咨询与建议

限定检索结果

文献类型

  • 129 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 95 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 33 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 轻工技术与工程
  • 68 篇 理学
    • 48 篇 数学
    • 16 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 4 篇 化学
  • 37 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学

主题

  • 14 篇 laboratories
  • 13 篇 computer science
  • 11 篇 wireless sensor ...
  • 9 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 optimization
  • 7 篇 computer network...
  • 6 篇 monitoring
  • 6 篇 sociology
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 benchmark testin...
  • 4 篇 databases
  • 4 篇 vehicles
  • 4 篇 cluster analysis

机构

  • 24 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 13 篇 anhui provincial...
  • 9 篇 school of commun...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 5 篇 school of commun...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 4 篇 school of comput...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 anhui province k...
  • 4 篇 anhui key labora...
  • 4 篇 state key lab fo...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 18 篇 xufa wang
  • 12 篇 yin zhaoxia
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 4 篇 lyu wanli
  • 4 篇 li zhifang
  • 4 篇 cao xianbin
  • 4 篇 lihua yue
  • 4 篇 jinglong li
  • 4 篇 hong qiao

语言

  • 172 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computation and Communication"
181 条 记 录,以下是111-120 订阅
排序:
Accurate classification of time series based on a new robust similarity measure
收藏 引用
Journal of computational Information Systems 2013年 第9期9卷 3521-3528页
作者: He, Xiaoxu Shao, Chenxi Xiong, Yan School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
Among different time series data mining, time series classification is one of the most important aspects. How to design a suitable similarity measure of similarity is a burning issue for accurate time series classific... 详细信息
来源: 评论
Directed differential evolution based on directional derivative for numerical optimization problems
Directed differential evolution based on directional derivat...
收藏 引用
International Conference on Hybrid Intelligent Systems (HIS)
作者: Jun Zhang Wenjian Luo School of Computer Science and Technology University of Science and Technology Hefei Anhui China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology Hefei Anhui China
Differential Evolution is one kind of Evolutionary Algorithms, which has been successfully applied to solve many optimization problems. In this paper, a directed differential mutation (DDM), which utilizes the directi... 详细信息
来源: 评论
An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption  7th
An Authentication Mechanism for IoT Devices Based on Tra...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Xia, Fei Mao, Jiaming Shao, Zhipeng Xu, Liangjie Zhao, Ran Yang, Yunzhi State Grid Jiangsu Electric Power Co Ltd. Information and Telecommunication Branch Nanjing210024 China Institute of Information and Communication State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Nanjing Jiangsu210003 China Anhui Jiyuan Software Co. Ltd SGITG Hefei Anhui230088 China
To solve low computing efficiency and high computational energy consumption in the traditional Public-key Infrastructure cryptosystem in the authentication of IoT devices, an authentication scheme for IoT devices base... 详细信息
来源: 评论
Representative Template Set Generation Method for Pedestrian Detection
Representative Template Set Generation Method for Pedestrian...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Pei Wu Xian-Bin Cao Yan-Wu Xu Hong Qiao Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Institute of Automation Chinese Academy and Sciences Beijing China
Template matching is an effective approach for pedestrian detection. In order to achieve real-time and accurate detection, how to obtain a suitable representative template set is still an open problem due to the large... 详细信息
来源: 评论
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
收藏 引用
International Workshop on Advanced computational Intelligence (IWACI)
作者: Junteng Wang Wenjian Luo Yamin Hu Hao Jiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei China
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not sa... 详细信息
来源: 评论
DFTCP: A TCP-friendly delay-based high-speed TCP variant
DFTCP: A TCP-friendly delay-based high-speed TCP variant
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Xu Zhang Naijie Gu Junjie Su Kaixin Ren Anhui Province Key Laboratory of Computing and Communication Software Hefei China Institute of Advanced Technology University of Science and Technology of China Hefei China
Due to the conservative additive increase and multiplicative decrease strategy, traditional TCP has a severe problem in utilizing bandwidth over high-speed long-distance networks. This paper proposes a delay-based con... 详细信息
来源: 评论
The Learning-Bargaining Algorithm Used in Unlicensed Spectrum Pre-Allocation
The Learning-Bargaining Algorithm Used in Unlicensed Spectru...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Kun Han Jinlong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time... 详细信息
来源: 评论
High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-MSB Prediction
arXiv
收藏 引用
arXiv 2021年
作者: Lyu, Wan-Li Cheng, Lulu Yin, Zhaoxia Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University 230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
The interaction of massive data in the network world poses an enormous threat to data security. Reversible data hiding in encrypted domain (RDH-ED) technology ensures the security of data storage. Extensive works of R... 详细信息
来源: 评论
High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology
arXiv
收藏 引用
arXiv 2022年
作者: Tang, Yun Cheng, Lulu Lyv, Wanli Yin, Zhaoxia Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University 230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
Reversible data hiding in encrypted domain(RDH-ED) can not only protect the privacy of 3D mesh models and embed additional data, but also recover original models and extract additional data losslessly. However, due to... 详细信息
来源: 评论
High-Capacity Reversible Data Hiding in Encrypted 3d Mesh Models Based on Multi-Msb Prediction
SSRN
收藏 引用
SSRN 2022年
作者: Lyu, Wan-Li Cheng, Lulu Yin, Zhaoxia Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University 230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
The interaction of massive data in the network world poses a enormous threat to data security. Reversible data hiding in encrypted domain (RDH-ED) technology ensures the security of data storage. With the advancement ... 详细信息
来源: 评论