咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 377 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
389 条 记 录,以下是331-340 订阅
排序:
The hot topics evaluation and key issues in online news about emergency events
The hot topics evaluation and key issues in online news abou...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Liping Chen Junping Du Katsunori Shimohara Maoqiang Song Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing China Department of Information Systems Design Doshisha University Kyotanabe Kyoto Japan Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
This paper concentrates on the evaluation system of hot topics in the online news about the emergency events. First, the overall technology framework of the system was established and description was formulated on the... 详细信息
来源: 评论
Exploiting Probabilistic Siamese Visual Tracking with a Conditional Variational Autoencoder
Exploiting Probabilistic Siamese Visual Tracking with a Cond...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Wenhui Huang Jason Gu Peiyong Duan Sujuan Hou Yuanjie Zheng School of Information Science and Engineering Shandong Normal University China Dalhousie University Halifax Canada Key Lab of Intelligent Computing & Information Security in Universities of Shandong Shandong Normal University China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University China
Visual tracking is a fundamental capability for robots tasked with humans and environment interaction. However, state-of-the-art visual tracking methods are still prone to failures and are imprecise when applied to ch... 详细信息
来源: 评论
A embedding model for text classification
收藏 引用
Expert Systems 2019年 第6期36卷 e12460-e12460页
作者: Liu, Wenfeng Liu, Peiyu Yang, Yuzhen Yi, Jing Zhu, Zhenfang School of Information Science and Engineering Shandong Normal University Jinan China School of Computer Heze University Heze China Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Computer Science and Technology Shandong Jianzhu University Jinan China School of Information Science and Electrical Engineering Shandong Jiaotong University Jinan China
Existing word embeddings learning algorithms only employ the contexts of words, but different text documents use words and their relevant parts of speech very differently. Based on the preceding assumption, in order t... 详细信息
来源: 评论
Multiple Feature Fusion-based Video Face Tracking for IoT Big Data
arXiv
收藏 引用
arXiv 2021年
作者: Li, Tianping Liu, Zhifeng Qiao, Jianping Key Laboratory of Medical Physics and Image Processing in Shandong Province Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University School of Physics and Electronics Jinan Shandong China School of Physics and Electronics Shandong Normal University JinanShandong China School of Physics and Electronics Shandong Normal University Jinan China
With the advancement of IoT and artificial intelligence technologies, and the need for rapid application growth in fields such as security entrance control and financial business trade, facial information processing h... 详细信息
来源: 评论
FCloudless: A Performance-Aware Collaborative Mechanism for JointCloud Serverless
FCloudless: A Performance-Aware Collaborative Mechanism for ...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Jianfei Liu Huaimin Wang Peichang Shi Yaojie Li Penghui Ma Guodong Yi National Key Laboratory of Parallel and Distributed Computing College of Computer Science National University of Defense Technology Changsha 410073 China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha 410073 China Xiangjiang Lab Changsha 410073 China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha 410073 China
As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to c...
来源: 评论
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded Logits for Few-Shot Text Classification
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yi Xu Jie Hu Zhiqiao Gao Jinpeng Chen School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China China Telecom Corporation Limited Research Institute Beijing China
Although the recent advances in pre-training language models have achieved great success and migrated annotation bottleneck for many tasks, the task-specific fine-tuning for text classification still requires thousand... 详细信息
来源: 评论
EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining
EFM: A Negative Network Public Opinion Early Warning Model B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Fanfeixue Meng Jingchen Wu Feifan Song Xu Wu Lan Hu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT School of Economics and Finance Changchun Finance College
With the popularity of the Internet and the increase in the number of netizens, it is of great significance to effectively monitor and predict the negative network public opinion on social media platforms. Most mainst...
来源: 评论
Predicting employee relations in enterprises by bi-directional link mining
Predicting employee relations in enterprises by bi-direction...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Wang Hong Sun Yanshen Institute of Information Science and Engineering Shandong Normal University Jinan Shandong Province China Computer Software Novel Technology Shandong Provincial Key Laboratory for Distributed Jinan Shandong Province China Department of Earth Sciences ZheJiang University Hangzhou Zhejiang Province China
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
An attention-based syntax-tree and tree-LSTM model for sentence summarization
收藏 引用
International Journal of Performability Engineering 2017年 第5期13卷 775-782页
作者: Liu, Wenfeng Liu, Peiyu Yang, Yuzhen Gao, Yaling Yi, Jing School of Information Science and Engineering Shandong Normal University Jinan250014 China Department of Computer and Information Engineering Heze University Heze274015 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China Ruipu Peony Industrial Technology Development Co. Ltd 274015 China School of Computer Science and Technology Shandong Jianzhu University Jinan250101 China
Generative Summarization is of great importance in understanding large-scale textual data. In this work, we propose an attention-based Tree-LSTM model for sentence summarization, which utilizes an attention-based synt... 详细信息
来源: 评论