咨询与建议

限定检索结果

文献类型

  • 168 篇 期刊文献
  • 52 篇 会议

馆藏范围

  • 220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 174 篇 工学
    • 124 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 30 篇 信息与通信工程
    • 12 篇 生物工程
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 9 篇 机械工程
    • 9 篇 控制科学与工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 110 篇 理学
    • 81 篇 数学
    • 27 篇 统计学(可授理学、...
    • 17 篇 生物学
    • 13 篇 物理学
    • 9 篇 化学
    • 7 篇 系统科学
  • 76 篇 管理学
    • 53 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 12 篇 法学
    • 12 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 7 篇 complex networks
  • 7 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 database systems
  • 2 篇 detection

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 34 篇 school of inform...
  • 20 篇 key laboratory f...
  • 16 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 state key lab of...

作者

  • 44 篇 ren jiadong
  • 15 篇 dong jun
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 10 篇 he haitao
  • 9 篇 gong jibing
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 tang yong
  • 7 篇 jin shunfu
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 gu xiaoying

语言

  • 210 篇 英文
  • 9 篇 中文
  • 2 篇 其他
检索条件"机构=The Key Lab for Computer Virtual Technology and System Integration"
220 条 记 录,以下是191-200 订阅
排序:
A New Dynamic Routing Network for Monocular Depth Estimation  12
A New Dynamic Routing Network for Monocular Depth Estimation
收藏 引用
12th International Conference on CYBER technology in Automation, Control, and Intelligent systems, CYBER 2022
作者: Luo, Zhehao Luo, Sijin Liang, Guoyuan Wu, Xinyu Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Province Shenzhen China University of Chinese Academy of Sciences Beijing China Guangdong-Hong Kong-Macao Joint Laboratory of Human-Machine Intelligence-Synergy Systems Chinese Academy of Sciences Guangdong Province Shenzhen China Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Province Shenzhen China
Depth estimation is an essential task for understanding the geometry of 3D scenes. Compared with multi-view-based methods, monocular depth estimation is more challenging for the requirement of integrating not only glo... 详细信息
来源: 评论
Occlusion avoidance approach based on depth image of visual object
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第11期6卷 3103-3108页
作者: Zhang, Shihui Sang, Yu Zhang, Xiaojun School of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Avenue Qinhuangdao China E and A College Hebei Normal University of Science and Technology No. 360 West Hebei Street Qinhuangdao China
Occlusion avoidance is a more challenging problem in visual field. An occlusion avoidance approach based on depth image of visual object is proposed in this paper. Firstly, the occlusion detection is implemented for t... 详细信息
来源: 评论
A study on the influence propagation model in topic attention networks
收藏 引用
International Journal of Performability Engineering 2017年 第5期13卷 721-730页
作者: Chen, Xiao Guo, Jingfeng Tian, Kelun Fan, Chaozhi Pan, Xiao College of Information Science and Engineering YanShan University Qinhuangdao066004 China Qian'An College North China University of Science and Technology Qian'an064400 China College of Economic and Management Shijiazhuang Tiedao University Shijiazhuang050043 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao066004 China
The social networks with the complex user relations and huge amount of data and hidden information, bring new opportunities and challenges for the study of information diffusion and influence maximization. In recent y... 详细信息
来源: 评论
Skin panel design for a morphing mechanism
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第10期7卷 2161-2167页
作者: Zhao, Qiang Guo, Xliuan Xi, Fengfeng Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province College of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao066004 China Department of Aerospace Engineering Ryerson University TorontoONM5B 2K3 Canada
A segmentation method is proposed to aid rigid skin panel design for an existing modular morphing wing mechanism. The method divides the surface of the modular morphing mechanism into panels through geometry discretiz... 详细信息
来源: 评论
Frequent closed itemsets mining using ITBitree
收藏 引用
International Journal of Advancements in Computing technology 2012年 第17期4卷 271-279页
作者: Ren, Jiadong Song, Wei Yu, Shiying College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Hebei Provincial S and T Management Information Center 159 Dongfeng Road Shijiazhuang Hebei 050021 China
The set of frequent closed itemsets is much smaller than the one of all frequent itemsets. Meanwhile it retains the completeness. In this paper, we propose an ITBitree-based algorithm, called ITBitreeFCIM (ITBitree Fr... 详细信息
来源: 评论
Dynamic spectrum allocation scheme with real-time traffic and its performance optimization
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第8期6卷 2243-2250页
作者: Shi, Guoying Jin, Shunfu Li, Yongqiang School of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 Hebei Avenue Qinhuangdao China The First Hospital of Qinhuangdao No. 258 Wenhua Road Qinhuangdao China
Aiming at relieving the shortage problem of wireless frequency resource, sec- ondary users in cognitive radio networks occupy the spectrum hole opportunistically. In cognitive radio networks, primary users have preemp... 详细信息
来源: 评论
Mining critical nodes in software execution network based on complex network
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第9期7卷 1879-1884页
作者: Wang, Lei Dong, Jun Ren, Jiadong College of Information Science and Engineering Yanshan University No. 360 Hebei Ave Qinhuangdao066004 China E & A College Hebei Normal University of Science and Technology No. 360 Hebei Ave Qinhuangdao066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Ave Qinhuangdao066004 China
It is significant for measuring the importance of nodes accurately to improve software stability and robustness in software network. A software execution directed network takes function as a node and relationship of f... 详细信息
来源: 评论
Mobile APP user attribute prediction by heterogeneous information network modeling
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Hekai Gong, Jibing Teng, Zhiyong Wang, Dan Wang, Hongfei Du, Linfeng Bhuiyan, Zakirul Alam School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Lab for Computer Virtual Technology and System Integration Yanshan University Qinhuangdao066004 China School of Computer Science and Engineering Beihang University Beijing100191 China Shenyuan Honors College Beihang University Beijing100191 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214000 China Department of Computer and Information Sciences Fordham University
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv... 详细信息
来源: 评论
Minkowski sum modeling of polyhedra based on VRML
收藏 引用
ICIC Express Letters 2013年 第2期7卷 455-460页
作者: Zhang, Jianfei Guo, Xijuan Geng, Qingjia Information Science and Engineering College Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province No. 438 Hebei Ave. Qinhuangdao 066004 China Computer and Control Engineering College Qiqihar University No. 42 Wenhua Street Qiqihar 161006 China
On the basis of the introduction to basic methods of the geometry modeling based on virtual reality modeling language (VRML) and the concepts of Minkowski sum computation of polyhedra, we present a method of Minkowski... 详细信息
来源: 评论
RNA secondary structure prediction based on density-based clustering
收藏 引用
ICIC Express Letters 2015年 第7期9卷 1965-1970页
作者: Wang, Changwu Wang, Xiuqin Wang, Baowen Liu, Wenyuan Wei, Zhenzhen Li, Yongqiang School of Information Science and Engineering Yanshan University No. 438 Hebei Ave Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 Hebei Ave Qinhuangdao China Department of Information The First Hospital of Qinhuangdao No. 258 Hebei Ave Qinhuangdao China
The ribonucleic acid (RNA) secondary structure prediction has designed to characterize the ensemble of structures, instead of only computing the minimum free energy structure. Clustering methods are brought to aid in ... 详细信息
来源: 评论