咨询与建议

限定检索结果

文献类型

  • 168 篇 会议
  • 86 篇 期刊文献

馆藏范围

  • 254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 174 篇 工学
    • 128 篇 计算机科学与技术...
    • 93 篇 软件工程
    • 48 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 电气工程
    • 13 篇 机械工程
    • 8 篇 生物工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 动力工程及工程热...
    • 5 篇 网络空间安全
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
  • 86 篇 理学
    • 59 篇 数学
    • 16 篇 物理学
    • 16 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 7 篇 化学
  • 51 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 13 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 8 篇 optimization
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 clustering algor...
  • 6 篇 sociology
  • 5 篇 vehicle detectio...
  • 5 篇 vectors
  • 5 篇 algorithm design...
  • 5 篇 genetic algorith...
  • 5 篇 vehicles
  • 5 篇 training
  • 4 篇 complex networks
  • 4 篇 maintenance engi...
  • 4 篇 cameras
  • 4 篇 resource managem...

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 cluster and grid...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 6 篇 science and tech...
  • 6 篇 institute of aut...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 16 篇 xufa wang
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 6 篇 jin hai
  • 5 篇 zhang lei
  • 5 篇 tao dacheng
  • 5 篇 wan wei
  • 5 篇 wanli dong

语言

  • 240 篇 英文
  • 12 篇 中文
  • 3 篇 其他
检索条件"机构=Key Laboratory of Software in Computing and Communication"
254 条 记 录,以下是171-180 订阅
排序:
An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor Networks
An Energy-Aware Coverage Based Node Scheduling Scheme for Wi...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Jinxia Liu Naijie Gu Songsong He Dept. of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei Anhui 230027 China
A fundamental issue in wireless sensor network is to extend network lifetime while maintaining network coverage and connectivity. Protection for sensors themselves is another important concern. An Energyaware Coverage... 详细信息
来源: 评论
Directed differential evolution based on directional derivative for numerical optimization problems
Directed differential evolution based on directional derivat...
收藏 引用
International Conference on Hybrid Intelligent Systems (HIS)
作者: Jun Zhang Wenjian Luo School of Computer Science and Technology University of Science and Technology Hefei Anhui China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology Hefei Anhui China
Differential Evolution is one kind of Evolutionary Algorithms, which has been successfully applied to solve many optimization problems. In this paper, a directed differential mutation (DDM), which utilizes the directi... 详细信息
来源: 评论
A real-time schedule method for aircraft landing scheduling problem based on cellular automaton  09
A real-time schedule method for aircraft landing scheduling ...
收藏 引用
2009 World Summit on Genetic and Evolutionary Computation, 2009 GEC Summit - 1st ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC'09
作者: Shenpeng, Yu Xianbin, Cao Maobin, Hu Wenbo, Du Jun, Zhang Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 86-551-3601545 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China School of Engineering Science University of Science and Technology of China Hefei 230026 86-551-3600127 China School of Electronic and Information Engineering Beihang University Beijing 100083 China
The Aircraft Landing Scheduling (ALS) problem is a typical hard multi-constraint optimization problem. In real applications, it is not most important to find the best solution but to provide a feasible landing schedul... 详细信息
来源: 评论
A qualitative modeling and simulation method based on cloud model
A qualitative modeling and simulation method based on cloud ...
收藏 引用
International Conference on Modeling, Simulation and Applied Optimization (ICMSAO)
作者: Chenxi Shao Kelü Sun Zhenzhong Shao Computer Science and Technology Department University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Software in Computing and Communication Hefei China Jianghuai Automobile Company Limited Hefei China
Qualitative simulation is effective methods processing incomplete knowledge, how to represent qualitative knowledge and reduce spurious behaviors is its research emphasis. Contraposing the limitations of existing meth... 详细信息
来源: 评论
Airborne moving vehicle detection for urban traffic surveillance
Airborne moving vehicle detection for urban traffic surveill...
收藏 引用
International Conference on Intelligent Transportation
作者: Renjun Lin Xianbin Cao Yanwu Xu Chuangxian Wei Hong Qiao Anhui Province Key Laboratory of Software Computing and Communication University of Science and Technology Hefei China University of Manchester Institute of Science and Technology UK Institute of Automation Chinese Academy and Sciences Beijing China
At present, moving vehicle detection on airborne platform has been an important technology for urban traffic surveillance. In such a situation, most commonly used methods (e.g. image subtraction) could hardly work wel... 详细信息
来源: 评论
Constructing the Voronoi Diagram of Planar Point Set in Parallel
Constructing the Voronoi Diagram of Planar Point Set in Para...
收藏 引用
International Conference on Computational Intelligence and software Engineering (CiSE)
作者: Lanfang Dong Yuan Wu Shanhai Zhou Anhui Province Key Laboratory of Software In Computing and Communication College of computer science and technology University of Science and Technology Hefei China College of computer science & technology University of Science and Technology Hefei China
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ... 详细信息
来源: 评论
An Evolutionary Support Vector Machines Classifier for Pedestrian Detection
An Evolutionary Support Vector Machines Classifier for Pedes...
收藏 引用
2006 IEEE/RSJ International Conference on Intelligent Robots and Systems
作者: D. Chen X.b. Cao Y.w. Xu H. Qiao Department of Computer Science and Technology University of Science and Technology Hefei China Anhui Province Key Laboratory Software Computing and Communication Hefei China Institute of Automation Chinese Academy and Sciences Beijing China
In a pedestrian detection system, a classifier is usually designed to recognize whether a candidate is a pedestrian. Support vector machines (SVM) has become a primary technique to train a classifier for pedestrian de... 详细信息
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qianqian Chang Lin Xu Lei Zhang Shanghai Key Laboratory of Trustworthy Computing East China Normal University China Science and Technology on Communication Security Laboratory Chengdu China Ministry of Education Engineering Research Center of Software/Hardware Co-Design Technology and Application China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony...
来源: 评论
The self-adaption strategy for parameter ε in ε-MOEA
The self-adaption strategy for parameter ε in ε-MOEA
收藏 引用
Congress on Evolutionary Computation
作者: Min Zhang Wenjian Luo Xingxin Pei Xufa Wang Nature Inspired Computing and Application Laboratory Department of Computer Science and Technology University of Science and Technology China Anhui Key Laboratory of software in Computing Communication University of Science and Technology China University of Science and Technology of China Hefei Anhui CN Nature Inspired Computing and Application Laboratory Department of Computer Science and Technology of China University of Science and Technology China
A novel self-adaption strategy for the parameter epsiv in epsiv-MOEA is proposed in this paper based on the analyses of the relationship between the value of epsiv and the maximum number of non-dominated solutions. Th... 详细信息
来源: 评论
The Frequency-Time Pre-Allocation in Unlicensed Spectrum Based on the Games Learning
The Frequency-Time Pre-Allocation in Unlicensed Spectrum Bas...
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and communications
作者: Kun Han Jinlong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication Department of Computer Science and Technology University of Science and Technology Hefei China Department of Computer Science and Technology University of Science and Technology of China Hefei China
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time... 详细信息
来源: 评论