咨询与建议

限定检索结果

文献类型

  • 165 篇 期刊文献
  • 52 篇 会议

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 172 篇 工学
    • 123 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 30 篇 信息与通信工程
    • 12 篇 生物工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 土木工程
    • 8 篇 动力工程及工程热...
    • 8 篇 控制科学与工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 建筑学
    • 7 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
  • 110 篇 理学
    • 81 篇 数学
    • 27 篇 统计学(可授理学、...
    • 17 篇 生物学
    • 13 篇 物理学
    • 9 篇 化学
    • 7 篇 系统科学
  • 77 篇 管理学
    • 53 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 12 篇 法学
    • 12 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 7 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 database systems
  • 2 篇 detection

机构

  • 61 篇 college of infor...
  • 42 篇 the key laborato...
  • 34 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 state key lab of...

作者

  • 44 篇 ren jiadong
  • 15 篇 dong jun
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 10 篇 he haitao
  • 9 篇 gong jibing
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 6 篇 zhang zhongping
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 gu xiaoying

语言

  • 207 篇 英文
  • 9 篇 中文
  • 2 篇 其他
检索条件"机构=Key Lab for Computer Virtual Technology and System Integration"
217 条 记 录,以下是21-30 订阅
A virtualized data center energy-saving mechanism based on switching operating mode of physical servers and reserving virtual machines
A virtualized data center energy-saving mechanism based on s...
收藏 引用
作者: Yin, Chunxia Liu, Jian Jin, Shunfu College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China Ocean College of Hebei Agricultural University Qinhuangdao China Institute of Computing Technology Chinese Academy of Sciences Beijing China
The energy consumption of virtualized data centers has grown very fast in last several years. Because a large number of hosts are running in an idle state, virtualized data centers waste a large amount of electric ene... 详细信息
来源: 评论
Reinforced Heterogeneous Graphlet Design for Knowledge Graph Representation Learning
SSRN
收藏 引用
SSRN 2023年
作者: Gong, Jibing Lin, Yuting Zhao, Yi Lin, Tianyu Fang, Xiaohan Feng, Xinchao Peng, Jiquan School of Information Science and Engineering Yanshan University Qinhuangdao066004 China The Key Laboratory for Computer Virtual Technology System Integration of Hebei Province Yanshan University Qinhuangdao066004 China
Knowledge Graphs have been practical tools to represent and integrate plentiful structural and semantic information in mainstream industrial scenarios. While promising, the heterogeneity and complexity of KGs pose a f... 详细信息
来源: 评论
Learning to Cluster Person in the Video via Graph Convolution Network
Learning to Cluster Person in the Video via Graph Convolutio...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Wei Li Sixin Liang Ang Bian Guodong Du College of Computer Science Sichuan University Chengdu China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Yanshan University Qinhuangdao P.R. China
Video person re-identification is receiving academic interest. However, the practical application of the algorithm is hardly supported because of prohibitive annotated data. Hence, the study for unlabeled data will le...
来源: 评论
Automatic web page data extraction through MD5 trigeminal tree and improved BIRCH
Automatic web page data extraction through MD5 trigeminal tr...
收藏 引用
2022 International Conference on Electronic Information Engineering, Big Data, and computer technology, EIBDCT 2022
作者: Gong, Jibing Kou, Xiaomeng Zhang, Hanyun Peng, Jiquan Gong, Shishan Wang, Shuli School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Key Laboratory for Software Engineering of Hebei Province Yanshan University Qinhuangdao066004 China School of Information Science Yanshan University Qinhuangdao066004 China
This paper proposes an automatic data extraction algorithm for web pages based on noise reduction and visualization blocks' construction. In this algorithm, we first build an MD5 trigeminal tree of the web page... 详细信息
来源: 评论
BAT: Mining Binary-API Topic for Multi-service Application Development
BAT: Mining Binary-API Topic for Multi-service Application D...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Pengfei He Linlin Liu Dianlong You Limin Shen Zhen Chen School of Information Science and Engineering Yanshan University Qinhuangdao China National Science Libraries Chinese Academy of Sciences Beijing China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
With the growing popularity of API-driven multiservice application (mashup) development, the burgeoning web APIs have left developers drowning in the sea of web API selections. Matching developers with the most approp...
来源: 评论
Optimal Subspace Analysis Based on Information-Entropy Increment  1
收藏 引用
8th China computer Federation International Conference on Big Data, CCF BIGDATA 2020
作者: Zhang, Zhongping Liu, Iiaojiao Zhang, Yuting Zhang, Jiyao Tian, Mingru College of Information Science and Engineering Yanshan University Qinhuangdao066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Hebei Education Examinations Authority Shijiazhuang050000 China
The data structure is becoming more and more complex, and the scale of the data set is getting larger and larger. The strong limitations and instability in the high-dimensional data environment is showed in traditiona... 详细信息
来源: 评论
Research on Software Community Division Method Based on Inter-node Dependency  16th
Research on Software Community Division Method Based on Inte...
收藏 引用
16th International Conference on Intelligent Computing, ICIC 2020
作者: Dong, Jun Hao, Chengqian Ren, Jiadong Lu, Haitao College of Information Science and Engineering Yanshan University Qinhuangdao066000 China The Key Computer Virtual Technology and System Integration Laboratory of Hebei Province Qinhuangdao066000 China
The mining of software community structure is of great significance in identifying software design pattern, software maintenance, software security and optimizing software structure. To improve the accuracy of descrip... 详细信息
来源: 评论
Mining Important Functions in Software Network by Node Vulnerability  2
Mining Important Functions in Software Network by Node Vulne...
收藏 引用
2019 2nd International Conference on computer Information Science and Artificial Intelligence, CISAI 2019
作者: Zhang, Bing Sun, Shengting Hao, Xiaobing School of Information Science and Engineering Yanshan University Hebei Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City066004 China
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in differ... 详细信息
来源: 评论
Transferable targeted adversarial attack via multi-source perturbation generation and integration
收藏 引用
Journal of Visual Communication and Image Representation 2025年 111卷
作者: Shihui Zhang Shaojie Han Sheng Yang Xueqiang Han Junbin Su Gangzheng Zhai Houlin Wang School of Information Science and Engineering Yanshan University Qinhuangdao Hebei China Hebei Key Laboratory of Computer Virtual Technology and System Integration Qinhuangdao Hebei China
With the rapid development of artificial intelligence, deep learning models have been applied in the field of society (e.g., video or image representation). However, due to the presence of adversarial examples, these ...
来源: 评论
A New Dynamic Routing Network for Monocular Depth Estimation  12
A New Dynamic Routing Network for Monocular Depth Estimation
收藏 引用
12th International Conference on CYBER technology in Automation, Control, and Intelligent systems, CYBER 2022
作者: Luo, Zhehao Luo, Sijin Liang, Guoyuan Wu, Xinyu Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Province Shenzhen China University of Chinese Academy of Sciences Beijing China Guangdong-Hong Kong-Macao Joint Laboratory of Human-Machine Intelligence-Synergy Systems Chinese Academy of Sciences Guangdong Province Shenzhen China Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Province Shenzhen China
Depth estimation is an essential task for understanding the geometry of 3D scenes. Compared with multi-view-based methods, monocular depth estimation is more challenging for the requirement of integrating not only glo... 详细信息
来源: 评论