咨询与建议

限定检索结果

文献类型

  • 212 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 253 篇 工学
    • 175 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 40 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 19 篇 控制科学与工程
    • 16 篇 土木工程
    • 16 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电气工程
    • 14 篇 建筑学
    • 11 篇 生物医学工程(可授...
    • 10 篇 动力工程及工程热...
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 7 篇 农业工程
    • 6 篇 材料科学与工程(可...
    • 5 篇 力学(可授工学、理...
  • 143 篇 理学
    • 99 篇 数学
    • 31 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 16 篇 物理学
    • 13 篇 化学
    • 11 篇 系统科学
  • 100 篇 管理学
    • 60 篇 图书情报与档案管...
    • 41 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 13 篇 法学
    • 13 篇 社会学
  • 10 篇 农学
    • 9 篇 作物学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 经济学
  • 1 篇 军事学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 7 篇 graphics process...
  • 7 篇 data mining
  • 6 篇 computational mo...
  • 6 篇 analytical model...
  • 5 篇 visualization
  • 4 篇 information syst...
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 efficiency
  • 4 篇 probability
  • 4 篇 virtual reality
  • 4 篇 mesh generation
  • 3 篇 parallel process...
  • 3 篇 deep learning
  • 3 篇 concurrent compu...
  • 3 篇 trees (mathemati...
  • 3 篇 model checking
  • 3 篇 acceleration

机构

  • 60 篇 college of infor...
  • 42 篇 the key laborato...
  • 35 篇 school of inform...
  • 20 篇 key laboratory f...
  • 18 篇 state key labora...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 state key labora...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 9 篇 college of infor...
  • 8 篇 school of comput...
  • 8 篇 guangdong-hongko...
  • 7 篇 key laboratory f...
  • 7 篇 national key lab...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...

作者

  • 45 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 10 篇 xia chunhe
  • 9 篇 wu hongfei
  • 9 篇 gong jibing
  • 8 篇 gao xiaopeng
  • 8 篇 jin shunfu
  • 8 篇 kang jiawen
  • 7 篇 niyato dusit
  • 7 篇 zhang fuzhi
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 6 篇 wang lei
  • 6 篇 cao zining
  • 6 篇 jing chen
  • 6 篇 wang zhiqiang

语言

  • 299 篇 英文
  • 18 篇 中文
  • 9 篇 其他
检索条件"机构=The Key Laboratory for Computer Virtual Technology and System Integration"
325 条 记 录,以下是261-270 订阅
Research On computer Network Defense Policy Conflict Detection
Research On Computer Network Defense Policy Conflict Detecti...
收藏 引用
World Congress on Information and Communication Technologies
作者: Chao Yuan Xiaoyan Liang Yang Bo Chunhe Xia State Key Laboratory of Virtual Reality Technology and System Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University
Policy is an essential part of computer network defense, which also has important guidance effect in the deployment, implementation, and configuration of the defense system. Thus, the possibility of conflicts existing... 详细信息
来源: 评论
The Consistency Verification of computer Network Defense Policy and Measures
The Consistency Verification of Computer Network Defense Pol...
收藏 引用
World Congress on Information and Communication Technologies
作者: Junshun Hu Xiaoyan Liang Yang Bo Chunhe Xia State Key Laboratory of Virtual Reality Technology and System Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University
computer Network Defense Policy is the rules of computer network and security devices. In order to achieve specific security objectives, the network need to choose the defensive measures under certain conditions. In o... 详细信息
来源: 评论
The study to eeg synchronization in alzheimer's disease based on new s estimator method
收藏 引用
Journal of Convergence Information technology 2012年 第22期7卷 1-7页
作者: Wen, Dong Chen, Ruihong Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Qinhuangdao Hebei 066004 China Division of General Internal Medicine Xiantao First People's Hospital Xiantao Hubei 433000 China
Synchronization decay of resting state EEG has shown that cognitive dysfunction in Alzheimer's disease (AD) was relevant to a loss of functional connectivity in intermediate frequency bands. The new S estimator (N... 详细信息
来源: 评论
The effects of DHPG stimulation on spikes and theta frequency oscillations and spike-theta oscillation relations in rat MSDB slice
收藏 引用
Journal of Convergence Information technology 2012年 第17期7卷 442-449页
作者: Wen, Dong Ouyang, Gaoxiang Peng, Ce Li, Xiaoli Lu, Chengbiao Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Qinhuangdao Hebei China Institue of Electrical Engineering Yanshan University Qinhuangdao Hebei China National Key Laboratory of Cognitive Neuroscience and Learning Beijing Normal University Beijing 100088 China
Neuronal oscillations in the theta frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi... 详细信息
来源: 评论
A DAG-based algorithm of mining frequent closed itemsets in high dimensional datasets
收藏 引用
International Journal of Advancements in Computing technology 2012年 第19期4卷 213-222页
作者: Dong, Jun Chen, Shuai Chen, Jing Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Production Management Department Shanghai Aircraft Manufacturing Co.Ltd 200436 China
Algorithms based on row enumeration always scan and construct conditional transposed tables, which increases the execution time and space cost. To address this problem, we adopt the DAG (Directed Acyclic Graph) to com... 详细信息
来源: 评论
Rapid modeling for large scale Anhui-Styled Architectures
Rapid modeling for large scale Anhui-Styled Architectures
收藏 引用
International Conference on systems and Informatics (ICSAI)
作者: Feng Xue Xiaotao Wang School of Computer Science and Information Hefei University of Technology Hefei China State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China
To construct Anhui-Styled Architecture (ASA) models rapidly and automatically, we proposed an automatic modeling method by analyzing the basic structure of ASA in-depth. Firstly, we built modules' database, compos... 详细信息
来源: 评论
The analysis to gamma oscillations induced in high dose DHPG and spike-gamma oscillation relationship
收藏 引用
International Journal of Advancements in Computing technology 2012年 第20期4卷 553-560页
作者: Wen, Dong Lu, Chengbiao Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University QinhuangdaoHebei 066004 China School of Information Science and Engineering Yanshan University QinhuangdaoHebei 066004 China Institue of Electrical Engineering Yanshan University Qinhuangdao Hebei 066004 China
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi... 详细信息
来源: 评论
A new estimator analysis method to synchronization among multivariate neural series of mild cognitive impairment
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第23期6卷 868-874页
作者: Wen, Dong Guan, Xinyong Chen, Ruihong The Key Laboratory for Computer Virtual Technology System Integration of HeBei Province Yanshan University Qinhuangdao Hebei 066004 China Liren College Yanshan University Qinhuangdao Hebei 066004 China Division of General Internal Medicine Xiantao First People's Hospital Xiantao Hubei 433000 China
Synchronization decay of resting state EEG has shown that cognitive dysfunction in mild cognitive impairment (MCI) was relevant to a loss of functional connectivity in intermediate frequency bands. A new estimator ana... 详细信息
来源: 评论
An algorithm based on bit vector decomposition and hash linklist for mining frequent patterns in data streams
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第22期6卷 570-579页
作者: Ren, Jiadong Zhang, Yuanyuan Yu, Shiying College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Hebei Provincial S and T Management Information Center 159 Dongfeng Road Shijiazhuang 050021 China
Most of algorithms based on bit vector for mining frequent pattern always produce candidate itemsets and scan the same data repeatedly;this increases the running time and the space consumption. In this paper, an algor... 详细信息
来源: 评论
Process Calculus with Data Structure and its Model Checking Algorithm
收藏 引用
Physics Procedia 2012年 33卷 782-789页
作者: Qing Zheng Zi-Ning Cao Department of Computer Science and Technology Nanjing University of Aero. & Astro. Nanjing 210016 P.R. China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 P.R. China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 P.R. China
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of... 详细信息
来源: 评论