咨询与建议

限定检索结果

文献类型

  • 315 篇 会议
  • 137 篇 期刊文献

馆藏范围

  • 452 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 303 篇 工学
    • 208 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 103 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 37 篇 电气工程
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 159 篇 理学
    • 103 篇 数学
    • 45 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 vectors
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 42 篇 college of infor...
  • 37 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 11 篇 school of softwa...
  • 11 篇 school of inform...
  • 11 篇 school of cyber ...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 university of sc...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 37 篇 li yingsong
  • 25 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 430 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of software in Computing Communication"
452 条 记 录,以下是351-360 订阅
排序:
Three dimensional stratum modeling and a fast algorithm for arbitrary cutting based on half-edge structure
Three dimensional stratum modeling and a fast algorithm for ...
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Xi, Liu Dong, Lanfang Lu, Detang Hefei China Anhui Province Key Lab of Software in Computing and Communication School of Computer Science and Technology USTC Hefei China Institute of Engineering and Science Software USTC Hefei China
The three dimensional stratum modeling provides important basis of analysis and policy-making in areas such as Geophysics, Petroleum, Minerals, Urban construction and so on. In this paper, we firstly propose a general... 详细信息
来源: 评论
The detection of Trojan horse based on the data mining
The detection of Trojan horse based on the data mining
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Tang, Shugang School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300191 China
Trojan horse is a serious security threat to computer network. Traditionally, Trojan Horses are detected using file's dynamic characteristics or behaviors. However, these methods are not available for unknown or u... 详细信息
来源: 评论
Opportunistic Dynamic Channel Allocation Based on Chain Store Game
Opportunistic Dynamic Channel Allocation Based on Chain Stor...
收藏 引用
International Conference on Wireless communications, Networking and Mobile computing (WiCom)
作者: Jinglong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication School of Computer Science and Technology University of Science and Technology Hefei Anhui China
In adaptive secondary user channel allocation of cognitive radio, some users finish communication and release their channel as the time goes by, while some newcomers request channel resources to communicate. Thus, it ... 详细信息
来源: 评论
An improved RBF network for predicting location in mobile network
An improved RBF network for predicting location in mobile ne...
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Liu, Fenglian School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300191 China
In mobile network, quality of service (Qos) is difficultly guaranteed for the particularity of mobile network. If the system knows, prior to the mobile subscriber movement, the exact trajectory it will follow, the Qos... 详细信息
来源: 评论
A novel similarity measure method for CBIR system
A novel similarity measure method for CBIR system
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Liu, Fenglian School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing Novel Software Technology Tianjin 300191 China
This paper presents a novel similarity measure method based a combination of color and texture feature representations. In this method, the YIQ color space is chosen, because it can describe both color images and gray... 详细信息
来源: 评论
A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems
A Preliminary Study on Why Using the Nonself Detector Set fo...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Baoliang Xu Wenjian Luo Xufa Wang Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al... 详细信息
来源: 评论
Constructing the Voronoi diagram of planar point set in parallel
Constructing the Voronoi diagram of planar point set in para...
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Dong, Lanfang Wu, Yuan Zhou, Shanhai Anhui Province Key Lab. of Software in Computing and Communication College of Computer Science and Technology USTC Hefei China College of Computer Science and Technology University of Science and Technology of China Hefei China
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ... 详细信息
来源: 评论
Generating an Approximately Optimal Detector Set by Evolving Random Seeds
Generating an Approximately Optimal Detector Set by Evolving...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Jie Zhang Wenjian Luo Baoliang Xu Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
The detector generation algorithm is the core of a negative selection algorithm (NSA). In most previous work, the NSAs generate the detector set randomly, which cannot guarantee to obtain an efficient detector set. To... 详细信息
来源: 评论
Theoretical and empirical analyses of Evolutionary Negative Selection Algorithms for a combinational optimization problem
Theoretical and empirical analyses of Evolutionary Negative ...
收藏 引用
International Conference on Bio-Inspired computing: Theories and Applications, BICTA
作者: Xingxin Pei Wenjian Luo Nature Inspired Computation and Application Laboratory School of Computer Science and Technology Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Evolutionary Negative Selection Algorithms (ENSAs) could be regarded as hybrid algorithms of Evolutionary Algorithms (EAs) and Negative Selection Algorithms (NSAs). The average time complexity of ENSAs on combinationa... 详细信息
来源: 评论
A hormone based tracking strategy for wireless sensor network
A hormone based tracking strategy for wireless sensor networ...
收藏 引用
IEEE International Conference on Intelligent computing and Intelligent Systems (ICIS)
作者: Yipeng Zhang Haifeng You Xufa Wang Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology Hefei China
In this paper, we present a hormone based tracking strategy called Hormone based Activation (HA) for mobile target tracking in wireless sensor networks inspired by the bio-endocrine system. Hormone messages are used i... 详细信息
来源: 评论