咨询与建议

限定检索结果

文献类型

  • 228 篇 会议
  • 131 篇 期刊文献

馆藏范围

  • 359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 254 篇 工学
    • 202 篇 计算机科学与技术...
    • 177 篇 软件工程
    • 44 篇 信息与通信工程
    • 24 篇 生物工程
    • 21 篇 生物医学工程(可授...
    • 17 篇 控制科学与工程
    • 16 篇 机械工程
    • 14 篇 化学工程与技术
    • 13 篇 建筑学
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 农业工程
    • 8 篇 土木工程
    • 7 篇 光学工程
    • 7 篇 动力工程及工程热...
  • 128 篇 理学
    • 89 篇 数学
    • 26 篇 生物学
    • 18 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 13 篇 化学
    • 13 篇 系统科学
  • 84 篇 管理学
    • 45 篇 图书情报与档案管...
    • 44 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 32 篇 教育学
    • 32 篇 教育学
  • 17 篇 医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 临床医学
    • 10 篇 药学(可授医学、理...
  • 13 篇 法学
    • 9 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 4 篇 经济学
  • 3 篇 艺术学
  • 1 篇 文学

主题

  • 14 篇 data mining
  • 9 篇 algorithm design...
  • 8 篇 computational mo...
  • 8 篇 cloud computing
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 optimization
  • 7 篇 genetic algorith...
  • 7 篇 ontology
  • 7 篇 heuristic algori...
  • 6 篇 access control
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 authentication
  • 6 篇 websites
  • 6 篇 data models
  • 5 篇 complex networks
  • 5 篇 information tech...
  • 5 篇 feature extracti...

机构

  • 161 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 8 篇 shandong provinc...
  • 8 篇 state key lab of...
  • 6 篇 zhejiang univers...
  • 6 篇 shandong provinc...
  • 6 篇 school of comput...
  • 6 篇 school of admini...
  • 6 篇 department of in...
  • 6 篇 shandong academy...
  • 5 篇 shandong normal ...
  • 5 篇 shandong provinc...

作者

  • 50 篇 liu hong
  • 24 篇 zheng xiangwei
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 20 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 xiangwei zheng
  • 11 篇 liu peiyu
  • 9 篇 guijuan zhang
  • 9 篇 gao ling
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 8 篇 hong wang
  • 8 篇 liu li
  • 7 篇 wang hongguo
  • 7 篇 yu xiaomei
  • 7 篇 ding yanhui

语言

  • 346 篇 英文
  • 8 篇 其他
  • 5 篇 中文
检索条件"机构=Shandong Key Laboratory for Normal Distributed Computer Software Technology"
359 条 记 录,以下是171-180 订阅
排序:
Recommendation of tourist attractions based on user preferences and attractions popularity
收藏 引用
Journal of Computational Information Systems 2014年 第20期10卷 8661-8668页
作者: Yu, Beijia Liu, Fangai Li, Tianlai School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Technology Jinan China
At present, the recommendation of information for travel is concentrating on two parts: personalized travel recommendations and classic travel recommendations. However, the interaction relationship between the user pr... 详细信息
来源: 评论
Vertical mining probabilistic frequent itemsets from uncertain database
收藏 引用
Journal of Computational Information Systems 2014年 第22期10卷 9813-9820页
作者: Yu, Xiaomei Wang, Hong Zheng, Xiangwei School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan China
With the emergence of new applications, the traditional methods of mining frequent itemsets are confronted with enormous challenges in uncertain environment. As one of the most classic algorithms, Eclat algorithm is r... 详细信息
来源: 评论
Semantic concept and weighted visual feature based image retrieval
收藏 引用
Journal of Information and Computational Science 2014年 第18期11卷 6461-6469页
作者: Zhu, Nana Zhang, Huaxiang Kong, Wenjie School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
The performance of content-based image retrieval is degraded because of the existence of the semantic gap. In order to address this drawback, this paper proposes an image retrieval method fusing with the semantic conc... 详细信息
来源: 评论
A two-stage method for annotation-based image retrieval
收藏 引用
Journal of Computational Information Systems 2014年 第14期10卷 6253-6260页
作者: Kong, Wenjie Zhang, Huaxiang Liu, Li School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
To improve the accuracy of image retrieval, a two-stage method for annotation-based image retrieval is proposed. In the approach, images are ranked using their attached text information at the first stage, and Content... 详细信息
来源: 评论
Multi-document sentiment summarization based on LDA model
收藏 引用
Journal of Computational Information Systems 2014年 第15期10卷 6389-6399页
作者: Xun, Jing Liu, Peiyu Yang, Yuzhen Wei, Jingxuan School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
Nowadays it is difficult to get overall sentiment orientation of the comment text. To solve this problem, in the paper, the method of multi-document sentiment summarization based on model Latent Dirichlet Allocation (... 详细信息
来源: 评论
Research of improved ABAC model supporting fine-grained attribute revocation
收藏 引用
Journal of Computational Information Systems 2014年 第13期10卷 5755-5762页
作者: Zou, Jiashun Zhang, Yongsheng School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
To solve the problem of authorization inflexibility and the problem of coarse-grained attribute revocation exist in the attribute based access control model, a kind of improved attribute based access control model whi... 详细信息
来源: 评论
A secure anonymous authentication scheme for wireless communications using smart cards
收藏 引用
International Journal of Network Security 2015年 第3期17卷 237-245页
作者: Lu, Yanrong Wu, Xiaobo Yang, Xiaodong Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing100876 China School of Software Engineering Yantai Vocational College Shandong Yantai264670 China College of Computer Science and Engineering Northwest Normal University Gansu Lanzhou730070 China
Wireless communications have become one of the most key parts in our everyday life, which give us facility on work and life but they still bring a great security risk. A crucial problem with wireless communications is... 详细信息
来源: 评论
Design of sub-optimal controller for discrete-time systems with multiple control input delays
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第9期6卷 2531-2538页
作者: Han, Shiyuan Wu, Xiaoyu Zheng, Xiangwei Chen, Yuehui Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University No. 88 East Wenhua Road Lixia District Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan No. 336 West Road of Nanxinzhuang Jinan China Shandong Computer Science Center No. 2008 Xinle Street Jinan China
This note presents the sub-optimal linear-quadratic controller for a discretetime system with multiple control input delays. Sub-optimality of the solution is designed in two steps. First, a delay-free transformed sys... 详细信息
来源: 评论
Network Forensics Scenario Reconstruction Method Based on Hidden Markov Models
Network Forensics Scenario Reconstruction Method Based on Hi...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Weiping Gu Liancheng Xu Min Ren Xiaoyan Han School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Mathematics and Quantitative Economics Shandong University of Finance and Economics Jinan China
Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order ... 详细信息
来源: 评论
Unbounded anonymous hierarchical identity-based encryption in the standard model
收藏 引用
Journal of Networks 2014年 第7期9卷 1846-1853页
作者: Wang, Hao Wu, Lei School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Shandong Provincial Key Laboratory of Software Engineering Jinan 250101 China
In this work, we present a new anonymous HIBE scheme which is unbounded in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In most of previous constructio... 详细信息
来源: 评论