咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 377 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
389 条 记 录,以下是321-330 订阅
排序:
Optimizing Batched Small Matrix Multiplication on Multi-core DSP Architecture
Optimizing Batched Small Matrix Multiplication on Multi-core...
收藏 引用
International Symposium on Parallel and distributed Processing with Applications, ISPA
作者: Xiaohan Zuo Chunhua Xiao Qinglin Wang Chen Shi College of Computer Science Chongqing University China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha China
General Matrix Multiplication (GEMM) is a critical computational operation in scientific computing and machine learning domains. While traditional GEMM performs well on large matrices, it is inefficient in terms of da... 详细信息
来源: 评论
Analysis of vocational education dynamics evolution based on topic modeling
Analysis of vocational education dynamics evolution based on...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Xinhua Wang Xiaomei Yu Yunmeng Jiang Xiangwei Zheng Wei Li School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China Shandong Normal University Library Shandong Normal University Jinan China
Clarifying the focus of vocational education dynamics is crucial for understanding the current situation and future development trends. However, comprehensive exploration on vocational education dynamics is inadequate... 详细信息
来源: 评论
Mining Approximate Frequent Patterns from Noisy Databases
Mining Approximate Frequent Patterns from Noisy Databases
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Xiaomei Yu Yongqin Li Hong Wang School of Information Science and Engineering Shandong Normal University Jinan Shandong China Shandong Provincial Key Laboratory for Distributed Computer software Novel Technology School of Teacher's Education Shandong Normal University Jinan Shandong China
As an important branch in the field of frequent pattern mining, approximate frequent pattern (AFP) mining attracts much attention recently. Various algorithms have been proposed to discover long true AFPs in presence ... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms
Feature and Performance Comparison of FaaS Platforms
收藏 引用
IEEE International Conference on software Engineering and Service Sciences (ICSESS)
作者: Penghui Ma Peichang Shi Guodong Yi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Xiangjiang Lab Changsha China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove...
来源: 评论
Network Forensics Scenario Reconstruction Method Based on Hidden Markov Models
Network Forensics Scenario Reconstruction Method Based on Hi...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Weiping Gu Liancheng Xu Min Ren Xiaoyan Han School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Mathematics and Quantitative Economics Shandong University of Finance and Economics Jinan China
Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order ... 详细信息
来源: 评论
Instrumental variable identification for a class of non-uniformly sampled-data systems
Instrumental variable identification for a class of non-unif...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Shengtao Li Nan Jiang Dan Li College of Information Science and Engineering Shandong Normal University Jinan Shandong Province China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology College of Information Science and Engineering Northeastern University Shenyang Liaoning Province China
A class of non-uniformly sampling system is investigated, and the lifted state space model of non-uniformly sampled-data system is derived by using integration method. The corresponding transfer function model is furt... 详细信息
来源: 评论
DETECTING THE RUN TIME ATTACKS IN THE CLOUD WITH AN EVIDENCE COLLECTION BASED APPROACH
DETECTING THE RUN TIME ATTACKS IN THE CLOUD WITH AN EVIDENCE...
收藏 引用
2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems
作者: Jie lin Chuanyi Liu Zhichun Ning Binxing Fang School of Computer Science Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education School of Software Engineering Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing University of Posts and Telecommunications
As the impacts of security threats are amplified and spread quickly in the cloud,especially with the attribute of large-scale *** of researches focus on monitoring the network ***,these methods don't check how the... 详细信息
来源: 评论
An energy saving and balanced clustering routing protocol for wireless sensor networks
收藏 引用
ICIC Express Letters 2014年 第9期8卷 2577-2584页
作者: Liu, Fangai Zhang, Chunhua Wang, Jiwei School of Information Science and Engineering Shandong Normal University No. 88 East Wenhua Road Lixia District Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology No. 88 East Wenhua Road Lixia District Jinan 250014 China
In order to prolong the lifetime of wireless sensor networks, we propose an energy saving and balanced clustering routing protocol (ESB). ESB employs energy and distance in probability model to generate candidate clus... 详细信息
来源: 评论
Research on Assistant Diagnostic Method of TCM Based on BERT
Research on Assistant Diagnostic Method of TCM Based on BERT
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Chuanjie Xu Feng Yuan Shouqiang Chen Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China School of Information Engineering Shandong Management University Jinan China Center of Hear of the Second Affiliated Hospital of Shandong University of Traditional Chinese Medicine Jinan China
Traditional Chinese medicine (TCM) auxiliary diagnosis is a systematic diagnosis platform that uses computer modeling technology to assist TCM doctors in recording diseases, providing on time diagnoses, writing prescr... 详细信息
来源: 评论
Towards Accurate and Efficient Super Spreader Detection with Sketching
Towards Accurate and Efficient Super Spreader Detection with...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Shouyou Song Pu Wang Yangchun Li Nanyang Wang Wei Jiang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT Beijing China Chinese Academy of Cyberspace Studies Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing China School of Computer and Information Engineering Chuzhou University Anhui China
Super spreaders are the flow that have a large number of distinct connections (also called spread), which related with many threats to networks. Estimating flow spread is the crucial step in super spreader detection. ...
来源: 评论