咨询与建议

限定检索结果

文献类型

  • 168 篇 会议
  • 87 篇 期刊文献

馆藏范围

  • 255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 129 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 48 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 15 篇 电气工程
    • 13 篇 机械工程
    • 8 篇 光学工程
    • 8 篇 生物工程
    • 7 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
  • 85 篇 理学
    • 58 篇 数学
    • 16 篇 物理学
    • 16 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 7 篇 化学
  • 52 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 13 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 9 篇 evolutionary com...
  • 8 篇 optimization
  • 8 篇 computer network...
  • 7 篇 statistics
  • 7 篇 clustering algor...
  • 6 篇 sociology
  • 5 篇 vehicle detectio...
  • 5 篇 vectors
  • 5 篇 algorithm design...
  • 5 篇 genetic algorith...
  • 5 篇 vehicles
  • 5 篇 training
  • 4 篇 complex networks
  • 4 篇 maintenance engi...
  • 4 篇 cameras
  • 4 篇 resource managem...

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 cluster and grid...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 6 篇 science and tech...
  • 6 篇 institute of aut...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 16 篇 xufa wang
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 tao dacheng
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 6 篇 jin hai
  • 6 篇 du bo
  • 5 篇 zhang lei
  • 5 篇 wan wei

语言

  • 241 篇 英文
  • 12 篇 中文
  • 3 篇 其他
检索条件"机构=Key Laboratory of Software in Computing and Communication"
255 条 记 录,以下是51-60 订阅
排序:
The detection of Trojan horse based on the data mining
The detection of Trojan horse based on the data mining
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Tang, Shugang School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300191 China
Trojan horse is a serious security threat to computer network. Traditionally, Trojan Horses are detected using file's dynamic characteristics or behaviors. However, these methods are not available for unknown or u... 详细信息
来源: 评论
Research on ultra-dependable embedded real time operating system
Research on ultra-dependable embedded real time operating sy...
收藏 引用
2011 IEEE/ACM International Conference on Green computing and communications, GreenCom 2011
作者: Chen, Hui Yang, Shi Ping Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China Guangzhou Haige Communication Industry Group Guangzhou China
In this paper, to research and design ultra-dependable embedded real time operating system supporting security and safety, spatial and temporal isolation safeguard is proposed and used. Temporal isolation mechanism gu... 详细信息
来源: 评论
Asymmetric Group key Agreement Protocol from Short Signatures  8
Asymmetric Group Key Agreement Protocol from Short Signature...
收藏 引用
8th IEEE International Conference on Computer and communications, ICCC 2022
作者: Shen, Kunyu Zhang, Lei Zhang, Rui Fang, Qihao Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China
Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel not... 详细信息
来源: 评论
MPC-Based Privacy-Preserving Serverless Federated Learning  3
MPC-Based Privacy-Preserving Serverless Federated Learning
收藏 引用
3rd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2022
作者: Zhong, Liangyu Zhang, Lei Xu, Lin Wang, Lulu East China Normal University Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute Shanghai200062 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China
Federated learning (FL) enables multiple users to collaboratively train a global model by keeping their data sets local. Since a single server is used, traditional FL faces the single point of failure problem. An avai... 详细信息
来源: 评论
PR3D: Precise and realistic 3D face reconstruction from a single image
PR3D: Precise and realistic 3D face reconstruction from a si...
收藏 引用
作者: Huang, Zhangjin Wu, Xing University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Software in Computing and Communication Hefei China Deqing Alpha Innovation Institute Huzhou China
Reconstructing the three-dimensional (3D) shape and texture of the face from a single image is a significant and challenging task in computer vision and graphics. In recent years, learning-based reconstruction methods... 详细信息
来源: 评论
IPRAR: A DFG-based approach to instruction clustering for multicluster VLIW DSP processor with SIMD structure
收藏 引用
Journal of Computational Information Systems 2014年 第3期10卷 1257-1269页
作者: Yang, Yangzhao Gu, Naijie Zhao, Zeng Ren, Kaixin School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China USTC and Loongson Technology Associated Laboratory Institute of Advanced Technology University of Science and Technology of China Hefei 230027 China
Modern Very Long Instruction (VLIW) DSP can improve performance by using instruction-level parallelism (ILP) and obtain better parallelism through instruction clustering. The essence of clustering is resource allocati... 详细信息
来源: 评论
An improved RBF network for predicting location in mobile network
An improved RBF network for predicting location in mobile ne...
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Liu, Fenglian School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300191 China
In mobile network, quality of service (Qos) is difficultly guaranteed for the particularity of mobile network. If the system knows, prior to the mobile subscriber movement, the exact trajectory it will follow, the Qos... 详细信息
来源: 评论
A novel similarity measure method for CBIR system
A novel similarity measure method for CBIR system
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Liu, Fenglian School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing Novel Software Technology Tianjin 300191 China
This paper presents a novel similarity measure method based a combination of color and texture feature representations. In this method, the YIQ color space is chosen, because it can describe both color images and gray... 详细信息
来源: 评论
Performance optimization and evaluation of space management in cloud storage systems  15th
Performance optimization and evaluation of space management ...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Xu, Guangping Li, Huan Mao, Qunfang Lin, Sheng Zhang, Hua Tianjin Key Laboratory of Intelligence Computing and New Software Technology Tianjin300384 China Computer and Communication Engineering School Tianjin University of Technology Tianjin300384 China
Cloud service providers and enterprises usually deploy high performance storage to manage the unrelenting growth of data. In this paper, we focus on performance optimization and evaluation by using optimal regeneratio... 详细信息
来源: 评论
Optimizing BLAS2 for a decoupled access/execute architecture processor
收藏 引用
Journal of Computational Information Systems 2014年 第3期10卷 1231-1241页
作者: Zhao, Zeng Gu, Naijie Yang, Yangzhao Ren, Kaixin School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China USTC and Loongson Technology Associated Laboratory Institute of Advanced Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China
Basic Linear Algebra Subroutines (BLAS) is a widely used basic mathematical library for high-performance computing. It has a great impact on the performance of supercomputers. This paper focuses on memory accessing op... 详细信息
来源: 评论