咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 40 篇 期刊文献

馆藏范围

  • 141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 75 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 23 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 9 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 51 篇 理学
    • 38 篇 数学
    • 14 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 系统科学
    • 7 篇 生物学
    • 2 篇 化学
  • 29 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 10 篇 computer science
  • 9 篇 wireless sensor ...
  • 8 篇 laboratories
  • 8 篇 computer network...
  • 5 篇 optimization
  • 4 篇 statistics
  • 4 篇 cognitive radio
  • 4 篇 monitoring
  • 4 篇 switches
  • 4 篇 databases
  • 4 篇 cluster analysis
  • 4 篇 energy efficienc...
  • 4 篇 heuristic algori...
  • 3 篇 maintenance engi...
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 data mining
  • 3 篇 computational mo...
  • 3 篇 benchmark testin...
  • 3 篇 software testing

机构

  • 21 篇 school of comput...
  • 19 篇 anhui province k...
  • 16 篇 department of co...
  • 8 篇 anhui province k...
  • 7 篇 anhui province k...
  • 7 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 3 篇 key lab of compu...
  • 3 篇 anhui province k...
  • 3 篇 department of co...
  • 3 篇 saic motor ai la...
  • 3 篇 anhui province k...
  • 3 篇 zhongguancun lab...
  • 3 篇 institute of adv...
  • 3 篇 key lab of compu...
  • 3 篇 jianghuai automo...

作者

  • 11 篇 wang shangfei
  • 11 篇 xufa wang
  • 9 篇 shangfei wang
  • 9 篇 luo wenjian
  • 8 篇 shao chenxi
  • 8 篇 wenjian luo
  • 7 篇 gu naijie
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 naijie gu
  • 5 篇 xianbin cao
  • 5 篇 qiang ji
  • 4 篇 dong lanfang
  • 4 篇 jinglong li
  • 4 篇 baohua zhao
  • 4 篇 zhen gao
  • 4 篇 fanping zeng
  • 4 篇 zhao dongdong
  • 3 篇 shan he
  • 3 篇 ren kaixin

语言

  • 132 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Province Key Lab of Software in Computer and Communication"
141 条 记 录,以下是41-50 订阅
排序:
Models of parallel computation :a survey and classification
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第2期1卷 156-165页
作者: ZHANG Yunquan CHEN Guoliang SUN Guangzhong MIAO Qiankun Laboratory of Parallel Computing Institute of SoftwareChinese Academy of SciencesBeijing 100080China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100080China Anhui Province-MOST Key Co-Lab of High Performance Computing and Its Applications Department of Computer Science and TechnologyUniversity of Science and Technology of ChinaHefei 230027China
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organiza... 详细信息
来源: 评论
Directed differential evolution based on directional derivative for numerical optimization problems
Directed differential evolution based on directional derivat...
收藏 引用
2011 11th International Conference on Hybrid Intelligent Systems, HIS 2011
作者: Zhang, Jun Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
Differential Evolution is one kind of Evolutionary Algorithms, which has been successfully applied to solve many optimization problems. In this paper, a directed differential mutation (DDM), which utilizes the directi... 详细信息
来源: 评论
SvdNPD: A negative data publication method based on the sensitive value distribution
SvdNPD: A negative data publication method based on the sens...
收藏 引用
International Workshop on Artificial Immune Systems, AIS 2015
作者: Wu, Linli Luo, Wenjian Zhao, Dongdong School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
Existing data publication methods retain the relationship between the quasi-identifier attributes and sensitive attributes of published data. We call them "positive data publication". However, it will lead t... 详细信息
来源: 评论
Real-Valued Negative Databases  12
Real-Valued Negative Databases
收藏 引用
12th European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, ECAL 2013
作者: Zhao, Dongdong Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
The negative database (NDB) is the negative representation of original data. Existing work has demonstrated that NDB can be used to preserve privacy and hide information. However, most work about NDB is based on binar... 详细信息
来源: 评论
Tuning linux's load balancing algorithm for CMT system
Tuning linux's load balancing algorithm for CMT system
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Peng, Jianzhang Gu, Naijie Li, Yehua Xu, Zhang School of Computer Science and Technology University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Computing and Communication Software USTC SICT Joint Laboratory of Network and Communication Hefei China
Linux 2.6 load balancing algorithm on scheduling domain supports CMP, CMT, SMP, NUMA architecture. For SMT, the algorithm try to assign the new process to the idlest CPU of the idlest core, and if the first CPU of a c... 详细信息
来源: 评论
Fast searching optimal negative surveys
Fast searching optimal negative surveys
收藏 引用
2014 International Conference on Information and Network Security, ICINS 2014
作者: Lu, Yihui Luo, Wenjian Zhao, Dongdong School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
In a negative survey, a category which does not agree with the fact of each participant is collected. Hence, data collectors cannot acquire the realistic data of participants, and this can efficiently protect particip... 详细信息
来源: 评论
Evolutionary Games on Weighted Newman-Watts Small-World Networks
收藏 引用
Chinese Physics Letters 2009年 第5期26卷 255-258页
作者: 杜文博 曹先彬 赵琳 周宏 Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230026 School of Life Sciences University of Science and Technology of China Hefei 230026
We investigate the evolutionary prisoner's dilemma game (PDG) on weighted Newman-Watts (NW) networks. In weighted NW networks, the link weight ωij is assigned to the link between the nodes i and j as: ωij = (... 详细信息
来源: 评论
Stochastic prefix-based fault tolerant source routing algorithm for network on chip
Stochastic prefix-based fault tolerant source routing algori...
收藏 引用
2012 International Conference on computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012
作者: Xu, Gengchun Ren, Kaixin Gu, Naijie Anhui Province Key Laboratory of Computing and Communication Software Hefei China USTC-SICT Joint Laboratory on Network and Communication Hefei China School of Computer Science and Technology University of Science and Technology of China Hefei China
In this paper, a novel fault-tolerant source routing algorithm for Network on Chip (NOC) called Stochastic Prefix-based Source Routing (SPSR) is proposed. Compared to non-source routing algorithms, it releases the int... 详细信息
来源: 评论
Learning with privileged information using Bayesian networks
收藏 引用
Frontiers of computer Science 2015年 第2期9卷 185-199页
作者: Shangfei WANG Menghua HE Yachen ZHU Shan HE Yue LIU Qiang JI School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Lab of Computing and Communicating Software of Anhui Province Hefei 230027 China School of Mathematical Sciences University of Science and Technology of China Hefei 230027 China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY 12180-3590 USA
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged ... 详细信息
来源: 评论
Test Case Generation Based on Program Invariant and Adaptive Random Algorithm
Test Case Generation Based on Program Invariant and Adaptive...
收藏 引用
Advances in Information Technology and Education
作者: Yuan Yuan Zeng Fanping Zhu Guanmiao Deng Chaoqiang Xiong Neng Department of Computer University of Science and Technology of China Anhui Province Key Lab of Software in Computing and Communication
Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation st... 详细信息
来源: 评论