咨询与建议

限定检索结果

文献类型

  • 252 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 school of softwa...
  • 18 篇 school of cyber ...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 12 篇 school of inform...
  • 11 篇 shandong provinc...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 379 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
391 条 记 录,以下是381-390 订阅
排序:
A content-based retrieval algorithm for document image database
A content-based retrieval algorithm for document image datab...
收藏 引用
International Conference on Multimedia Technology
作者: Hou, Dewen Wang, Xichang Liu, Jiang Shandong Normal University Key Laboratory for Distributed Computer Software Shandong China Shandong Oumasoft Co. Ltd. Research Institute of Digital Image Processing Shandong China
This paper makes a study on content-based image retrieval algorithm for document image database. Given a query image the system returns overall similar images in database. For document images, we propose the algorithm... 详细信息
来源: 评论
Multi-Agent network security audit system based on information entropy
Multi-Agent network security audit system based on informati...
收藏 引用
2010 IEEE 2nd Symposium on Web Society, SWS 2010
作者: Lü, Taoxia Liu, Peiyu School of Information Science and Engineering Shandong Normal University Ji'nan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan 250014 China
Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior's security problem highlights gradually. On the ... 详细信息
来源: 评论
Web services security policy
Web services security policy
收藏 引用
2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010
作者: Zhang, Yongsheng Sun, Cuicui Yang, Jing Wang, Ying School of Information Science and Engineering Shandong Normal University Ji'nan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan 250014 China
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then... 详细信息
来源: 评论
Application research of 3D collaborative design system based on HSF
Application research of 3D collaborative design system based...
收藏 引用
IEEE Symposium on Web Society
作者: Men, Chao Liu, Hong School of Information Science and Engineering Shandong Normal University Jinan Shandong 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan Shandong 250014 China
In a collaborative design, especially in an internet-based collaboration, the implement of real-time collaboration is difficult to achieve as a result of many factors such as network bandwidth constraints. HSF files p... 详细信息
来源: 评论
RETRACTED ARTICLE: Research of an improved web visit statistical method applying in user's interest degree
RETRACTED ARTICLE: Research of an improved web visit statist...
收藏 引用
作者: Zhang, Zhuyu Liu, Peiyu Zhu, Zhenfang Shan, Guojie School of Information Science and Engineering Shandong Normal University Ji'nan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan 250014 China
To solve the issue that traditional web visit statistical method in hits as the standard expresses the web visit amount inaccurately, both of the existing methods are analyzed, an improved visit statistical method is ... 详细信息
来源: 评论
A method to determine the hyper-parameter range for tuning RBF support vector machines
A method to determine the hyper-parameter range for tuning R...
收藏 引用
2010 International Conference on E-Product E-Service and E-Entertainment, ICEEE2010
作者: Duan, Huichuan Wang, Ruijin Liu, Xiyu Liu, Hong School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Management Shandong University Jinan China School of Management and Economy Shandong Normal University Jinan China
A method to determine (Cγ), the hyper-parameters, range for Radial Basis Function Support Vector Machines (RBF SVMs) is proposed. The γ range is determined by the extreme Squared Euclidean Distance (SED) quantiles o... 详细信息
来源: 评论
Notice of Retraction: Fuzzy Value-at-Risk and Fuzzy Conditional Value-at-Risk: Two risk measures under fuzzy uncertainty
Notice of Retraction: Fuzzy Value-at-Risk and Fuzzy Conditio...
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Zhaoxia Shang Hong Liu Xiaoxian Ma Yanmin Liu School of Information Science and Engineering Provincial Key Laboratory of Distributed Computer Software Novel Technology Shandong Normal University Shandong China
This article has been retracted by the publisher.
来源: 评论
The research on portfolio optimization model and strategy for multiple objectives
The research on portfolio optimization model and strategy fo...
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Zhaoxia Shang Hong Liu School of Information Science and Engineering Shandong Provincial Key Laboratory of Distributed Computer Software Novel Technology Shandong Normal University China
Application of multi-objective optimization method, the issue of portfolio risk is analyzed and simulated and the feasibility of the scheme is validated under the uncertain investment environment. Proposed the use of ... 详细信息
来源: 评论
Web Services Security Policy
Web Services Security Policy
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Yongsheng Zhang Cuicui Sun Yang Jing Wang Ying School of Information Science Engineering of Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan China
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then... 详细信息
来源: 评论
A Hierarchical Network (HRRP(k)) and Its Application
A Hierarchical Network (HRRP(k)) and Its Application
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Fang-Ai Liu Chang-Ming Xing Shandong Provincial Key Laboratory of Distributed Computer Software Novel Technology Shandong Normal University Jinan China School of further education Shandong University of Finance Jinan China
This paper is concerned with the problem of how to share distributed resources. Based on a distributed resource sharing application in schools, an HRRP(k) network is proposed and its properties studied. It is proven t... 详细信息
来源: 评论