咨询与建议

限定检索结果

文献类型

  • 168 篇 会议
  • 88 篇 期刊文献

馆藏范围

  • 256 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 176 篇 工学
    • 130 篇 计算机科学与技术...
    • 94 篇 软件工程
    • 48 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 电气工程
    • 13 篇 机械工程
    • 8 篇 生物工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 动力工程及工程热...
    • 5 篇 网络空间安全
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
  • 86 篇 理学
    • 59 篇 数学
    • 16 篇 物理学
    • 16 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 7 篇 化学
  • 51 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 13 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 8 篇 optimization
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 clustering algor...
  • 6 篇 sociology
  • 5 篇 vehicle detectio...
  • 5 篇 vectors
  • 5 篇 algorithm design...
  • 5 篇 genetic algorith...
  • 5 篇 vehicles
  • 5 篇 training
  • 4 篇 complex networks
  • 4 篇 maintenance engi...
  • 4 篇 cameras
  • 4 篇 resource managem...

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 cluster and grid...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 6 篇 science and tech...
  • 6 篇 institute of aut...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 16 篇 xufa wang
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 6 篇 jin hai
  • 5 篇 zhang lei
  • 5 篇 tao dacheng
  • 5 篇 wan wei
  • 5 篇 wanli dong

语言

  • 240 篇 英文
  • 12 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory of Software in Computing and Communication"
256 条 记 录,以下是71-80 订阅
排序:
Mining important topological properties in large-scale computer software systems base on complex networks
Mining important topological properties in large-scale compu...
收藏 引用
World Congress on software Engineering
作者: Sun, Shiwen Xia, Chengyi Wang, Li Wang, Lanying School of Computer and Communication Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Periodical Department Hebei University Baoding China
Recently, large-scale computer software systems have attached a great deal of attention when they are regarded as complex networks composed of interacting units. In this paper, the collaboration relationships between ... 详细信息
来源: 评论
Real-Valued Negative Databases  12
Real-Valued Negative Databases
收藏 引用
12th European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, ECAL 2013
作者: Zhao, Dongdong Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
The negative database (NDB) is the negative representation of original data. Existing work has demonstrated that NDB can be used to preserve privacy and hide information. However, most work about NDB is based on binar... 详细信息
来源: 评论
Fast searching optimal negative surveys
Fast searching optimal negative surveys
收藏 引用
2014 International Conference on Information and Network Security, ICINS 2014
作者: Lu, Yihui Luo, Wenjian Zhao, Dongdong School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
In a negative survey, a category which does not agree with the fact of each participant is collected. Hence, data collectors cannot acquire the realistic data of participants, and this can efficiently protect particip... 详细信息
来源: 评论
Cost-Optimized Microservice Deployment for IoT Application in Cloud-Edge Collaborative Environment  26
Cost-Optimized Microservice Deployment for IoT Application i...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Zhang, Xiaoyuan Tang, Bing Yang, Qing Xu, Wei Guo, Feiyan Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China Guangzhou Maritime University School of Information and Communication Engineering Guangzhou510725 China
With the popularity of cloud native and DevOps, container technology is widely used and combined with microservices. The deployment of container-based microservices in distributed cloud-edge infrastructure requires su... 详细信息
来源: 评论
A novel denoising method for infrared image based on bilateral filtering and non-local means
收藏 引用
Optoelectronics Letters 2017年 第3期13卷 237-240页
作者: 刘凤连 孙梦尧 蔡文娜 Key Laboratory of Computer Vision and System Ministry of Education of ChinaTianjin Key Laboratory of Intelligence Computing and Novel Software TechnologySchool of Computer and Communication EngineeringTianjin University of TechnologyTianjin 300384China
This paper presents an image denoising method based on bilateral filtering and non-local means. The non-local region texture or structure of the image has the characteristics of repetition, which can be used to effect... 详细信息
来源: 评论
A parallel NURBS-based isogeometric analysis framework on multi-core CPUs
收藏 引用
Journal of Computational Information Systems 2012年 第16期8卷 6589-6600页
作者: Guo, Licai Huang, Zhangjin Gu, Naijie School of Computer Science and Technology University of Science and Technology of China China Key Laboratory of Software in Computing and Communication Anhui China USTC-SICT Joint Laboratory on Network and Communication China
A parallel framework for NURBS-based isogeometric analysis on multi-core cpus is presented in this paper. The framework is composed of two parts: (1) construction of the stiffness matrix and right hand side vector;(2)... 详细信息
来源: 评论
A framework for optimization in multi-channel multi-radio wireless mesh networks
A framework for optimization in multi-channel multi-radio wi...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Wanli, Dong Naijie, Gu Kun, Bi Kun, Tu Xiaohu, Liu Dept. of Comput. Sci. and Technol. Univ. of Sci. and Technol. of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
Multi-hop infrastructure wireless mesh networks offer increased reliability, coverage and reduced equipment costs over their single-hop counterpart, wireless LANs. Equipping wireless routers with multiple radios furth... 详细信息
来源: 评论
An efficient group key agreement protocol with administrator  3
An efficient group key agreement protocol with administrator
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Fang, Qihao Zhang, Lei Zhang, Mingrui Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
Group key agreement technology is one of the most popular solution to establish a reliable secure channel between communicating entities of a group. Group key agreement protocol with administrator (GKAA) can handle a ... 详细信息
来源: 评论
Address assignment in wireless sensor networks using game approach
Address assignment in wireless sensor networks using game ap...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Kim, Tu Naijie, Gu Kim, Bi Wanli, Dong Dept. of Comput. Sci. and Technol. Univ. of Sci. and Technol. of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In this paper, we propose a game model to solve the MAC address assignment in sensor networks. Insufficiency of battery power of sensors makes the conservation of the energy be the main design issues for the sensor ne... 详细信息
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin  26
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chang, Qianqian Xu, Lin Zhang, Lei Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony... 详细信息
来源: 评论