咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 41 篇 期刊文献

馆藏范围

  • 142 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 76 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 23 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 9 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 52 篇 理学
    • 39 篇 数学
    • 15 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 生物学
    • 8 篇 系统科学
    • 2 篇 化学
  • 29 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 10 篇 computer science
  • 9 篇 wireless sensor ...
  • 8 篇 laboratories
  • 8 篇 computer network...
  • 5 篇 optimization
  • 4 篇 statistics
  • 4 篇 data mining
  • 4 篇 cognitive radio
  • 4 篇 monitoring
  • 4 篇 switches
  • 4 篇 databases
  • 4 篇 cluster analysis
  • 4 篇 energy efficienc...
  • 4 篇 heuristic algori...
  • 3 篇 maintenance engi...
  • 3 篇 electronic mail
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 computational mo...
  • 3 篇 benchmark testin...

机构

  • 21 篇 school of comput...
  • 19 篇 anhui province k...
  • 16 篇 department of co...
  • 8 篇 anhui province k...
  • 7 篇 anhui province k...
  • 7 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 3 篇 key lab of compu...
  • 3 篇 anhui province k...
  • 3 篇 department of co...
  • 3 篇 saic motor ai la...
  • 3 篇 anhui province k...
  • 3 篇 zhongguancun lab...
  • 3 篇 institute of adv...
  • 3 篇 key lab of compu...
  • 3 篇 jianghuai automo...

作者

  • 11 篇 wang shangfei
  • 11 篇 xufa wang
  • 9 篇 shangfei wang
  • 9 篇 luo wenjian
  • 8 篇 shao chenxi
  • 8 篇 wenjian luo
  • 7 篇 gu naijie
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 naijie gu
  • 5 篇 xianbin cao
  • 5 篇 qiang ji
  • 4 篇 dong lanfang
  • 4 篇 jinglong li
  • 4 篇 baohua zhao
  • 4 篇 zhen gao
  • 4 篇 fanping zeng
  • 4 篇 zhao dongdong
  • 3 篇 shan he
  • 3 篇 ren kaixin

语言

  • 133 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Province Key Lab of Software in Computer and Communication"
142 条 记 录,以下是101-110 订阅
排序:
Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Shuang Zhang, Tao Liu, Jiqiang Wang, Jiacheng Wu, Xuangou Zhu, Xiaoqiang Zhang, Ruichen Zhang, Weiting Yuan, Zhenhui Mao, Shiwen Kim, Dong In School of Software Engineering Beijing Jiaotong University Beijing100044 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Computer Science and Technology An hui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui University of Technology Anhui243002 China College of Computing and Data Science Nanyang Technological University Singapore School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China School of Engineering University of Warwick CoventryCV4 7AL United Kingdom Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States Department of Electrical and Computer Engineering College of Information and Communication Engineering Sungkyunkwan University Suwon16419 Korea Republic of
—With the rapid development of technology and the acceleration of digitalisation, the frequency and complexity of cyber security threats are increasing. Traditional cybersecurity approaches, often based on static rul... 详细信息
来源: 评论
An Energy-Efficient TDMA MAC for Wireless Sensor Networks
An Energy-Efficient TDMA MAC for Wireless Sensor Networks
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Rong Gang Bai Yu Gui Qu Yang Guo Bao Hua Zhao Department of Electronic Engineering and Information Science University of Science and Technology Hefei Anhui China Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
This paper proposes an energy-efficient and collision-free medium access control protocol TDMA-WSN for wireless sensor networks. The protocol is based on time division multiple access (TDMA) principle and reduces ener... 详细信息
来源: 评论
A Lightweight OS-Level Virtualization Architecture Based on Android
A Lightweight OS-Level Virtualization Architecture Based on ...
收藏 引用
2017 2nd International Conference on computer, Network Security and communication Engineering(CNSCE2017)
作者: Bo-wen LIU Nai-jie GU De-he GU School of Computer Science and Technology University of Science and Technology of China Institute of Advanced Technology University of Science and Technology of China Anhui Province Key Laboratory of Computing and Communication Software
All kinds of intelligent terminal equipment emerge in endlessly and grow explosively. Typical devices, such as smartphones and tablets, are becoming more and more popular, furthermore, intelligent equipment market sha... 详细信息
来源: 评论
Empirical Study of Population-Based Dynamic Constrained Multimodal Optimization Algorithms
Empirical Study of Population-Based Dynamic Constrained Mult...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Xin Lin Wenjian Luo Yingying Qiao Peilan Xu Tao Zhu Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei China School of Software Engineering University of South China Hengyang China
There are many dynamic optimization problems in real-world applications. Although many variants of evolutionary algorithms and swarm intelligence have been proposed to solve such problems, little work has been conduct... 详细信息
来源: 评论
Constructing the Voronoi Diagram of Planar Point Set in Parallel
Constructing the Voronoi Diagram of Planar Point Set in Para...
收藏 引用
International Conference on Computational Intelligence and software Engineering (CiSE)
作者: Lanfang Dong Yuan Wu Shanhai Zhou Anhui Province Key Laboratory of Software In Computing and Communication College of computer science and technology University of Science and Technology Hefei China College of computer science & technology University of Science and Technology Hefei China
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ... 详细信息
来源: 评论
Extended Doo-Sabin surfaces
收藏 引用
Journal of Information and Computational Science 2011年 第12期8卷 2239-2247页
作者: Huang, Zhangjin Wang, Feng Wang, Guoping School of Computer Science and Technology University of Science and Technology of China China Key Laboratory of Software in Computing and Communication Anhui Province China USTC-SICT Joint Laboratory on Network and Communication China Peking University China School of Electronic Engineering and Computer Science Peking University China
In this paper we propose a modification of quadratic NURSSes called EDSes (Extended Doo-Sabin Surfaces). EDSes inherit the refinement rules for quadratic NURSSes for four-sided faces but use the refinement rules for D... 详细信息
来源: 评论
Privacy-Protected Facial Expression Recognition Augmented by High-Resolution Facial Images
Privacy-Protected Facial Expression Recognition Augmented by...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Cong Liang Shangfei Wang Xiaoping Chen Key Lab of Computing and Communication Software of Anhui Province University of Science and Technology of China Hefei China Anhui Robot Technology Standard Innovation Base University of Science and Technology of China Hefei China
Cloud-based expression recognition from high-resolution facial images may put the subjects’ privacy at risk. We identify two kinds of privacy leakage, the appearance leakage in which the visual appearances of subject...
来源: 评论
The Frequency-Time Pre-Allocation in Unlicensed Spectrum Based on the Games Learning
The Frequency-Time Pre-Allocation in Unlicensed Spectrum Bas...
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and communications
作者: Kun Han Jinlong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication Department of Computer Science and Technology University of Science and Technology Hefei China Department of Computer Science and Technology University of Science and Technology of China Hefei China
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time... 详细信息
来源: 评论
Estimating properties of chaotic system based on S-NURBS resampling method
Estimating properties of chaotic system based on S-NURBS res...
收藏 引用
International Conference on Measurement, Information and Control (MIC)
作者: Chenxi Shao Qingqing Liu Tingting Wang Binghong Wang Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei China Computer Science and Technology Department University of Science and Technology of China Hefei China
Physical properties of the chaotic system play important roles on studying the innate character and deciding the practical predictability of the dynamics. For a short piece of undersampled chaotic signals, it is very ... 详细信息
来源: 评论
A hybrid active contour model with local Gaussian distribution fitting energy for image segmentation
收藏 引用
Journal of Information and Computational Science 2015年 第17期12卷 6515-6523页
作者: Zhang, Runru Huang, Zhangjin Gu, Naijie School of Computer Science and Technology University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Computing and Communication Software Hefei China Institute of Advanced Technology University of Science and Technology of China Hefei China
Active contour models have been widely applied in image segmentation with promising results. However, many of them fail to segment images successfully due to intensity inhomogeneity. To address this problem, we propos... 详细信息
来源: 评论