: Han, Yuanyuan Liu, Yongshan Chen, Wei Liu, Chang Shang, Xuehui Lv, Yongteng The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Qinhuangdao City 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao City 066004 China
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication alg... 详细信息
来源: 评论
A new estimator analysis method to synchronization among multivariate neural series of mild cognitive impairment
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第23期6卷 868-874页
作者: Wen, Dong Guan, Xinyong Chen, Ruihong The Key Laboratory for Computer Virtual Technology System Integration of HeBei Province Yanshan University Qinhuangdao Hebei 066004 China Liren College Yanshan University Qinhuangdao Hebei 066004 China Division of General Internal Medicine Xiantao First People's Hospital Xiantao Hubei 433000 China
Synchronization decay of resting state EEG has shown that cognitive dysfunction in mild cognitive impairment (MCI) was relevant to a loss of functional connectivity in intermediate frequency bands. A new estimator ana... 详细信息
来源: 评论
An algorithm based on bit vector decomposition and hash linklist for mining frequent patterns in data streams
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第22期6卷 570-579页
作者: Ren, Jiadong Zhang, Yuanyuan Yu, Shiying College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Hebei Provincial S and T Management Information Center 159 Dongfeng Road Shijiazhuang 050021 China
Most of algorithms based on bit vector for mining frequent pattern always produce candidate itemsets and scan the same data repeatedly;this increases the running time and the space consumption. In this paper, an algor... 详细信息
来源: 评论
A novel grouping aggregation algorithm for online analytical processing
收藏 引用
2012 National Conference on Information technology and computer Science, CITCS 2012
作者: Chen, Wei Liu, Yongshan Wang, Ning College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Qinhuangdao China
As regard to improve the efficiency of grouping aggregation calculation, the data is compressed by using binary encoding, and the dimension hierarchical grouping attribute set encodings of each dimension table are cal... 详细信息
来源: 评论
Multi-resolution terrain rendering seamlessly by function curve fitting
收藏 引用
Journal of Computational Information Systems 2012年 第24期8卷 10399-10409页
作者: Nie, Junlan Guo, Dongliang Kong, Lingfu Wang, Yanfen The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao 066004 China
During the process of real-time multi-resolution terrain rendering, avoiding cracks between LOD (Level of Detail) has always been a tedious task that requires extra complicated handling. In this paper, we propose a no... 详细信息
来源: 评论
An algorithm based on compressed tree and bit vector table for mining frequent patterns on uncertain data streams
收藏 引用
Journal of Convergence Information technology 2012年 第20期7卷 389-398页
作者: Dong, Jun Zhang, Yuanyuan Song, Wei Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
Most of algorithms based on tree structure for mining frequent pattern on uncertain data streams always store a large number of tree nodes, and record the corresponding information of data streams which can cause mass... 详细信息
来源: 评论
The effects of DHPG stimulation on spikes and theta frequency oscillations and spike-theta oscillation relations in rat MSDB slice
收藏 引用
Journal of Convergence Information technology 2012年 第17期7卷 442-449页
作者: Wen, Dong Ouyang, Gaoxiang Peng, Ce Li, Xiaoli Lu, Chengbiao Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Qinhuangdao Hebei China Institue of Electrical Engineering Yanshan University Qinhuangdao Hebei China National Key Laboratory of Cognitive Neuroscience and Learning Beijing Normal University Beijing 100088 China
Neuronal oscillations in the theta frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi... 详细信息
来源: 评论
virtual grid-based clustering of uncertain data on vulnerability database
收藏 引用
Journal of Convergence Information technology 2012年 第20期7卷 429-438页
作者: Dong, Jun Cao, Mengmeng Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Most existing vulnerability taxonomy classifies vulnerabilities by their idiosyncrasies, weaknesses, flaws and faults et al. The disadvantage of the taxonomy is that the classification standard is not unified and ther... 详细信息
来源: 评论
An algorithm based on bit complementary tree for mining closed frequent itemsets
收藏 引用
International Journal of Advancements in Computing technology 2012年 第22期4卷 427-435页
作者: Ren, Jiadong Yang, Xuan Dong, Jun College of Information Science and Engineering Yanshan University Qinhuangdao City066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
In recent years, closed frequent itemsets mining has become a hot topic. In this paper, we present an algorithm BCTCF, which is based on Bit complementary tree (BCTree) in order to mine closed frequent itemsets effici... 详细信息
来源: 评论