咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,598 篇 期刊文献

馆藏范围

  • 3,491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,306 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 108 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 46 篇 security
  • 46 篇 cryptography

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 47 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,955 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3491 条 记 录,以下是2771-2780 订阅
排序:
IMSPMIS-Stream: incremental mining of top-k short sequential pattern over multiple item set streams
收藏 引用
Journal of Computational information Systems 2014年 第6期10卷 2305-2312页
作者: Hao, Xiaobing Han, Gaowei Chen, Yuping Wang, Peilong Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Many previous algorithms in data streams are about single stream, which can only process single items. The algorithms about data streams are always extended by sequential pattern algorithms about static database, they... 详细信息
来源: 评论
Density-based clustering for evolving uncertain data stream
收藏 引用
Journal of Computational information Systems 2014年 第1期10卷 419-426页
作者: He, Haitao Zhao, Jintian The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China
The current clustering algorithms for evolving uncertain data stream are sensitive to user specified threshold, and unstable in noise processing. In this paper, DUStream is presented, a density-based algorithm for dis... 详细信息
来源: 评论
Robust recommendation algorithm based on user rating matrix block and modified LTS-estimator
收藏 引用
Journal of information and Computational Science 2014年 第6期11卷 1889-1898页
作者: Xu, Yuchen Liu, Zhen Zhang, Fuzhi School of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
The most widely-used collaborative recommendation algorithms are vulnerable to shilling attacks. To this end, in this paper we propose a robust recommendation algorithm based on user rating matrix block and modified L... 详细信息
来源: 评论
XGRouter: high-quality global router in X-architecture with particle swarm optimization
收藏 引用
Frontiers of computer Science 2015年
作者: Liu, Genggeng Guo, Wenzhong Li, Rongrong Niu, Yuzhen Chen, Guolong College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
This paper presents a high-quality very large scale integration (VLSI) global router in X-architecture, called XGRouter, that heavily relies on integer linear programming (ILP) techniques, partition strategy and parti... 详细信息
来源: 评论
Sequential pattern mining with gap constraints for discovery of the software bug features
收藏 引用
Journal of Computational information Systems 2014年 第2期10卷 673-680页
作者: Zeng, Qiang Chen, Yuping Han, Gaowei Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
In order to process the software bug feature sequences, this paper presents a gap-constrained sequential pattern mining algorithm, MEMIGCSP algorithm. The length of the interval between items is limited in the origina... 详细信息
来源: 评论
Darwintree: A molecular data analysis and application environment for phylogenetic study
Darwintree: A molecular data analysis and application enviro...
收藏 引用
作者: Meng, Zhen Dong, Hui Li, Jianhui Chen, Zhiduan Zhou, Yuanchun Wang, Xuezhi Zhang, Shouzhou Scientific Data Center Computer Network Information Center Chinese Academy of Sciences 4 4th South Street Zhongguancun Haidian District Beijing100190 China Key Laboratory of Southern Subtropical Plant Diversity Fairylake Botanical Garden Shenzhen and Chinese Academy of Sciences 160 Xianhu Rd. Luohu District Shenzhen518004 China State Key Laboratory of Systematic and Evolutionary Botany Institute of Botany Chinese Academy of Sciences 20 Nanxincun Xiangshan Beijing100093 China
DarwinTree (http://***) provides an integrated bioinformatics platform that supports all phases of the analytical pathway for phylogenetic study from data collections, phylogenetic tree constructions, visualization of... 详细信息
来源: 评论
Defect inspection for TFT-LCD images based on the low-rank matrix reconstruction
收藏 引用
Neurocomputing 2015年 149卷 1206-1215页
作者: Yi-Gang Cen Rui-Zhen Zhao Li-Hui Cen Li-Hong Cui Zhen-Jiang Miao Zhe Wei School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China School of Information Science and Engineering Central South University Changsha Hunan 410083 China Department of Mathematics Beijing University of Chemical Technology Beijing 100029 China Electrical and Computer Engineering McMaster University Ontario Canada
Surface defect inspection of TFT-LCD panels is a critical task in LCD manufacturing. In this paper, an automatic defect inspection method based on the low-rank matrix reconstruction is proposed. The textured backgroun... 详细信息
来源: 评论
Mining important nodes in directed-weighted software network based on semi-global structure information
收藏 引用
ICIC Express Letters 2015年 第10期9卷 2859-2866页
作者: Ren, Jiadong Wu, Hongfei Yin, Tengteng Liu, Yang He, Haitao College of Information Science and Engineering Yanshan University No. 438 West Hebei Ave. Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 West Hebei Ave. Qinhuangdao China
Software’s control flow graph can be treated as a complex software network, and a tiny fraction of key function nodes has considerable influence on the stability, reliability and robustness of the network. Identifyin... 详细信息
来源: 评论
A feature selection algorithm based on Hoeffding inequality and mutual information
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第11期8卷 433-444页
作者: Yin, Chunyong Feng, Lu Ma, Luyu Yin, Zhichao Wang, Jin School of Computer and Software Jiangsu Key Laboratory of Meteorological Observation and Information Processing Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School Nanjing China
With the rapid development of the Internet, the application of data mining in the Internet is becoming more and more extensive. However, the data source’s complex feature redundancy leads that data mining process bec... 详细信息
来源: 评论
Friends recommendation with rating side information
收藏 引用
Open Cybernetics and Systemics Journal 2015年 第1期9卷 807-815页
作者: Hu, Xiang Wang, Wengdong Gong, Xiangyang Wang, Bai Que, Xirong Xia, Hongke State Key Laboratory of Network and Switching Beijing University of Posts and Telecommunications Beijing100876 China School Of Control And Computer Engineering North China Electric Power University Beijing102206 China Computer School Beijing Information Science & Technology University Beijing100101 China
With the broad application of web 2.0 technology, various kinds of online social networks arise at present. The emergence of social networks not only helps the public to facilitate the sharing and communicating, but a... 详细信息
来源: 评论