咨询与建议

限定检索结果

文献类型

  • 241 篇 会议
  • 112 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 235 篇 工学
    • 166 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 83 篇 信息与通信工程
    • 37 篇 电气工程
    • 36 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 11 篇 建筑学
    • 11 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 9 篇 生物工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 光学工程
    • 7 篇 土木工程
  • 127 篇 理学
    • 81 篇 数学
    • 32 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 16 篇 化学
    • 14 篇 生物学
  • 63 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 10 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 法学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 19 篇 laboratories
  • 13 篇 computer science
  • 12 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 9 篇 optimization
  • 9 篇 algorithm design...
  • 9 篇 evolutionary com...
  • 8 篇 statistics
  • 8 篇 bandwidth
  • 8 篇 clustering algor...
  • 7 篇 computational mo...
  • 7 篇 computer network...
  • 6 篇 couplings
  • 6 篇 vectors
  • 6 篇 feature extracti...
  • 6 篇 sociology
  • 6 篇 training
  • 5 篇 linear discrimin...
  • 5 篇 face recognition
  • 5 篇 data mining

机构

  • 43 篇 college of infor...
  • 31 篇 key laboratory o...
  • 25 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 11 篇 hubei key labora...
  • 11 篇 microsoft resear...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...

作者

  • 37 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 11 篇 huang zhixiang
  • 9 篇 junwei qi
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 xianbin cao
  • 7 篇 zhang lei
  • 6 篇 chenxi shao
  • 6 篇 qi junwei
  • 6 篇 tao dacheng
  • 6 篇 ping zhu

语言

  • 340 篇 英文
  • 8 篇 中文
  • 5 篇 其他
检索条件"机构=Anhui Key Laboratory of Software Engineering in Computing and Communication"
353 条 记 录,以下是21-30 订阅
排序:
Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems
收藏 引用
Science China(Information Sciences) 2015年 第5期58卷 33-48页
作者: WANG FuTian LIU Xiao YANG Yun School of Computer Science and Technology Anhui University Shanghai Key Laboratory of Trustworthy Computing East China Normal University School of Software and Electrical Engineering Swinburne University of Technology
On-time completion is an important temporal Qo S(Quality of Service) dimension and one of the fundamental requirements for high-confidence workflow systems. In recent years, a workflow temporal verification framework,... 详细信息
来源: 评论
Research and implementation of continuous wave radar ranging method based on tri-frequency
收藏 引用
High Technology Letters 2014年 第2期20卷 111-116页
作者: 袁其平 Fan Lijieare Tong Zhengrong Yang Xiufeng Cao Ye School of Electronics Information Engineering Tianjin University of Technology Key Laboratory of Film Electronics and Communication Devices and Key Laboratory of Intelligent Computing and Novel Software Technolgy School of Computer and Communication EngineeringTianjin University of Technology
In the traditional dual-frequency radar ranging system,there is a contradiction between ranging precision and ranging *** a tri-frequency ranging method is *** principle of the tri-frequency ranging is that the distan... 详细信息
来源: 评论
Secure Two-Party Point-Circle Inclusion Problem
收藏 引用
Journal of Computer Science & Technology 2007年 第1期22卷 88-91页
作者: 罗永龙 黄刘生 仲红 Department of Computer Science University of Science and Technology of China Hefei 230027 China Department of Computer Science Anhui Normal University Wuhu 241000 China Anhui Province Key laboratory of Software in Computing and Communication Hefei 230027 China
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... 详细信息
来源: 评论
Dynamic Scheduling Policy for Patient Flow in a Smart Environment
收藏 引用
Chinese Journal of Electronics 2017年 第3期26卷 530-536页
作者: CHEN Xiao DING Jie Nigel Thomas School of Computer Science and Communication Engineering Jiangsu University State Key Laboratory of Software Development Environment Beihang University School of Information Engineering Yangzhou University School of Computing Science Newcastle University
Given the popularity of smart environment in a hospital involving the participation of a large group of patients,scheduling of patients towards their desired destination is still being a challenging *** the developmen... 详细信息
来源: 评论
Accurate classification of time series based on a new robust similarity measure
收藏 引用
Journal of Computational Information Systems 2013年 第9期9卷 3521-3528页
作者: He, Xiaoxu Shao, Chenxi Xiong, Yan School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
Among different time series data mining, time series classification is one of the most important aspects. How to design a suitable similarity measure of similarity is a burning issue for accurate time series classific... 详细信息
来源: 评论
Clustering time-evolving data using an efficient differential evolution  6th
Clustering time-evolving data using an efficient differentia...
收藏 引用
6th International Conference on Swarm Intelligence, ICSI 2015 held in conjunction with the 2nd BRICS Congress on Computational Intelligence, CCI 2015
作者: Chen, Gang Luo, Wenjian Anhui Province key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui China
The previous evolutionary clustering methods for time-evolving data usually adopt the temporal smoothness framework, which controls the balance between temporal noise and true concept drift of clusters. They, however,... 详细信息
来源: 评论
LMP-GAN: Out-Of-Distribution Detection For Non-Control Data Malware Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Wood, David Kapp, David Kebede, Temesgen Hirakawa, Keigo Wuhan University School of Computer Science China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering China Zhongguancun Academy China Wuhan University State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing China Sun Yat-sen University School of Geography and Planning China Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Chongqing University College of Computer Science China The University of Tokyo Japan RIKEN Center for Advanced Intelligence Project Japan Intelligent Science & Technology Academy Limited CASIC China iFlytek Company Ltd. National Engineering Research Center of Speech and Language Information Processing China Nanyang Technological University College of Computing & Data Science Singapore Henan Academy of Sciences Aerospace Information Research Institute China
Anomaly detection is a common application of machine learning. Out-of-distribution (OOD) detection in particular is a semi-supervised anomaly detection technique where the detection method is trained only on the inlie... 详细信息
来源: 评论
A novel linear machine learning method based on DNA hybridization reaction circuit
IEEE Transactions on Nanobioscience
收藏 引用
IEEE Transactions on Nanobioscience 2025年
作者: Zou, Chengye Zhang, Qiang Wang, Bin Zhou, Changjun Yang, Yongwei Zhang, Xuncai Yanshan University school of Information Science and Engineering Qinhuangdao066004 China Informedia Electronic Co. Ltd Dalian116000 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China Zhengzhou University of Light Industry College of Electrical and Electronic Engineering Zhengzhou450002 China Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Zhejiang Normal University School of Computer Science and Technology Jinhua321004 China Tongling University School of Mathematics and Computer Science Anhui Tongling244000 China
DNA hybridization reaction is a significant technology in the field of semi-synthetic biology and holds great potential for use in biological computation. In this study, we propose a novel machine learning model based... 详细信息
来源: 评论
A hybrid particle swarm optimization for high-dimensional dynamic optimization  11th
A hybrid particle swarm optimization for high-dimensional dy...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Luo, Wenjian Yang, Bin Bu, Chenyang Lin, Xin Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui230027 China
High-Dimensional Dynamic Optimization Problems (HDDOPs) commonly exist in real-world applications. In evolutionary computation field, most of existing benchmark problems, which could simulate HDDOPs, are non-separable... 详细信息
来源: 评论
Multi-question negative surveys  3rd
Multi-question negative surveys
收藏 引用
3rd International Conference on Data Mining and Big Data, DMBD 2018 held in conjunction with the 9th International Conference on Swarm Intelligence, ICSI 2018
作者: Jiang, Hao Luo, Wenjiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui230027 China
The negative survey is an emerging method of collecting sensitive information. It could obtain the distribution of sensitive information while preserving the personal privacy. When collecting sensitive information, se... 详细信息
来源: 评论