咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 377 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
389 条 记 录,以下是131-140 订阅
排序:
MicroBlog orientation analysis based on sentiment symbol
MicroBlog orientation analysis based on sentiment symbol
收藏 引用
2014 International Conference on Manufacturing Technology and Electronics Applications, ICMTEA 2014
作者: Liu, Pei Yu Zhang, Yan Hui Wei, Jing Xun Hou, Xiu Yan School of Information Engineering Shandong Yingcai University Jinan China Department of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
As a new social networking media, Micro-blog is recognized by more and more people gradually, the orientation analysis of Micro-blog short text messages has become a hotspot in the field of data mining. At present, th... 详细信息
来源: 评论
Study on event correlation analysis in evidence chain structure
Study on event correlation analysis in evidence chain struct...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Liu, Dong Wei, Yong-Qing School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Police College Jinan China
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ... 详细信息
来源: 评论
distributed PrefixSpan algorithm based on MapReduce
Distributed PrefixSpan algorithm based on MapReduce
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Wei, Yong-Qing Liu, Dong Duan, Lin-Shan Basic Education Department Shandong Police College Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Shandong Normal University Jinan China
For mining sequential patterns on massive data set, the distributed sequential pattern mining algorithm based on MapReduce programming model and PrefixSpan is proposed. Mining tasks are decomposed to many small tasks,... 详细信息
来源: 评论
An improved memetic algorithm and its application in multi-constrained test paper generation
An improved memetic algorithm and its application in multi-c...
收藏 引用
2012 International Conference on Information Technology and software Engineering, ITSE 2012
作者: Wang, Zhihao Zheng, Xiangwei School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Information Science and Engineering Shandong Normal University Jinan China
In order to improve the quality of intelligent test paper generation, an improved Memetic Algorithm (MA) is proposed as the strategy for intelligent test paper generation in this paper, which is based on Particle Swar... 详细信息
来源: 评论
Improved access control model under cloud computing environment
Improved access control model under cloud computing environm...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Zhang, Yongsheng Zou, Jiashun Gao, Yan Li, Bo School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Academic Affairs Office Shandong Polytechnic Jinan 250104 China
With the development of cloud computing, cloud security problem has become a hot topic. Some scholars put forward the role access control based on mapping, which is used to solve the leakage problem of data storing in... 详细信息
来源: 评论
A multi-objective biogeography-based optimization with mean value migration operator
A multi-objective biogeography-based optimization with mean ...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Zheng, Xiang-Wei Gao, Kai-Ge Wang, Xiao-Guang Ma, Chi-Zhu School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Communication Shandong Normal University Jinan China
Considering its successful application in solving discrete single objective problems, biogeography-based optimization (BBO) is considered as a new promising intelligent algorithm. Therefore, many studies are conducted... 详细信息
来源: 评论
A community evolution model based on visibility graph  34
A community evolution model based on visibility graph
收藏 引用
34th Chinese Control Conference, CCC 2015
作者: Hong, Wang Yan-Shen, Sun School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China Department of Earth Sciences Zhejiang University Hangzhou China
One of the most important work to analyze networks is community detection. We present a dynamic community discovery method based on Visibility Graph. Firstly, we put forward related definitions of Visibility Graph for... 详细信息
来源: 评论
Identity-based aggregate signcryption in the standard model from multilinear maps
收藏 引用
Frontiers of computer Science 2016年 第4期10卷 741-754页
作者: Hao WANG Zhen LIU Zhe LIU Duncan S. WONG School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Labe ratory for Novel Distributed Computer Software Technology Jinan 250014 China Security and Data Sciences Hong Kong Applied Science and Technology Research Institute (ASTRI) Hong Kong China Laboratory of Algorithmics Cryptology and Security (LACS) University of Luxembourg Luxembourg L-1359 Luxembourg
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key en... 详细信息
来源: 评论
ASRNet: Adversarial Segmentation and Registration Networks for Multispectral Fundus Images
收藏 引用
computer Systems Science & Engineering 2021年 第3期36卷 537-549页
作者: Yanyun Jiang Yuanjie Zheng Xiaodan Sui Wanzhen Jiao Yunlong He Weikuan Jia School of Information Science and Engineering Shandong Normal UniversityJinan250358China Key Laboratory of Intelligent Computing&Information Security in Universities of Shandong Shandong Provincial Key Laboratory for Novel Distributed Computer Software TechnologyInstitute of Biomedical SciencesShandong Normal UniversityJinan250358China Shandong Provincial Hospital Affiliated to Shandong University Jinan250021China INSA Lyon University of LyonCNRSInsermVilleurbanne69621CedexFrance
Multispectral imaging (MSI) technique is often used to capture imagesof the fundus by illuminating it with different wavelengths of light. However,these images are taken at different points in time such that eyeball m... 详细信息
来源: 评论
SWRR:The Link Scheduling Algorithm Based on Weighted Round-Robin
收藏 引用
computers, Materials & Continua 2019年 第6期59卷 965-982页
作者: Tianbo Lu Ru Yan Chao Li Lihua Yin Hao Chen Xieyu Zou School of Software Engineering Beijing University of Posts and TelecommunicationsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(Beijing University of Posts and Telecommunications) Ministry of EducationBeijing100876China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Department Computer Science and Engineering The University of Texas at ArlingtonArlington76091USA
With the rapid development of the Internet,people pay more and more attention to the protection of *** second-generation onion routing system Tor is the most commonly used among anonymous communication systems,which c... 详细信息
来源: 评论