咨询与建议

限定检索结果

文献类型

  • 118 篇 会议
  • 72 篇 期刊文献

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 97 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 38 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 20 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 10 篇 生物工程
    • 9 篇 机械工程
    • 5 篇 动力工程及工程热...
    • 4 篇 仪器科学与技术
    • 4 篇 交通运输工程
    • 4 篇 航空宇航科学与技...
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 生物医学工程(可授...
  • 60 篇 理学
    • 43 篇 数学
    • 16 篇 系统科学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 6 篇 物理学
    • 4 篇 化学
  • 35 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 5 篇 医学
    • 5 篇 临床医学
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 13 篇 wireless sensor ...
  • 11 篇 computer science
  • 9 篇 laboratories
  • 8 篇 computer network...
  • 6 篇 monitoring
  • 5 篇 optimization
  • 5 篇 databases
  • 5 篇 heuristic algori...
  • 4 篇 statistics
  • 4 篇 energy consumpti...
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 feature extracti...
  • 4 篇 cluster analysis
  • 4 篇 evolutionary com...
  • 4 篇 energy efficienc...
  • 3 篇 maintenance engi...
  • 3 篇 routing
  • 3 篇 reinforcement le...
  • 3 篇 relays

机构

  • 21 篇 school of comput...
  • 19 篇 anhui province k...
  • 17 篇 department of co...
  • 8 篇 anhui province k...
  • 7 篇 anhui province k...
  • 7 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 department of el...
  • 4 篇 province key lab...
  • 4 篇 anhui province k...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...
  • 3 篇 the key laborato...
  • 3 篇 department of co...
  • 3 篇 college of compu...
  • 3 篇 institute of adv...
  • 3 篇 college of compu...
  • 3 篇 department of co...

作者

  • 17 篇 xufa wang
  • 10 篇 wenjian luo
  • 9 篇 luo wenjian
  • 8 篇 shao chenxi
  • 7 篇 chenxi shao
  • 7 篇 gu naijie
  • 6 篇 ping zhu
  • 6 篇 baohua zhao
  • 6 篇 naijie gu
  • 6 篇 ding zhiguo
  • 5 篇 wang xufa
  • 5 篇 xianbin cao
  • 5 篇 xie xianzhong
  • 5 篇 shi zhaoyuan
  • 5 篇 haifeng you
  • 4 篇 lu huabing
  • 4 篇 shangfei wang
  • 4 篇 jinglong li
  • 4 篇 dai xuchu
  • 4 篇 cai jun

语言

  • 179 篇 英文
  • 7 篇 中文
  • 4 篇 其他
检索条件"机构=Department of Computer Anhui Province Key Laboratory of Software in Computer and Communication"
190 条 记 录,以下是161-170 订阅
排序:
Secure Two-Party Point-Circle Inclusion Problem
收藏 引用
Journal of computer Science & Technology 2007年 第1期22卷 88-91页
作者: 罗永龙 黄刘生 仲红 Department of Computer Science University of Science and Technology of China Hefei 230027 China Department of Computer Science Anhui Normal University Wuhu 241000 China Anhui Province Key laboratory of Software in Computing and Communication Hefei 230027 China
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... 详细信息
来源: 评论
Nonlinear characteristics and qualitative analysis of sleep EEG
Nonlinear characteristics and qualitative analysis of sleep ...
收藏 引用
2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
作者: Shao, Chenxi Fan, Jinfeng Li, Shaobin Department of Computer Science and Technology USTC Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China Department of Computer Science and Technology USTC Hefei Anhui 230027 China
Correlation dimension (CD) and the largest Lyapunov exponent (LLE), which are two most important nonlinear invariant measures of nonlinear system, are adopted to characterize the complexity and stability of human brai... 详细信息
来源: 评论
An efficient synchronisation protocol for wireless sensor network
An efficient synchronisation protocol for wireless sensor ne...
收藏 引用
作者: Huang, Liusheng Xu, Hongli Wan, Yingyu Wu, Junmin Li, Hong Department of Computer Science and Technology University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
Time synchronisation is a critical topic in wireless sensor networks for its wide applications, such as data fusion, TDMA scheduling and cooperated sleeping, etc. In this paper, we present an Accurate Time Synchronisa... 详细信息
来源: 评论
Local reputation for P2P MMOG design
Local reputation for P2P MMOG design
收藏 引用
18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2007
作者: Shanshan, Liu Jinlong, Li Xufa, Wang Anhui Key Laboratory of Software in Computation and Communication Computer Science Department University of Science and Technology of China
The assignment of the computation and communication is one of the important problems in the design of peer-to-peer (P2P) Massively Multi-player Online Game (MMOG). A reputation mechanism for P2P MMOG is proposed in th... 详细信息
来源: 评论
A Real-time Relaxed Garbage Collection in DSM
收藏 引用
电子学报(英文版) 2007年 第1期16卷 7-12页
作者: WU Junmin SONG Zhenhua Anhui Province Co-Key Laboratory of High Performance Computing and Application Department of Computer Science & Technology University of Science & Technology of China Hefei 230027 China
Garbage collection is a memory management mechanism for automatically reclaiming garbage objects in memory. It can effectively relieve the programmers' burden and optimize the design of programs. Currently many ga... 详细信息
来源: 评论
Models of parallel computation :a survey and classification
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第2期1卷 156-165页
作者: ZHANG Yunquan CHEN Guoliang SUN Guangzhong MIAO Qiankun Laboratory of Parallel Computing Institute of SoftwareChinese Academy of SciencesBeijing 100080China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100080China Anhui Province-MOST Key Co-Lab of High Performance Computing and Its Applications Department of Computer Science and TechnologyUniversity of Science and Technology of ChinaHefei 230027China
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organiza... 详细信息
来源: 评论
A novel approach for signal transduction networks simulation at a mesoscopic level
A novel approach for signal transduction networks simulation...
收藏 引用
7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE
作者: Shao, Chenxi Deng, Hongli MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology of China Hefei Anhui 230027 China Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Signal transduction (ST) networks simulation is important to medical research. However, owing to the complexity of the networks, most methods presented for the simulation are not desirable. Here, based on multi-agent ... 详细信息
来源: 评论
A Global-Energy-Balancing Real-Time Routing in Wireless Sensor Networks
A Global-Energy-Balancing Real-Time Routing in Wireless Sens...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Peilong Li Yu Gu Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy e... 详细信息
来源: 评论
A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks
A Secure Routing Protocol with Malicious Nodes Detecting and...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Yuan-xi Jiang Bao-hua Zhao Department of Computer Science Anhui Province Key Laboratory of software in Computing and Communication University of Science and Technology Hefei Anhui China
Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routin... 详细信息
来源: 评论
Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks
Secure Location Verification Using Hop-Distance Relationship...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Yongsheng Liu Hao Zhou Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to informa... 详细信息
来源: 评论