咨询与建议

限定检索结果

文献类型

  • 168 篇 期刊文献
  • 48 篇 会议

馆藏范围

  • 216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 171 篇 工学
    • 123 篇 计算机科学与技术...
    • 88 篇 软件工程
    • 27 篇 信息与通信工程
    • 11 篇 机械工程
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 控制科学与工程
    • 10 篇 生物工程
    • 9 篇 土木工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 材料科学与工程(可...
  • 108 篇 理学
    • 81 篇 数学
    • 25 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
  • 74 篇 管理学
    • 51 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection

机构

  • 60 篇 college of infor...
  • 43 篇 the key laborato...
  • 35 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 45 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 207 篇 英文
  • 9 篇 中文
  • 1 篇 其他
检索条件"机构=The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province"
216 条 记 录,以下是91-100 订阅
排序:
A density grid-based uncertain data stream clustering algorithm
收藏 引用
Journal of Computational Information systems 2014年 第9期10卷 3619-3626页
作者: He, Haitao Zhao, Jintian The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China
The existing grid-based uncertain data stream clustering algorithms are fast but low-accuracy, and sensitive to user-specified threshold. In order to solve the above problems, a density grid-based uncertain data strea... 详细信息
来源: 评论
virtual grid-based clustering of uncertain data on vulnerability database
收藏 引用
Journal of Convergence Information technology 2012年 第20期7卷 429-438页
作者: Dong, Jun Cao, Mengmeng Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Most existing vulnerability taxonomy classifies vulnerabilities by their idiosyncrasies, weaknesses, flaws and faults et al. The disadvantage of the taxonomy is that the classification standard is not unified and ther... 详细信息
来源: 评论
Density-based clustering for evolving uncertain data stream
收藏 引用
Journal of Computational Information systems 2014年 第1期10卷 419-426页
作者: He, Haitao Zhao, Jintian The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China
The current clustering algorithms for evolving uncertain data stream are sensitive to user specified threshold, and unstable in noise processing. In this paper, DUStream is presented, a density-based algorithm for dis... 详细信息
来源: 评论
A high dimensional data clustering algorithm based on hypergraph
收藏 引用
Journal of Computational Information systems 2012年 第23期8卷 9839-9846页
作者: Liu, Yongshan Chen, Wei Shang, Xuehui Lv, Yongteng Han, Yuanyuan Liu, Chang College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
High dimensional data clustering is an important issue for data mining. Firstly, the records in the dataset are mapped to the vertices of hypergraph, the hyperedges of hypergraph are composed of the vertices which hav... 详细信息
来源: 评论
Robust recommendation algorithm based on user rating matrix block and modified LTS-estimator
收藏 引用
Journal of Information and Computational Science 2014年 第6期11卷 1889-1898页
作者: Xu, Yuchen Liu, Zhen Zhang, Fuzhi School of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
The most widely-used collaborative recommendation algorithms are vulnerable to shilling attacks. To this end, in this paper we propose a robust recommendation algorithm based on user rating matrix block and modified L... 详细信息
来源: 评论
An energy-efficient routing algorithm of zigbee network
收藏 引用
Journal of Computational Information systems 2012年 第23期8卷 9873-9879页
作者: Liu, Yongshan Chen, Wei Shang, Xuehui Lv, Yongteng Han, Yuanyuan Liu, Chang College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
As regard to the case of extending the lifetime of zigbee network, the defination of node's boundary is proposed. First, all the information for node's boundary is stored when zigbee network is built. Then, th... 详细信息
来源: 评论
Sequential pattern mining with gap constraints for discovery of the software bug features
收藏 引用
Journal of Computational Information systems 2014年 第2期10卷 673-680页
作者: Zeng, Qiang Chen, Yuping Han, Gaowei Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
In order to process the software bug feature sequences, this paper presents a gap-constrained sequential pattern mining algorithm, MEMIGCSP algorithm. The length of the interval between items is limited in the origina... 详细信息
来源: 评论
Multi-Update Patterns and Validity Verification for Robust Visual Tracking
收藏 引用
Journal of computers (Taiwan) 2020年 第4期31卷 77-90页
作者: Wen, Jia Wang, Hong-Jun Li, Yan-Nan Zhao, Ji-Wei Yang, Yu-Ying School of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China Key Laboratory of Software Engineering of Hebei Province China
The Object tracking is a challenging problem in computer vision field. Now, deep learning has made outstanding achievements in feature extraction. There are already some examples of deep learning applications in visua... 详细信息
来源: 评论
New methods of constructing quaternary sequence Pairs
收藏 引用
ICIC Express Letters 2016年 第9期10卷 2177-2183页
作者: Jia, Yanguo Shen, Xiumin Duan, Xiaobei Song, Xiaofei School of Information Sciences and Engineering Yanshan University China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Ave. Qinhuangdao066004 China
In this letter, new methods of constructing quaternary sequence pairs are presented based on binary sequence pairs with two-level autocorrelation, almost perfect binary sequence pairs and cyclic shift sequences. The q... 详细信息
来源: 评论
Time sequential influence maximization algorithm based on neighbor node influence
收藏 引用
High technology Letters 2022年 第2期28卷 153-163页
作者: CHEN Jing QI Ziyi LIU Mingxin School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004P.R.China Hebei Key Laboratory of Virtual Technology and System Integration Qinhuangdao 066004P R.China Hebei Key Laboratory of Software Engineering Qinhuangdao 066004P R.China College of Electronic and Information Engineering Guangdong Ocean UniversityZhanjiang 524088P.R.China
In view of the forwarding microblogging,secondhand smoke,happiness,and many other phenomena in real life,the spread characteristic of the secondary neighbor nodes in this kind of phenomenon and network scheduling is e... 详细信息
来源: 评论