咨询与建议

限定检索结果

文献类型

  • 241 篇 会议
  • 112 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 235 篇 工学
    • 166 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 83 篇 信息与通信工程
    • 37 篇 电气工程
    • 36 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 11 篇 建筑学
    • 11 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 9 篇 生物工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 光学工程
    • 7 篇 土木工程
  • 127 篇 理学
    • 81 篇 数学
    • 32 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 16 篇 化学
    • 14 篇 生物学
  • 63 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 10 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 法学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 19 篇 laboratories
  • 13 篇 computer science
  • 12 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 9 篇 optimization
  • 9 篇 algorithm design...
  • 9 篇 evolutionary com...
  • 8 篇 statistics
  • 8 篇 bandwidth
  • 8 篇 clustering algor...
  • 7 篇 computational mo...
  • 7 篇 computer network...
  • 6 篇 couplings
  • 6 篇 vectors
  • 6 篇 feature extracti...
  • 6 篇 sociology
  • 6 篇 training
  • 5 篇 linear discrimin...
  • 5 篇 face recognition
  • 5 篇 data mining

机构

  • 43 篇 college of infor...
  • 31 篇 key laboratory o...
  • 25 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 11 篇 hubei key labora...
  • 11 篇 microsoft resear...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...

作者

  • 37 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 11 篇 huang zhixiang
  • 9 篇 junwei qi
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 xianbin cao
  • 7 篇 zhang lei
  • 6 篇 chenxi shao
  • 6 篇 qi junwei
  • 6 篇 tao dacheng
  • 6 篇 ping zhu

语言

  • 340 篇 英文
  • 8 篇 中文
  • 5 篇 其他
检索条件"机构=Anhui Key Laboratory of Software Engineering in Computing and Communication"
353 条 记 录,以下是81-90 订阅
排序:
Image quality assessment metrics with radon transform
Image quality assessment metrics with radon transform
收藏 引用
2008 IEEE International Conference on Systems, Man and Cybernetics, SMC 2008
作者: Pang, Jianxin Zhang, Rong Zhang, Hui Huang, Xuan Liu, Zhen Kai MOE-Microsoft Key Laboratory of Multimedia Computing and Communication Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei Anhui 230027 China
Objective image quality assessment (QA) is a fundamental and challenging job in image processing which evaluates the image quality consistently with human perception automatically. Generally, an image can be segmented... 详细信息
来源: 评论
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array for 5G Application  5
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array f...
收藏 引用
5th IEEE International Conference on Electronic Information and communication Technology, ICEICT 2022
作者: Zhou, Wei Qi, Junwei Li, Yingsong Huang, Zhixiang Yang, Lixia College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui Province Key Laboratory of Target Recognition and Feature Extraction LuAn230088 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Hefei China
In this work, a Gong-Si-shaped circularly polarized (CP) array with power driver for 5G is proposed. The radiator of the constructed CP array consists of two Chinese-like characters ' and '' with the simil... 详细信息
来源: 评论
Differential evolution with a species-based repair strategy for constrained optimization
Differential evolution with a species-based repair strategy ...
收藏 引用
Congress on Evolutionary Computation
作者: Chenyang Bu Wenjian Luo Tao Zhu Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Evolutionary Algorithms (EAs) with gradient-based repair, which utilize the gradient information of the constraints set, have been proved to be effective. It is known that it would be time-consuming if all infeasible ... 详细信息
来源: 评论
Evolutionary clustering with differential evolution
Evolutionary clustering with differential evolution
收藏 引用
Congress on Evolutionary Computation
作者: Gang Chen Wenjian Luo Tao Zhu Anhui Province key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Evolutionary clustering is a hot research topic that clusters the time-stamped data and it is essential to some important applications such as data streams clustering and social network analysis. An evolutionary clust... 详细信息
来源: 评论
An improved genetic algorithm for dynamic shortest path problems
An improved genetic algorithm for dynamic shortest path prob...
收藏 引用
Congress on Evolutionary Computation
作者: Xuezhi Zhu Wenjian Luo Tao Zhu Anhui Province key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
The Shortest Path (SP) problems are conventional combinatorial optimization problems. There are many deterministic algorithms for solving the shortest path problems in static topologies. However, in dynamic topologies... 详细信息
来源: 评论
Grasping and folding knots
Grasping and folding knots
收藏 引用
IEEE International Conference on Robotics and Automation
作者: Weifu Wang Devin Balkcom Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
String stretched tightly along a sequence of fixed grasp points takes the shape of a polygonal arc. In this work, we investigate how many points are necessary and sufficient to grasp and tie arbitrary knots while main... 详细信息
来源: 评论
Recent Advances in Clonal Selection Algorithms and Applications
Recent Advances in Clonal Selection Algorithms and Applicati...
收藏 引用
IEEE Symposium Series on Computational Intelligence
作者: Wenjian Luo Xin Lin Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Clonal selection algorithms (CSAs) are a kind of Artificial Immune Algorithms (AIAs). In this paper, recent advances in clonal selection algorithms are summarized and reviewed. First, the basic framework of clonal sel... 详细信息
来源: 评论
A fine-grained algorithm for generating hard-toreverse negative databases
A fine-grained algorithm for generating hard-toreverse negat...
收藏 引用
International Workshop on Artificial Immune Systems, AIS 2015
作者: Zhao, Dongdong Luo, Wenjian Liu, Ran Yue, Lihua School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China School of Computer Science China University of Geosciences Wuhan430074 China
The negative database (NDB) is a new technique for privacy preserving and information hiding. It hides information by storing the complementary set instead of the original data. In order to protect the hidden informat... 详细信息
来源: 评论
The detection of Trojan horse based on the data mining
The detection of Trojan horse based on the data mining
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Tang, Shugang School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300191 China
Trojan horse is a serious security threat to computer network. Traditionally, Trojan Horses are detected using file's dynamic characteristics or behaviors. However, these methods are not available for unknown or u... 详细信息
来源: 评论
Research on ultra-dependable embedded real time operating system
Research on ultra-dependable embedded real time operating sy...
收藏 引用
2011 IEEE/ACM International Conference on Green computing and communications, GreenCom 2011
作者: Chen, Hui Yang, Shi Ping Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China Guangzhou Haige Communication Industry Group Guangzhou China
In this paper, to research and design ultra-dependable embedded real time operating system supporting security and safety, spatial and temporal isolation safeguard is proposed and used. Temporal isolation mechanism gu... 详细信息
来源: 评论