咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 137 篇 期刊文献

馆藏范围

  • 451 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 209 篇 计算机科学与技术...
    • 156 篇 软件工程
    • 103 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 38 篇 电气工程
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 159 篇 理学
    • 103 篇 数学
    • 45 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 vectors
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 42 篇 college of infor...
  • 37 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 university of sc...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 37 篇 li yingsong
  • 25 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 429 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computing and Communication"
451 条 记 录,以下是381-390 订阅
排序:
Representative Template Set Generation Method for Pedestrian Detection
Representative Template Set Generation Method for Pedestrian...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Pei Wu Xian-Bin Cao Yan-Wu Xu Hong Qiao Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Institute of Automation Chinese Academy and Sciences Beijing China
Template matching is an effective approach for pedestrian detection. In order to achieve real-time and accurate detection, how to obtain a suitable representative template set is still an open problem due to the large... 详细信息
来源: 评论
An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor Networks
An Energy-Aware Coverage Based Node Scheduling Scheme for Wi...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Jinxia Liu Naijie Gu Songsong He Dept. of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei Anhui 230027 China
A fundamental issue in wireless sensor network is to extend network lifetime while maintaining network coverage and connectivity. Protection for sensors themselves is another important concern. An Energyaware Coverage... 详细信息
来源: 评论
Scheduling Model for Cognitive Radio
Scheduling Model for Cognitive Radio
收藏 引用
3rd International Conference on Cognitive Radio Oriented Wireless Networks and communications (CrownCom 2008)
作者: Ping Zhu Jinglong Li Xufa Wang Department of Computer Science and Technology Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
The priority queue model divides CR (cognitive radio) system users into primary user and secondary user. The primary user has preemptive priority over secondary user, while the same priority level users are FIFO serve... 详细信息
来源: 评论
The self-adaption strategy for parameter ε in ε-MOEA
The self-adaption strategy for parameter ε in ε-MOEA
收藏 引用
Congress on Evolutionary Computation
作者: Min Zhang Wenjian Luo Xingxin Pei Xufa Wang Nature Inspired Computing and Application Laboratory Department of Computer Science and Technology University of Science and Technology China Anhui Key Laboratory of software in Computing Communication University of Science and Technology China University of Science and Technology of China Hefei Anhui CN Nature Inspired Computing and Application Laboratory Department of Computer Science and Technology of China University of Science and Technology China
A novel self-adaption strategy for the parameter epsiv in epsiv-MOEA is proposed in this paper based on the analyses of the relationship between the value of epsiv and the maximum number of non-dominated solutions. Th... 详细信息
来源: 评论
Airborne moving vehicle detection for urban traffic surveillance
Airborne moving vehicle detection for urban traffic surveill...
收藏 引用
International Conference on Intelligent Transportation
作者: Renjun Lin Xianbin Cao Yanwu Xu Chuangxian Wei Hong Qiao Anhui Province Key Laboratory of Software Computing and Communication University of Science and Technology Hefei China University of Manchester Institute of Science and Technology UK Institute of Automation Chinese Academy and Sciences Beijing China
At present, moving vehicle detection on airborne platform has been an important technology for urban traffic surveillance. In such a situation, most commonly used methods (e.g. image subtraction) could hardly work wel... 详细信息
来源: 评论
Image quality assessment metrics with Radon transform
Image quality assessment metrics with Radon transform
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jianxin Pang Rong Zhang Hui Zhang Xuan Huang Zhenkai Liu MOE-Microsoft Key Laboratory of Multimedia Computing and Communication Department of Electronic Engineering and Information Science University of Science and Technology Hefei Anhui China
Objective image quality assessment (QA) is a fundamental and challenging job in image processing which evaluates the image quality consistently with human perception automatically. Generally, an image can be segmented... 详细信息
来源: 评论
A low-cost pedestrian-detection system with a single optical camera
A low-cost pedestrian-detection system with a single optical...
收藏 引用
作者: Cao, Xian-Bin Qiao, Hong Keane, John IEEE Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China Laboratory of Complex Systems and Intelligent Science Institute of Automation Chinese Academy of Sciences Beijing 100080 China School of Informatics University of Manchester M60 1QD Manchester United Kingdom University of Manchester M13 9PL Manchester United Kingdom
The ultimate purpose of a pedestrian-detection system (PDS) is to reduce pedestrian-vehicle-related injury. Most such systems tend to adopt expensive sensors, such as infrared devices, in expectation of better perform... 详细信息
来源: 评论
Network Security Evaluation Algorithm Based on Access Level Vectors
Network Security Evaluation Algorithm Based on Access Level ...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Kai Li Naijie Gu Kun Bi Hongzhu Ji Department of Computer Science and Technology University of Science and Technology of China Hefei China 230027 Anhui Province Key Lab. of Computing and Communication Software Hefei China 230027
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres... 详细信息
来源: 评论
A Joint Appearance-Spatial Distance for Kernel-Based Image Categorization
A Joint Appearance-Spatial Distance for Kernel-Based Image C...
收藏 引用
26th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2008), vol.1
作者: Guo-Jun Qi Xian-Sheng Hua Yong Rui Jinhui Tang Zheng-Jun Zha Hong-Jiang Zhang MOE-Microsoft Key Laboratory of Multimedia Computing and Communication & Department of Automation University of Science and Technology Hefei Anhui China Microsoft Research Asia Beijing China
The goal of image categorization is to classify a collection of unlabeled images into a set of predefined classes to support semantic-level image retrieval. The distance measures used in most existing approaches eithe... 详细信息
来源: 评论
Scheduling Aircraft Landing Based on Clonal Selection Algorithm and Receding Horizon Control
Scheduling Aircraft Landing Based on Clonal Selection Algori...
收藏 引用
International Conference on Intelligent Transportation
作者: Xiaolan Jia Xianbin Cao Yuanping Guo Hong Qiao Jun Zhang Province Key Laboratory of Software Computing and Communication University of Science and Technology Hefei Anhui China University of Manchester Institute of Science and Technology UK Institute of Automation Chinese Academy and Sciences Beijing China School of Electronic and Information Engineering Beihang University Beijing China
The task of aircraft landing scheduling (ALS) is to give a landing sequence and landing times for a given set of aircrafts where many constraints must be satisfied. ALS is an NP-hard problem with large-scale and multi... 详细信息
来源: 评论