咨询与建议

限定检索结果

文献类型

  • 168 篇 期刊文献
  • 52 篇 会议

馆藏范围

  • 220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 174 篇 工学
    • 124 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 30 篇 信息与通信工程
    • 12 篇 生物工程
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 9 篇 机械工程
    • 9 篇 控制科学与工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 110 篇 理学
    • 81 篇 数学
    • 27 篇 统计学(可授理学、...
    • 17 篇 生物学
    • 13 篇 物理学
    • 9 篇 化学
    • 7 篇 系统科学
  • 76 篇 管理学
    • 53 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 12 篇 法学
    • 12 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 7 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 database systems
  • 2 篇 detection

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 34 篇 school of inform...
  • 20 篇 key laboratory f...
  • 16 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 state key lab of...

作者

  • 44 篇 ren jiadong
  • 15 篇 dong jun
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 10 篇 he haitao
  • 9 篇 gong jibing
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 tang yong
  • 7 篇 jin shunfu
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 gu xiaoying

语言

  • 210 篇 英文
  • 9 篇 中文
  • 2 篇 其他
检索条件"机构=The Key Lab for Computer Virtual Technology and System Integration"
220 条 记 录,以下是111-120 订阅
排序:
Mining maximal frequent patterns based on hierarchical bit vector and stack principle
收藏 引用
Journal of Computational Information systems 2015年 第1期11卷 369-376页
作者: Wang, Qian Ren, Jiadong He, Haitao Huang, Guoyan College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Maximal frequent pattern mining usually adopts a global pattern growth way, and a maximal frequent pattern can be obtained unless most of its subsets are checked to be frequent. An algorithm for mining maximal frequen... 详细信息
来源: 评论
ENHANCING TWITTER BOT DETECTION VIA MULTIMODAL INVARIANT REPRESENTATIONS
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Jibing Peng, Jiquan Qu, Jin Du, ShuYing Wang, Kaiyu School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China
Detecting Twitter Bots is crucial for maintaining the integrity of online discourse, safeguarding democratic processes, and preventing the spread of malicious propaganda. However, advanced Twitter Bots today often emp... 详细信息
来源: 评论
Research of Signed Networks Community Detection Based on the Tightness of Common Neighbors  6
Research of Signed Networks Community Detection Based on the...
收藏 引用
6th International Conference on Digital Home, ICDH 2016
作者: Xinzhuan, Hu Guo, Jingfeng Chen, Xiao Zhao, Xiaomeng School of Economics and Management Yanshan University Hebei Ave. Qinhuangdao China College of Information Science and Engineering Yanshan University Hebei Ave. Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Hebei Ave. Qinhuangdao China
According to the characteristics of positive and negative edge of signed networks, a new signed networks community detection algorithm BTCN-SNCD (Signed networks Community Detection Based on the Tightness of Common Ne... 详细信息
来源: 评论
Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling  5th
Mobile APP User Attribute Prediction by Heterogeneous Inform...
收藏 引用
5th International Conference on Dependability in Sensor, Cloud, and Big Data systems and Applications, DependSys 2019
作者: Zhang, Hekai Gong, Jibing Teng, Zhiyong Wang, Dan Wang, Hongfei Du, Linfeng Bhuiyan, Zakirul Alam School of Information Science and Engineering Yanshan University Qinhuangdao066004 China The Key Lab for Computer Virtual Technology and System Integration Yanshan University Qinhuangdao066004 China School of Computer Science and Engineering Beihang University Beijing100191 China Shenyuan Honors College Beihang University Beijing100191 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214000 China Department of Computer and Information Sciences Fordham University New York United States
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv... 详细信息
来源: 评论
virtual grid-based clustering of uncertain data on vulnerability database
收藏 引用
Journal of Convergence Information technology 2012年 第20期7卷 429-438页
作者: Dong, Jun Cao, Mengmeng Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Most existing vulnerability taxonomy classifies vulnerabilities by their idiosyncrasies, weaknesses, flaws and faults et al. The disadvantage of the taxonomy is that the classification standard is not unified and ther... 详细信息
来源: 评论
A density grid-based uncertain data stream clustering algorithm
收藏 引用
Journal of Computational Information systems 2014年 第9期10卷 3619-3626页
作者: He, Haitao Zhao, Jintian The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China
The existing grid-based uncertain data stream clustering algorithms are fast but low-accuracy, and sensitive to user-specified threshold. In order to solve the above problems, a density grid-based uncertain data strea... 详细信息
来源: 评论
A Time-aware POI Recommendation Method Exploiting User-based Collaborative Filtering and Location Popularity
A Time-aware POI Recommendation Method Exploiting User-based...
收藏 引用
2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)
作者: Ya-li SI Fu-zhi ZHANG Wen-yuan LIU School of Information Science and Engineering Yanshan University School of Liren Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
Point-of-interest(POI) recommendation becomes an important research for location-based social networks, since it helps modern citizens to explore new locations in unvisited cites effectively according to their prefere... 详细信息
来源: 评论
Object Tracking by Jointly Utilizing Template Updating and Relocation Mechanisms⋆
SSRN
收藏 引用
SSRN 2023年
作者: Wen, Jia Ren, Kejun School of Information Science and Engineering Yanshan University Qinhuangdao066099 China The Key Laboratory for Computer Virtual Technology System Integration of Hebei Province China
The Siamese network-based tracker has achieved competitive performance in the field of single target tracking because of its excellent tracking speed and tracking accuracy. When faced with target deformations, most Si... 详细信息
来源: 评论
Integrating LDA into the weighted average method for semantic friend recommendation  6th
Integrating LDA into the weighted average method for semanti...
收藏 引用
6th CCF Academic Conference on Big Data, CCF Big Data 2018
作者: Gong, Jibing Chen, Shuai Gao, Xiaoxia Song, Yanqing Wang, Shuli School of Information Science and Engineering Yanshan University Qinhuangdao066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Key Laboratory for Software Engineering of Hebei Province Yanshan University Qinhuangdao066004 China The Department of Applied Mathematics Yanshan University Qinhuangdao066004 China
Friend recommendation is a fundamental service for both social networks and practical applications. The majority of existing friend-recommendation methods utilize user profiles, social relationships, or static post co... 详细信息
来源: 评论
Automatic web page data extraction through MD5 trigeminal tree and improved BIRCH
Automatic web page data extraction through MD5 trigeminal tr...
收藏 引用
2022 International Conference on Electronic Information Engineering, Big Data, and computer technology, EIBDCT 2022
作者: Gong, Jibing Kou, Xiaomeng Zhang, Hanyun Peng, Jiquan Gong, Shishan Wang, Shuli School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Key Laboratory for Software Engineering of Hebei Province Yanshan University Qinhuangdao066004 China School of Information Science Yanshan University Qinhuangdao066004 China
This paper proposes an automatic data extraction algorithm for web pages based on noise reduction and visualization blocks' construction. In this algorithm, we first build an MD5 trigeminal tree of the web page... 详细信息
来源: 评论