咨询与建议

限定检索结果

文献类型

  • 149 篇 会议
  • 48 篇 期刊文献

馆藏范围

  • 197 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 129 篇 工学
    • 94 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 38 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 9 篇 机械工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 69 篇 理学
    • 52 篇 数学
    • 19 篇 统计学(可授理学、...
    • 14 篇 系统科学
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 化学
  • 36 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 4 篇 医学
    • 3 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 12 篇 wireless sensor ...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 face recognition
  • 7 篇 optimization
  • 7 篇 databases
  • 7 篇 clustering algor...
  • 7 篇 computer network...
  • 6 篇 feature extracti...
  • 6 篇 sociology
  • 5 篇 vectors
  • 5 篇 monitoring
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 resource managem...
  • 4 篇 cognitive radio
  • 4 篇 switches

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 9 篇 university of sc...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 province key lab...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 5 篇 anhui province k...
  • 5 篇 college of infor...
  • 4 篇 department of el...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 4 篇 department of co...
  • 4 篇 anhui key labora...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 5 篇 wang shangfei
  • 5 篇 kun bi
  • 4 篇 li zhifang
  • 4 篇 dong lanfang
  • 4 篇 xie xianzhong

语言

  • 188 篇 英文
  • 8 篇 中文
  • 1 篇 其他
检索条件"机构=Anhui Province Key Laboratory of Software in Computing and Communication"
197 条 记 录,以下是141-150 订阅
排序:
Test Case Generation Based on Invariant Extraction
Test Case Generation Based on Invariant Extraction
收藏 引用
International Conference on Wireless communications, Networking and Mobile computing (WiCom)
作者: Fanping Zeng Qing Cao Liangliang Mao Zhide Chen Department of Computer Anhui Province Key Laboratory of Software in Computer and Communication University of Science and Technology Hefei Anhui China Department of Computer University of Science and Technology Hefei Anhui China
software testing is an effective way to find software errors. Generating a good test suite is the key. A program invariant is a property that is true at a particular program point or points. The property could reflect... 详细信息
来源: 评论
Load-Balanced and Length-Minimized Link Scheduling for Multi-Channel TDMA Wireless Mesh Networks
收藏 引用
Chinese Journal of Electronics 2023年 第4期19卷 733-736页
作者: Junfeng Jin Baohua Zhao Hao Zhou School of Computer Science and Technology University of Science and Technology of China Hefei China State Key Laboratory of Networking and Switching Technology Beijing China Province Key Laboratory of Software in Computing and Communication Hefei China
To minimize the length of scheduling and guarantee the load balance of channels, a Load-balanced and length-minimized link scheduling (LBLM) algorithm is proposed. LBLM algorithm is a heuristic scheme, which assigns t... 详细信息
来源: 评论
Research on Buffer Overflow Test Based on Invariant
Research on Buffer Overflow Test Based on Invariant
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Fanping Zeng Minghui Chen Kaitao Yin Xufa Wang Department of Computer Anhui Province Key Laboratory of Software in Computer and Communication University of Science and Technology Hefei Anhui China Department of Computer University of Science and Technology Hefei Anhui China
Buffer overflow (BOF) is one of the major vulnerabilities that lead to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying reasons of buffer overflow vary widely. Th... 详细信息
来源: 评论
A real-time schedule method for aircraft landing scheduling problem based on cellular automaton  09
A real-time schedule method for aircraft landing scheduling ...
收藏 引用
2009 World Summit on Genetic and Evolutionary Computation, 2009 GEC Summit - 1st ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC'09
作者: Shenpeng, Yu Xianbin, Cao Maobin, Hu Wenbo, Du Jun, Zhang Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 86-551-3601545 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China School of Engineering Science University of Science and Technology of China Hefei 230026 86-551-3600127 China School of Electronic and Information Engineering Beihang University Beijing 100083 China
The Aircraft Landing Scheduling (ALS) problem is a typical hard multi-constraint optimization problem. In real applications, it is not most important to find the best solution but to provide a feasible landing schedul... 详细信息
来源: 评论
A qualitative modeling and simulation method based on cloud model
A qualitative modeling and simulation method based on cloud ...
收藏 引用
International Conference on Modeling, Simulation and Applied Optimization (ICMSAO)
作者: Chenxi Shao Kelü Sun Zhenzhong Shao Computer Science and Technology Department University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Software in Computing and Communication Hefei China Jianghuai Automobile Company Limited Hefei China
Qualitative simulation is effective methods processing incomplete knowledge, how to represent qualitative knowledge and reduce spurious behaviors is its research emphasis. Contraposing the limitations of existing meth... 详细信息
来源: 评论
Representative Template Set Generation Method for Pedestrian Detection
Representative Template Set Generation Method for Pedestrian...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Pei Wu Xian-Bin Cao Yan-Wu Xu Hong Qiao Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Institute of Automation Chinese Academy and Sciences Beijing China
Template matching is an effective approach for pedestrian detection. In order to achieve real-time and accurate detection, how to obtain a suitable representative template set is still an open problem due to the large... 详细信息
来源: 评论
Airborne moving vehicle detection for urban traffic surveillance
Airborne moving vehicle detection for urban traffic surveill...
收藏 引用
International Conference on Intelligent Transportation
作者: Renjun Lin Xianbin Cao Yanwu Xu Chuangxian Wei Hong Qiao Anhui Province Key Laboratory of Software Computing and Communication University of Science and Technology Hefei China University of Manchester Institute of Science and Technology UK Institute of Automation Chinese Academy and Sciences Beijing China
At present, moving vehicle detection on airborne platform has been an important technology for urban traffic surveillance. In such a situation, most commonly used methods (e.g. image subtraction) could hardly work wel... 详细信息
来源: 评论
Constructing the Voronoi Diagram of Planar Point Set in Parallel
Constructing the Voronoi Diagram of Planar Point Set in Para...
收藏 引用
International Conference on Computational Intelligence and software Engineering (CiSE)
作者: Lanfang Dong Yuan Wu Shanhai Zhou Anhui Province Key Laboratory of Software In Computing and Communication College of computer science and technology University of Science and Technology Hefei China College of computer science & technology University of Science and Technology Hefei China
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ... 详细信息
来源: 评论
An Evolutionary Support Vector Machines Classifier for Pedestrian Detection
An Evolutionary Support Vector Machines Classifier for Pedes...
收藏 引用
2006 IEEE/RSJ International Conference on Intelligent Robots and Systems
作者: D. Chen X.b. Cao Y.w. Xu H. Qiao Department of Computer Science and Technology University of Science and Technology Hefei China Anhui Province Key Laboratory Software Computing and Communication Hefei China Institute of Automation Chinese Academy and Sciences Beijing China
In a pedestrian detection system, a classifier is usually designed to recognize whether a candidate is a pedestrian. Support vector machines (SVM) has become a primary technique to train a classifier for pedestrian de... 详细信息
来源: 评论
The Frequency-Time Pre-Allocation in Unlicensed Spectrum Based on the Games Learning
The Frequency-Time Pre-Allocation in Unlicensed Spectrum Bas...
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and communications
作者: Kun Han Jinlong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication Department of Computer Science and Technology University of Science and Technology Hefei China Department of Computer Science and Technology University of Science and Technology of China Hefei China
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time... 详细信息
来源: 评论