咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 38 篇 期刊文献

馆藏范围

  • 148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 104 篇 工学
    • 79 篇 计算机科学与技术...
    • 55 篇 软件工程
    • 33 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 12 篇 电气工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 5 篇 生物工程
    • 5 篇 网络空间安全
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 生物医学工程(可授...
  • 58 篇 理学
    • 44 篇 数学
    • 15 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 9 篇 物理学
    • 8 篇 生物学
    • 5 篇 化学
  • 35 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 军事学

主题

  • 11 篇 wireless sensor ...
  • 10 篇 computer science
  • 8 篇 laboratories
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 optimization
  • 7 篇 clustering algor...
  • 7 篇 computer network...
  • 6 篇 sociology
  • 5 篇 databases
  • 4 篇 maintenance engi...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 cluster analysis
  • 4 篇 evolutionary com...
  • 4 篇 energy efficienc...
  • 3 篇 vehicle detectio...
  • 3 篇 merging
  • 3 篇 cameras

机构

  • 24 篇 anhui province k...
  • 21 篇 school of comput...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of el...
  • 4 篇 institute of adv...
  • 4 篇 institute of aut...
  • 4 篇 anhui province k...
  • 4 篇 college of infor...
  • 4 篇 anhui province k...
  • 4 篇 university of sc...
  • 4 篇 department of co...
  • 4 篇 anhui key labora...
  • 3 篇 key laboratory o...
  • 3 篇 dept. of comput....
  • 3 篇 anhui university...

作者

  • 17 篇 wenjian luo
  • 13 篇 luo wenjian
  • 9 篇 xufa wang
  • 9 篇 naijie gu
  • 8 篇 shao chenxi
  • 7 篇 xianbin cao
  • 7 篇 gu naijie
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 4 篇 xie xianzhong
  • 4 篇 cao xianbin
  • 4 篇 lu huabing
  • 4 篇 shi zhaoyuan
  • 4 篇 jinglong li
  • 4 篇 baohua zhao
  • 4 篇 li yingsong
  • 4 篇 lu detang
  • 4 篇 kun tu

语言

  • 140 篇 英文
  • 7 篇 中文
  • 1 篇 其他
检索条件"机构=Anhui Province Key Laboratory of Software Engineering in Computing and Communication"
148 条 记 录,以下是1-10 订阅
排序:
Fairness-Aware Budgeted Edge Server Placement for Connected Autonomous Vehicles
收藏 引用
IEEE Transactions on Mobile computing 2025年 第06期24卷 4762-4776页
作者: Wu, Jintao Xu, Xiaolong Cui, Guangming Zhang, Yiwen Qi, Lianyong Dou, Wanchun Cai, Zhipeng Nanjing University of Information Science & Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software Nanjing210044 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Nanjing University of Information Science & Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software China Nanjing University State Key Laboratory for Novel Software Technology China Anhui University School of Computer Science and Technology Anhui230031 China College of Computer Science and Technology Qingdao266580 China Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China Georgia State University Department of Computer Science United States
Mobile edge computing (MEC) considerably enhances the capabilities and performance of connected autonomous vehicles (CAVs) by deploying edge servers (ESs) on roadside units (RSUs) near CAVs, thereby ensuring low-laten... 详细信息
来源: 评论
HEAT: Efficient Vision Transformer Accelerator with Hybrid-Precision Quantization
收藏 引用
IEEE Transactions on Circuits and Systems II: Express Briefs 2025年 第5期72卷 758-762页
作者: Zhao, Pan Xue, Donghui Wu, Licheng Chang, Liang Tan, Haining Han, Yinhe Peng, Shouzhong Zhou, Jun University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Chinese Academy of Sciences Institute of Computing Technology Beijing100190 China Beihang University Anhui Province Key Laboratory of Spintronic Chip Research and Manufacturing Beijing100191 China
Quantization is an important technique for the acceleration of transformer-based neural networks. Prior related works mainly consider quantization from the algorithm level. Their hardware implementation is inefficient... 详细信息
来源: 评论
Symbol-Level Physical Layer Security Design in Space-Air-Ground Integrated Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Xia, Guiyang Shi, Qianmei Hu, Xianxin Zhou, Xiaobo Shu, Feng School of Information and Artificial Intelligence Anhui Provincial Engineering Research Center for Agricultural Information Perception and Intelligent Computing China Anhui Agricultural University Anhui Province Key Laboratory of Smart Agricultural Technology and Equipment Hefei230036 China Hainan University School of Information and Communication Engineering Haikou570228 China
In the down-link secure space-air-ground integrated network (SAGIN) with practical discrete modulation symbols, we consider the joint design of the power of satellite and unmanned aerial vehicle (UAV) swarm beamformin... 详细信息
来源: 评论
Compromising Rechargeable Sensor Networks in Marine Environment
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Wang, Qiwei Lin, Chi Dai, Haipeng Obaidat, Mohammad S. Hsiao, Kuei-Fang Fan, Xin Dalian University of Technology School of Software Technology & DUT-RU International School of Information Science and Engineering China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China SRM University Department of Computational Intelligence School of Computing SRM Nagar TN Kattankulathur603203 India The Amity University School of Engineering UP Noida201301 India The King Abdullah II School of Information Technology The University of Jordan Amman11942 Jordan
Marine Wireless Rechargeable Sensor Networks (MWRSNs), enhanced by recent Wireless Power Transfer (WPT) technology, present a significant advancement in extending network life. Traditional methods improve network perf... 详细信息
来源: 评论
A Power Control Scheme for Target Localization in WSN
收藏 引用
电子学报(英文版) 2008年 第3期17卷 443-448页
作者: GU Yu ZHAO Baohua Department of Computer Science University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
In this paper, we focus on the target tracking problem in sensor networks and propose an Powersaving target localization scheme (PSTL) based on a conjecture model that reflects the moving pattern of a target, and also... 详细信息
来源: 评论
Minimum-Energy Broadcast Trees in All-Wireless Networks
收藏 引用
电子学报(英文版) 2008年 第2期17卷 227-230页
作者: HU Tian ZHAO Baohua Department of Computer Science University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
This paper focuses on the problem of constructing the minimum-energy broadcast trees in all-wireless networks. We proposed a greedy algorithm called Greedy maximum-branch replacement algorithm (GMBR) to decrease the t... 详细信息
来源: 评论
Classifying and clustering in negative databases
收藏 引用
Frontiers of Computer Science 2013年 第6期7卷 864-874页
作者: Ran LIU Wenjian LUO Lihua YUE School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 China
Recently, negative databases (NDBs) are proposed for privacy protection. Similar to the traditional databases, some basic operations could be conducted over the NDBs, such as select, intersection, update, delete and... 详细信息
来源: 评论
Secure Two-Party Point-Circle Inclusion Problem
收藏 引用
Journal of Computer Science & Technology 2007年 第1期22卷 88-91页
作者: 罗永龙 黄刘生 仲红 Department of Computer Science University of Science and Technology of China Hefei 230027 China Department of Computer Science Anhui Normal University Wuhu 241000 China Anhui Province Key laboratory of Software in Computing and Communication Hefei 230027 China
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... 详细信息
来源: 评论
Clustering time-evolving data using an efficient differential evolution  6th
Clustering time-evolving data using an efficient differentia...
收藏 引用
6th International Conference on Swarm Intelligence, ICSI 2015 held in conjunction with the 2nd BRICS Congress on Computational Intelligence, CCI 2015
作者: Chen, Gang Luo, Wenjian Anhui Province key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui China
The previous evolutionary clustering methods for time-evolving data usually adopt the temporal smoothness framework, which controls the balance between temporal noise and true concept drift of clusters. They, however,... 详细信息
来源: 评论
A hybrid particle swarm optimization for high-dimensional dynamic optimization  11th
A hybrid particle swarm optimization for high-dimensional dy...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Luo, Wenjian Yang, Bin Bu, Chenyang Lin, Xin Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui230027 China
High-Dimensional Dynamic Optimization Problems (HDDOPs) commonly exist in real-world applications. In evolutionary computation field, most of existing benchmark problems, which could simulate HDDOPs, are non-separable... 详细信息
来源: 评论