咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 48 篇 会议

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 172 篇 工学
    • 124 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 27 篇 信息与通信工程
    • 11 篇 机械工程
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 控制科学与工程
    • 10 篇 生物工程
    • 9 篇 土木工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 材料科学与工程(可...
  • 108 篇 理学
    • 81 篇 数学
    • 25 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
  • 75 篇 管理学
    • 52 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 35 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 46 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 207 篇 英文
  • 10 篇 中文
  • 1 篇 其他
检索条件"机构=Key Laboratory of Computer Virtual Technology and System Integration of Hebei Province"
217 条 记 录,以下是81-90 订阅
排序:
Analysis on impact of node failure in software execution network
收藏 引用
Journal of Computational Information systems 2015年 第6期11卷 2217-2225页
作者: He, Haitao Ren, Rong Zhang, Bing Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
One or few failure nodes will cause cascading failure in software network, which would bring about security issues. Thus, analyzing nodes becomes an indispensable aid in software security. In this paper, software exec... 详细信息
来源: 评论
New friend recommendation with user interest and socialization
收藏 引用
Journal of Information and Computational Science 2015年 第11期12卷 4253-4262页
作者: Huang, Guoyan Chang, Yixin Li, Yakun College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Friend recommendation is popular in social site to help people make new friends and expand their social networks. However, the conventional friend recommendation method is low accuracy for the sparsity of data and col... 详细信息
来源: 评论
A novel approach to efficiently mine structural patterns from software execution sequence
收藏 引用
Journal of Computational Information systems 2015年 第3期11卷 1109-1119页
作者: Huang, Guoyan Zhang, Bing Ren, Rong Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Analyzing structure of a software system is not sufficient for understanding its functionality. Certain characteristics of software are often hidden in its structure and can only be discovered when the various executi... 详细信息
来源: 评论
Mining maximal frequent patterns based on hierarchical bit vector and stack principle
收藏 引用
Journal of Computational Information systems 2015年 第1期11卷 369-376页
作者: Wang, Qian Ren, Jiadong He, Haitao Huang, Guoyan College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Maximal frequent pattern mining usually adopts a global pattern growth way, and a maximal frequent pattern can be obtained unless most of its subsets are checked to be frequent. An algorithm for mining maximal frequen... 详细信息
来源: 评论
Research on Router Algorithm Based on Trust Primary Node in the Environment of P2P Network
Research on Router Algorithm Based on Trust Primary Node in ...
收藏 引用
2015 International Conference on Informatics, Control and Automation(ICA 2015)
作者: Jing CHEN Yun WAN Department of Computer College of Information Science and EngineeringYanshan University Key Laboratory of Computer Virtual Technology and System Integration of Hebei Province
The distributed, heterogeneous and anonymous attribute of P2 P networks make the node information sharing facing security problems. In order to prevent malicious and false service of nodes, and improve the retrieval e... 详细信息
来源: 评论
ENHANCING TWITTER BOT DETECTION VIA MULTIMODAL INVARIANT REPRESENTATIONS
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Jibing Peng, Jiquan Qu, Jin Du, ShuYing Wang, Kaiyu School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China
Detecting Twitter Bots is crucial for maintaining the integrity of online discourse, safeguarding democratic processes, and preventing the spread of malicious propaganda. However, advanced Twitter Bots today often emp... 详细信息
来源: 评论
Kainate induced gamma oscillations and spike-gamma relationship analysis
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第21期4卷 606-612页
作者: Wen, Dong Peng, Ce Li, Xiaoli Lu, Chengbiao The Key Laboratory for Computer Virtual Technology System Integration of HeBei Province Yanshan University Qinhuangdao Hebei 066004 China Institue of Electrical Engineering Yanshan University Qinhuangdao Hebei 066004 China
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi... 详细信息
来源: 评论
Real-time simulation of action-driven 3D subtle facial expressions
收藏 引用
Journal of Computational Information systems 2014年 第5期10卷 2137-2144页
作者: Tang, Yong Liang, Haiyan Guo, Dan Lv, Mengya Zhao, Jing College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
While the large-scale deformations such as the Laplacian deformation method could not synthesize new expressional details, this paper proposes a method for simulating different subtle facial expressions based on the K... 详细信息
来源: 评论
An algorithm based on compressed tree and bit vector table for mining frequent patterns on uncertain data streams
收藏 引用
Journal of Convergence Information technology 2012年 第20期7卷 389-398页
作者: Dong, Jun Zhang, Yuanyuan Song, Wei Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
Most of algorithms based on tree structure for mining frequent pattern on uncertain data streams always store a large number of tree nodes, and record the corresponding information of data streams which can cause mass... 详细信息
来源: 评论
Mining weighted closed sequential patterns by memory indexing
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第19期6卷 432-440页
作者: Ren, Jiadong Li, Shuo Dong, Jun College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
There exist two major problems in weighted closed sequential patterns mining. The first is that only the weights of items are considered and they ignore the time-interval information of data elements during the mining... 详细信息
来源: 评论