咨询与建议

限定检索结果

文献类型

  • 315 篇 会议
  • 138 篇 期刊文献

馆藏范围

  • 453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 209 篇 计算机科学与技术...
    • 156 篇 软件工程
    • 103 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 38 篇 电气工程
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 159 篇 理学
    • 103 篇 数学
    • 45 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 vectors
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 42 篇 college of infor...
  • 37 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 11 篇 school of softwa...
  • 11 篇 school of inform...
  • 11 篇 school of cyber ...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 university of sc...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 37 篇 li yingsong
  • 25 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 431 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computing and Communication"
453 条 记 录,以下是221-230 订阅
排序:
Energy-Efficient In-Memory Paging for Smartphones
Energy-Efficient In-Memory Paging for Smartphones
收藏 引用
作者: Zhong, Kan Liu, Duo Liang, Liang Zhu, Xiao Long, Linbo Wang, Yi Sha, Edwin Hsing-Mean College of Computer Science Chongqing University Chongqing400044 China Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education Chongqing400044 China College of Communication Engineering Chongqing University Chongqing400044 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Smartphones are becoming increasingly energy-hungry to support feature-rich applications, posing a lot of pressure on battery lifetime and making energy consumption a non-negligible issue. In particular, dynamic rando... 详细信息
来源: 评论
A new private-preserving algorithm based on SMART
收藏 引用
Journal of Computers (Taiwan) 2016年 第4期27卷 171-185页
作者: Han, Bowen Zhang, Zhenjiang Uden, Lorna School of Electronic and Information Engineering Key Laboratory of Communication and Information Systems Beijing Jiaotong University Beijing100044 China School of Software Engineering Key Laboratory of Communication and Information Systems Beijing Jiaotong University Beijing100044 China School of Computing FACS Staffordshire University The Octagon Beaconside StaffordSt180AD United Kingdom
Privacy is a critical issue in many WSN applications because wireless sensor networks (WSNs) are vulnerable to malicious attacks due to their characteristics. Existing hop by hop and shuffling based privacy preserving... 详细信息
来源: 评论
Speaker recognition with mel scale-based wavelet packet decomposition and AR-volterra model
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第10期7卷 2087-2094页
作者: Yang, Shuying Guo, Jijn Jiang, Jiaojiao School of Computer and Communication Engineering Tianjin University of Technology No. 391 Binshui Xidao Xiqing District Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology No. 391 Binshui Xidao Xiqing District Tianjin300384 China
In order to improve the rate of speaker recognition, this paper proposes a new scheme with Mel scale-based Wavelet Packet Decomposition and AR-Volterra model. First, the speech signal is decomposed by wavelet packet o... 详细信息
来源: 评论
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE BASED ON BLOCK HISTOGRAM SHIFTING
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE BASED ON BLOCK HIS...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Zhaoxia Yin Andrew Abel Xinpeng Zhang Bin Luo School of Communication and Information Engineering Shanghai University Shanghai 200072 P.R. China. Computing Science and Mathematics University of Stirling. Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei 230601 P.R. China.
Since there is good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection, reversible data hiding in encrypted image (RDHEI) has attracted inc... 详细信息
来源: 评论
Interactive reflection simulation via physical shading model and fast environment mapping
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第2期7卷 351-356页
作者: Xu, Jie Fu, Jinhua School of Software Zhengzhou University of Light Industry China School of Computer and Communication Engineering Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou China
In order to enhance realistic reflection effects on some objects and realize faster rendering to meet interactive requirements, we present a novel method to produce interactive reflection simulation using physical sha... 详细信息
来源: 评论
A fine-grained algorithm for generating hard-toreverse negative databases
A fine-grained algorithm for generating hard-toreverse negat...
收藏 引用
International Workshop on Artificial Immune Systems, AIS 2015
作者: Zhao, Dongdong Luo, Wenjian Liu, Ran Yue, Lihua School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China School of Computer Science China University of Geosciences Wuhan430074 China
The negative database (NDB) is a new technique for privacy preserving and information hiding. It hides information by storing the complementary set instead of the original data. In order to protect the hidden informat... 详细信息
来源: 评论
Performance optimization and evaluation of space management in cloud storage systems  15th
Performance optimization and evaluation of space management ...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Xu, Guangping Li, Huan Mao, Qunfang Lin, Sheng Zhang, Hua Tianjin Key Laboratory of Intelligence Computing and New Software Technology Tianjin300384 China Computer and Communication Engineering School Tianjin University of Technology Tianjin300384 China
Cloud service providers and enterprises usually deploy high performance storage to manage the unrelenting growth of data. In this paper, we focus on performance optimization and evaluation by using optimal regeneratio... 详细信息
来源: 评论
Complete separable reversible data hiding in encrypted image  1st
Complete separable reversible data hiding in encrypted image
收藏 引用
1st International Conference on Cloud computing and Security, ICCCS 2015
作者: Zhaoxia, Yin Huabin, Wang Haifeng, Zhao Bin, Luo Xinpeng, Zhang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei230601 China School of Communication and Information Engineering Shanghai University Shanghai200072 China
Reversible data hiding in encrypted image (RDHEI) is an emerging technology since it has good potential for practical applications such as encrypted image authentication, content owner identification and privacy prote... 详细信息
来源: 评论
SvdNPD: a negative data publication method based on the sensitive value distribution
SvdNPD: a negative data publication method based on the sens...
收藏 引用
International Workshop on Artificial Immune Systems (AIS)
作者: Linli Wu Wenjian Luo Dongdong Zhao University of Science and Technology of China Hefei Anhui CN Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Existing data publication methods retain the relationship between the quasi-identifier attributes and sensitive attributes of published data. We call them "positive data publication". However, it will lead t... 详细信息
来源: 评论
A fine-grained algorithm for generating hard-toreverse negative databases
A fine-grained algorithm for generating hard-toreverse negat...
收藏 引用
International Workshop on Artificial Immune Systems (AIS)
作者: Dongdong Zhao Wenjian Luo Ran Liu Lihua Yue Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China School of Computer Science China University of Geosciences Wuhan China
The negative database (NDB) is a new technique for privacy preserving and information hiding. It hides information by storing the complementary set instead of the original data. In order to protect the hidden informat... 详细信息
来源: 评论