咨询与建议

限定检索结果

文献类型

  • 160 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 161 篇 工学
    • 117 篇 计算机科学与技术...
    • 85 篇 软件工程
    • 28 篇 信息与通信工程
    • 11 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 10 篇 生物工程
    • 9 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 控制科学与工程
    • 8 篇 土木工程
    • 7 篇 建筑学
    • 6 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
  • 104 篇 理学
    • 78 篇 数学
    • 27 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 11 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
  • 72 篇 管理学
    • 49 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 4 篇 临床医学
  • 4 篇 农学
    • 4 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 10 篇 clustering algor...
  • 6 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection
  • 2 篇 multi-valued dep...

机构

  • 58 篇 college of infor...
  • 42 篇 the key laborato...
  • 32 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 9 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 43 篇 ren jiadong
  • 15 篇 dong jun
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 8 篇 tang yong
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 gong jibing
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 6 篇 han gaowei
  • 6 篇 zhang zhongping
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 liu linlin

语言

  • 196 篇 英文
  • 11 篇 中文
  • 1 篇 其他
检索条件"机构=Hebei Key Laboratory of Computer Virtual Technology and SystemIntegration"
207 条 记 录,以下是41-50 订阅
排序:
Energy-efficient computation offloading via deep reinforcement learning in mobility-aware multi-access edge computing systems with diverse users
收藏 引用
Expert Systems with Applications 2025年 286卷
作者: Wu, Haixing Jin, Shunfu School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China
Multi-access Edge Computing (MEC) has been a promising solution that enables Internet of Things (IoT) devices to support computation-intensive applications by offloading some tasks to the network edge. However, most e... 详细信息
来源: 评论
An Ensemble Detection Method for Shilling Attacks Based on Features of Automatic Extraction
收藏 引用
China Communications 2019年 第8期16卷 130-146页
作者: Yaojun Hao Fuzhi Zhang Jinbo Chao School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004China Department of Computer Science and Technology Xinzhou Teachers UniversityXinzhou 034000China
Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extract... 详细信息
来源: 评论
Research on a Novel Influence Maximization Algorithm Based on Community Structure
Research on a Novel Influence Maximization Algorithm Based o...
收藏 引用
作者: Jing Chen Jiangchuan Liu College of Information Science and Engineering Yanshan University Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Software Engineering Laboratory in Hebei Province
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influ... 详细信息
来源: 评论
Research on the Influence of Improved K-shell Algorithm on Commodity Profit
Research on the Influence of Improved K-shell Algorithm on C...
收藏 引用
作者: Jing Chen Jincheng Huang College of Information Science and Engineering Yanshan University Key Laboratory for Computer Virtual Technology and system Integration of Hebei Province Software Engineering Laboratory in Hebei Province
In order to maximize the influence of commodity profits in e-commerce platforms, designing and improving the K-shell algorithm to select the more influential seed node sets in this paper. The new algorithm improves th... 详细信息
来源: 评论
Communication-Based Attacks Detection in Android Applications
收藏 引用
Tsinghua Science and technology 2019年 第5期24卷 596-614页
作者: Chuan Ma Tao Wang Limin Shen Dongkui Liang Shuping Chen Dianlong You School of In formation Science and Engineering Yanshan University the Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China School of Business Ad mi nisliatiom Hebei Normal University of Science and Technology. Qinhuangdao 066004 China Library of Yanshan University. Yanshan University Qinhuangdao 066004 China
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... 详细信息
来源: 评论
A PSO Based Multi-Domain virtual Network Embedding Approach
收藏 引用
China Communications 2019年 第4期16卷 105-119页
作者: Yongjing Ni Guoyan Huang Sheng Wu Chenxi Li Peiying Zhang Haipeng Yao College of Information Science and Engineering Yanshan University College of Information Science and Engineering Hebei University of Science and Technology The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University School of Information and Communication Engineering Beijing University of Posts and Telecommunications College of Computer & Communication Engineering China University of Petroleum (East China)
This paper proposed a multi-domain virtual network embedding algorithm based on multi-controller SDN architecture. The local controller first selects candidate substrate nodes for each virtual node in the domain. Then... 详细信息
来源: 评论
Multi-Update Patterns and Validity Verification for Robust Visual Tracking
收藏 引用
Journal of computers (Taiwan) 2020年 第4期31卷 77-90页
作者: Wen, Jia Wang, Hong-Jun Li, Yan-Nan Zhao, Ji-Wei Yang, Yu-Ying School of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China Key Laboratory of Software Engineering of Hebei Province China
The Object tracking is a challenging problem in computer vision field. Now, deep learning has made outstanding achievements in feature extraction. There are already some examples of deep learning applications in visua... 详细信息
来源: 评论
SIGAN: A novel image generation method for solar cell defect segmentation and augmentation
arXiv
收藏 引用
arXiv 2021年
作者: Su, Binyi Zhou, Zhong Chen, Haiyong Cao, Xiaochun State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing100191 China School of Artificial Intelligence and Data Science Hebei University of Technology Tianjin300130 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Peng Cheng Laboratory Shenzhen518055 China
Solar cell electroluminescence (EL) defect segmentation is an interesting and challenging topic. Many methods have been proposed for EL defect detection, but these methods are still unsatisfactory due to the diversity... 详细信息
来源: 评论
Local outlier detection algorithm based on gaussian kernel density function  10th
Local outlier detection algorithm based on gaussian kernel d...
收藏 引用
10th International Symposium on Intelligence Computation and Applications, ISICA 2018
作者: Zhang, Zhongping Liu, Jiaojiao Miao, Chuangye School of Information Science and Engineering Yanshan University QinhuangdaoHebei066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei066004 China
With the rapid development of information technology, the structure of data resources is becoming more and more complex, and outlier mining is attracting more and more attention. Based on Gaussian kernel function, thi... 详细信息
来源: 评论
Mining important nodes in complex software network based on ripple effects of probability  19
Mining important nodes in complex software network based on ...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Ren, Jiadong Huang, Guoyan Wang, Qian He, Haitao Liu, Xinqian Zhao, Xiaolin Computer Virtual Technology and System Integration Laboratory of Hebei Province College of Information Science and Engineering Yanshan University Qinhuangdao Hebei China Beijing Key Laboratory of Software Security Engineering Technology School of Computer Science and Technology Beijing Institute of Technology Beijing China
The complexity of software directly leads to an increasing cost in software testing and maintenance. Finding the important nodes with significant vulnerability is helpful for fault discovery and further reduces the da... 详细信息
来源: 评论