咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 306 篇 工学
    • 209 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 104 篇 信息与通信工程
    • 42 篇 控制科学与工程
    • 40 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 161 篇 理学
    • 104 篇 数学
    • 46 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 vectors
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 43 篇 college of infor...
  • 38 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 21 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 university of sc...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 38 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 431 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computing and Communication"
453 条 记 录,以下是131-140 订阅
排序:
Constructing the Voronoi diagram of planar point set in parallel
Constructing the Voronoi diagram of planar point set in para...
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Dong, Lanfang Wu, Yuan Zhou, Shanhai Anhui Province Key Lab. of Software in Computing and Communication College of Computer Science and Technology USTC Hefei China College of Computer Science and Technology University of Science and Technology of China Hefei China
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ... 详细信息
来源: 评论
NURBS model for chaotic time series
NURBS model for chaotic time series
收藏 引用
2011 3rd International Conference on Computer Research and Development, ICCRD 2011
作者: Shao, Chenxi Xiao, Lipeng Department of Computer Science and Technology University of Science and Technology of China Hefei China Department of Modern Physics Nonlinear Science Center University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Software in Computing and Communication Hefei China
NURBS method is extensively used in the field of Geometric Modeling. Since the original NURBS method does not have time factor, it can not display the huge advantage in the dynamics field. In this article, inspired by... 详细信息
来源: 评论
Generating an Approximately Optimal Detector Set by Evolving Random Seeds
Generating an Approximately Optimal Detector Set by Evolving...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Jie Zhang Wenjian Luo Baoliang Xu Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
The detector generation algorithm is the core of a negative selection algorithm (NSA). In most previous work, the NSAs generate the detector set randomly, which cannot guarantee to obtain an efficient detector set. To... 详细信息
来源: 评论
Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images  7th
Adaptive Algorithm Based on Reversible Data Hiding Method fo...
收藏 引用
7th EAI International Conference on Cloud computing, CloudComp 2016 and 1st EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2016
作者: Zhang, Hao Yin, Zhaoxia Zhang, Xinpeng Chen, Jianpeng Wang, Ruonan Luo, Bin Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei230601 China School of Communication and Information Engineering Shanghai University Shanghai200072 China
This paper presents an adaptive reversible information hiding algorithm that can maintain thee JPEG file sizes by using RLC (Run Length Coding) AC coefficient coded for embedding, the key point is to choose the approp... 详细信息
来源: 评论
Complete separable reversible data hiding in encrypted image  1st
Complete separable reversible data hiding in encrypted image
收藏 引用
1st International Conference on Cloud computing and Security, ICCCS 2015
作者: Zhaoxia, Yin Huabin, Wang Haifeng, Zhao Bin, Luo Xinpeng, Zhang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei230601 China School of Communication and Information Engineering Shanghai University Shanghai200072 China
Reversible data hiding in encrypted image (RDHEI) is an emerging technology since it has good potential for practical applications such as encrypted image authentication, content owner identification and privacy prote... 详细信息
来源: 评论
An improved lossless data hiding scheme in JPEG bitstream by VLC mapping  1
收藏 引用
13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017
作者: Du, Yang Yin, Zhaoxia Zhang, Xinpeng Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei230601 China School of Communication and Information Engineering Shanghai University Shanghai200072 China
This paper proposed a lossless data hiding scheme by variable length code (VLC) mapping, which focused on embedding additional data into JPEG bitstream. The entropy-coded data in JPEG bitstream consists of a sequence ... 详细信息
来源: 评论
Tumor type classification and candidate cancer-specific biomarkers discovery via semi-supervised learning
收藏 引用
Biophysics Reports 2023年 第2期9卷 57-66页
作者: Peng Chen Zhenlei Li Zhaolin Hong Haoran Zheng Rong Zeng School of Computer Science and Technology University of Science and Technology of China Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Department of Systems Biology University of Science and Technology of China CAS Key Laboratory of Systems Biology Shanghai Institute of Biochemistry and Cell Biology Center for Excellence in Molecular Cell Science Chinese Academy of Sciences School of Life Science and Technology ShanghaiTech University
Identifying cancer-related differentially expressed genes provides significant information for diagnosing tumors, predicting prognoses, and effective treatments. Recently, deep learning methods have been used to perfo... 详细信息
来源: 评论
Error-minimization approach to reduce protease bias  2
Error-minimization approach to reduce protease bias
收藏 引用
2nd International Conference on Biological Information and Biomedical Engineering, BIBE 2018
作者: Chen, Chong Zheng, Haoran School of Computer Science and Technology University of Science and Technology of China Hefei China Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei China Department of Systems Biology University of Science and Technology of China Hefei China
The main goal in proteomics is to describe the proteome in a comprehensive and accurate way, and enzymolysis is a key step in the process of large-scale proteomics experiments. For the same protein samples, using diff... 详细信息
来源: 评论
An adaptive strategy for updating the memory in Evolutionary Algorithms for dynamic optimization
An adaptive strategy for updating the memory in Evolutionary...
收藏 引用
IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments (CIDUE)
作者: Tao Zhu Wenjian Luo Zhifang Li Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
The memory scheme is one of the most widely employed techniques in Evolutionary Algorithms for solving dynamic optimization problems. The updating strategy is a key concern for the memory scheme. Unfortunately, the ex... 详细信息
来源: 评论
AN APPROACH BASED ON TSA-TREE FOR ACCURATE TIME SERIES CLASSIFICATION
AN APPROACH BASED ON TSA-TREE FOR ACCURATE TIME SERIES CLASS...
收藏 引用
2012 IEEE 2nd International Conference on Cloud computing and Intelligence Systems
作者: Xiaoxu He Chenxi Shao School of Computer Science and Technology University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication
In order to improve the performance of time series classification, we introduce a new approach of time series classification. The first step of the approach is to design a feature exaction model based on Trend and Sur... 详细信息
来源: 评论