咨询与建议

限定检索结果

文献类型

  • 252 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 school of softwa...
  • 18 篇 school of cyber ...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 12 篇 school of inform...
  • 11 篇 shandong provinc...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 379 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
391 条 记 录,以下是211-220 订阅
排序:
MOEA/D with adaptive IWO for synthesizing phase-only reconfigurable linear arrays
收藏 引用
Open Chemical Engineering Journal 2015年 第1期9卷 125-133页
作者: Tan, Yanyan Li, Shengtao Fang, Xiaonan School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan250014 China
In order to well solve the phase-only reconfigurable arrays synthesis problems, we introduce an adaptive strategy in invasive weed optimization (IWO), and integrate the adaptive IWO (AIWO) into the framework of MOEA/D... 详细信息
来源: 评论
A Naive Bayesian Network Intrusion Detection Algorithm Based on Principal Component Analysis
A Naive Bayesian Network Intrusion Detection Algorithm Based...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Xiaoyan Han Liancheng Xu Min Ren Weiping Gu School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology School of Mathematics and Quantitative Economics Shandong University of Finance and Economics Jinan China
Traditional Naive Bayesian classification model does not consider the feature redundancy in intrusion forensics and neglects the difference between data attributes in different intrusion actions. This paper proposed a... 详细信息
来源: 评论
Design of sub-optimal controller for discrete-time systems with multiple control input delays
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第9期6卷 2531-2538页
作者: Han, Shiyuan Wu, Xiaoyu Zheng, Xiangwei Chen, Yuehui Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University No. 88 East Wenhua Road Lixia District Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan No. 336 West Road of Nanxinzhuang Jinan China Shandong Computer Science Center No. 2008 Xinle Street Jinan China
This note presents the sub-optimal linear-quadratic controller for a discretetime system with multiple control input delays. Sub-optimality of the solution is designed in two steps. First, a delay-free transformed sys... 详细信息
来源: 评论
Imbalanced web spam classification based on nested rotation forest
收藏 引用
ICIC Express Letters 2015年 第3期9卷 937-944页
作者: Fang, Xiaonan Zhang, Huaxiang Gao, Shuang Tan, Yanyan Department of Information Science and Engineering Shandong Normal University No. 88 Wenhua East Road Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University No. 88 Wenhua East Road Jinan China
Web spam has emerged to be a critical problem in web search. Unfortunately, single classifiers always perform poorly on imbalanced web spam data sets. For better solving these problems, a nested Rotation Forest struct... 详细信息
来源: 评论
Double filtration of topic tracking based on KL divergence
收藏 引用
Journal of Computational Information Systems 2014年 第19期10卷 8543-8552页
作者: Lu, Ran Wei, Jingxuan Xun, Jing School of Information Science and Engineering Shandong Normal University Ji'nan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan China
In order to overcome the shortcoming of the static threshold and the problem of the false reports, the method of double filtering topic tracking based on Kullback-Leibler divergence is put forward. In this method, it ... 详细信息
来源: 评论
Mining Approximate Frequent Patterns from Noisy Databases
Mining Approximate Frequent Patterns from Noisy Databases
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Xiaomei Yu Yongqin Li Hong Wang School of Information Science and Engineering Shandong Normal University Jinan Shandong China Shandong Provincial Key Laboratory for Distributed Computer software Novel Technology School of Teacher's Education Shandong Normal University Jinan Shandong China
As an important branch in the field of frequent pattern mining, approximate frequent pattern (AFP) mining attracts much attention recently. Various algorithms have been proposed to discover long true AFPs in presence ... 详细信息
来源: 评论
Network Forensics Scenario Reconstruction Method Based on Hidden Markov Models
Network Forensics Scenario Reconstruction Method Based on Hi...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Weiping Gu Liancheng Xu Min Ren Xiaoyan Han School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Mathematics and Quantitative Economics Shandong University of Finance and Economics Jinan China
Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order ... 详细信息
来源: 评论
Double anomaly detection algorithm based on dendritic cells
Double anomaly detection algorithm based on dendritic cells
收藏 引用
2014 International Conference on Materials Science and Computational Engineering, ICMSCE 2014
作者: Xu, Lian Cheng Xu, Di Zhou, Guang Gang Hou, Xiu Yan Department of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
On the problem of data quantity in anomaly detection, traditional dendritic cell algorithms should be improved by proposing an antigen data preprocessing method which introduced suspected abnormal base. The abnormal d... 详细信息
来源: 评论
Hybrid collaborative filtering recommendation based on time and diversity
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第9期6卷 2539-2545页
作者: Wang, Hong Sun, Yanshen Yu, Xiaomei Wang, Jihua School of Information Science and Engineering Shandong Normal University No. 88 East Wenhua Road Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology No. 88 East Wenhua Road Jinan China School of Earth Sciences Zhejiang University No. 388 Yuhangtang Road Hangzhou China
Many researchers have been attracted in personalized recommendation which is considered as one of the most effective methods to solve the problem of information overloading. We propose a hybrid collaborative filtering... 详细信息
来源: 评论
A visualization method in virtual educational system
A visualization method in virtual educational system
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Zhang, Guijuan Lu, Dianjie Liu, Hong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
We present a visualization-based knowledge expression approach for virtual educational system in this paper. Our method allows teachers and students to understand complex algorithms and procedures more intuitively and... 详细信息
来源: 评论