咨询与建议

限定检索结果

文献类型

  • 168 篇 会议
  • 87 篇 期刊文献

馆藏范围

  • 255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 129 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 48 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 15 篇 电气工程
    • 13 篇 机械工程
    • 8 篇 光学工程
    • 8 篇 生物工程
    • 7 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
  • 85 篇 理学
    • 58 篇 数学
    • 16 篇 物理学
    • 16 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 7 篇 化学
  • 52 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 13 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 9 篇 evolutionary com...
  • 8 篇 optimization
  • 8 篇 computer network...
  • 7 篇 statistics
  • 7 篇 clustering algor...
  • 6 篇 sociology
  • 5 篇 vehicle detectio...
  • 5 篇 vectors
  • 5 篇 algorithm design...
  • 5 篇 genetic algorith...
  • 5 篇 vehicles
  • 5 篇 training
  • 4 篇 complex networks
  • 4 篇 maintenance engi...
  • 4 篇 cameras
  • 4 篇 resource managem...

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 cluster and grid...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 6 篇 science and tech...
  • 6 篇 institute of aut...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 16 篇 xufa wang
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 tao dacheng
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 6 篇 jin hai
  • 6 篇 du bo
  • 5 篇 zhang lei
  • 5 篇 wan wei

语言

  • 241 篇 英文
  • 12 篇 中文
  • 3 篇 其他
检索条件"机构=Key Laboratory of Software in Computing and Communication"
255 条 记 录,以下是61-70 订阅
排序:
Implicit interpolation of time vector series
Implicit interpolation of time vector series
收藏 引用
2011 7th International Conference on Natural Computation, ICNC 2011
作者: Li, Dao-Lun Zha, Wen-Shu Lu, De-Tang Department of Modern Mechanics University of Science and Technology of China China Key Laboratory of Software in Computing and Communication of Anhui Province University of Science and Technology of China Hefei 230027 China
Time vector series abound in many fields, which are different from time series. Based on mapping and implicit function interpolation, the method of implicit interpolation over time vector series is developed and studi... 详细信息
来源: 评论
Evolutionary Games on Weighted Newman-Watts Small-World Networks
收藏 引用
Chinese Physics Letters 2009年 第5期26卷 255-258页
作者: 杜文博 曹先彬 赵琳 周宏 Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230026 School of Life Sciences University of Science and Technology of China Hefei 230026
We investigate the evolutionary prisoner's dilemma game (PDG) on weighted Newman-Watts (NW) networks. In weighted NW networks, the link weight ωij is assigned to the link between the nodes i and j as: ωij = (... 详细信息
来源: 评论
The g-dominance Relation for Preference-Based Evolutionary Multi-Objective Optimization
The g-dominance Relation for Preference-Based Evolutionary M...
收藏 引用
2019 IEEE Congress on Evolutionary Computation, CEC 2019
作者: Luo, Wenjian Shi, Luming Lin, Xin Coello Coello, Carlos A. Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei230027 China Departmento de Sistemas UAM-Azcapotzalco Mexico City Mexico
In evolutionary multi-objective optimization, the results generated by an evolutionary algorithm usually contain an approximation, as good as possible, of the entire Pareto-optimal front. However, sometimes the number... 详细信息
来源: 评论
Mac address assignment in wireless sensor networks: A mixed strategy game approach
Mac address assignment in wireless sensor networks: A mixed ...
收藏 引用
2nd International Conference on Systems and Networks communications, ICSNC 2006
作者: Kun, Tu Kun, Bi Naijie, Gu Wanli, Dong Xiaohu, Liu Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In this paper, we address the problem of MAC address assignment in wireless sensor networks. A novel scheme for MAC address assignment is proposed to reduce the overhead. We model the problem from the game theoretical... 详细信息
来源: 评论
Topological hole detection in sensor networks with cooperative neighbors
Topological hole detection in sensor networks with cooperati...
收藏 引用
2nd International Conference on Systems and Networks communications, ICSNC 2006
作者: Kun, Bi Kun, Tu Naijie, Gu Wanli, Dong Xiaohu, Liu Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In a wireless sensor network, the regions in which a large percentage of sensor nodes are not available may form holes in the network. In holes, sensor nodes may be depleted or not dense enough to communicate with oth... 详细信息
来源: 评论
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases
A Hybrid of the prefix algorithm and the q-hidden algorithm ...
收藏 引用
IEEE Symposium on Computational Intelligence in Cyber Security
作者: Liu, Ran Luo, Wenjian Wang, Xufa School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software Engineering in Computing and Communication Hefei 230027 Anhui China
The negative database (NDB) is a complement of the corresponding database. The NDB could protect the privacy of the data, but it should be complete and hard-to-reverse. However, existent techniques cannot generate the... 详细信息
来源: 评论
Nonlinear characteristics and qualitative analysis of sleep EEG
Nonlinear characteristics and qualitative analysis of sleep ...
收藏 引用
2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
作者: Shao, Chenxi Fan, Jinfeng Li, Shaobin Department of Computer Science and Technology USTC Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China Department of Computer Science and Technology USTC Hefei Anhui 230027 China
Correlation dimension (CD) and the largest Lyapunov exponent (LLE), which are two most important nonlinear invariant measures of nonlinear system, are adopted to characterize the complexity and stability of human brai... 详细信息
来源: 评论
Scalable video multicast with joint layer resource allocation in broadband wireless networks
Scalable video multicast with joint layer resource allocatio...
收藏 引用
International Conference on Network Protocols
作者: Li, Peilong Zhang, Honghai Zhao, Baohua Rangarajan, Sampath Dept. of Computer Science and Technology University of Science and Technology of China China NEC Laboratories America United States State Key Laboratory of Networking and Switching Technology Beijing China Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Scalable video coding (SVC), together with adaptive modulation and coding (AMC), can improve wireless multicast streaming video by jointly performing radio resource allocation and modulation and coding scheme (MCS) se... 详细信息
来源: 评论
Airborne moving vehicle detection for urban traffic surveillance
Airborne moving vehicle detection for urban traffic surveill...
收藏 引用
11th International IEEE Conference on Intelligent Transportation Systems, ITSC 2008
作者: Lin, Renjun Cao, Xianbin Xu, Yanwu Wei, Chuangxian Qiao, Hong University of Science and Technology China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China Institute of Automation Chinese Academy of Sciences Beijing 100080 China University of Manchester United Kingdom
At present, moving vehicle detection on airborne platform has been an important technology for urban traffic surveillance. In such a situation, most commonly used methods (e.g. image subtraction) could hardly work wel... 详细信息
来源: 评论
A new clustering strategy in ambulatory electrocardiogram waveform
A new clustering strategy in ambulatory electrocardiogram wa...
收藏 引用
2009 International Conference on Information Engineering and Computer Science, ICIECS 2009
作者: Yu, Tian Zheng, Gang School of Computer and Communication Engineering Tianjin University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 Tianjin China
Ambulatory electrocardiogram is used to record about 24 hours electrocardiogram waveform. The purpose is to find out the conspicuous variation in the recording data. A new strategy used to cluster the electrocardiogra... 详细信息
来源: 评论