咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 156 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 107 篇 工学
    • 82 篇 计算机科学与技术...
    • 61 篇 软件工程
    • 29 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 8 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 航空宇航科学与技...
    • 4 篇 动力工程及工程热...
    • 3 篇 电子科学与技术(可...
    • 3 篇 交通运输工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 环境科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 56 篇 理学
    • 42 篇 数学
    • 16 篇 统计学(可授理学、...
    • 10 篇 系统科学
    • 9 篇 物理学
    • 8 篇 生物学
    • 2 篇 化学
  • 33 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 农学

主题

  • 11 篇 wireless sensor ...
  • 10 篇 computer science
  • 8 篇 laboratories
  • 8 篇 computer network...
  • 7 篇 statistics
  • 7 篇 clustering algor...
  • 7 篇 heuristic algori...
  • 6 篇 optimization
  • 6 篇 sociology
  • 5 篇 databases
  • 4 篇 maintenance engi...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 cluster analysis
  • 4 篇 energy efficienc...
  • 3 篇 parallel algorit...
  • 3 篇 vehicle detectio...
  • 3 篇 merging
  • 3 篇 throughput

机构

  • 24 篇 anhui province k...
  • 21 篇 school of comput...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 institute of adv...
  • 4 篇 institute of aut...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 4 篇 university of sc...
  • 3 篇 key lab of compu...
  • 3 篇 dept. of comput....
  • 3 篇 anhui province k...
  • 3 篇 saic motor ai la...
  • 3 篇 anhui province k...
  • 3 篇 zhongguancun lab...

作者

  • 16 篇 wenjian luo
  • 11 篇 wang shangfei
  • 10 篇 luo wenjian
  • 10 篇 xufa wang
  • 10 篇 naijie gu
  • 9 篇 shangfei wang
  • 8 篇 shao chenxi
  • 7 篇 xianbin cao
  • 7 篇 gu naijie
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 5 篇 wanli dong
  • 5 篇 qiang ji
  • 5 篇 tao zhu
  • 5 篇 kun bi
  • 4 篇 dong lanfang
  • 4 篇 cao xianbin
  • 4 篇 jinglong li
  • 4 篇 baohua zhao
  • 4 篇 zhen gao

语言

  • 146 篇 英文
  • 8 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Province Key Lab of Software in Computing and Communication"
156 条 记 录,以下是71-80 订阅
排序:
Recent Advances in Clonal Selection Algorithms and Applications
Recent Advances in Clonal Selection Algorithms and Applicati...
收藏 引用
IEEE Symposium Series on Computational Intelligence
作者: Wenjian Luo Xin Lin Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Clonal selection algorithms (CSAs) are a kind of Artificial Immune Algorithms (AIAs). In this paper, recent advances in clonal selection algorithms are summarized and reviewed. First, the basic framework of clonal sel... 详细信息
来源: 评论
An improved genetic algorithm for dynamic shortest path problems
An improved genetic algorithm for dynamic shortest path prob...
收藏 引用
Congress on Evolutionary Computation
作者: Xuezhi Zhu Wenjian Luo Tao Zhu Anhui Province key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
The Shortest Path (SP) problems are conventional combinatorial optimization problems. There are many deterministic algorithms for solving the shortest path problems in static topologies. However, in dynamic topologies... 详细信息
来源: 评论
A Global-Energy-Balancing Real-Time Routing in Wireless Sensor Networks
A Global-Energy-Balancing Real-Time Routing in Wireless Sens...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Peilong Li Yu Gu Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy e... 详细信息
来源: 评论
A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks
A Secure Routing Protocol with Malicious Nodes Detecting and...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Yuan-xi Jiang Bao-hua Zhao Department of Computer Science Anhui Province Key Laboratory of software in Computing and Communication University of Science and Technology Hefei Anhui China
Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routin... 详细信息
来源: 评论
Scalable video multicast with joint layer resource allocation in broadband wireless networks
Scalable video multicast with joint layer resource allocatio...
收藏 引用
International Conference on Network Protocols
作者: Li, Peilong Zhang, Honghai Zhao, Baohua Rangarajan, Sampath Dept. of Computer Science and Technology University of Science and Technology of China China NEC Laboratories America United States State Key Laboratory of Networking and Switching Technology Beijing China Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Scalable video coding (SVC), together with adaptive modulation and coding (AMC), can improve wireless multicast streaming video by jointly performing radio resource allocation and modulation and coding scheme (MCS) se... 详细信息
来源: 评论
Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks
Secure Location Verification Using Hop-Distance Relationship...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Yongsheng Liu Hao Zhou Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to informa... 详细信息
来源: 评论
Zone routing protocol based on energy consumption
收藏 引用
Jisuanji Gongcheng/Computer Engineering 2006年 第12期32卷 117-118+135页
作者: Zhai, Weifeng Gu, Naijie Zhang, Jianming Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China
A zone routing protocol based on the energy consumption speed of nodes in mobile Adhoc networks is presented. A route select parameter computed by residual lifetime of nodes and hop count of route is used to be select... 详细信息
来源: 评论
Personalized video emotion tagging through a topic model
Personalized video emotion tagging through a topic model
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Shan Wu Shangfei Wang Zhen Gao Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei China
The inherent dependencies among video content, personal characteristics, and perceptual emotion are crucial for personalized video emotion tagging, but have not been thoroughly exploited. To address this, we propose a... 详细信息
来源: 评论
Opportunistic Dynamic Channel Allocation Based on Chain Store Game
Opportunistic Dynamic Channel Allocation Based on Chain Stor...
收藏 引用
International Conference on Wireless communications, Networking and Mobile computing (WiCom)
作者: Jinglong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication School of Computer Science and Technology University of Science and Technology Hefei Anhui China
In adaptive secondary user channel allocation of cognitive radio, some users finish communication and release their channel as the time goes by, while some newcomers request channel resources to communicate. Thus, it ... 详细信息
来源: 评论
A qualitative modeling and simulation method based on cloud model
A qualitative modeling and simulation method based on cloud ...
收藏 引用
2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013
作者: Shao, Chenxi Sun, Kelu Zhenzhong, Shao Computer Science and Technology Dept. University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China Jianghuai Automobile Co. Ltd. Hefei 230022 China
Qualitative simulation is effective methods processing incomplete knowledge, how to represent qualitative knowledge and reduce spurious behaviors is its research emphasis. Contraposing the limitations of existing meth... 详细信息
来源: 评论