咨询与建议

限定检索结果

文献类型

  • 165 篇 期刊文献
  • 48 篇 会议

馆藏范围

  • 213 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 121 篇 计算机科学与技术...
    • 87 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 生物工程
    • 8 篇 控制科学与工程
    • 8 篇 土木工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 6 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 矿业工程
    • 4 篇 农业工程
  • 107 篇 理学
    • 80 篇 数学
    • 25 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
  • 74 篇 管理学
    • 51 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection

机构

  • 60 篇 college of infor...
  • 42 篇 the key laborato...
  • 33 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 6 篇 data industry re...
  • 5 篇 software enginee...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 45 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 14 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 6 篇 zhang zhongping
  • 5 篇 wen dong
  • 5 篇 lv mengya

语言

  • 203 篇 英文
  • 10 篇 中文
  • 1 篇 其他
检索条件"机构=The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province"
213 条 记 录,以下是41-50 订阅
A hierarchical residual network with compact triplet-center loss for sketch recognition
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Lei Zhang, Shihui He, Huan Zhang, Xiaoxiao Sang, Yu School of Information Science and Engineering Yanshan University Hebei Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Hebei Qinhuangdao066004 China School of Mathematics and Information Science and Technology Hebei Normal University of Science and Technology Qinhuangdao066004 China
With the widespread use of touch-screen devices, it is more and more convenient for people to draw sketches on screen. This results in the demand for automatically understanding the sketches. Thus, the sketch recognit... 详细信息
来源: 评论
Reinforced MOOCs Concept Recommendation in Heterogeneous Information Networks
arXiv
收藏 引用
arXiv 2022年
作者: Gong, Jibing Wan, Yao Liu, Ye Li, Xuewen Zhao, Yi Wang, Cheng Lin, Yuting Fang, Xiaohan Feng, Wenzheng Zhang, Jingyi Tang, Jie School of Information Science and Engineering The Key Lab for Computer Virtual Technology and System Integration The Key Laboratory for Software Engineering of Hebei Province Yanshan University No. 438 West Hebei Avenue Hebei Qinhuangdao066004 China School of Computer Science and Technology Huazhong University of Science and Technology Luoyu Road 1037 Hubei Wuhan430074 China Salesforce Research 556 Xixi Road Chicago United States School of Cyber Science and Technology Beihang University 37 Xueyuan Road Beijing100191 China Department of Computer Science Tsinghua University Beijing100084 China
Massive open online courses (MOOCs), which offer open access and widespread interactive participation through the internet, are quickly becoming the preferred method for online and remote learning. Several MOOC platfo... 详细信息
来源: 评论
Research on the Influence of Improved K-shell Algorithm on Commodity Profit
Research on the Influence of Improved K-shell Algorithm on C...
收藏 引用
作者: Jing Chen Jincheng Huang College of Information Science and Engineering Yanshan University Key Laboratory for Computer Virtual Technology and system Integration of Hebei Province Software Engineering Laboratory in Hebei Province
In order to maximize the influence of commodity profits in e-commerce platforms, designing and improving the K-shell algorithm to select the more influential seed node sets in this paper. The new algorithm improves th... 详细信息
来源: 评论
Research on a Novel Influence Maximization Algorithm Based on Community Structure
Research on a Novel Influence Maximization Algorithm Based o...
收藏 引用
作者: Jing Chen Jiangchuan Liu College of Information Science and Engineering Yanshan University Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Software Engineering Laboratory in Hebei Province
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influ... 详细信息
来源: 评论
An Ensemble Detection Method for Shilling Attacks Based on Features of Automatic Extraction
收藏 引用
China Communications 2019年 第8期16卷 130-146页
作者: Yaojun Hao Fuzhi Zhang Jinbo Chao School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004China Department of Computer Science and Technology Xinzhou Teachers UniversityXinzhou 034000China
Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extract... 详细信息
来源: 评论
Communication-Based Attacks Detection in Android Applications
收藏 引用
Tsinghua Science and technology 2019年 第5期24卷 596-614页
作者: Chuan Ma Tao Wang Limin Shen Dongkui Liang Shuping Chen Dianlong You School of In formation Science and Engineering Yanshan University the Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China School of Business Ad mi nisliatiom Hebei Normal University of Science and Technology. Qinhuangdao 066004 China Library of Yanshan University. Yanshan University Qinhuangdao 066004 China
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... 详细信息
来源: 评论
Multi-Update Patterns and Validity Verification for Robust Visual Tracking
收藏 引用
Journal of computers (Taiwan) 2020年 第4期31卷 77-90页
作者: Wen, Jia Wang, Hong-Jun Li, Yan-Nan Zhao, Ji-Wei Yang, Yu-Ying School of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China Key Laboratory of Software Engineering of Hebei Province China
The Object tracking is a challenging problem in computer vision field. Now, deep learning has made outstanding achievements in feature extraction. There are already some examples of deep learning applications in visua... 详细信息
来源: 评论
Local outlier detection algorithm based on gaussian kernel density function  10th
Local outlier detection algorithm based on gaussian kernel d...
收藏 引用
10th International Symposium on Intelligence Computation and Applications, ISICA 2018
作者: Zhang, Zhongping Liu, Jiaojiao Miao, Chuangye School of Information Science and Engineering Yanshan University QinhuangdaoHebei066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei066004 China
With the rapid development of information technology, the structure of data resources is becoming more and more complex, and outlier mining is attracting more and more attention. Based on Gaussian kernel function, thi... 详细信息
来源: 评论
A PSO Based Multi-Domain virtual Network Embedding Approach
收藏 引用
China Communications 2019年 第4期16卷 105-119页
作者: Yongjing Ni Guoyan Huang Sheng Wu Chenxi Li Peiying Zhang Haipeng Yao College of Information Science and Engineering Yanshan University College of Information Science and Engineering Hebei University of Science and Technology The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University School of Information and Communication Engineering Beijing University of Posts and Telecommunications College of Computer & Communication Engineering China University of Petroleum (East China)
This paper proposed a multi-domain virtual network embedding algorithm based on multi-controller SDN architecture. The local controller first selects candidate substrate nodes for each virtual node in the domain. Then... 详细信息
来源: 评论
Mining important nodes in complex software network based on ripple effects of probability  19
Mining important nodes in complex software network based on ...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Ren, Jiadong Huang, Guoyan Wang, Qian He, Haitao Liu, Xinqian Zhao, Xiaolin Computer Virtual Technology and System Integration Laboratory of Hebei Province College of Information Science and Engineering Yanshan University Qinhuangdao Hebei China Beijing Key Laboratory of Software Security Engineering Technology School of Computer Science and Technology Beijing Institute of Technology Beijing China
The complexity of software directly leads to an increasing cost in software testing and maintenance. Finding the important nodes with significant vulnerability is helpful for fault discovery and further reduces the da... 详细信息
来源: 评论