咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 52 篇 会议

馆藏范围

  • 221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 177 篇 工学
    • 127 篇 计算机科学与技术...
    • 92 篇 软件工程
    • 30 篇 信息与通信工程
    • 12 篇 生物工程
    • 11 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 控制科学与工程
    • 10 篇 土木工程
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 111 篇 理学
    • 82 篇 数学
    • 27 篇 统计学(可授理学、...
    • 17 篇 生物学
    • 13 篇 物理学
    • 9 篇 化学
    • 7 篇 系统科学
  • 78 篇 管理学
    • 54 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 12 篇 法学
    • 12 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 7 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 database systems

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 37 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 state key lab of...

作者

  • 44 篇 ren jiadong
  • 15 篇 dong jun
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 10 篇 he haitao
  • 9 篇 gong jibing
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 gu xiaoying

语言

  • 211 篇 英文
  • 9 篇 中文
  • 2 篇 其他
检索条件"机构=Key Lab for Computer Virtual Technology and System Integration"
221 条 记 录,以下是81-90 订阅
排序:
ENHANCING TWITTER BOT DETECTION VIA MULTIMODAL INVARIANT REPRESENTATIONS
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Jibing Peng, Jiquan Qu, Jin Du, ShuYing Wang, Kaiyu School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China
Detecting Twitter Bots is crucial for maintaining the integrity of online discourse, safeguarding democratic processes, and preventing the spread of malicious propaganda. However, advanced Twitter Bots today often emp... 详细信息
来源: 评论
Real-time simulation of action-driven 3D subtle facial expressions
收藏 引用
Journal of Computational Information systems 2014年 第5期10卷 2137-2144页
作者: Tang, Yong Liang, Haiyan Guo, Dan Lv, Mengya Zhao, Jing College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
While the large-scale deformations such as the Laplacian deformation method could not synthesize new expressional details, this paper proposes a method for simulating different subtle facial expressions based on the K... 详细信息
来源: 评论
IMSPMIS-Stream: incremental mining of top-k short sequential pattern over multiple item set streams
收藏 引用
Journal of Computational Information systems 2014年 第6期10卷 2305-2312页
作者: Hao, Xiaobing Han, Gaowei Chen, Yuping Wang, Peilong Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Many previous algorithms in data streams are about single stream, which can only process single items. The algorithms about data streams are always extended by sequential pattern algorithms about static database, they... 详细信息
来源: 评论
Research of Signed Networks Community Detection Based on the Tightness of Common Neighbors  6
Research of Signed Networks Community Detection Based on the...
收藏 引用
6th International Conference on Digital Home, ICDH 2016
作者: Xinzhuan, Hu Guo, Jingfeng Chen, Xiao Zhao, Xiaomeng School of Economics and Management Yanshan University Hebei Ave. Qinhuangdao China College of Information Science and Engineering Yanshan University Hebei Ave. Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Hebei Ave. Qinhuangdao China
According to the characteristics of positive and negative edge of signed networks, a new signed networks community detection algorithm BTCN-SNCD (Signed networks Community Detection Based on the Tightness of Common Ne... 详细信息
来源: 评论
Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling  5th
Mobile APP User Attribute Prediction by Heterogeneous Inform...
收藏 引用
5th International Conference on Dependability in Sensor, Cloud, and Big Data systems and Applications, DependSys 2019
作者: Zhang, Hekai Gong, Jibing Teng, Zhiyong Wang, Dan Wang, Hongfei Du, Linfeng Bhuiyan, Zakirul Alam School of Information Science and Engineering Yanshan University Qinhuangdao066004 China The Key Lab for Computer Virtual Technology and System Integration Yanshan University Qinhuangdao066004 China School of Computer Science and Engineering Beihang University Beijing100191 China Shenyuan Honors College Beihang University Beijing100191 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214000 China Department of Computer and Information Sciences Fordham University New York United States
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv... 详细信息
来源: 评论
Mining time-interval weighted closed sequential patterns based on memory indexing
收藏 引用
Journal of Computational Information systems 2014年 第1期10卷 293-300页
作者: Zeng, Qiang Chen, Dengxi Ren, Jiadong Han, Gaowei College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
General weighted sequential pattern mining algorithms ignore or do not make good use of the time and time-interval information of data elements. Besides some algorithms require to scan the database many times or build... 详细信息
来源: 评论
An energy-efficient routing algorithm of zigbee network
收藏 引用
Journal of Computational Information systems 2012年 第23期8卷 9873-9879页
作者: Liu, Yongshan Chen, Wei Shang, Xuehui Lv, Yongteng Han, Yuanyuan Liu, Chang College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
As regard to the case of extending the lifetime of zigbee network, the defination of node's boundary is proposed. First, all the information for node's boundary is stored when zigbee network is built. Then, th... 详细信息
来源: 评论
Robust recommendation algorithm based on user rating matrix block and modified LTS-estimator
收藏 引用
Journal of Information and Computational Science 2014年 第6期11卷 1889-1898页
作者: Xu, Yuchen Liu, Zhen Zhang, Fuzhi School of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
The most widely-used collaborative recommendation algorithms are vulnerable to shilling attacks. To this end, in this paper we propose a robust recommendation algorithm based on user rating matrix block and modified L... 详细信息
来源: 评论
Density-based clustering for evolving uncertain data stream
收藏 引用
Journal of Computational Information systems 2014年 第1期10卷 419-426页
作者: He, Haitao Zhao, Jintian The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China
The current clustering algorithms for evolving uncertain data stream are sensitive to user specified threshold, and unstable in noise processing. In this paper, DUStream is presented, a density-based algorithm for dis... 详细信息
来源: 评论
virtual grid-based clustering of uncertain data on vulnerability database
收藏 引用
Journal of Convergence Information technology 2012年 第20期7卷 429-438页
作者: Dong, Jun Cao, Mengmeng Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Most existing vulnerability taxonomy classifies vulnerabilities by their idiosyncrasies, weaknesses, flaws and faults et al. The disadvantage of the taxonomy is that the classification standard is not unified and ther... 详细信息
来源: 评论