咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 29 篇 期刊文献

馆藏范围

  • 105 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 73 篇 工学
    • 56 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 20 篇 信息与通信工程
    • 12 篇 电气工程
    • 9 篇 生物工程
    • 7 篇 仪器科学与技术
    • 7 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 4 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 3 篇 冶金工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 39 篇 理学
    • 30 篇 数学
    • 14 篇 统计学(可授理学、...
    • 10 篇 生物学
    • 4 篇 物理学
  • 25 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 8 篇 法学
    • 8 篇 社会学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 7 篇 semantics
  • 7 篇 feature extracti...
  • 4 篇 computation offl...
  • 4 篇 optimization
  • 4 篇 particle swarm o...
  • 4 篇 machine learning
  • 4 篇 computer vision
  • 3 篇 reinforcement le...
  • 3 篇 image segmentati...
  • 3 篇 neural networks
  • 3 篇 contrastive lear...
  • 3 篇 predictive model...
  • 3 篇 visualization
  • 3 篇 genetic algorith...
  • 3 篇 clustering algor...
  • 3 篇 cloud computing
  • 3 篇 data models
  • 2 篇 complex networks
  • 2 篇 object detection
  • 2 篇 task analysis

机构

  • 27 篇 college of compu...
  • 26 篇 college of mathe...
  • 21 篇 fujian key labor...
  • 15 篇 key laboratory o...
  • 14 篇 fujian provincia...
  • 12 篇 fujian key labor...
  • 10 篇 fujian provincia...
  • 7 篇 engineering rese...
  • 7 篇 key laboratory o...
  • 4 篇 xiamen wish info...
  • 4 篇 key laboratory o...
  • 4 篇 college of physi...
  • 3 篇 college of compu...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 school of softwa...
  • 3 篇 smart sensing in...
  • 3 篇 fujian key labor...
  • 3 篇 fuzhou universit...
  • 3 篇 college of compu...

作者

  • 18 篇 guo kun
  • 8 篇 guo wenzhong
  • 8 篇 wu ling
  • 5 篇 dong chen
  • 5 篇 chen xing
  • 4 篇 yu zhiyong
  • 4 篇 xing chen
  • 4 篇 niu yuzhen
  • 4 篇 liu yanhua
  • 4 篇 xianghan zheng
  • 4 篇 yanhua liu
  • 4 篇 chen yuzhong
  • 4 篇 zhanghui liu
  • 3 篇 feng naixing
  • 3 篇 wenzhong guo
  • 3 篇 huang fangwan
  • 3 篇 chen dong
  • 3 篇 wang shiping
  • 3 篇 cai yijun
  • 3 篇 gao xiaoling

语言

  • 99 篇 英文
  • 9 篇 中文
  • 2 篇 其他
检索条件"机构=Fujian Province Key Laboratory of Network Computing and Intelligent Information Process"
105 条 记 录,以下是61-70 订阅
排序:
A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production
A Dynamic Demand-driven Smart Manufacturing for Mass Individ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Qiyu Hong Zhenyi Chen Chen Dong Qiancheng Xiong College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University University of South Florida Tampa United States
Industry 4.0 intends to realize mass individualization production driven by customers’ demands, thus generating several advanced manufacturing modes. However, the existing modes have disadvantages such as low custome... 详细信息
来源: 评论
Research on Data Augmentation for Garbage Classification with Target Detection Algorithm
Research on Data Augmentation for Garbage Classification wit...
收藏 引用
International Applied Computational Electromagnetics Society Symposium (ACES)
作者: Jiansong Chen Shikai Zuo Yun Lin Kai Tang Jianhang Zou Naixing Feng Yijun Cai Smart Sensing Integrated Circuit Engineering Research Center of Universities in Fujian Province Xiamen University of Technology Xiamen China Xiamen Wish Information Technology Co. Ltd Xiamen China Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China
Garbage classification is an essential work in daily life. With the development of artificial intelligence (AI), we have begun to use object detection to achieve garbage classification. However, the stacking and occlu... 详细信息
来源: 评论
Mobility-aware Seamless Service Migration and Resource Allocation in Multi-edge IoV Systems
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Chen, Zheyi Huang, Sijin Min, Geyong Ning, Zhaolong Li, Jie Zhang, Yan Fuzhou University College of Computer and Data Science Fuzhou350116 China Ministry of Education Engineering Research Center of Big Data Intelligence Fuzhou350002 China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China University of Exeter Department of Computer Science Faculty of Environment Science and Economy ExeterEX4 4QF United Kingdom Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai200240 China University of Oslo Department of Informatics Oslo0316 Norway
Mobile Edge computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha... 详细信息
来源: 评论
Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model
收藏 引用
Science China(information Sciences) 2019年 第11期62卷 192-194页
作者: Xing CHEN Junxin LIN Yun MA Bing LIN Haijiang WANG Gang HUANG College of Mathematics and Computer Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University School of Software Tsinghua University College of Physics and Energy Fujian Normal University Key Laboratory of High Confidence Software Technologies Ministry of Education
Dear editor,Self-adaptation is a promising approach to allocate resources for cloud-based software services [1, 2].Traditional self-adaptive resource-allocation methods are rule-driven, which leads to high administrat... 详细信息
来源: 评论
Abnormal network Traffic Detection based on Leaf Node Density Ratio  2019
Abnormal Network Traffic Detection based on Leaf Node Densit...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Huajun Liu Zhanghui Liu Yanhua Liu Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data i... 详细信息
来源: 评论
intelligent ultrasonic distance measurer system with temperature compensation algorithm
Intelligent ultrasonic distance measurer system with tempera...
收藏 引用
International Applied Computational Electromagnetics Society Symposium (ACES)
作者: Yuwen Wu Qiang Yang Kai Tang Jianhang Zou Jianming Zhuo Naixing Feng Yijun Cai Smart Sensing Integrated Circuit Engineering Research Center of Universities in Fujian Province Xiamen University of Technology Xiamen China Xiamen Wish Information Technology Co. Ltd Xiamen China Xiamen Blue Ocean Technology Co. Ltd Xiamen China Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China
With regard to distance measurement in daily life, the traditional way is to measure the distance between objects through rulers. Nowadays, ultrasonic ranging, laser ranging, radar ranging, sonar ranging and other tec... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
Abnormal network traffic detection based on leaf node density ratio  9
Abnormal network traffic detection based on leaf node densit...
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Liu, Huajun Liu, Zhanghui Liu, Yanhua Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data i... 详细信息
来源: 评论
A comprehensive assessment method of asset importance for key asset protection  9
A comprehensive assessment method of asset importance for ke...
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Gao, Xiaoling Liu, Yanhua Qiu, Yanbin Liu, Huajun College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
Mobility-aware Seamless Service Migration and Resource Allocation in Multi-edge IoV Systems
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Zheyi Huang, Sijin Min, Geyong Ning, Zhaolong Li, Jie Zhang, Yan College of Computer and Data Science Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Ministry of Education Fujian Key Laboratory of Network Fuzhou350002 China Computing and Intelligent Information Processing [Fuzhou University Fuzhou350116 China Department of Computer Science Faculty of Environment Science and Economy University of Exeter ExeterEX4 4QF United Kingdom School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Department of Informatics University of Oslo Oslo0316 Norway
Mobile Edge computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha... 详细信息
来源: 评论