咨询与建议

限定检索结果

文献类型

  • 149 篇 会议
  • 49 篇 期刊文献

馆藏范围

  • 198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 130 篇 工学
    • 95 篇 计算机科学与技术...
    • 66 篇 软件工程
    • 38 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 13 篇 电子科学与技术(可...
    • 12 篇 电气工程
    • 9 篇 机械工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 70 篇 理学
    • 53 篇 数学
    • 19 篇 统计学(可授理学、...
    • 14 篇 系统科学
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 化学
  • 37 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 5 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 12 篇 wireless sensor ...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 face recognition
  • 7 篇 optimization
  • 7 篇 databases
  • 7 篇 clustering algor...
  • 7 篇 computer network...
  • 6 篇 feature extracti...
  • 6 篇 sociology
  • 5 篇 vectors
  • 5 篇 monitoring
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 resource managem...
  • 4 篇 cognitive radio
  • 4 篇 switches

机构

  • 26 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 16 篇 department of co...
  • 9 篇 university of sc...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 province key lab...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 4 篇 department of el...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 college of infor...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 4 篇 department of co...
  • 4 篇 anhui key labora...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 5 篇 wang shangfei
  • 5 篇 kun bi
  • 4 篇 li zhifang
  • 4 篇 dong lanfang
  • 4 篇 xie xianzhong

语言

  • 189 篇 英文
  • 8 篇 中文
  • 1 篇 其他
检索条件"机构=Key Laboratory of Software in Computing and Communication of Anhui Province"
198 条 记 录,以下是71-80 订阅
排序:
Facial Action Unit Recognition Enhanced by Text Descriptions of FACS
收藏 引用
IEEE Transactions on Affective computing 2024年
作者: Chang, Yanan Zhang, Caichao Wu, Yi Wang, Shangfei University of Science and Technology of China Key Lab of Computing and Communication Software of Anhui Province Anhui Hefei230027 China
Although the descriptions of facial action units (AUs) provide crucial semantic knowledge for representation learning from facial images, they have not been fully explored for facial action unit recognition. In this p... 详细信息
来源: 评论
AutoGR: Automated geo-replication with fast system performance and preserved application semantics  47th
AutoGR: Automated geo-replication with fast system performan...
收藏 引用
47th International Conference on Very Large Data Bases, VLDB 2021
作者: Wang, Jiawei Li, Cheng Ma, Kai Huo, Jingze Yan, Feng Feng, Xinyu Xu, Yinlong University of Science and Technology of China China University of Nevada Reno United States State Key Laboratory for Novel Software Technology Nanjing University China Anhui Province Key Laboratory of High Performance Computing China
Geo-replication is essential for providing low latency response and quality Internet services. However, designing fast and correct geo-replicated services is challenging due to the complex trade-off between performanc... 详细信息
来源: 评论
A preliminary study on why using the nonself detector set for anomaly detection in artificial immune Systems
A preliminary study on why using the nonself detector set fo...
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Xu, Baoliang Luo, Wenjian Wang, Xufa Nature Inspired Computation and Applications Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al... 详细信息
来源: 评论
A fine-grained algorithm for generating hard-toreverse negative databases
A fine-grained algorithm for generating hard-toreverse negat...
收藏 引用
International Workshop on Artificial Immune Systems, AIS 2015
作者: Zhao, Dongdong Luo, Wenjian Liu, Ran Yue, Lihua School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China School of Computer Science China University of Geosciences Wuhan430074 China
The negative database (NDB) is a new technique for privacy preserving and information hiding. It hides information by storing the complementary set instead of the original data. In order to protect the hidden informat... 详细信息
来源: 评论
Constructing the Voronoi diagram of planar point set in parallel
Constructing the Voronoi diagram of planar point set in para...
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Dong, Lanfang Wu, Yuan Zhou, Shanhai Anhui Province Key Lab. of Software in Computing and Communication College of Computer Science and Technology USTC Hefei China College of Computer Science and Technology University of Science and Technology of China Hefei China
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ... 详细信息
来源: 评论
A Global-Energy-Balancing Real-Time Routing in Wireless Sensor Networks
A Global-Energy-Balancing Real-Time Routing in Wireless Sens...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Peilong Li Yu Gu Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy e... 详细信息
来源: 评论
A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks
A Secure Routing Protocol with Malicious Nodes Detecting and...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Yuan-xi Jiang Bao-hua Zhao Department of Computer Science Anhui Province Key Laboratory of software in Computing and Communication University of Science and Technology Hefei Anhui China
Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routin... 详细信息
来源: 评论
Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks
Secure Location Verification Using Hop-Distance Relationship...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Yongsheng Liu Hao Zhou Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to informa... 详细信息
来源: 评论
Zone routing protocol based on energy consumption
收藏 引用
Jisuanji Gongcheng/Computer Engineering 2006年 第12期32卷 117-118+135页
作者: Zhai, Weifeng Gu, Naijie Zhang, Jianming Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China
A zone routing protocol based on the energy consumption speed of nodes in mobile Adhoc networks is presented. A route select parameter computed by residual lifetime of nodes and hop count of route is used to be select... 详细信息
来源: 评论
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array for 5G Application  5
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array f...
收藏 引用
5th IEEE International Conference on Electronic Information and communication Technology, ICEICT 2022
作者: Zhou, Wei Qi, Junwei Li, Yingsong Huang, Zhixiang Yang, Lixia College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui Province Key Laboratory of Target Recognition and Feature Extraction LuAn230088 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Hefei China
In this work, a Gong-Si-shaped circularly polarized (CP) array with power driver for 5G is proposed. The radiator of the constructed CP array consists of two Chinese-like characters ' and '' with the simil... 详细信息
来源: 评论