咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 40 篇 期刊文献

馆藏范围

  • 141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 75 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 23 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 9 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 51 篇 理学
    • 38 篇 数学
    • 14 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 系统科学
    • 7 篇 生物学
    • 2 篇 化学
  • 29 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 10 篇 computer science
  • 9 篇 wireless sensor ...
  • 8 篇 laboratories
  • 8 篇 computer network...
  • 5 篇 optimization
  • 4 篇 statistics
  • 4 篇 cognitive radio
  • 4 篇 monitoring
  • 4 篇 switches
  • 4 篇 databases
  • 4 篇 cluster analysis
  • 4 篇 energy efficienc...
  • 4 篇 heuristic algori...
  • 3 篇 maintenance engi...
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 data mining
  • 3 篇 computational mo...
  • 3 篇 benchmark testin...
  • 3 篇 software testing

机构

  • 21 篇 school of comput...
  • 19 篇 anhui province k...
  • 16 篇 department of co...
  • 8 篇 anhui province k...
  • 7 篇 anhui province k...
  • 7 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 3 篇 key lab of compu...
  • 3 篇 anhui province k...
  • 3 篇 department of co...
  • 3 篇 saic motor ai la...
  • 3 篇 anhui province k...
  • 3 篇 zhongguancun lab...
  • 3 篇 institute of adv...
  • 3 篇 key lab of compu...
  • 3 篇 jianghuai automo...

作者

  • 11 篇 wang shangfei
  • 11 篇 xufa wang
  • 9 篇 shangfei wang
  • 9 篇 luo wenjian
  • 8 篇 shao chenxi
  • 8 篇 wenjian luo
  • 7 篇 gu naijie
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 naijie gu
  • 5 篇 xianbin cao
  • 5 篇 qiang ji
  • 4 篇 dong lanfang
  • 4 篇 jinglong li
  • 4 篇 baohua zhao
  • 4 篇 zhen gao
  • 4 篇 fanping zeng
  • 4 篇 zhao dongdong
  • 3 篇 shan he
  • 3 篇 ren kaixin

语言

  • 132 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Province Key Lab of Software in Computer and Communication"
141 条 记 录,以下是81-90 订阅
排序:
Many-Modal Optimization by Difficulty-Based Cooperative Co-evolution
Many-Modal Optimization by Difficulty-Based Cooperative Co-e...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Wenjian Luo Yingying Qiao Xin Lin Peilan Xu Mike Preuss Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
Evolutionary multimodal optimization has received considerable attention in the past decade. Most existing evolutionary multimodal optimization algorithms are designed to solve problems with relatively few global opti... 详细信息
来源: 评论
Study on Parallel Computing
收藏 引用
Journal of computer Science & Technology 2006年 第5期21卷 665-673页
作者: 陈国良 孙广中 张云泉 莫则尧 Anhui Province-MOST Key Co-Lab of High Performance Computing and Its Applications Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 P.R. China Laboratory of Parallel Computing Institute of Software Chinese Academy of Sciences Beijing 100080 P.R. China Laboratory of Computational Physics Institute of Applied Physics and Computational Mathematics Beijing 100088 P.R. China
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical ba... 详细信息
来源: 评论
Combining multipopulation evolutionary algorithms with memory for dynamic optimization problems
Combining multipopulation evolutionary algorithms with memor...
收藏 引用
Congress on Evolutionary Computation
作者: Tao Zhu Wenjian Luo Lihua Yue Anhui Province Key Laboratory of Software Engineering in Computing and Communication Hefei Anhui China School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
Both multipopulation and memory are widely used approaches in the field of evolutionary dynamic optimization. It would be interesting to examine the effect of the combinations of multipopulation algorithms (MPAs) and ... 详细信息
来源: 评论
Random directional attack for fooling deep neural networks
arXiv
收藏 引用
arXiv 2019年
作者: Luo, Wenjian Wu, Chenwang Zhou, Nan Ni, Li Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China
Deep neural networks (DNNs) have been widely used in many fields such as images processing, speech recognition;however, they are vulnerable to adversarial examples, and this is a security issue worthy of attention. Be... 详细信息
来源: 评论
Community-based 3-SAT formulas with a predefined solution
arXiv
收藏 引用
arXiv 2019年
作者: Hu, Yamin Luo, Wenjian Wang, Junteng Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China China
It is crucial to generate crafted SAT formulas with predefined solutions for the testing and development of SAT solvers since many SAT formulas from real-world applications have solutions. Although some generating alg... 详细信息
来源: 评论
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOTH QUALITATIVE KNOWLEDGE AND QUANTITATIVE DATA
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOT...
收藏 引用
IEEE International Conference on Multimedia and Expo Workshops
作者: Zhen Gao Shangfei Wang Chongliang Wu Jun Wang Qiang Ji Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute
In this paper, we propose to capture Action Unit (AU) relations existing in both qualitative knowledge and quantitative data through Credal Networks (CN). Each node of the CN represents an AU label, and the links and ... 详细信息
来源: 评论
Coverage-preserving Data Gathering in Wireless Sensor Networks
Coverage-preserving Data Gathering in Wireless Sensor Networ...
收藏 引用
ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Hongli Xu Liusheng Huang Jumin Wu Yang Wang Depart. of Computer Science and Technology Anhui Province key Laboratory of Software in Computing and Communication University of Science and Technology Hefei China
The power is the most significant resource in wireless sensor nodes, so energy conservation is the most important factor in designing the protocol for sensor networks. In this paper, we study the problem of energy-eff... 详细信息
来源: 评论
A Hormone-based Clustering Algorithm in Wireless Sensor Networks
A Hormone-based Clustering Algorithm in Wireless Sensor Netw...
收藏 引用
2010 2nd International Conference on computer Engineering and Technology(2010年第二届计算机工程与技术国际会议 ICCET 2010)
作者: Dayuan Dong Haifeng You Yipeng Zhang Xufa Wang Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology of China HefeiChina
Clustering problem is one of the hottest issues in wireless sensor networks (WSNs). The strategy for selection of cluster head has not been sufficiently investigated. In this paper,we propose a hormone-based clusterin... 详细信息
来源: 评论
Accurate classification of time series based on a new robust similarity measure
收藏 引用
Journal of Computational Information Systems 2013年 第9期9卷 3521-3528页
作者: He, Xiaoxu Shao, Chenxi Xiong, Yan School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
Among different time series data mining, time series classification is one of the most important aspects. How to design a suitable similarity measure of similarity is a burning issue for accurate time series classific... 详细信息
来源: 评论
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Junteng Wang Wenjian Luo Yamin Hu Hao Jiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei China
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not sa... 详细信息
来源: 评论