咨询与建议

限定检索结果

文献类型

  • 129 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 95 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 33 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 轻工技术与工程
  • 68 篇 理学
    • 48 篇 数学
    • 16 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 4 篇 化学
  • 37 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学

主题

  • 14 篇 laboratories
  • 13 篇 computer science
  • 11 篇 wireless sensor ...
  • 9 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 optimization
  • 7 篇 computer network...
  • 6 篇 monitoring
  • 6 篇 sociology
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 benchmark testin...
  • 4 篇 databases
  • 4 篇 vehicles
  • 4 篇 cluster analysis

机构

  • 24 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 13 篇 anhui provincial...
  • 9 篇 school of commun...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 5 篇 school of commun...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 4 篇 school of comput...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 anhui province k...
  • 4 篇 anhui key labora...
  • 4 篇 state key lab fo...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 18 篇 xufa wang
  • 12 篇 yin zhaoxia
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 4 篇 lyu wanli
  • 4 篇 li zhifang
  • 4 篇 cao xianbin
  • 4 篇 lihua yue
  • 4 篇 jinglong li
  • 4 篇 hong qiao

语言

  • 172 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computation and Communication"
181 条 记 录,以下是1-10 订阅
排序:
Decentralized Federated Learning for Wireless Traffic Prediction
收藏 引用
IEEE communications Letters 2025年 第5期29卷 1057-1061页
作者: Zhang, Haochang Huang, Sirui Zhou, Xiaotian Zhang, Chuanting Jia, Junrong Shandong University School of Control Science and Engineering Shandong Key Laboratory of Intelligent Communications and Sensing-Computation Integration Jinan250061 China Institute of Intelligent Communication Technologies Shandong Key Laboratory of Intelligent Communications and Sensing-Computation Integration Shandong University Jinan250061 China Shandong University School of Software Shandong Key Laboratory of Intelligent Communications and Sensing-Computation Integration Jinan250061 China
Wireless traffic prediction is indispensable for future intelligent cellular networks, as it can guide the resource allocation smartly to boost the usage efficiency. While the deep learning based methods have been rep... 详细信息
来源: 评论
Scaling Up Single Image Dehazing Algorithm by Cross-Data Vision Alignment for Richer Representation Learning and Beyond
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Shi, Yukai Weng, Zhipeng Lin, Yupei Shi, Cidan Guo, Xingyuan Yang, Xiaojun Lin, Liang Guangdong University of Technology School of Information Engineering Guangzhou510006 China Anhui University Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Hefei230601 China Southern Power Grid Ltd. Guangzhou510000 China Ministry of Education of China Key Laboratory of Photonic Technology for Integrated Sensing and Communication Guangdong Guangzhou510006 China Sun Yat-sen University School of Computer Science Guangzhou510006 China
In recent years, deep neural network tasks have increasingly relied on high-quality image inputs. With the development of high-resolution representation learning, the task of image dehazing has received significant at... 详细信息
来源: 评论
Local reputation for P2P MMOG design
Local reputation for P2P MMOG design
收藏 引用
18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2007
作者: Shanshan, Liu Jinlong, Li Xufa, Wang Anhui Key Laboratory of Software in Computation and Communication Computer Science Department University of Science and Technology of China
The assignment of the computation and communication is one of the important problems in the design of peer-to-peer (P2P) Massively Multi-player Online Game (MMOG). A reputation mechanism for P2P MMOG is proposed in th... 详细信息
来源: 评论
A Power Control Scheme for Target Localization in WSN
收藏 引用
电子学报(英文版) 2008年 第3期17卷 443-448页
作者: GU Yu ZHAO Baohua Department of Computer Science University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
In this paper, we focus on the target tracking problem in sensor networks and propose an Powersaving target localization scheme (PSTL) based on a conjecture model that reflects the moving pattern of a target, and also... 详细信息
来源: 评论
Minimum-Energy Broadcast Trees in All-Wireless Networks
收藏 引用
电子学报(英文版) 2008年 第2期17卷 227-230页
作者: HU Tian ZHAO Baohua Department of Computer Science University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
This paper focuses on the problem of constructing the minimum-energy broadcast trees in all-wireless networks. We proposed a greedy algorithm called Greedy maximum-branch replacement algorithm (GMBR) to decrease the t... 详细信息
来源: 评论
Secure Two-Party Point-Circle Inclusion Problem
收藏 引用
Journal of Computer Science & Technology 2007年 第1期22卷 88-91页
作者: 罗永龙 黄刘生 仲红 Department of Computer Science University of Science and Technology of China Hefei 230027 China Department of Computer Science Anhui Normal University Wuhu 241000 China Anhui Province Key laboratory of Software in Computing and Communication Hefei 230027 China
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... 详细信息
来源: 评论
A preliminary study on why using the nonself detector set for anomaly detection in artificial immune Systems
A preliminary study on why using the nonself detector set fo...
收藏 引用
2009 International Conference on computational Intelligence and Security, CIS 2009
作者: Xu, Baoliang Luo, Wenjian Wang, Xufa Nature Inspired Computation and Applications Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al... 详细信息
来源: 评论
A novel updating strategy for associative memory scheme in cyclic dynamic environments
A novel updating strategy for associative memory scheme in c...
收藏 引用
International Workshop on Advanced computational Intelligence (IWACI)
作者: Cao, Yong Luo, Wenjian Nature Inspired Computation and Applications Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
Associative memory schemes have been developed for Evolutionary Algorithms (EAs) to solve Dynamic Optimization Problems (DOPs), and demonstrated powerful performance. In these schemes, how to update the memory could b... 详细信息
来源: 评论
Classifying and clustering in negative databases
收藏 引用
Frontiers of Computer Science 2013年 第6期7卷 864-874页
作者: Ran LIU Wenjian LUO Lihua YUE School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 China
Recently, negative databases (NDBs) are proposed for privacy protection. Similar to the traditional databases, some basic operations could be conducted over the NDBs, such as select, intersection, update, delete and... 详细信息
来源: 评论
Boosting performance of virtualized desktop infrastructure with physical GPU and SPICE
收藏 引用
Science China(Information Sciences) 2020年 第7期63卷 236-238页
作者: Shupan LI Limin XIAO Chungang SHI Liequan CHE Changyou ZHANG Yuanzhang LI State Key Laboratory of Software Development Environment Beihang University School of Computer Science and Engineering Beihang University Beijing Jinghang Computation and Communication Research Institute Institute of Software Chinese Academy of Sciences School of Computer Science and Technology Beijing Institute of Technology
Dear editor,The virtual desktop infrastructure (VDI) is widely used by enterprises, as it can be easily deployed,has a reduced management cost, improves resource utilization, and can be accessed at any location by the... 详细信息
来源: 评论