咨询与建议

限定检索结果

文献类型

  • 168 篇 会议
  • 88 篇 期刊文献

馆藏范围

  • 256 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 176 篇 工学
    • 130 篇 计算机科学与技术...
    • 94 篇 软件工程
    • 48 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 电气工程
    • 13 篇 机械工程
    • 8 篇 生物工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 动力工程及工程热...
    • 5 篇 网络空间安全
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
  • 86 篇 理学
    • 59 篇 数学
    • 16 篇 物理学
    • 16 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 7 篇 化学
  • 51 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 13 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 8 篇 optimization
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 clustering algor...
  • 6 篇 sociology
  • 5 篇 vehicle detectio...
  • 5 篇 vectors
  • 5 篇 algorithm design...
  • 5 篇 genetic algorith...
  • 5 篇 vehicles
  • 5 篇 training
  • 4 篇 complex networks
  • 4 篇 maintenance engi...
  • 4 篇 cameras
  • 4 篇 resource managem...

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 cluster and grid...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 6 篇 science and tech...
  • 6 篇 institute of aut...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 16 篇 xufa wang
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 6 篇 jin hai
  • 5 篇 zhang lei
  • 5 篇 tao dacheng
  • 5 篇 wan wei
  • 5 篇 wanli dong

语言

  • 240 篇 英文
  • 12 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory of Software in Computing and Communication"
256 条 记 录,以下是131-140 订阅
A Clustering System for Gene Expression Data Based upon Genetic Programming and the HS-Model
A Clustering System for Gene Expression Data Based upon Gene...
收藏 引用
The Third International Joint Conference on Computational Science and Optimization(第三届计算科学与优化国际大会 CSO 2010)
作者: Guiquan Liu Xiufang Jiang Lingyun Wen Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China
Cluster analysis is a major method to study gene function and gene regulation information for there is a lack of prior knowledge for gene data. Many clustering methods existed at present usually need manual operat... 详细信息
来源: 评论
Many-Modal Optimization by Difficulty-Based Cooperative Co-evolution
Many-Modal Optimization by Difficulty-Based Cooperative Co-e...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Wenjian Luo Yingying Qiao Xin Lin Peilan Xu Mike Preuss Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
Evolutionary multimodal optimization has received considerable attention in the past decade. Most existing evolutionary multimodal optimization algorithms are designed to solve problems with relatively few global opti... 详细信息
来源: 评论
Design and Implementation of Links Generation for Inter Domain Routing System  12
Design and Implementation of Links Generation for Inter Doma...
收藏 引用
12th International Conference on Information Science and Technology, ICIST 2022
作者: Wang, Yu Qiao, Zhi Yin, Junru Zhang, Mingliang College of Software Henan University of Engineering Zhengzhou China College of Information and Electrical Engineering China Agriculture University Beijing China College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Network Research Department Zhengzhou China
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of... 详细信息
来源: 评论
A fast algorithm for finding community structure based on community closeness
A fast algorithm for finding community structure based on co...
收藏 引用
The Third International Joint Conference on Computational Science and Optimization(第三届计算科学与优化国际大会 CSO 2010)
作者: Xiufang Jiang Guiquan Liu Zhiting Lin Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China
Recently, the characterization of community structures in complex networks has received a considerable amount of attentions. Effective identification of these communities or clusters is a general problem in the fi... 详细信息
来源: 评论
Evolutionary repair for evolutionary design of combinational logic circuits
Evolutionary repair for evolutionary design of combinational...
收藏 引用
Congress on Evolutionary Computation
作者: Xin Zhang Wenjian Luo School of Computer Science and Technology Anhui Province key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Evolutionary algorithms have been adopted to design logic circuits for many years. However, it takes too much time for evolutionary algorithms to generate circuits directly. Recently, the repair technique has been int... 详细信息
来源: 评论
Generating an Approximately Optimal Detector Set by Evolving Random Seeds
Generating an Approximately Optimal Detector Set by Evolving...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Jie Zhang Wenjian Luo Baoliang Xu Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
The detector generation algorithm is the core of a negative selection algorithm (NSA). In most previous work, the NSAs generate the detector set randomly, which cannot guarantee to obtain an efficient detector set. To... 详细信息
来源: 评论
Interpersonal Relationship Analysis with Dyadic EEG Signals via Learning Spatial-Temporal Patterns
arXiv
收藏 引用
arXiv 2024年
作者: Ji, Wenqi Liu, Fang Du, Xinxin Liu, Niqi Zhou, Chao Yu, Minjing Zhao, Guozhen Liu, Yong-Jin BNRist Department of Computer Science and Technology MOE Key Laboratory of Pervasive Computing Tsinghua University China State Key Laboratory of Media Convergence and Communication Communication University of China China Institute of Software Chinese Academy of Sciences China College of Intelligence and Computing Tianjin University China CAS Key Laboratory of Behavioral Science Institute of Psychology China
Interpersonal relationship quality is pivotal in social and occupational contexts. Existing analysis of interpersonal relationships mostly rely on subjective self-reports, whereas objective quantification remains chal... 详细信息
来源: 评论
Unifying and Improving Graph Convolutional Neural Networks with Wavelet Denoising Filters  23
Unifying and Improving Graph Convolutional Neural Networks w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wan, Liangtian Li, Xiaona Han, Huijin Yan, Xiaoran Sun, Lu Ning, Zhaolong Xia, Feng Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Research Center of Big Data Intelligence Research Institute of Artificial Intelligence Zhejiang Lab Hangzhou China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian China School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Computing Technologies Rmit University Melbourne Australia
Graph convolutional neural network (GCN) is a powerful deep learning framework for network data. However, variants of graph neural architectures can lead to drastically different performance on different tasks. Model ... 详细信息
来源: 评论
Asymmetric Group key Agreement Protocol from Short Signatures
Asymmetric Group Key Agreement Protocol from Short Signature...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Kunyu Shen Lei Zhang Rui Zhang Qihao Fang Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China Science and Technology on Communication Security Laboratory Chengdu Sichuan China
Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel not... 详细信息
来源: 评论
An adaptive strategy for updating the memory in Evolutionary Algorithms for dynamic optimization
An adaptive strategy for updating the memory in Evolutionary...
收藏 引用
IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments (CIDUE)
作者: Tao Zhu Wenjian Luo Zhifang Li Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
The memory scheme is one of the most widely employed techniques in Evolutionary Algorithms for solving dynamic optimization problems. The updating strategy is a key concern for the memory scheme. Unfortunately, the ex... 详细信息
来源: 评论