咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 48 篇 会议

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 172 篇 工学
    • 124 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 27 篇 信息与通信工程
    • 11 篇 机械工程
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 控制科学与工程
    • 10 篇 生物工程
    • 9 篇 土木工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 材料科学与工程(可...
  • 108 篇 理学
    • 81 篇 数学
    • 25 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
  • 75 篇 管理学
    • 52 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 35 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 46 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 207 篇 英文
  • 10 篇 中文
  • 1 篇 其他
检索条件"机构=Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province"
217 条 记 录,以下是61-70 订阅
排序:
A novel collaborative recommendation algorithm integrating probabilistic matrix factorization and neighbor model
收藏 引用
Journal of Information and Computational Science 2015年 第5期12卷 2011-2019页
作者: Yu, Hongtao Dou, Lisha Zhang, Fuzhi The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Yanshan University Qinhuangdao China
The existing collaborative recommendation algorithms suffer from lower recommendation precision due to the problem of data sparsity. To solve this problem, we propose a novel collaborative recommendation algorithm whi... 详细信息
来源: 评论
The synthesis of dynamic junction over-constrained parallel-parallel mechanism based on the weighted directed graph theory
收藏 引用
ICIC Express Letters 2013年 第11期7卷 3057-3065页
作者: Guo, Xijuan Zhang, Dayu Geng, Qingjia Zhang, Wenyuan The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China
Several dynamic junction over-constrained parallel-parallel mechanisms are proposed in this paper with a new method based on graph theory synthesis. This kind of mechanism is the pivotal part of the equivalent mechani... 详细信息
来源: 评论
Robust recommendation algorithm based on the identification of suspicious users and matrix factorization
收藏 引用
Journal of Information and Computational Science 2014年 第13期11卷 4769-4777页
作者: Yi, Huawei Zhang, Fuzhi Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Yanshan University Qinhuangdao China
The existing recommendation algorithms have lower robustness against shilling attacks. With this in mind, in this paper we propose a robust recommendation algorithm based on the identification of suspicious users and ... 详细信息
来源: 评论
Automatic web page data extraction through MD5 trigeminal tree and improved BIRCH
Automatic web page data extraction through MD5 trigeminal tr...
收藏 引用
2022 International Conference on Electronic Information Engineering, Big Data, and computer technology, EIBDCT 2022
作者: Gong, Jibing Kou, Xiaomeng Zhang, Hanyun Peng, Jiquan Gong, Shishan Wang, Shuli School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Key Laboratory for Software Engineering of Hebei Province Yanshan University Qinhuangdao066004 China School of Information Science Yanshan University Qinhuangdao066004 China
This paper proposes an automatic data extraction algorithm for web pages based on noise reduction and visualization blocks' construction. In this algorithm, we first build an MD5 trigeminal tree of the web page... 详细信息
来源: 评论
New construction of quaternary sequence pairs with even period
收藏 引用
Journal of Information and Computational Science 2014年 第13期11卷 4613-4621页
作者: Jia, Yanguo Shi, Yan Duan, Xiaobei Shen, Xiumin Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Yanshan University Qinhuangdao China
In the paper, we present a new method for constructing a class of quaternary sequence pairs with even period 2N from the known binary sequence pairs with odd period N by using the reverse Gray mapping and interleaving... 详细信息
来源: 评论
A virtualized data center energy-saving mechanism based on switching operating mode of physical servers and reserving virtual machines
A virtualized data center energy-saving mechanism based on s...
收藏 引用
作者: Yin, Chunxia Liu, Jian Jin, Shunfu College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China Ocean College of Hebei Agricultural University Qinhuangdao China Institute of Computing Technology Chinese Academy of Sciences Beijing China
The energy consumption of virtualized data centers has grown very fast in last several years. Because a large number of hosts are running in an idle state, virtualized data centers waste a large amount of electric ene... 详细信息
来源: 评论
Outlier detection based on cluster outlier factor and mutual density  10th
Outlier detection based on cluster outlier factor and mutual...
收藏 引用
10th International Symposium on Intelligence Computation and Applications, ISICA 2018
作者: Zhang, Zhongping Zhu, Mengfan Qiu, Jingyang Liu, Cong Zhang, Debin Qi, Jie School of Information Science and Engineering Yanshan University QinhuangdaoHebei066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei066004 China Hebei Education Examinations Authority ShijiazhuangHebei050000 China The First Middle School of Qian An Country Qian’anJilin131400 China
Outlier detection is an important task in data mining with numerous applications. Recent years, the study on outlier detection is very active, many algorithms were proposed including that based on clustering. However,... 详细信息
来源: 评论
A metadata extraction approach from papers based on meta-learning
收藏 引用
Journal of Information and Computational Science 2013年 第4期10卷 1121-1129页
作者: Zhang, Fuzhi Zhao, Zihao School of Information Science and Engineering The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao 066004 China
To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support... 详细信息
来源: 评论
Opnet: Deep Occlusion Perception Network with Boundary Awareness for Amodal Instance Segmentation
Opnet: Deep Occlusion Perception Network with Boundary Aware...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shihui Zhang Ziteng Xue Yuhong Jiang Houlin Wang School of Information Science and Engineering Yanshan University Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
The Amodal Instance Segmentation (AIS) task aims to infer the visible and occluded regions of an object instance. Existing AIS methods typically focus on directly predicting visible and occluded regions or leveraging ...
来源: 评论
Robust Recommendation Method Based on Shilling Attack Detection and Matrix Factorization Model
Robust Recommendation Method Based on Shilling Attack Detect...
收藏 引用
2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)
作者: Yu-qi HU Kai LIU Fu-zhi ZHANG School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and mat... 详细信息
来源: 评论