咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 74 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 137 篇 工学
    • 99 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 38 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 10 篇 生物工程
    • 8 篇 机械工程
    • 5 篇 动力工程及工程热...
    • 4 篇 仪器科学与技术
    • 4 篇 交通运输工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 生物医学工程(可授...
  • 59 篇 理学
    • 42 篇 数学
    • 16 篇 系统科学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 6 篇 物理学
    • 4 篇 化学
  • 36 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 5 篇 医学
    • 5 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 13 篇 wireless sensor ...
  • 11 篇 computer science
  • 9 篇 laboratories
  • 8 篇 computer network...
  • 6 篇 monitoring
  • 5 篇 optimization
  • 5 篇 databases
  • 5 篇 heuristic algori...
  • 4 篇 reinforcement le...
  • 4 篇 statistics
  • 4 篇 energy consumpti...
  • 4 篇 data mining
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 feature extracti...
  • 4 篇 security
  • 4 篇 cloud computing
  • 4 篇 cluster analysis
  • 4 篇 evolutionary com...
  • 4 篇 energy efficienc...

机构

  • 21 篇 school of comput...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 8 篇 anhui province k...
  • 7 篇 anhui province k...
  • 7 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 province key lab...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 department of el...
  • 4 篇 anhui province k...
  • 3 篇 nanjing universi...
  • 3 篇 school of comput...
  • 3 篇 the key laborato...
  • 3 篇 department of co...
  • 3 篇 college of compu...
  • 3 篇 institute of adv...
  • 3 篇 college of compu...
  • 3 篇 department of co...

作者

  • 17 篇 xufa wang
  • 10 篇 wenjian luo
  • 9 篇 luo wenjian
  • 8 篇 shao chenxi
  • 7 篇 chenxi shao
  • 7 篇 gu naijie
  • 6 篇 ping zhu
  • 6 篇 baohua zhao
  • 6 篇 naijie gu
  • 6 篇 ding zhiguo
  • 5 篇 wang xufa
  • 5 篇 xianbin cao
  • 5 篇 xie xianzhong
  • 5 篇 shi zhaoyuan
  • 5 篇 haifeng you
  • 4 篇 lu huabing
  • 4 篇 shangfei wang
  • 4 篇 jinglong li
  • 4 篇 dai xuchu
  • 4 篇 cai jun

语言

  • 177 篇 英文
  • 11 篇 其他
  • 5 篇 中文
检索条件"机构=Department of Computer Anhui Province Key Laboratory of Software in Computer and Communication"
193 条 记 录,以下是11-20 订阅
排序:
Load-Balanced and Length-Minimized Link Scheduling for Multi-Channel TDMA Wireless Mesh Networks
收藏 引用
Chinese Journal of Electronics 2023年 第4期19卷 733-736页
作者: Junfeng Jin Baohua Zhao Hao Zhou School of Computer Science and Technology University of Science and Technology of China Hefei China State Key Laboratory of Networking and Switching Technology Beijing China Province Key Laboratory of Software in Computing and Communication Hefei China
To minimize the length of scheduling and guarantee the load balance of channels, a Load-balanced and length-minimized link scheduling (LBLM) algorithm is proposed. LBLM algorithm is a heuristic scheme, which assigns t... 详细信息
来源: 评论
MineLoRa: Markov Transition Fields and Adaptive Neural Networks for LoRa Device Radio Frequency Fingerprint Identification
MineLoRa: Markov Transition Fields and Adaptive Neural Netwo...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2024
作者: Zhu, Biaokai Jia, Yupeng Wang, Zhonghao Wen, Jiawei Liu, Xinle Zhao, Shijia Xu, Qiongyue Song, Jie Li, Ping Liu, Sanman Li, Feng Zhao, Jumin Shanxi Police College Taiyuan University of Technology Taiyuan China Shanxi Police College Cyber Security Department Taiyuan China Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou China School of Computer Science and Technology Anhui University Hefei China Taiyuan University of Technology Taiyuan China College of Information and Computer Taiyuan University of Technology Jinzhong China
With the development of LPWAN technology, LoRa, one of the typical representatives, is widely used in various communication scenarios. At the same time, it is also faced with problems such as difficulty in identifying... 详细信息
来源: 评论
Analysis and Design of Mobile Model for DTN
收藏 引用
Chinese Journal of Electronics 2023年 第4期18卷 635-638页
作者: Zhiting Lin Yugui Qu Yusheng Ji Baohua Zhao Department of Computer Science University of Science and Technology of China Hefei China Province Key Laboratory of Software in Computing and Communication Hefei China Information Systems Architecture Science Research Division National Institute of Informatics Tokyo Japan
Delay tolerant networks may become unexpectedly partitioned due to node mobility or variation in signal strength. However, most widely used models in some relative works are generally very simplistic. In order to expl... 详细信息
来源: 评论
Transferring fashion to surveillance with weak labels
收藏 引用
Neural Computing and Applications 2023年 第18期35卷 13021-13035页
作者: Zheng, Qi He, Zheng Liang, Chao Chen, Jun Lin, Chia-Wen Tao, Dapeng National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan430072 China Collaborative Innovation Center of Geospatial Technology Wuhan430079 China Department of Electrical Engineering National Tsing Hua University Hsinchu Taiwan School of Information Science and Engineering Yunnan University Yunnan Kunming650504 China
In this paper, we address the problem of automatic clothing parsing in surveillance images using the information from user-generated tags, such as "jeans" and "T-shirt." Although clothing parsing h... 详细信息
来源: 评论
MTGA: Multi-View Temporal Granularity Aligned Aggregation for Event-Based Lip-Reading  39
MTGA: Multi-View Temporal Granularity Aligned Aggregation fo...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Wenhao Wang, Jun Luo, Yong Yu, Lei Yu, Wei He, Zheng Shen, Jialie School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Electronics and Information Wuhan University China Department of Computer Science City University of London United Kingdom
Lip-reading is to utilize the visual information of the speaker's lip movements to recognize words and sentences. Existing event-based lip-reading solutions integrate different frame rate branches to learn spatio-...
来源: 评论
Cooperative Task Offloading for Internet of Vehicles in Cloud-edge Computing  23
Cooperative Task Offloading for Internet of Vehicles in Clou...
收藏 引用
23rd IEEE International Conference on High Performance Computing and communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gu, Linjie Xu, Xiaolong Qi, Lianyong Zhang, Yiwen Zhang, Xuyun Dou, Wanchun Changwang School of Honors Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China School of Information Science and Engineering Qufu Normal University China School of Computer Science and Technology Anhui University Anhui China Macquarie University The Department of Computing Sydney Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
In order to support computing-intensive and service-sensitive Internet of Vehicles (IoV) applications, Digital Twin and edge computing are attractive solutions. Most of the existing IoV service offloading solutions on... 详细信息
来源: 评论
A Lightweight Authentication Protocol for Mobile RFID
收藏 引用
International Journal of Network Security 2024年 第2期26卷 190-199页
作者: Pan, Tao Zuo, Kai-Zhong Wang, Tao-Chun Deng, Chun-Hong College of Internet and Communication Anhui Technical College of Mechanical and Electrical Engineering No.16 Wenjin West Rd. Yijiang Dist. Anhui Province Wuhu City241002 China College of Computer and Information Anhui Normal University China Anhui Key Laboratory of Network and Information Security No.1 Beijing East Rd. Jinghu Dist. Anhui Province Wuhu City241000 China
Recently, Radio Frequency Identification (RFID) has been widely used. A lightweight security authentication protocol for mobile RFID is proposed to aim at the problems of high complexity and system security in existin... 详细信息
来源: 评论
An Effective and Real-time Time-Slot Power Detection Method  23
An Effective and Real-time Time-Slot Power Detection Method
收藏 引用
Proceedings of the 3rd International Conference on Electronic Information Technology and Smart Agriculture
作者: Xian Zhang Xinhui Luo Taiguo Qu Dong Yin School of Computer and Artificial Intelligence (School of Software) Huaihua University China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua University China and Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua University China Department of Art Design Huaihua Tourism School China School of Computer and Artificial Intelligence (School of Software) Huaihua University China
To efficiently detect the time-slot power of the Time Division Multiple Access (TDMA) communication systems such as repeaters and base stations in real-time. This article designs a signal-sampling hardware circuit bas... 详细信息
来源: 评论
Target-Oriented WiFi Sensing for Respiratory Healthcare: from Indiscriminate Perception to In-Area Sensing
收藏 引用
IEEE Network 2024年
作者: Wang, Meng Huang, Jinyang Zhang, Xiang Liu, Zhi Li, Meng Zhao, Peng Yan, Huan Sun, Xiao Dong, Mianxiong Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligence Machine School of Computer and Information Hefei230601 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China Muroran Institute of Technology Department of Sciences and Informatics 0508585 Japan
Driven by the vision of integrated sensing and communication (ISAC) toward 6G technology, the WiFi-based respiration sensing approach has emerged as a highly competitive candidate for advanced healthcare services. Nev... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论