咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 52 篇 会议

馆藏范围

  • 221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 177 篇 工学
    • 127 篇 计算机科学与技术...
    • 92 篇 软件工程
    • 30 篇 信息与通信工程
    • 12 篇 生物工程
    • 11 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 控制科学与工程
    • 10 篇 土木工程
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 111 篇 理学
    • 82 篇 数学
    • 27 篇 统计学(可授理学、...
    • 17 篇 生物学
    • 13 篇 物理学
    • 9 篇 化学
    • 7 篇 系统科学
  • 78 篇 管理学
    • 54 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 12 篇 法学
    • 12 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 7 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 database systems

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 37 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 state key lab of...

作者

  • 44 篇 ren jiadong
  • 15 篇 dong jun
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 10 篇 he haitao
  • 9 篇 gong jibing
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 gu xiaoying

语言

  • 211 篇 英文
  • 9 篇 中文
  • 2 篇 其他
检索条件"机构=Key Lab for Computer Virtual Technology and System Integration"
221 条 记 录,以下是61-70 订阅
排序:
Semantic recommendation through Reinforcement Learning and weighted meta-paths
Semantic recommendation through Reinforcement Learning and w...
收藏 引用
2022 International Conference on Electronic Information Engineering, Big Data, and computer technology, EIBDCT 2022
作者: Yu, Jing Lang, Yue Li, Xuewen Zhang, Jin Zheng, Shaojie Gong, Jibing School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Key Laboratory for Software Engineering of Hebei Province Yanshan University Qinhuangdao066004 China
Explainable recommendation systems, which can produce high-accuracy recommendations and help users make quick decisions, have become a hotspot in research field. Most of existing research algorithms committed to impro... 详细信息
来源: 评论
A metadata extraction approach from papers based on meta-learning
收藏 引用
Journal of Information and Computational Science 2013年 第4期10卷 1121-1129页
作者: Zhang, Fuzhi Zhao, Zihao School of Information Science and Engineering The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao 066004 China
To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support... 详细信息
来源: 评论
Design of Irregular QC-LDPC Code Based Multi-Level Coded Modulation Scheme for High Speed Optical Communication systems
收藏 引用
China Communications 2019年 第5期16卷 106-120页
作者: Liqian Wang Dongdong Wang Yongjing Ni Xue Chen Midou Cui Fu Yang Beijing University of Posts and Telecommunications Beijing 100876China The 54th Research Institute of China Electronics Technology Group Corporation Shijiazhuang 050081China Science and Technology on Communication Networks Laboratory Shijiazhuang 050081China College of Information Science and Engineering Yanshan UniversityQinhuangdao 066000China College of Information Science and Engineering Hebei University of Science and TechnologyShijiazhuang 050000China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao 066000China
In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC compon... 详细信息
来源: 评论
Opnet: Deep Occlusion Perception Network with Boundary Awareness for Amodal Instance Segmentation
Opnet: Deep Occlusion Perception Network with Boundary Aware...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shihui Zhang Ziteng Xue Yuhong Jiang Houlin Wang School of Information Science and Engineering Yanshan University Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
The Amodal Instance Segmentation (AIS) task aims to infer the visible and occluded regions of an object instance. Existing AIS methods typically focus on directly predicting visible and occluded regions or leveraging ...
来源: 评论
Robust Recommendation Method Based on Shilling Attack Detection and Matrix Factorization Model
Robust Recommendation Method Based on Shilling Attack Detect...
收藏 引用
2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)
作者: Yu-qi HU Kai LIU Fu-zhi ZHANG School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and mat... 详细信息
来源: 评论
Research on Router Algorithm Based on Trust Primary Node in the Environment of P2P Network
Research on Router Algorithm Based on Trust Primary Node in ...
收藏 引用
2015 International Conference on Informatics, Control and Automation(ICA 2015)
作者: Jing CHEN Yun WAN Department of Computer College of Information Science and EngineeringYanshan University Key Laboratory of Computer Virtual Technology and System Integration of Hebei Province
The distributed, heterogeneous and anonymous attribute of P2 P networks make the node information sharing facing security problems. In order to prevent malicious and false service of nodes, and improve the retrieval e... 详细信息
来源: 评论
Research on community detection in social network based on Pairwise Merging
收藏 引用
Journal of Computational Information systems 2015年 第19期11卷 7079-7086页
作者: Chen, Jing Wan, Yun Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China College of Information Science and Engineering Yanshan University Qinhuangdao China
Community detection has become an important challenge during the past decade. Network is divided into some groups or communities that are densely connected to each other inside while less connected to the nodes outsid... 详细信息
来源: 评论
Software fault localization via mining program dynamic execution graph
收藏 引用
Journal of Computational Information systems 2014年 第19期10卷 8563-8573页
作者: Zhang, Kai Yang, Ke Zhou, Lianbo Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining... 详细信息
来源: 评论
Community detection algorithm in signed social networks based on statistics and merger
收藏 引用
Journal of Information and Computational Science 2015年 第15期12卷 5589-5599页
作者: Guo, Jingfeng Zhao, Yue Hu, Xinzhuan Liu, Yuanying College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Researches on community detection in signed social networks focus on the assignment of positive and negative edges. However, the community detection approaches that positive and negative edges are handled separately i... 详细信息
来源: 评论
Graph-dissimilar-detect: dissimilar path detecting in complex software behavior network based on time-interval weight and dissimilarity
收藏 引用
Journal of Computational Information systems 2015年 第2期11卷 535-545页
作者: Ren, Jiadong Li, Weina Han, Gaowei College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Dissimilar path detection is an important task in software behavior detection. Previous dissimilar path mining algorithms ignore time-interval weight and dissimilarity. Therefore, a dissimilar path detecting algorithm... 详细信息
来源: 评论