咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 306 篇 工学
    • 209 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 104 篇 信息与通信工程
    • 42 篇 控制科学与工程
    • 40 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 161 篇 理学
    • 104 篇 数学
    • 46 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 vectors
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 43 篇 college of infor...
  • 38 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 21 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 university of sc...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 38 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 431 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computing and Communication"
453 条 记 录,以下是31-40 订阅
排序:
A novel approach for signal transduction networks simulation at a mesoscopic level
A novel approach for signal transduction networks simulation...
收藏 引用
7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE
作者: Shao, Chenxi Deng, Hongli MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology of China Hefei Anhui 230027 China Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Signal transduction (ST) networks simulation is important to medical research. However, owing to the complexity of the networks, most methods presented for the simulation are not desirable. Here, based on multi-agent ... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
A hybrid particle swarm optimization for high-dimensional dynamic optimization  11th
A hybrid particle swarm optimization for high-dimensional dy...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Luo, Wenjian Yang, Bin Bu, Chenyang Lin, Xin Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui230027 China
High-Dimensional Dynamic Optimization Problems (HDDOPs) commonly exist in real-world applications. In evolutionary computation field, most of existing benchmark problems, which could simulate HDDOPs, are non-separable... 详细信息
来源: 评论
Research and implementation of continuous wave radar ranging method based on tri-frequency
收藏 引用
High Technology Letters 2014年 第2期20卷 111-116页
作者: 袁其平 Fan Lijieare Tong Zhengrong Yang Xiufeng Cao Ye School of Electronics Information Engineering Tianjin University of Technology Key Laboratory of Film Electronics and Communication Devices and Key Laboratory of Intelligent Computing and Novel Software Technolgy School of Computer and Communication EngineeringTianjin University of Technology
In the traditional dual-frequency radar ranging system,there is a contradiction between ranging precision and ranging *** a tri-frequency ranging method is *** principle of the tri-frequency ranging is that the distan... 详细信息
来源: 评论
Multi-question negative surveys  3rd
Multi-question negative surveys
收藏 引用
3rd International Conference on Data Mining and Big Data, DMBD 2018 held in conjunction with the 9th International Conference on Swarm Intelligence, ICSI 2018
作者: Jiang, Hao Luo, Wenjiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui230027 China
The negative survey is an emerging method of collecting sensitive information. It could obtain the distribution of sensitive information while preserving the personal privacy. When collecting sensitive information, se... 详细信息
来源: 评论
A self-organized algorithm based on digital hormone
A self-organized algorithm based on digital hormone
收藏 引用
International Conference on Advanced Computer Theory and Engineering
作者: Xia, Li Xufa, Wang Yang, Lei Haifeng, You Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei China
In this paper, a self-organized algorithm for task allocation, based on the hormone reaction-diffusion mechanism, is proposed for a multi-robot system. Hormone messages are used to coordinate the movement of robots. B... 详细信息
来源: 评论
A hormone-based clustering algorithm in wireless sensor networks
A hormone-based clustering algorithm in wireless sensor netw...
收藏 引用
2010 2nd International Conference on Computer Engineering and Technology, ICCET 2010
作者: Dong, Dayuan You, Haifeng Zhang, Yipeng Wang, Xufa Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei China
Clustering problem is one of the hottest issues in wireless sensor networks (WSNs). The strategy for selection of cluster head has not been sufficiently investigated. In this paper, we propose a hormone-based clusteri... 详细信息
来源: 评论
Mac address assignment in wireless sensor networks: A mixed strategy game approach
Mac address assignment in wireless sensor networks: A mixed ...
收藏 引用
2nd International Conference on Systems and Networks communications, ICSNC 2006
作者: Kun, Tu Kun, Bi Naijie, Gu Wanli, Dong Xiaohu, Liu Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In this paper, we address the problem of MAC address assignment in wireless sensor networks. A novel scheme for MAC address assignment is proposed to reduce the overhead. We model the problem from the game theoretical... 详细信息
来源: 评论
Topological hole detection in sensor networks with cooperative neighbors
Topological hole detection in sensor networks with cooperati...
收藏 引用
2nd International Conference on Systems and Networks communications, ICSNC 2006
作者: Kun, Bi Kun, Tu Naijie, Gu Wanli, Dong Xiaohu, Liu Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In a wireless sensor network, the regions in which a large percentage of sensor nodes are not available may form holes in the network. In holes, sensor nodes may be depleted or not dense enough to communicate with oth... 详细信息
来源: 评论
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases
A Hybrid of the prefix algorithm and the q-hidden algorithm ...
收藏 引用
IEEE Symposium on Computational Intelligence in Cyber Security
作者: Liu, Ran Luo, Wenjian Wang, Xufa School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software Engineering in Computing and Communication Hefei 230027 Anhui China
The negative database (NDB) is a complement of the corresponding database. The NDB could protect the privacy of the data, but it should be complete and hard-to-reverse. However, existent techniques cannot generate the... 详细信息
来源: 评论