咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,598 篇 期刊文献

馆藏范围

  • 3,491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,306 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 108 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 46 篇 security
  • 46 篇 cryptography

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 47 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,955 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3491 条 记 录,以下是2681-2690 订阅
排序:
Graph-cluster-mine: weighted closed key path mining in complex software executing network modules
收藏 引用
Journal of Computational information Systems 2015年 第1期11卷 285-295页
作者: Ren, Jiadong Li, Weina Han, Gaowei College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration Qinhuangdao China
Previous key path mining algorithms have high computation complexity in the whole software executing network. But the network can be clustered into modules to find key paths in the module. If simplified strategy, weig... 详细信息
来源: 评论
Research on Router Algorithm Based on Trust Primary Node in the Environment of P2P network
Research on Router Algorithm Based on Trust Primary Node in ...
收藏 引用
2015 International Conference on Informatics, Control and Automation(ICA 2015)
作者: Jing CHEN Yun WAN Department of Computer College of Information Science and EngineeringYanshan University Key Laboratory of Computer Virtual Technology and System Integration of Hebei Province
The distributed, heterogeneous and anonymous attribute of P2 P networks make the node information sharing facing security problems. In order to prevent malicious and false service of nodes, and improve the retrieval e... 详细信息
来源: 评论
Deep Label Distribution Learning for Apparent Age Estimation
Deep Label Distribution Learning for Apparent Age Estimation
收藏 引用
International Conference on computer Vision Workshops (ICCV Workshops)
作者: Xu Yang Bin-Bin Gao Chao Xing Zeng-Wei Huo Xiu-Shen Wei Ying Zhou Jianxin Wu Xin Geng School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Southeast University Nanjing Jiangsu CN
In the age estimation competition organized by ChaLearn, apparent ages of images are provided. Uncertainty of each apparent age is induced because each image is labeled by multiple individuals. Such uncertainty makes ... 详细信息
来源: 评论
A novel PSO for portfolio optimization based on heterogeneous multiple population strategy
A novel PSO for portfolio optimization based on heterogeneou...
收藏 引用
Congress on Evolutionary Computation
作者: Xushan Yin Qingjian Ni Yuqing Zhai College of Software Engineering Southeast University Nanjing China MOE Key Lab of Computer Network & Information Integration P.R.China
The problem of portfolio selection in the field of financial engineering has received more attention in recent years. This paper presents a novel heterogeneous multiple population particle swarm optimization algorithm... 详细信息
来源: 评论
Research on community detection in social network based on Pairwise Merging
收藏 引用
Journal of Computational information Systems 2015年 第19期11卷 7079-7086页
作者: Chen, Jing Wan, Yun Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China College of Information Science and Engineering Yanshan University Qinhuangdao China
Community detection has become an important challenge during the past decade. network is divided into some groups or communities that are densely connected to each other inside while less connected to the nodes outsid... 详细信息
来源: 评论
Improving neighbourhood quality for CHUCKY: An empirical study
收藏 引用
Journal of Computational information Systems 2015年 第16期11卷 5967-5977页
作者: Zhao, Fengda Yang, Ke Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Vulnerability discovery is at the centre of attention in computer security. Most vulnerability detection methods need considerable human auditing, thus making vulnerability detection inefficient and unreliable. Simila... 详细信息
来源: 评论
Community detection algorithm in signed social networks based on statistics and merger
收藏 引用
Journal of information and Computational Science 2015年 第15期12卷 5589-5599页
作者: Guo, Jingfeng Zhao, Yue Hu, Xinzhuan Liu, Yuanying College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Researches on community detection in signed social networks focus on the assignment of positive and negative edges. However, the community detection approaches that positive and negative edges are handled separately i... 详细信息
来源: 评论
Analysis on impact of node failure in software execution network
收藏 引用
Journal of Computational information Systems 2015年 第6期11卷 2217-2225页
作者: He, Haitao Ren, Rong Zhang, Bing Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
One or few failure nodes will cause cascading failure in software network, which would bring about security issues. Thus, analyzing nodes becomes an indispensable aid in software security. In this paper, software exec... 详细信息
来源: 评论
Graph-dissimilar-detect: dissimilar path detecting in complex software behavior network based on time-interval weight and dissimilarity
收藏 引用
Journal of Computational information Systems 2015年 第2期11卷 535-545页
作者: Ren, Jiadong Li, Weina Han, Gaowei College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Dissimilar path detection is an important task in software behavior detection. Previous dissimilar path mining algorithms ignore time-interval weight and dissimilarity. Therefore, a dissimilar path detecting algorithm... 详细信息
来源: 评论
Road network information based edge bundling
收藏 引用
Journal of information and Computational Science 2015年 第13期12卷 4909-4918页
作者: Nie, Junlan Zhang, Jikai Xin, Shuyue Guo, Dongliang College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
To solve edge confusion problems in the geo-related graph visualization, here we present an edge bundling algorithm based on the road network information. First, the improved Dijkstra shortest path algorithm is employ... 详细信息
来源: 评论