咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 141 篇 期刊文献

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 212 篇 计算机科学与技术...
    • 183 篇 软件工程
    • 55 篇 信息与通信工程
    • 27 篇 生物工程
    • 22 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 8 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 87 篇 管理学
    • 50 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 17 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 157 篇 school of inform...
  • 97 篇 shandong provinc...
  • 79 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zheng xiangwei
  • 22 篇 zhang huaxiang
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 379 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
391 条 记 录,以下是141-150 订阅
排序:
ASRNet: Adversarial Segmentation and Registration Networks for Multispectral Fundus Images
收藏 引用
computer Systems Science & Engineering 2021年 第3期36卷 537-549页
作者: Yanyun Jiang Yuanjie Zheng Xiaodan Sui Wanzhen Jiao Yunlong He Weikuan Jia School of Information Science and Engineering Shandong Normal UniversityJinan250358China Key Laboratory of Intelligent Computing&Information Security in Universities of Shandong Shandong Provincial Key Laboratory for Novel Distributed Computer Software TechnologyInstitute of Biomedical SciencesShandong Normal UniversityJinan250358China Shandong Provincial Hospital Affiliated to Shandong University Jinan250021China INSA Lyon University of LyonCNRSInsermVilleurbanne69621CedexFrance
Multispectral imaging (MSI) technique is often used to capture imagesof the fundus by illuminating it with different wavelengths of light. However,these images are taken at different points in time such that eyeball m... 详细信息
来源: 评论
SWRR:The Link Scheduling Algorithm Based on Weighted Round-Robin
收藏 引用
computers, Materials & Continua 2019年 第6期59卷 965-982页
作者: Tianbo Lu Ru Yan Chao Li Lihua Yin Hao Chen Xieyu Zou School of Software Engineering Beijing University of Posts and TelecommunicationsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(Beijing University of Posts and Telecommunications) Ministry of EducationBeijing100876China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Department Computer Science and Engineering The University of Texas at ArlingtonArlington76091USA
With the rapid development of the Internet,people pay more and more attention to the protection of *** second-generation onion routing system Tor is the most commonly used among anonymous communication systems,which c... 详细信息
来源: 评论
LMR-CBT: learning modality-fused representations with CB-Transformer for multimodal emotion recognition from unaligned multimodal sequences
收藏 引用
Frontiers of computer Science 2024年 第4期18卷 39-47页
作者: Ziwang FU Feng LIU Qing XU Xiangling FU Jiayin QI School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Beijing 100876China Shanghai International School of Chief Technology Officer East China Normal UniversityShanghai 200062China School of Computer Science and Technology East China Normal UniversityShanghai 200062China School of Cyberspace Security Guangzhou UniversityGuangdong 510006China
Learning modality-fused representations and processing unaligned multimodal sequences are meaningful and challenging in multimodal emotion *** approaches use directional pairwise attention or a message hub to fuse lan... 详细信息
来源: 评论
TeeSwap: Private Data Exchange using Smart Contract and Trusted Execution Environment  23
TeeSwap: Private Data Exchange using Smart Contract and Trus...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Chen, Peng Shi, Peichang Xu, Jie Fu, Xiang Li, Linhui Zhong, Tao Xiang, Liangliang Kong, Jinzhu College of Computer National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China Zhejiang Lab Hangzhou311100 China Kylin Software Co. Ltd Changsha410073 China
With importance of data value is approved, data-sharing will create more and greater value has become consensus. However, data exchange has to use a trusted third party(TTP) as an intermediary in an untrusted network ... 详细信息
来源: 评论
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things  24
RBCP: A Reputation-based Blockchain Consensus Protocol for I...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Shang, Jiaze Lu, Tianbo Cai, Yingjie Luo, Shuang Jin, Zhaoxin School of Computer Science National Pilot Software Enginerring School Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
The application of blockchain in the Internet of Things (IoT) solves the problem of centralization, enables data interaction of IoT nodes in untrusted environments. However, most of the blockchain consensus protocols ... 详细信息
来源: 评论
Graph Convolutional Network with Long Time Memory for Skeleton-based Action Recognition  26
Graph Convolutional Network with Long Time Memory for Skelet...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Qi, Yanpeng Pang, Chen Liu, Yiliang Liu, Hong Lyu, Lei Shandong Normal University School of Information Science and Engineering Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China Shandong Provincial Academy of Education Recruitment and Examination Jinan China
Skeleton-based action recognition task has been widely studied in recent years. Currently, the most popular researches use graph convolutional network (GCN) to solve this task by modeling human joints data as spatio-t... 详细信息
来源: 评论
An RBF neural network–based dynamic virtual network embedding algorithm
An RBF neural network–based dynamic virtual network embeddi...
收藏 引用
作者: Zheng, Xiangwei Zhang, Yuang Zhang, Hui Xue, Qingshui School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China School of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai201418 China
Network virtualization is a promising technology, which is used to solve the existing shortcomings of the Internet architecture and in which virtual network (VN) embedding plays a vital role in resource allocation. Ho... 详细信息
来源: 评论
An adaptive video watermarking algorithm
An adaptive video watermarking algorithm
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Yang, Feng Tan, Kai School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan 250014 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China
An adaptive data hiding method is proposed that encapsulates forbidden zone data hiding in order to improve the robustness of watermark under the premise of ensuring the subjective quality of host video and the invisi... 详细信息
来源: 评论
Prolonging Time Synchronized Mesh Protocol network's lifetime by adjusting transmission range and routing graph
Prolonging Time Synchronized Mesh Protocol network's lifetim...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Yao Zhen Hui-chuan Duan Lin Qi School of Information Science and Engineering Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China School of Information Science and Engineering Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China School of Information Science and Engineering Shandong Normal University Provincial Key Laboratory for Novel Distributed Computer Software Technology. Jinan China
The Time Synchronized Mesh Protocol (TSMP) uses time synchronization, graph-routing and pre-scheduling of pair-wise communication while cycling through all available pre-divided channels to manage the whole network. W... 详细信息
来源: 评论
Parallel computing for large-scale author name disambiguation in medline  21
Parallel computing for large-scale author name disambiguatio...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Tang, Anyao Wu, Chengkun Liu, Jie Wang, Wei Yang, Xi Xing, Yuting Science and Technology on Parallel and Distributed Processing Laboratory Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha410073 China State Key Laboratory of High Performance Computing College of Computer National University of Defense Technology Changsha410073 China College of Computer National University of Defense Technology Changsha 410073 China
Author name disambiguation (AND) is an important task in the field of scientific data mining. It has become a great challenge with the rapid growth of academic digital libraries. The task of AND for a large number of ... 详细信息
来源: 评论