咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 377 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
389 条 记 录,以下是121-130 订阅
排序:
Research on education resource recommendation algorithm based on implicit feedback and pairwise  10
Research on education resource recommendation algorithm base...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Huang, Xiaoxiang Zhang, Yongsheng Zheng, Zhihua Zhang, Jie Duan, Jiaxi School of Information Science and Engineering Shandong Normal University Jinan250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China
In view of the problem of how to improve the accuracy of education resources recommendation in Internet era, a recommendation algorithm based on implicit feedback and pairwise education resources are proposed. Firstly... 详细信息
来源: 评论
The study of searchable encryption mechanism
The study of searchable encryption mechanism
收藏 引用
International Conference on Intelligent Computing, Communication and Devices, ICCD 2017
作者: Cui, Ranran Zhang, Yongsheng Li, Nengneng School of Information Science and Engineering Shandong Normal University Jinan250358 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250358 China
With the development of information technology, more and more data information uploaded to the cloud server, cloud computing encryption storage technology for data security has become particularly important. This pape... 详细信息
来源: 评论
Research on college teachers teaching ability evaluation model based on DHNN  10
Research on college teachers teaching ability evaluation mod...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Zhang, Jie Zhang, Yongsheng Wei, Yu Zheng, Zhihua Fan, Shaojun School of Information Science and Engineering Shandong Normal University Jinan250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China
The teaching ability of teachers is one of the core abilities of colleges. Its level has gradually become an important indicator for evaluating a school. However, the existing evaluation models of college teachers are... 详细信息
来源: 评论
A patient outcome prediction based on random forest  19
A patient outcome prediction based on random forest
收藏 引用
4th International Conference on Crowd Science and Engineering, ICCSE 2019
作者: Yang, Shan Zheng, Xiangwei Yuan, Feng School of Information Science and Engineering Shandong Normal University Ji'nan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji’nan China
Since the research and development value of electronic health records (EHRs) which contains a large number of patient treatment data is very high and meaningful, EHRs has gained attention by researchers in recent year... 详细信息
来源: 评论
BCS-Net: Boundary, Context and Semantic for Automatic COVID-19 Lung Infection Segmentation from CT Images
arXiv
收藏 引用
arXiv 2022年
作者: Cong, Runmin Yang, Haowei Jiang, Qiuping Gao, Wei Li, Haisheng Wang, Cong Zhao, Yao Kwong, Sam The Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Big Data Technology for Food Safety Beijing Technology and Business University Beijing100048 China The Department of Computer Science City University of Hong Kong Hong Kong The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The School of Information Science and Engineering Ningbo University Ningbo315211 China The School of Electronic and Computer Engineering Peking University Shenzhen Graduate School Shenzhen518055 China Peng Cheng Laboratory Shenzhen518055 China The Distributed and Parallel Software Lab Huawei Technologies Shenzhen518129 China The City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
The spread of COVID-19 has brought a huge disaster to the world, and the automatic segmentation of infection regions can help doctors to make diagnosis quickly and reduce workload. However, there are several challenge... 详细信息
来源: 评论
Research and implementation of teaching system for higher vocational specialty courses based on hybrid teaching mode  10
Research and implementation of teaching system for higher vo...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Zhang, Penglong Zhang, Yongsheng Fan, Shaojun Huang, Xiaoxiang Zhang, Jie School of Information Science and Engineering Shandong Normal University Jinan250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China
In recent years, with the diversified development of education and training in China and the continuous 'Internet +', enterprises and society have put forward higher requirements for the ability of skilled tal... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
A grouping approach based on non-uniform binary grid partitioning for crowd evacuation simulation
A grouping approach based on non-uniform binary grid partiti...
收藏 引用
作者: Liu, Hong Li, Yan Li, Wenhao Lu, Dianjie Zhang, Guijuan School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China University of South Australia Adelaide Australia
Small social groups based on kinship or friendships are ubiquitous in human crowds. Therefore, the effect of social groups on crowd evacuations and that of crowd evacuations on social groups must be investigated. To s... 详细信息
来源: 评论
SWRR:The Link Scheduling Algorithm Based on Weighted Round-Robin
收藏 引用
computers, Materials & Continua 2019年 第6期59卷 965-982页
作者: Tianbo Lu Ru Yan Chao Li Lihua Yin Hao Chen Xieyu Zou School of Software Engineering Beijing University of Posts and TelecommunicationsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(Beijing University of Posts and Telecommunications) Ministry of EducationBeijing100876China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Department Computer Science and Engineering The University of Texas at ArlingtonArlington76091USA
With the rapid development of the Internet,people pay more and more attention to the protection of *** second-generation onion routing system Tor is the most commonly used among anonymous communication systems,which c... 详细信息
来源: 评论
An RBF neural network–based dynamic virtual network embedding algorithm
An RBF neural network–based dynamic virtual network embeddi...
收藏 引用
作者: Zheng, Xiangwei Zhang, Yuang Zhang, Hui Xue, Qingshui School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China School of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai201418 China
Network virtualization is a promising technology, which is used to solve the existing shortcomings of the Internet architecture and in which virtual network (VN) embedding plays a vital role in resource allocation. Ho... 详细信息
来源: 评论