咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 41 篇 期刊文献

馆藏范围

  • 142 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 76 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 23 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 9 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 52 篇 理学
    • 39 篇 数学
    • 15 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 生物学
    • 8 篇 系统科学
    • 2 篇 化学
  • 29 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 10 篇 computer science
  • 9 篇 wireless sensor ...
  • 8 篇 laboratories
  • 8 篇 computer network...
  • 5 篇 optimization
  • 4 篇 statistics
  • 4 篇 data mining
  • 4 篇 cognitive radio
  • 4 篇 monitoring
  • 4 篇 switches
  • 4 篇 databases
  • 4 篇 cluster analysis
  • 4 篇 energy efficienc...
  • 4 篇 heuristic algori...
  • 3 篇 maintenance engi...
  • 3 篇 electronic mail
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 computational mo...
  • 3 篇 benchmark testin...

机构

  • 21 篇 school of comput...
  • 19 篇 anhui province k...
  • 16 篇 department of co...
  • 8 篇 anhui province k...
  • 7 篇 anhui province k...
  • 7 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 3 篇 key lab of compu...
  • 3 篇 anhui province k...
  • 3 篇 department of co...
  • 3 篇 saic motor ai la...
  • 3 篇 anhui province k...
  • 3 篇 zhongguancun lab...
  • 3 篇 institute of adv...
  • 3 篇 key lab of compu...
  • 3 篇 jianghuai automo...

作者

  • 11 篇 wang shangfei
  • 11 篇 xufa wang
  • 9 篇 shangfei wang
  • 9 篇 luo wenjian
  • 8 篇 shao chenxi
  • 8 篇 wenjian luo
  • 7 篇 gu naijie
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 naijie gu
  • 5 篇 xianbin cao
  • 5 篇 qiang ji
  • 4 篇 dong lanfang
  • 4 篇 jinglong li
  • 4 篇 baohua zhao
  • 4 篇 zhen gao
  • 4 篇 fanping zeng
  • 4 篇 zhao dongdong
  • 3 篇 shan he
  • 3 篇 ren kaixin

语言

  • 133 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Province Key Lab of Software in Computer and Communication"
142 条 记 录,以下是91-100 订阅
排序:
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Junteng Wang Wenjian Luo Yamin Hu Hao Jiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei China
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not sa... 详细信息
来源: 评论
An immune based algorithm for Chinese network short text clustering
收藏 引用
Zidonghua Xuebao/ Acta Automatica Sinica 2009年 第7期35卷 896-902页
作者: He, Tao Cao, Xian-Bin Tan, Hui School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Laboratory of Software in Computing and Communication Anhui Province Hefei 230027 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Network short text clustering is a major technology in network content security. Since Chinese network short text is less of keywords and full of anomalous writings, the traditional text clustering method is not direc... 详细信息
来源: 评论
Joint Sink Mobility and Data Diffusion for Lifetime Optimization in Wireless Sensor Networks
Joint Sink Mobility and Data Diffusion for Lifetime Optimiza...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Yu Gu Hengchang Liu Fei Song Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Department of Computer Science University of Virginia Charlottesville VA USA
In this paper, we address the problem of lifetime optimization under storage constraint for wireless sensor networks with a mobile sink node. The problem is particularly challenging since we need to consider both mobi... 详细信息
来源: 评论
The Learning-Bargaining Algorithm Used in Unlicensed Spectrum Pre-Allocation
The Learning-Bargaining Algorithm Used in Unlicensed Spectru...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Kun Han Jinlong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time... 详细信息
来源: 评论
Network Security Evaluation Algorithm Based on Access Level Vectors
Network Security Evaluation Algorithm Based on Access Level ...
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Kai Li Naijie Gu Kun Bi Hongzhu Ji Department of Computer Science and Technology University of Science and Technology of China Hefei China 230027 Anhui Province Key Lab. of Computing and Communication Software Hefei China 230027
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres... 详细信息
来源: 评论
Link-weighted and distance-constrained channel assignment in single-radio wireless mesh networks
Link-weighted and distance-constrained channel assignment in...
收藏 引用
Conference on Local computer Networks (LCN)
作者: Junfeng Jin Baohua Zhao Hao Zhou School of Computer Science University of Science and Technology Hefei Anhui China Province Key Laboratory of Software in Computing and Communication Hefei Anhui China School of Computer Science University of Science and Technology of China Hefei Anhui
In this work, we study a link-weighted and distance-constrained channel assignment problem in multi-channel mesh networks with stationary router nodes, such as community wireless networks. A good channel assignment is... 详细信息
来源: 评论
An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor Networks
An Energy-Aware Coverage Based Node Scheduling Scheme for Wi...
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Jinxia Liu Naijie Gu Songsong He Dept. of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei Anhui 230027 China
A fundamental issue in wireless sensor network is to extend network lifetime while maintaining network coverage and connectivity. Protection for sensors themselves is another important concern. An Energyaware Coverage... 详细信息
来源: 评论
Directed differential evolution based on directional derivative for numerical optimization problems
Directed differential evolution based on directional derivat...
收藏 引用
International Conference on Hybrid Intelligent Systems (HIS)
作者: Jun Zhang Wenjian Luo School of Computer Science and Technology University of Science and Technology Hefei Anhui China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology Hefei Anhui China
Differential Evolution is one kind of Evolutionary Algorithms, which has been successfully applied to solve many optimization problems. In this paper, a directed differential mutation (DDM), which utilizes the directi... 详细信息
来源: 评论
Scheduling Model for Cognitive Radio
Scheduling Model for Cognitive Radio
收藏 引用
3rd International Conference on Cognitive Radio Oriented Wireless Networks and communications (CrownCom 2008)
作者: Ping Zhu Jinglong Li Xufa Wang Department of Computer Science and Technology Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
The priority queue model divides CR (cognitive radio) system users into primary user and secondary user. The primary user has preemptive priority over secondary user, while the same priority level users are FIFO serve... 详细信息
来源: 评论
A fine-grained algorithm for generating hard-toreverse negative databases
A fine-grained algorithm for generating hard-toreverse negat...
收藏 引用
International Workshop on Artificial Immune Systems (AIS)
作者: Dongdong Zhao Wenjian Luo Ran Liu Lihua Yue Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China School of Computer Science China University of Geosciences Wuhan China
The negative database (NDB) is a new technique for privacy preserving and information hiding. It hides information by storing the complementary set instead of the original data. In order to protect the hidden informat... 详细信息
来源: 评论