咨询与建议

限定检索结果

文献类型

  • 218 篇 会议
  • 116 篇 期刊文献

馆藏范围

  • 334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 238 篇 工学
    • 188 篇 计算机科学与技术...
    • 164 篇 软件工程
    • 40 篇 信息与通信工程
    • 23 篇 生物工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 控制科学与工程
    • 14 篇 机械工程
    • 14 篇 化学工程与技术
    • 12 篇 建筑学
    • 9 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 农业工程
    • 7 篇 光学工程
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
  • 118 篇 理学
    • 80 篇 数学
    • 25 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 13 篇 系统科学
    • 12 篇 化学
  • 75 篇 管理学
    • 42 篇 图书情报与档案管...
    • 37 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 30 篇 教育学
    • 30 篇 教育学
  • 16 篇 医学
    • 13 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 13 篇 法学
    • 9 篇 社会学
  • 10 篇 农学
    • 9 篇 作物学
  • 4 篇 经济学
  • 3 篇 艺术学
  • 1 篇 文学

主题

  • 14 篇 data mining
  • 7 篇 education
  • 7 篇 computational mo...
  • 7 篇 algorithm design...
  • 7 篇 genetic algorith...
  • 7 篇 ontology
  • 7 篇 heuristic algori...
  • 6 篇 access control
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 educational inst...
  • 6 篇 optimization
  • 6 篇 websites
  • 6 篇 feature extracti...
  • 6 篇 cloud computing
  • 5 篇 complex networks
  • 5 篇 information tech...
  • 5 篇 servers
  • 5 篇 prediction algor...

机构

  • 157 篇 school of inform...
  • 97 篇 shandong provinc...
  • 80 篇 shandong provinc...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 8 篇 shandong provinc...
  • 8 篇 state key lab of...
  • 6 篇 zhejiang univers...
  • 6 篇 shandong provinc...
  • 6 篇 school of comput...
  • 6 篇 school of admini...
  • 6 篇 department of in...
  • 6 篇 shandong academy...
  • 5 篇 basic education ...
  • 5 篇 school of inform...

作者

  • 52 篇 liu hong
  • 26 篇 zheng xiangwei
  • 24 篇 zhang yongsheng
  • 22 篇 zhang guijuan
  • 22 篇 zhang huaxiang
  • 21 篇 lu dianjie
  • 19 篇 hong liu
  • 12 篇 xiangwei zheng
  • 12 篇 wang hong
  • 11 篇 liu peiyu
  • 10 篇 gao ling
  • 9 篇 guijuan zhang
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 8 篇 hong wang
  • 8 篇 liu li
  • 7 篇 yu xiaomei
  • 7 篇 lin jianqiang
  • 7 篇 lyu lei
  • 7 篇 fang xiaonan

语言

  • 326 篇 英文
  • 5 篇 中文
  • 3 篇 其他
检索条件"机构=Shandong Provincial Key Lab for Distributed Computer Software Novel Technology"
334 条 记 录,以下是61-70 订阅
排序:
An improved cellular genetic algorithm with evolutionary rules for 3D animation modeling design
An improved cellular genetic algorithm with evolutionary rul...
收藏 引用
12th International Conference on computer-Aided Design and computer Graphics, CAD/Graphics 2011
作者: Yang, Xiaopeng Liu, Hong Ding, Yanhui Yu, Hanchao School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
In order to inspire and assist designers to create novel 3D animation modelings, an improved cellular genetic algorithm with evolutionary rules is proposed in this paper and applied in 3D animation modeling design. In... 详细信息
来源: 评论
Association rules mining algorithm based on rough set
Association rules mining algorithm based on rough set
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Xun, Jiao Xu, Lian-Cheng Qi, Lin School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
Association rules mining algorithm based on Rough Set theory is put forward using the idea of Rough Set theory, which applies the improved Apriori algorithm in association rules mining on the basis of Decision Table. ... 详细信息
来源: 评论
Adaptive web wrapper based on hybrid hierarchical conditional random fields for web data integration
Adaptive web wrapper based on hybrid hierarchical conditiona...
收藏 引用
2nd International Conference on Information Engineering and Applications, IEA 2012
作者: Ding, Yanhui Wang, Hongguo School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
During the process of Web data integration, new related Web sites consisting valuable data will be identified constantly. Wrapper induction based on labeled examples is a widely accepted method. However, manually labe... 详细信息
来源: 评论
A new way for path planning based on BBO in crowd animation
A new way for path planning based on BBO in crowd animation
收藏 引用
2013 International Conference on Future computer and Information technology, ICFCIT 2013
作者: Gao, Kaige Zheng, Xiangwei Ma, Hongwei School of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
In crowd animation production, it is difficult to design realistic and natural crowd motion paths using traditional methods. In order to solve the problems in generating paths of a crowd, a new approach based on an in... 详细信息
来源: 评论
Double anomaly detection algorithm based on dendritic cells
Double anomaly detection algorithm based on dendritic cells
收藏 引用
2014 International Conference on Materials Science and Computational Engineering, ICMSCE 2014
作者: Xu, Lian Cheng Xu, Di Zhou, Guang Gang Hou, Xiu Yan Department of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
On the problem of data quantity in anomaly detection, traditional dendritic cell algorithms should be improved by proposing an antigen data preprocessing method which introduced suspected abnormal base. The abnormal d... 详细信息
来源: 评论
A template extraction approach for image recognition
A template extraction approach for image recognition
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Wang, Gang Duan, Hui-Chuan School of Information Science and Engineering Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
A robust approach for extracting template from images with relatively poor quality is presented in this paper. The approach combines fast Fourier transformation algorithm and weighted normalized cross correlation algo... 详细信息
来源: 评论
3D model family design and development based on ontology: A knowledge support approach
3D model family design and development based on ontology: A ...
收藏 引用
2013 International Conference on Management Innovation and Information technology, MIIT 2013
作者: Wang, Jihua Wang, Huayu College of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
The design of 3D model family in knowledge support framework has been recognized as an efficient means to realize sufficient 3D model variety to satisfy a range of customer demands. This paper proposed 3D model family... 详细信息
来源: 评论
RETRACTED ARTICLE: Fuzzy value-at-risk and fuzzy conditional value-at-risk: Two risk measures under fuzzy uncertainty
RETRACTED ARTICLE: Fuzzy value-at-risk and fuzzy conditional...
收藏 引用
作者: Shang, Zhaoxia Liu, Hong Ma, Xiaoxian Liu, Yanmin School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology 250014 China
This paper deals with two risk management tools and their application on Economical crisis management. Next points out some problems in their research and application and the direction of research, introduced some con... 详细信息
来源: 评论
Status quo and development on cross-domain authentication based on public key cryptosystems
Status quo and development on cross-domain authentication ba...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Zheng, Zhihua School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
Authentication is the most basic prerequisite for secure communications. Authentication theory and technology play a key role in the application of modern cryptography. Cross-domain authentication among entities of di... 详细信息
来源: 评论
Integrity verification of cloud data
Integrity verification of cloud data
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Kong, Fan-Xin Liu, Li School of Information Science and Engineering China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan China
This paper proposes a new program on the integrity of the data to the probabilistic methods when the number of documents inserted the pseudo-tuple becomes large. In this program, pseudo-tuple inserted in accordance wi... 详细信息
来源: 评论