咨询与建议

限定检索结果

文献类型

  • 129 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 95 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 33 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 轻工技术与工程
  • 68 篇 理学
    • 48 篇 数学
    • 16 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 4 篇 化学
  • 37 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学

主题

  • 14 篇 laboratories
  • 13 篇 computer science
  • 11 篇 wireless sensor ...
  • 9 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 optimization
  • 7 篇 computer network...
  • 6 篇 monitoring
  • 6 篇 sociology
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 benchmark testin...
  • 4 篇 databases
  • 4 篇 vehicles
  • 4 篇 cluster analysis

机构

  • 24 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 13 篇 anhui provincial...
  • 9 篇 school of commun...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 5 篇 school of commun...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 4 篇 school of comput...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 anhui province k...
  • 4 篇 anhui key labora...
  • 4 篇 state key lab fo...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 18 篇 xufa wang
  • 12 篇 yin zhaoxia
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 4 篇 lyu wanli
  • 4 篇 li zhifang
  • 4 篇 cao xianbin
  • 4 篇 lihua yue
  • 4 篇 jinglong li
  • 4 篇 hong qiao

语言

  • 172 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computation and Communication"
181 条 记 录,以下是41-50 订阅
排序:
Directed differential evolution based on directional derivative for numerical optimization problems
Directed differential evolution based on directional derivat...
收藏 引用
2011 11th International Conference on Hybrid Intelligent Systems, HIS 2011
作者: Zhang, Jun Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
Differential Evolution is one kind of Evolutionary Algorithms, which has been successfully applied to solve many optimization problems. In this paper, a directed differential mutation (DDM), which utilizes the directi... 详细信息
来源: 评论
Real-Valued Negative Databases  12
Real-Valued Negative Databases
收藏 引用
12th European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, ECAL 2013
作者: Zhao, Dongdong Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
The negative database (NDB) is the negative representation of original data. Existing work has demonstrated that NDB can be used to preserve privacy and hide information. However, most work about NDB is based on binar... 详细信息
来源: 评论
Fast searching optimal negative surveys
Fast searching optimal negative surveys
收藏 引用
2014 International Conference on Information and Network Security, ICINS 2014
作者: Lu, Yihui Luo, Wenjian Zhao, Dongdong School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
In a negative survey, a category which does not agree with the fact of each participant is collected. Hence, data collectors cannot acquire the realistic data of participants, and this can efficiently protect particip... 详细信息
来源: 评论
Quantitative and qualitative forecasting applied to supply-chain inventory
Quantitative and qualitative forecasting applied to supply-c...
收藏 引用
2010 2nd International Conference on MultiMedia and Information Technology, MMIT 2010
作者: Shao, Chenxi Wang, Lizhong Computer Science and Technology School of University of Science and Technology of China Hefei China Anhui Province Key Laboratory Software in Computing and Communication Hefei 230027 China MOE-Microsoft Key Laboratory Multimedia Computing and Communication University of Science and Technology of China Hefei China
In the process of supply chain (SC) management, time inventory management problem is extremely important. In terms of academic methods, quantitative methods are very popular as the researchers could calculate the inve... 详细信息
来源: 评论
PR3D: Precise and realistic 3D face reconstruction from a single image
PR3D: Precise and realistic 3D face reconstruction from a si...
收藏 引用
作者: Huang, Zhangjin Wu, Xing University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Software in Computing and Communication Hefei China Deqing Alpha Innovation Institute Huzhou China
Reconstructing the three-dimensional (3D) shape and texture of the face from a single image is a significant and challenging task in computer vision and graphics. In recent years, learning-based reconstruction methods... 详细信息
来源: 评论
Theoretical and empirical analyses of Evolutionary Negative Selection Algorithms for a combinational optimization problem
Theoretical and empirical analyses of Evolutionary Negative ...
收藏 引用
International Conference on Bio-Inspired Computing: Theories and Applications, BICTA
作者: Xingxin Pei Wenjian Luo Nature Inspired Computation and Application Laboratory School of Computer Science and Technology Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Evolutionary Negative Selection Algorithms (ENSAs) could be regarded as hybrid algorithms of Evolutionary Algorithms (EAs) and Negative Selection Algorithms (NSAs). The average time complexity of ENSAs on combinationa... 详细信息
来源: 评论
A framework for optimization in multi-channel multi-radio wireless mesh networks
A framework for optimization in multi-channel multi-radio wi...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Wanli, Dong Naijie, Gu Kun, Bi Kun, Tu Xiaohu, Liu Dept. of Comput. Sci. and Technol. Univ. of Sci. and Technol. of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Multi-hop infrastructure wireless mesh networks offer increased reliability, coverage and reduced equipment costs over their single-hop counterpart, wireless LANs. Equipping wireless routers with multiple radios furth... 详细信息
来源: 评论
Address assignment in wireless sensor networks using game approach
Address assignment in wireless sensor networks using game ap...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Kim, Tu Naijie, Gu Kim, Bi Wanli, Dong Dept. of Comput. Sci. and Technol. Univ. of Sci. and Technol. of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In this paper, we propose a game model to solve the MAC address assignment in sensor networks. Insufficiency of battery power of sensors makes the conservation of the energy be the main design issues for the sensor ne... 详细信息
来源: 评论
Neighborhood-based distributed topological hole detection algorithm in sensor networks
Neighborhood-based distributed topological hole detection al...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Kun, Bi Naijie, Gu Kun, Tu Wanli, Dong Dept. of Comput. Sci. and Technol. Univ. of Sci. and Technol. of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Topological holes in sensor networks usually indicate the region where nodes are depleted or not dense enough due to kinds of reasons. In this paper, we study the problem of detecting topological holes in wireless sen... 详细信息
来源: 评论
Implicit interpolation of time vector series
Implicit interpolation of time vector series
收藏 引用
2011 7th International Conference on Natural computation, ICNC 2011
作者: Li, Dao-Lun Zha, Wen-Shu Lu, De-Tang Department of Modern Mechanics University of Science and Technology of China China Key Laboratory of Software in Computing and Communication of Anhui Province University of Science and Technology of China Hefei 230027 China
Time vector series abound in many fields, which are different from time series. Based on mapping and implicit function interpolation, the method of implicit interpolation over time vector series is developed and studi... 详细信息
来源: 评论