咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 306 篇 工学
    • 209 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 104 篇 信息与通信工程
    • 42 篇 控制科学与工程
    • 40 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 161 篇 理学
    • 104 篇 数学
    • 46 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 vectors
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 43 篇 college of infor...
  • 38 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 21 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 university of sc...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 38 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 431 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computing and Communication"
453 条 记 录,以下是111-120 订阅
排序:
Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks
Secure Location Verification Using Hop-Distance Relationship...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Yongsheng Liu Hao Zhou Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to informa... 详细信息
来源: 评论
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array for 5G Application  5
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array f...
收藏 引用
5th IEEE International Conference on Electronic Information and communication Technology, ICEICT 2022
作者: Zhou, Wei Qi, Junwei Li, Yingsong Huang, Zhixiang Yang, Lixia College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui Province Key Laboratory of Target Recognition and Feature Extraction LuAn230088 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Hefei China
In this work, a Gong-Si-shaped circularly polarized (CP) array with power driver for 5G is proposed. The radiator of the constructed CP array consists of two Chinese-like characters ' and '' with the simil... 详细信息
来源: 评论
Adaptive Step-Size Sparse Millimeter Wave Imaging Algorithm Based on Approximate Observations  11
Adaptive Step-Size Sparse Millimeter Wave Imaging Algorithm ...
收藏 引用
11th IEEE International Conference on Computer Science and Network Technology, ICCSNT 2023
作者: Wang, Dianhao Huang, Xinqi Yu, Canping Mao, Qi Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education China
The currently constructed millimeter wave imaging system has the problems of long sampling time and more sampling points of antenna units, and the use of compressed perception algorithm can improve the imaging quality... 详细信息
来源: 评论
A Dual-band Low-profile Quadrifilar-Helix Antenna for Satellite Navigation System
A Dual-band Low-profile Quadrifilar-Helix Antenna for Satell...
收藏 引用
2023 IEEE International Workshop on Electromagnetics: Applications and Student Innovation Competition, iWEM 2023
作者: Wang, Jiahong Qi, Junwei Li, Yingsong Harbin Engineering University College of Information and Communication Engineering Harbin150001 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education China
A new dual-band low-profile quadrifilar-helical antenna (QHA) was presented. The spiral radiation arm of QHA is printed to three circular dielectric plates to reduce the antenna height. In this case, the radiation arm... 详细信息
来源: 评论
Affine-Projection Maximum Asymmetric Correntropy Criterion Algorithm Under System Identifications  11
Affine-Projection Maximum Asymmetric Correntropy Criterion A...
收藏 引用
11th IEEE International Conference on Computer Science and Network Technology, ICCSNT 2023
作者: Peng, Yan Huang, Xinqi Yu, Canping Mao, Qi Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education China
The Affine-Projection Maximum Asymmetric Correntropy Criterion (APMACC) is constructed, drawing upon the fundamental principles of the maximum asymmetric correntropy criterion and an affine-projection scheme. The APMA... 详细信息
来源: 评论
Zone routing protocol based on energy consumption
收藏 引用
Jisuanji Gongcheng/Computer Engineering 2006年 第12期32卷 117-118+135页
作者: Zhai, Weifeng Gu, Naijie Zhang, Jianming Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China
A zone routing protocol based on the energy consumption speed of nodes in mobile Adhoc networks is presented. A route select parameter computed by residual lifetime of nodes and hop count of route is used to be select... 详细信息
来源: 评论
The detection of Trojan horse based on the data mining
The detection of Trojan horse based on the data mining
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Tang, Shugang School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300191 China
Trojan horse is a serious security threat to computer network. Traditionally, Trojan Horses are detected using file's dynamic characteristics or behaviors. However, these methods are not available for unknown or u... 详细信息
来源: 评论
Research on ultra-dependable embedded real time operating system
Research on ultra-dependable embedded real time operating sy...
收藏 引用
2011 IEEE/ACM International Conference on Green computing and communications, GreenCom 2011
作者: Chen, Hui Yang, Shi Ping Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China Guangzhou Haige Communication Industry Group Guangzhou China
In this paper, to research and design ultra-dependable embedded real time operating system supporting security and safety, spatial and temporal isolation safeguard is proposed and used. Temporal isolation mechanism gu... 详细信息
来源: 评论
Asymmetric Group key Agreement Protocol from Short Signatures  8
Asymmetric Group Key Agreement Protocol from Short Signature...
收藏 引用
8th IEEE International Conference on Computer and communications, ICCC 2022
作者: Shen, Kunyu Zhang, Lei Zhang, Rui Fang, Qihao Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China
Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel not... 详细信息
来源: 评论
MPC-Based Privacy-Preserving Serverless Federated Learning  3
MPC-Based Privacy-Preserving Serverless Federated Learning
收藏 引用
3rd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2022
作者: Zhong, Liangyu Zhang, Lei Xu, Lin Wang, Lulu East China Normal University Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute Shanghai200062 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China
Federated learning (FL) enables multiple users to collaboratively train a global model by keeping their data sets local. Since a single server is used, traditional FL faces the single point of failure problem. An avai... 详细信息
来源: 评论