咨询与建议

限定检索结果

文献类型

  • 252 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 school of softwa...
  • 18 篇 school of cyber ...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 12 篇 school of inform...
  • 11 篇 shandong provinc...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 379 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
391 条 记 录,以下是281-290 订阅
排序:
Instrumental variable identification for a class of non-uniformly sampled-data systems
Instrumental variable identification for a class of non-unif...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Shengtao Li Nan Jiang Dan Li College of Information Science and Engineering Shandong Normal University Jinan Shandong Province China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology College of Information Science and Engineering Northeastern University Shenyang Liaoning Province China
A class of non-uniformly sampling system is investigated, and the lifted state space model of non-uniformly sampled-data system is derived by using integration method. The corresponding transfer function model is furt... 详细信息
来源: 评论
DETECTING THE RUN TIME ATTACKS IN THE CLOUD WITH AN EVIDENCE COLLECTION BASED APPROACH
DETECTING THE RUN TIME ATTACKS IN THE CLOUD WITH AN EVIDENCE...
收藏 引用
2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems
作者: Jie lin Chuanyi Liu Zhichun Ning Binxing Fang School of Computer Science Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education School of Software Engineering Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing University of Posts and Telecommunications
As the impacts of security threats are amplified and spread quickly in the cloud,especially with the attribute of large-scale *** of researches focus on monitoring the network ***,these methods don't check how the... 详细信息
来源: 评论
An energy saving and balanced clustering routing protocol for wireless sensor networks
收藏 引用
ICIC Express Letters 2014年 第9期8卷 2577-2584页
作者: Liu, Fangai Zhang, Chunhua Wang, Jiwei School of Information Science and Engineering Shandong Normal University No. 88 East Wenhua Road Lixia District Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology No. 88 East Wenhua Road Lixia District Jinan 250014 China
In order to prolong the lifetime of wireless sensor networks, we propose an energy saving and balanced clustering routing protocol (ESB). ESB employs energy and distance in probability model to generate candidate clus... 详细信息
来源: 评论
Predicting employee relations in enterprises by bi-directional link mining
Predicting employee relations in enterprises by bi-direction...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Wang Hong Sun Yanshen Institute of Information Science and Engineering Shandong Normal University Jinan Shandong Province China Computer Software Novel Technology Shandong Provincial Key Laboratory for Distributed Jinan Shandong Province China Department of Earth Sciences ZheJiang University Hangzhou Zhejiang Province China
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do... 详细信息
来源: 评论
Personalized recommendation based on link prediction in dynamic super-networks
Personalized recommendation based on link prediction in dyna...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Wang Hong Yanshen Sun Xiaomei Yu Institute of Information Science and Engineering Shandong Normal University Jinan Shandong CN Zhejiang University Hangzhou China Institute of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
Personalized recommendation is one of the most effective methods to solve the problem of information overloading. As many real existing systems in nature, a recommendation system can also be considered as a complex ne... 详细信息
来源: 评论
DIV: Dynamic Integrity Validation Framework for Detecting Compromises on Virtual Machine Based Cloud Services in Real Time
收藏 引用
China Communications 2014年 第8期11卷 15-27页
作者: WANG Chunlu LIU Chuanyi LIU Bin DONG Yingfei School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 P. R. China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 P. R. China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing 100876 P. R. China Department of Electrical Engineering University of Hawaii Honolulu Hawaii U.S.
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynam... 详细信息
来源: 评论
A new fractional-order chaotic complex system and its antisynchronization
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2014年 第1期2014卷
作者: Jiang, Cuimei Liu, Shutang Luo, Chao College of Control Science and Engineering Shandong University Jinan 250061 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
We propose a new fractional-order chaotic complex system and study its dynamical properties including symmetry, equilibria and their stability, and chaotic attractors. Chaotic behavior is verified with phase portraits...
来源: 评论
Adaptive web wrapper based on hybrid hierarchical conditional random fields for web data integration
Adaptive web wrapper based on hybrid hierarchical conditiona...
收藏 引用
2nd International Conference on Information Engineering and Applications, IEA 2012
作者: Ding, Yanhui Wang, Hongguo School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
During the process of Web data integration, new related Web sites consisting valuable data will be identified constantly. Wrapper induction based on labeled examples is a widely accepted method. However, manually labe... 详细信息
来源: 评论
Attribute-based access control security model in service-oriented computing
收藏 引用
2012 International Conference on Cybernetics and Informatics, ICCI 2012
作者: Zhang, Yongsheng S. Wu, Mingfeng F. Wu, Lei Li, Yuanyuan Y. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology School of Information Science and Engineering Shandong Normal University 250014 Jinan China
Currently, industrial and scientific community are concerned about Service-Oriented Computing (SOC), whose key technology is Web services. Web service is a new distributed computing model. It has a broad prospect in a... 详细信息
来源: 评论
An elastic and distributed secret sharing scheme
An elastic and distributed secret sharing scheme
收藏 引用
International Conference on Informatics and Management Science, IMS 2012
作者: Wu, Lei School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Jinan 250014 China
How to ensure the security of important private data is the key problem in electric commerce. In this paper, we propose an elastic and distributed secret sharing scheme. The scheme improves the security of data and in... 详细信息
来源: 评论