咨询与建议

限定检索结果

文献类型

  • 252 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 school of softwa...
  • 18 篇 school of cyber ...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 12 篇 school of inform...
  • 11 篇 shandong provinc...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 379 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
391 条 记 录,以下是161-170 订阅
排序:
Cooperative Co-evolutionary Artificial Bee Colony Algorithm Based on Hierarchical Communication Model
收藏 引用
Chinese Journal of Electronics 2016年 第3期25卷 570-576页
作者: HU Chunyu LIU Hong ZHANG Peng School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology
Canonical Artificial bee colony(ABC) algorithm with a single species is insufficient to extend the diversity of solutions and may be trapped into the local optimal solution. This paper proposes a new co-evolutionary A... 详细信息
来源: 评论
Bayesian multi-hypothesis Wyner-Ziv video coding
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2017年 第2期8卷 478-485页
作者: Meng, Li Li Zong, Jing Xiu Sun, Gui Na Cheng, Jie Zhang, Jia Zhao, Meng Chen Department of Information Science and Engineering Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University No.88 Wenhua East Road Jinan250014 China
The performance of distributed video coding (DVC) relies heavily on the quality of the side information (SI), and better performance can be expected if multiple SIs are employed. In this paper, we consider the scenari... 详细信息
来源: 评论
Eunomia: Scaling Concurrent Search Trees under Contention Using HTM
收藏 引用
ACM SIGPLAN Notices 2017年 第8期52卷 385-399页
作者: Wang, Xin Zhang, Weihua Wang, Zhaoguo Wei, Ziyun Chen, Haibo Zhao, Wenyun Software School Fudan University China Shanghai Key Laboratory of Data Science Fudan University School of Computer Science Fudan University China Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Computer Science Department New York University United States
While hardware transactional memory (HTM) has recently been adopted to construct efficient concurrent search tree structures, such designs fail to deliver scalable performance under contention. In this paper, we first... 详细信息
来源: 评论
Bilevel genetic algorithm with clustering for large scale traveling salesman problems
Bilevel genetic algorithm with clustering for large scale tr...
收藏 引用
2016 International Conference on Information System and Artificial Intelligence, ISAI 2016
作者: Tan, Yan-Yan Tan, Li-Zhuang Yun, Guo-Xiao Zheng, Wei School of Information Science and Engineering Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
The Traveling Salesman Problem (TSP) belongs to the class of NP-hard optimization problems. Its solving procedure is complicated, especially for large scale problems. In order to solve the large scale TSPs efficiently... 详细信息
来源: 评论
Efficient mining Algorithm of frequent itemsets for uncertain data streams  9
Efficient mining Algorithm of frequent itemsets for uncertai...
收藏 引用
9th International Symposium on Computational Intelligence and Design, ISCID 2016
作者: Qianqian, Wang Fang-Ai, Liu School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
With the rapid development of computer technology, web services has been widely used. In these applications, the uncertain data is in the form of streams. In view of this kind of situation, present a new generalized d... 详细信息
来源: 评论
Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks
收藏 引用
Applied Intelligence 2018年 第7期48卷 1891-1891页
作者: Shujuan Ji Haiyan Ma Yongquan Liang Hofung Leung Chunjin Zhang Shandong Provincial Key Laboratory of Wisdom Mine Information Technology Shandong University of Science and Technology Qingdao China Shandong Provincial Key Laboratory of Novel Distributed Computer Software Technology Shandong Normal University Jinan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China Center of Network Shandong University of Science and Technology Qingdao China
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally p...
来源: 评论
Model of assessment of trustworthy user based on fuzzy theory under cloud environment  6
Model of assessment of trustworthy user based on fuzzy theor...
收藏 引用
2016 6th International Workshop on computer Science and Engineering, WCSE 2016
作者: Chang, Liang Zhang, Yong-Sheng School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250014 China
To solve the two problems that users are independent of each other, it does not form indirect trust relationship between user and cloud service providers, and the traditional method of quantitative measures user's... 详细信息
来源: 评论
An attention-based syntax-tree and tree-LSTM model for sentence summarization
收藏 引用
International Journal of Performability Engineering 2017年 第5期13卷 775-782页
作者: Liu, Wenfeng Liu, Peiyu Yang, Yuzhen Gao, Yaling Yi, Jing School of Information Science and Engineering Shandong Normal University Jinan250014 China Department of Computer and Information Engineering Heze University Heze274015 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China Ruipu Peony Industrial Technology Development Co. Ltd 274015 China School of Computer Science and Technology Shandong Jianzhu University Jinan250101 China
Generative Summarization is of great importance in understanding large-scale textual data. In this work, we propose an attention-based Tree-LSTM model for sentence summarization, which utilizes an attention-based synt... 详细信息
来源: 评论
Identity-based aggregate signcryption in the standard model from multilinear maps
收藏 引用
Frontiers of computer Science 2016年 第4期10卷 741-754页
作者: Hao WANG Zhen LIU Zhe LIU Duncan S. WONG School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Labe ratory for Novel Distributed Computer Software Technology Jinan 250014 China Security and Data Sciences Hong Kong Applied Science and Technology Research Institute (ASTRI) Hong Kong China Laboratory of Algorithmics Cryptology and Security (LACS) University of Luxembourg Luxembourg L-1359 Luxembourg
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key en... 详细信息
来源: 评论
Analysis on the Content Features and Their Correlation of Web Pages for Spam Detection
收藏 引用
China Communications 2015年 第3期12卷 84-94页
作者: JI Hua ZHANG Huaxiang Department of computer science Shandong Normal University Shandong Provincial key laboratory for novel distributed computer software technology
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problem... 详细信息
来源: 评论