咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 306 篇 工学
    • 209 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 104 篇 信息与通信工程
    • 42 篇 控制科学与工程
    • 40 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 161 篇 理学
    • 104 篇 数学
    • 46 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 vectors
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 43 篇 college of infor...
  • 38 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 21 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 university of sc...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 38 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 431 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computing and Communication"
453 条 记 录,以下是71-80 订阅
排序:
Precise eye localization with AdaBoost and fast radial symmetry
Precise eye localization with AdaBoost and fast radial symme...
收藏 引用
2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
作者: Zhang, Wencong Chen, Hong Yao, Peng Li, Bin Zhuang, Zhenquan University of Science and Technology of China MOE-Microsoft Key Laboratory of Multimedia Computing and Communication Hefei 230026 Anhui China
The accuracy of face alignment affects greatly the performance of a face recognition system. Since the face alignment is usually conducted using eye positions, the algorithm for accurate eye localization is therefore ... 详细信息
来源: 评论
Address assignment in wireless sensor networks using game approach
Address assignment in wireless sensor networks using game ap...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Kim, Tu Naijie, Gu Kim, Bi Wanli, Dong Dept. of Comput. Sci. and Technol. Univ. of Sci. and Technol. of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In this paper, we propose a game model to solve the MAC address assignment in sensor networks. Insufficiency of battery power of sensors makes the conservation of the energy be the main design issues for the sensor ne... 详细信息
来源: 评论
Full-space LDA with evolutionary selection for face recognition
Full-space LDA with evolutionary selection for face recognit...
收藏 引用
2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
作者: Li, Xin Li, Bin Chen, Hong Wang, XianJi Zhuang, ZhengQuan University of Science and Technology of China MOE-Microsoft Key Laboratory of Multimedia Computing and Communication Hefei 230026 Anhui China
Linear Discriminant Analysis (LDA) is a popular feature extraction technique for face recognition. However, it often suffers from the small sample size problem when dealing with the high dimensional face data. Some ap... 详细信息
来源: 评论
Kurtosis normalization after short-time gaussianization for robust speaker verification
Kurtosis normalization after short-time gaussianization for ...
收藏 引用
6th World Congress on Intelligent Control and Automation, WCICA 2006
作者: Yanlu, Xie Beiqian, Dai Jun, Sun MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology of China HeifeiAnhui 230027 China
Statistical normalization has been popularly used to transform the distribution of the speech feature to decrease the mismatch between the training and test environment in robust speaker verification. This paper prese... 详细信息
来源: 评论
Neighborhood-based distributed topological hole detection algorithm in sensor networks
Neighborhood-based distributed topological hole detection al...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Kun, Bi Naijie, Gu Kun, Tu Wanli, Dong Dept. of Comput. Sci. and Technol. Univ. of Sci. and Technol. of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Topological holes in sensor networks usually indicate the region where nodes are depleted or not dense enough due to kinds of reasons. In this paper, we study the problem of detecting topological holes in wireless sen... 详细信息
来源: 评论
Evolutionary Games on Weighted Newman-Watts Small-World Networks
收藏 引用
Chinese Physics Letters 2009年 第5期26卷 255-258页
作者: 杜文博 曹先彬 赵琳 周宏 Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230026 School of Life Sciences University of Science and Technology of China Hefei 230026
We investigate the evolutionary prisoner's dilemma game (PDG) on weighted Newman-Watts (NW) networks. In weighted NW networks, the link weight ωij is assigned to the link between the nodes i and j as: ωij = (... 详细信息
来源: 评论
The g-dominance Relation for Preference-Based Evolutionary Multi-Objective Optimization
The g-dominance Relation for Preference-Based Evolutionary M...
收藏 引用
2019 IEEE Congress on Evolutionary Computation, CEC 2019
作者: Luo, Wenjian Shi, Luming Lin, Xin Coello Coello, Carlos A. Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei230027 China Departmento de Sistemas UAM-Azcapotzalco Mexico City Mexico
In evolutionary multi-objective optimization, the results generated by an evolutionary algorithm usually contain an approximation, as good as possible, of the entire Pareto-optimal front. However, sometimes the number... 详细信息
来源: 评论
Uplink Supportive Number of Users in Massive MIMO Systems  9
Uplink Supportive Number of Users in Massive MIMO Systems
收藏 引用
2017 9th IEEE International Conference on communication software and Networks (ICCSN 2017)
作者: Jun Zhu Chao Wang Peng Ma Chaochao Jia Kai Li Key laboratory of Intelligent Computing & Signal Processing (Anhui University) Ministry of Education Technology and Innovation Department Shanghai Research Center for Wireless Communication
The supportive number of users achieving the maximum sum rate is studied in uplink massive MIMO systems for zero-forcing(ZF) and maximum-ratio combining(MRC). We obtain the lower bound of the achievable rate of each u... 详细信息
来源: 评论
LMP-GAN: Out-Of-Distribution Detection For Non-Control Data Malware Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Wood, David Kapp, David Kebede, Temesgen Hirakawa, Keigo Wuhan University School of Computer Science China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering China Zhongguancun Academy China Wuhan University State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing China Sun Yat-sen University School of Geography and Planning China Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Chongqing University College of Computer Science China The University of Tokyo Japan RIKEN Center for Advanced Intelligence Project Japan Intelligent Science & Technology Academy Limited CASIC China iFlytek Company Ltd. National Engineering Research Center of Speech and Language Information Processing China Nanyang Technological University College of Computing & Data Science Singapore Henan Academy of Sciences Aerospace Information Research Institute China
Anomaly detection is a common application of machine learning. Out-of-distribution (OOD) detection in particular is a semi-supervised anomaly detection technique where the detection method is trained only on the inlie... 详细信息
来源: 评论
An adaptive strategy for updating the memory in evolutionary algorithms for dynamic optimization
An adaptive strategy for updating the memory in evolutionary...
收藏 引用
IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments
作者: Zhu, Tao Luo, Wenjian Li, Zhifang Nature Inspired Computation and Applications Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 China
The memory scheme is one of the most widely employed techniques in Evolutionary Algorithms for solving dynamic optimization problems. The updating strategy is a key concern for the memory scheme. Unfortunately, the ex... 详细信息
来源: 评论