咨询与建议

限定检索结果

文献类型

  • 164 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 121 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 控制科学与工程
    • 9 篇 土木工程
    • 9 篇 生物工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 104 篇 理学
    • 80 篇 数学
    • 25 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 10 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
  • 74 篇 管理学
    • 51 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection

机构

  • 60 篇 college of infor...
  • 43 篇 the key laborato...
  • 35 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 46 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 203 篇 英文
  • 8 篇 中文
  • 1 篇 其他
检索条件"机构=The Key Laboratory for Computer Virtual Technology and System Integration of Hebei"
211 条 记 录,以下是21-30 订阅
排序:
Communication-Based Attacks Detection in Android Applications
收藏 引用
Tsinghua Science and technology 2019年 第5期24卷 596-614页
作者: Chuan Ma Tao Wang Limin Shen Dongkui Liang Shuping Chen Dianlong You School of In formation Science and Engineering Yanshan University the Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China School of Business Ad mi nisliatiom Hebei Normal University of Science and Technology. Qinhuangdao 066004 China Library of Yanshan University. Yanshan University Qinhuangdao 066004 China
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... 详细信息
来源: 评论
A homogenization method for nonlinear inhomogeneous elastic materials
收藏 引用
virtual Reality & Intelligent Hardware 2021年 第2期3卷 156-170页
作者: Jing ZHAO Fei ZHU Liyou XU Yong TANG Sheng LI College of Information Science and Engineering Yanshan UniversityQinhuangdaoHebei 066004China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei 066004China School of Electronics Engineering and Computer Science Peking UniversityBeijing 100871China Beijing Engineering Research Center for Virtual Simulation and Visualization Beijing 100871China
Background Fast simulation techniques are strongly favored in computer graphics,especially for the nonlinear inhomogeneous elastic *** homogenization theory is a perfect match to simulate inhomogeneous deformable obje... 详细信息
来源: 评论
A PSO Based Multi-Domain virtual Network Embedding Approach
收藏 引用
China Communications 2019年 第4期16卷 105-119页
作者: Yongjing Ni Guoyan Huang Sheng Wu Chenxi Li Peiying Zhang Haipeng Yao College of Information Science and Engineering Yanshan University College of Information Science and Engineering Hebei University of Science and Technology The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University School of Information and Communication Engineering Beijing University of Posts and Telecommunications College of Computer & Communication Engineering China University of Petroleum (East China)
This paper proposed a multi-domain virtual network embedding algorithm based on multi-controller SDN architecture. The local controller first selects candidate substrate nodes for each virtual node in the domain. Then... 详细信息
来源: 评论
Local outlier detection algorithm based on gaussian kernel density function  10th
Local outlier detection algorithm based on gaussian kernel d...
收藏 引用
10th International Symposium on Intelligence Computation and Applications, ISICA 2018
作者: Zhang, Zhongping Liu, Jiaojiao Miao, Chuangye School of Information Science and Engineering Yanshan University QinhuangdaoHebei066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei066004 China
With the rapid development of information technology, the structure of data resources is becoming more and more complex, and outlier mining is attracting more and more attention. Based on Gaussian kernel function, thi... 详细信息
来源: 评论
A novel grouping aggregation algorithm for online analytical processing
收藏 引用
2012 National Conference on Information technology and computer Science, CITCS 2012
作者: Chen, Wei Liu, Yongshan Wang, Ning College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Qinhuangdao China
As regard to improve the efficiency of grouping aggregation calculation, the data is compressed by using binary encoding, and the dimension hierarchical grouping attribute set encodings of each dimension table are cal... 详细信息
来源: 评论
Position Measurement Based Slave Torque Feedback Control for Teleoperation systems With Time-Varying Communication Delays
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 388-402页
作者: Xian Yang Jing Yan Changchun Hua Xinping Guan the Institute of Information Science and Engineering Yanshan University the Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004China IEEE the Institute of Electrical Engineering Yanshan UniversityQinhuangdao 066004China the Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Bilateral teleoperation system is referred to as a promising technology to extend human actions and intelligence to manipulating objects *** the tracking control of teleoperation systems,velocity measurements are nece... 详细信息
来源: 评论
A survey of occlusion detection method for visual object
收藏 引用
High technology Letters 2016年 第3期22卷 256-265页
作者: 张世辉 He Huan Liu Jianxin Zhang Yucheng Pang Yunchong Sang Yu School of Information Science and Engineering Yanshan University Qinhuangdao 066004 P. R. China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 P. R. China
Occlusion problem is one of the challenging issues in vision field for a long time,and the occlusion phenomenon of visual object will be involved in many vision research fields. Once the occlusion occurs in a visual s... 详细信息
来源: 评论
Mining Important Functions in Software Network by Node Vulnerability  2
Mining Important Functions in Software Network by Node Vulne...
收藏 引用
2019 2nd International Conference on computer Information Science and Artificial Intelligence, CISAI 2019
作者: Zhang, Bing Sun, Shengting Hao, Xiaobing School of Information Science and Engineering Yanshan University Hebei Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City066004 China
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in differ... 详细信息
来源: 评论
Model for Software Behaviour Detection Based on Process Algebra and system Call
收藏 引用
China Communications 2013年 第11期10卷 24-36页
作者: 申利民 王涛 马川 College of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Hebei Normal University of Science and Technology
Behaviour detection models based on automata have been studied widely. By add- ing edge ε, the local automata are combined into global automata to describe and detect soft- ware behaviour. However, these methods in- ... 详细信息
来源: 评论
Research on Recommendation Strategies Integrating Emotional Tendency and User Influences  20
Research on Recommendation Strategies Integrating Emotional ...
收藏 引用
2020 International Conference on Internet Computing for Science and Engineering, ICICSE 2020 and the 13th International Conference on Advanced computer Theory and Engineering, ICACTE 2020
作者: Jing, Chen Liuqian, Duan Hong, Zhang College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Software Engineering Laboratory in Hebei Province Qinhuangdao China
At present, the topic model based on LDA as an information recommendation method has the defect of neglecting the emotional information in social platform. Therefore, a microblog user recommendation strategy I-TES (in... 详细信息
来源: 评论