咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 141 篇 期刊文献

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 212 篇 计算机科学与技术...
    • 183 篇 软件工程
    • 55 篇 信息与通信工程
    • 27 篇 生物工程
    • 22 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 8 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 87 篇 管理学
    • 50 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 17 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 157 篇 school of inform...
  • 97 篇 shandong provinc...
  • 79 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zheng xiangwei
  • 22 篇 zhang huaxiang
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 379 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
391 条 记 录,以下是41-50 订阅
排序:
Bilevel genetic algorithm with clustering for large scale traveling salesman problems
Bilevel genetic algorithm with clustering for large scale tr...
收藏 引用
2016 International Conference on Information System and Artificial Intelligence, ISAI 2016
作者: Tan, Yan-Yan Tan, Li-Zhuang Yun, Guo-Xiao Zheng, Wei School of Information Science and Engineering Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
The Traveling Salesman Problem (TSP) belongs to the class of NP-hard optimization problems. Its solving procedure is complicated, especially for large scale problems. In order to solve the large scale TSPs efficiently... 详细信息
来源: 评论
RETRACTED ARTICLE: Fuzzy value-at-risk and fuzzy conditional value-at-risk: Two risk measures under fuzzy uncertainty
RETRACTED ARTICLE: Fuzzy value-at-risk and fuzzy conditional...
收藏 引用
作者: Shang, Zhaoxia Liu, Hong Ma, Xiaoxian Liu, Yanmin School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology 250014 China
This paper deals with two risk management tools and their application on Economical crisis management. Next points out some problems in their research and application and the direction of research, introduced some con... 详细信息
来源: 评论
Association rules mining algorithm based on rough set
Association rules mining algorithm based on rough set
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Xun, Jiao Xu, Lian-Cheng Qi, Lin School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
Association rules mining algorithm based on Rough Set theory is put forward using the idea of Rough Set theory, which applies the improved Apriori algorithm in association rules mining on the basis of Decision Table. ... 详细信息
来源: 评论
A dynamic and resource sharing virtual network mapping algorithm
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1101-1112页
作者: Xiancui Xiao Xiangwei Zheng Ji Bian Cun Ji Xinchun Cui School of Information Science and Engineering Shandong Normal UniversityJinan250014China School of Information Engineering Shandong Management UniversityJinan250358China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014China School of Computer Science and Technology Qufu Normal UniversityRizhao276800China
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of ind... 详细信息
来源: 评论
Status quo and development on cross-domain authentication based on public key cryptosystems
Status quo and development on cross-domain authentication ba...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Zheng, Zhihua School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
Authentication is the most basic prerequisite for secure communications. Authentication theory and technology play a key role in the application of modern cryptography. Cross-domain authentication among entities of di... 详细信息
来源: 评论
Integrity verification of cloud data
Integrity verification of cloud data
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Kong, Fan-Xin Liu, Li School of Information Science and Engineering China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
This paper proposes a new program on the integrity of the data to the probabilistic methods when the number of documents inserted the pseudo-tuple becomes large. In this program, pseudo-tuple inserted in accordance wi... 详细信息
来源: 评论
Attribute-based access control security model in service-oriented computing
收藏 引用
2012 International Conference on Cybernetics and Informatics, ICCI 2012
作者: Zhang, Yongsheng S. Wu, Mingfeng F. Wu, Lei Li, Yuanyuan Y. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology School of Information Science and Engineering Shandong Normal University 250014 Jinan China
Currently, industrial and scientific community are concerned about Service-Oriented Computing (SOC), whose key technology is Web services. Web service is a new distributed computing model. It has a broad prospect in a... 详细信息
来源: 评论
Characteristics of the relation between diseases and acupuncture points in human body
Characteristics of the relation between diseases and acupunc...
收藏 引用
2011 IEEE International Symposium on IT in Medicine and Education, ITME 2011
作者: Wang, Hong Liu, Hong Jin, Yue-Heng Institute of Information Science and Engineering ShanDong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan 250014 China
In this paper, we analyze the characteristics of an acupoint-disease network by using complex networks theory. Firstly, we build an acupoint-disease network using the data from traditional Chinese medicine acupuncture... 详细信息
来源: 评论
Modeling and dynamics analyses of immobilized CSTR bioreactor using transfer function model
Modeling and dynamics analyses of immobilized CSTR bioreacto...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Gao, Ling Institute of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan 250014 China
CSTR (Continuous Stirred Tank Reactor) is commonly used in case of immobilized enzyme or immobilized cells. Mathematical model is a useful tool in reactor design, operation condition optimization, and production proce... 详细信息
来源: 评论
Analysis of cloud computing and its security
Analysis of cloud computing and its security
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Tian, Ming Zhang, Yongsheng School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
Cloud computing is another milestone in the integration of computer technology and the development of the Internet, people have gradually known it, and it attracts the concerns of major IT enterprises, meanwhile it wi... 详细信息
来源: 评论