咨询与建议

限定检索结果

文献类型

  • 241 篇 会议
  • 112 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 236 篇 工学
    • 164 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 83 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 35 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 12 篇 仪器科学与技术
    • 12 篇 网络空间安全
    • 11 篇 动力工程及工程热...
    • 11 篇 建筑学
    • 11 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 9 篇 生物工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 光学工程
    • 7 篇 土木工程
    • 5 篇 材料科学与工程(可...
  • 129 篇 理学
    • 81 篇 数学
    • 34 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 16 篇 化学
    • 14 篇 生物学
  • 61 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 4 篇 经济学
  • 4 篇 法学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 19 篇 laboratories
  • 13 篇 computer science
  • 12 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 9 篇 optimization
  • 9 篇 algorithm design...
  • 8 篇 statistics
  • 8 篇 bandwidth
  • 8 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 7 篇 computational mo...
  • 7 篇 computer network...
  • 6 篇 couplings
  • 6 篇 vectors
  • 6 篇 feature extracti...
  • 6 篇 sociology
  • 6 篇 training
  • 5 篇 linear discrimin...
  • 5 篇 face recognition
  • 5 篇 data mining

机构

  • 43 篇 college of infor...
  • 31 篇 key laboratory o...
  • 25 篇 school of comput...
  • 24 篇 anhui province k...
  • 21 篇 anhui university...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 11 篇 hubei key labora...
  • 11 篇 microsoft resear...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...

作者

  • 38 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 11 篇 huang zhixiang
  • 9 篇 junwei qi
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 xianbin cao
  • 7 篇 zhang lei
  • 6 篇 chenxi shao
  • 6 篇 qi junwei
  • 6 篇 ping zhu
  • 6 篇 dong xu

语言

  • 337 篇 英文
  • 8 篇 其他
  • 8 篇 中文
检索条件"机构=Anhui Key Laboratory of Software Engineering in Computing and Communication"
353 条 记 录,以下是281-290 订阅
排序:
A Parallel NURBS-based Isogeometric Analysis Framework on Multi-core CPUs
A Parallel NURBS-based Isogeometric Analysis Framework on Mu...
收藏 引用
2012年全国理论计算机科学学术年会(NCTCS2012)
作者: Licai Guo Zhangjin Huang School of Computer Science and Technology University of Science and Technology of China PR China USTC-SICT Joint Laboratory on Network and Key Laboratory of Software in Computing and Communication Anhui Province PR China USTC-SICT Joint Laboratory on Network and Communication PR China School of Computer Science and Technology University of Science and Technology of China PR China
parallel framework for NURBS-based isogeometric analysis on multi-core cpus is presented in this *** framework is composed of two parts:(1) construction of the stiffness matrix and right hand side vector; (2) a parall...
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qianqian Chang Lin Xu Lei Zhang Shanghai Key Laboratory of Trustworthy Computing East China Normal University China Science and Technology on Communication Security Laboratory Chengdu China Ministry of Education Engineering Research Center of Software/Hardware Co-Design Technology and Application China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony...
来源: 评论
ALOHA-like neighbor discovery in low-duty-cycle wireless sensor networks
ALOHA-like neighbor discovery in low-duty-cycle wireless sen...
收藏 引用
IEEE Conference on Wireless communications and Networking
作者: Lizhao You Zimu Yuan Panlong Yang Guihai Chen State Key Laboratory of Novel Software Technology Nanjing University China Institute of Computing Technology Chinese Academy and Sciences China Institute of Communication Engineering People''s Liberation Army University of Science and Technology China
Neighbor discovery is an essential step for the self-organization of wireless sensor networks. Many algorithms have been proposed for efficient neighbor discovery. However, most of those algorithms need nodes to keep ... 详细信息
来源: 评论
Interactive reflection simulation via physical shading model and fast environment mapping
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第2期7卷 351-356页
作者: Xu, Jie Fu, Jinhua School of Software Zhengzhou University of Light Industry China School of Computer and Communication Engineering Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou China
In order to enhance realistic reflection effects on some objects and realize faster rendering to meet interactive requirements, we present a novel method to produce interactive reflection simulation using physical sha... 详细信息
来源: 评论
New Framework for Code-Mapping-based Reversible Data Hiding in JPEG Images
arXiv
收藏 引用
arXiv 2020年
作者: Du, Yang Yin, Zhaoxia Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei230601 China Anhui Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
Code mapping (CM) is an efficient technique for reversible data hiding (RDH) in JPEG images, which embeds data by constructing a mapping relationship between the used and unused codes in the JPEG bitstream. This study... 详细信息
来源: 评论
A Method to Verify Internal Parameters of Camera Calibration in World Coordinate System
A Method to Verify Internal Parameters of Camera Calibration...
收藏 引用
IEEE International Conference on Electronic Information and communication Technology (ICEICT)
作者: Zheng Xing Qingchun Wang Yingsong Li Junwei Qi College of Information and Communication Engineering Harbin Engineering University Harbin China Shanghai Yanding Information Technology Co. Ltd. Shanghai China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China
Aiming at the problem that reprojection error (RE) cannot reflect the camera calibration accuracy intuitively, this paper proposes a method to verify the camera calibration results in world coordinate system. Firstly,...
来源: 评论
DETECTING THE RUN TIME ATTACKS IN THE CLOUD WITH AN EVIDENCE COLLECTION BASED APPROACH
DETECTING THE RUN TIME ATTACKS IN THE CLOUD WITH AN EVIDENCE...
收藏 引用
2014 IEEE 3rd International Conference on Cloud computing and Intelligence Systems
作者: Jie lin Chuanyi Liu Zhichun Ning Binxing Fang School of Computer Science Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education School of Software Engineering Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing University of Posts and Telecommunications
As the impacts of security threats are amplified and spread quickly in the cloud,especially with the attribute of large-scale *** of researches focus on monitoring the network ***,these methods don't check how the... 详细信息
来源: 评论
Matrix Classifier On Dynamic Functional Connectivity For Mci Identification
Matrix Classifier On Dynamic Functional Connectivity For Mci...
收藏 引用
IEEE International Conference on Image Processing
作者: Lei Zhou Liang Zhang Xiao Bai Jun Zhou School of Computer Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing State Key Laboratory of Software Development Environment Beihang University Beijing School of Information and Communication Technology Griffith University Nathan
One of the most popular method for Alzheimer's disease (AD) diagnosis is exploring the Brain functional connectivity (FC) from resting-state functional magnetic resonance imaging (RS-fMRI). To early prevent AD, it... 详细信息
来源: 评论
Multi-Layer Visual Perception for No-Reference Image Quality Assessment
Multi-Layer Visual Perception for No-Reference Image Quality...
收藏 引用
IEEE International Conference on Electronic Information and communication Technology (ICEICT)
作者: Junwei Qi Yingzhen Wang Qingchun Wang Yingsong Li College of Computer Science and Technology Harbin Engineering University Harbin China College of Information and Communication Engineering Harbin Engineering University Harbin China Shanghai Yanding Information Technology Co. Ltd. Shanghai China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui China
In this work, we propose a no-reference image quality evaluation approach, aiming to solve the problem that the traditional convolutional neural network is insufficient to express the global information of the image. ...
来源: 评论
Speaker recognition with mel scale-based wavelet packet decomposition and AR-volterra model
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第10期7卷 2087-2094页
作者: Yang, Shuying Guo, Jijn Jiang, Jiaojiao School of Computer and Communication Engineering Tianjin University of Technology No. 391 Binshui Xidao Xiqing District Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology No. 391 Binshui Xidao Xiqing District Tianjin300384 China
In order to improve the rate of speaker recognition, this paper proposes a new scheme with Mel scale-based Wavelet Packet Decomposition and AR-Volterra model. First, the speech signal is decomposed by wavelet packet o... 详细信息
来源: 评论