咨询与建议

限定检索结果

文献类型

  • 168 篇 期刊文献
  • 48 篇 会议

馆藏范围

  • 216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 120 篇 计算机科学与技术...
    • 85 篇 软件工程
    • 27 篇 信息与通信工程
    • 11 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 生物工程
    • 9 篇 控制科学与工程
    • 9 篇 土木工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 材料科学与工程(可...
  • 107 篇 理学
    • 80 篇 数学
    • 25 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
  • 73 篇 管理学
    • 51 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection
  • 2 篇 multi-valued dep...

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 32 篇 school of inform...
  • 20 篇 key laboratory f...
  • 16 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 46 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 jin shunfu
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 zhang fuzhi
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 207 篇 英文
  • 10 篇 中文
检索条件"机构=Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province"
216 条 记 录,以下是41-50 订阅
排序:
An algorithm based on temporary table for mining top-k closed frequent patterns in data streams
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第20期6卷 582-589页
作者: Wang, Peilong Yang, Xuan Zhang, Yuanyuan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao City 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
In this paper, we present an algorithm TKBT(top-k closed frequent mining based on TKTT) to mine top-k closed frequent itemsets in data streams efficiently. First according to the consecutive and changeable characteris... 详细信息
来源: 评论
Inference rules based on XML functional dependency and XML multi-valued dependency
Inference rules based on XML functional dependency and XML m...
收藏 引用
2014 International Conference on Future Information Engineering and Manufacturing Science(FIEMS 2014)
作者: Zhongping Zhang Shanshan Shi The School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
There not only exists the relation of the functional dependency and multi-valued dependency in XML data constraint,but also exists the relation of data dependency obtained only from a certain existing relationship ins... 详细信息
来源: 评论
Influence maximization in MicroBlog based on a new user influence ranking method
收藏 引用
Journal of Information and Computational Science 2015年 第9期12卷 3729-3737页
作者: Liu, Yuanying Guo, Jingfeng Hu, Xinzhuan Liu, Miaomiao Zhang, Jilong College of Information Science and Engineering Yanshan University Qinhuangdao China College of Information Technology Hebei University of Economics and Business Shijiazhuang China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
The characteristics of the MicroBlog data are analyzed firstly. Then WeiBo graph is constructed through tweets forwarded path and user influence ranking calculation method which according to the classic PageRank is gi... 详细信息
来源: 评论
An Ensemble Detection Method for Shilling Attacks Based on Features of Automatic Extraction
收藏 引用
China Communications 2019年 第8期16卷 130-146页
作者: Yaojun Hao Fuzhi Zhang Jinbo Chao School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004China Department of Computer Science and Technology Xinzhou Teachers UniversityXinzhou 034000China
Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extract... 详细信息
来源: 评论
A community detection method to undirected weighted signed social networks
收藏 引用
Journal of Computational Information systems 2015年 第10期11卷 3623-3632页
作者: Guo, Jingfeng Liu, Miaomiao Liu, Linlin Liu, Yuanying College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Northeast Petroleum University Daqing China
With regard to the community mining in weighted signed networks and weighted social networks containing only positive links, the AGMA algorithm has some imperfections in the second clustering of vertices. So some impr... 详细信息
来源: 评论
PromptHC: Multi-attention prompt guided haze-weather crowd counting
收藏 引用
Expert systems with Applications 2025年 286卷
作者: Jienan Shen Liangang Tong Shaohua Li Weihang Kong School of Information Science and Engineering Yanshan University Qinhuangdao 066004 China Information Technology Center Yanshan University Qinhuangdao 066004 China Hebei Key Laboratory of Computer Virtual Technology and System Integration Qinhuangdao 066004 China
Existing crowd counting methods encounter the challenge of degraded performance in hazy weather due to the blurring of pedestrian outlines. However, current hazy-weather crowd counting methods primarily focus on extra...
来源: 评论
An identity authentication algorithm in the object name service of the internet of things for heat meter
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第22期4卷 174-181页
作者: Han, Yuanyuan Liu, Yongshan Chen, Wei Liu, Chang Shang, Xuehui Lv, Yongteng The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Qinhuangdao City 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao City 066004 China
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication alg... 详细信息
来源: 评论
Pricing Policy for a Dynamic Spectrum Allocation Scheme with Batch Requests and Impatient Packets in Cognitive Radio Networks
收藏 引用
Journal of systems Science and systems Engineering 2022年 第2期31卷 133-149页
作者: Haixing Wu Shunfu Jin Wuyi Yue School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan UniversityQinhuangdao 066004China Department of Intelligence and Informatics Konan UniversityKobe 658-8501Japan
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate ***,a s... 详细信息
来源: 评论
A PTV method based on SIFT feature points matching for velocimetry measurement of oil-water two-phase flow in horizontal pipelines
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第12期8卷 195-206页
作者: Kong, Weihang Li, Lei Kong, Lingfu Li, Yingwei Xie, Na School of Information Science and Engineering Yanshan University QinhuangdaoHebei China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Hebei China Information Department of Library Yanshan University QinhuangdaoHebei China
Due to the advantages of scale invariant feature transform (SIFT) feature points on the invariant to image scale, brightness, rotation, occlusion, noise and so on, this paper proposes a Particle Tracking Velocimetry (... 详细信息
来源: 评论
Communication-Based Attacks Detection in Android Applications
收藏 引用
Tsinghua Science and technology 2019年 第5期24卷 596-614页
作者: Chuan Ma Tao Wang Limin Shen Dongkui Liang Shuping Chen Dianlong You School of In formation Science and Engineering Yanshan University the Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China School of Business Ad mi nisliatiom Hebei Normal University of Science and Technology. Qinhuangdao 066004 China Library of Yanshan University. Yanshan University Qinhuangdao 066004 China
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... 详细信息
来源: 评论