咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是121-130 订阅
排序:
Evolutionary clustering with differential evolution
Evolutionary clustering with differential evolution
收藏 引用
Congress on Evolutionary Computation
作者: Gang Chen Wenjian Luo Tao Zhu Anhui Province key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Evolutionary clustering is a hot research topic that clusters the time-stamped data and it is essential to some important applications such as data streams clustering and social network analysis. An evolutionary clust... 详细信息
来源: 评论
An improved genetic algorithm for dynamic shortest path problems
An improved genetic algorithm for dynamic shortest path prob...
收藏 引用
Congress on Evolutionary Computation
作者: Xuezhi Zhu Wenjian Luo Tao Zhu Anhui Province key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
The Shortest Path (SP) problems are conventional combinatorial optimization problems. There are many deterministic algorithms for solving the shortest path problems in static topologies. However, in dynamic topologies... 详细信息
来源: 评论
AN APPROACH BASED ON TSA-TREE FOR ACCURATE TIME SERIES CLASSIFICATION
AN APPROACH BASED ON TSA-TREE FOR ACCURATE TIME SERIES CLASS...
收藏 引用
2012 IEEE 2nd International Conference on Cloud computing and Intelligence Systems
作者: Xiaoxu He Chenxi Shao School of Computer Science and Technology University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication
In order to improve the performance of time series classification, we introduce a new approach of time series classification. The first step of the approach is to design a feature exaction model based on Trend and Sur... 详细信息
来源: 评论
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks
收藏 引用
Journal of Computer Science & Technology 2022年 第4期37卷 960-974页
作者: Hao Liao Qi-Xin Liu Ze-Cheng Huang Ke-Zhong Lu Chi Ho Yeung Yi-Cheng Zhang National Engineering Laboratory on Big Data System Computing Technology College of Computer Science and SoftwareEngineeringShenzhen UniversityShenzhen 518060China Guangdong Province Key Laboratory of Popular High Performance Computers Shenzhen UniversityShenzhen 518060China Guangdong Province Engineering Center of China-Made High Performance Data Computing System College of ComputerScience and Software EngineeringShenzhen UniversityShenzhen 518060China Institute of Big Data Intelligent Management and Decision Shenzhen UniversityShenzhen 518060China Department of Science and Environmental Studies The Education University of Hong KongHong Kong 999077China Department of Physics University of FribourgFribourg 1700Switzerland
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in v... 详细信息
来源: 评论
Large area crystalline Weyl semimetal with nano Au film based micro-fold line array for THz detector
收藏 引用
Science China(Technological Sciences) 2023年 第11期66卷 3267-3275页
作者: SONG Qi ZHOU Yu JIA ErSe WANG JiaTong ZHANG Min ZHANG BingYuan Shandong Key Laboratory of Optical Communication Science and Technology School of Physics Science and Information TechnologyLiaocheng UniversityLiaocheng 252059China North China Institute of Computing Technology Beijing 100083China Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province College of Physics and Optoelectronic EngineeringShenzhen UniversityShenzhen 518060China School of Precision Instrument and Opto-electronics Engineering Tianjin UniversityTianjin 300072China
The advancement of 6G technology relies on the development of high-performance terahertz detectors that can operate at room *** detectors are crucial for Internet of Things(Io T)applications,which require sensitive en... 详细信息
来源: 评论
Leveraging geometric correlation for input-adaptive facial landmark regression
Leveraging geometric correlation for input-adaptive facial l...
收藏 引用
2017 IEEE International Conference on Multimedia and Expo, ICME 2017
作者: Feng, Yuyao Liu, Risheng Fan, Xin Huyan, Kang Luo, Zhongxuan DUT-RU International School of Information and Software Engineering Dalian University of Technology China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province China Department of Computing Hong Kong Polytechnic University Hong Kong
Facial analysis plays very important role in many vision applications, such as authentication and entertainments. The very early works in the 1990s mostly focus on estimating geometric deformations of facial landmarks... 详细信息
来源: 评论
Manifold Projection for Adversarial Defense on Face Recognition  1
收藏 引用
16th European Conference on Computer Vision, ECCV 2020
作者: Zhou, Jianli Liang, Chao Chen, Jun National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Key Laboratory of Multimedia and Network Communication Engineering BeijingHubei Province China
Although deep convolutional neural network based face recognition system has achieved remarkable success, it is susceptible to adversarial images: carefully constructed imperceptible perturbations can easily mislead d... 详细信息
来源: 评论
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases
A Hybrid of the prefix algorithm and the q-hidden algorithm ...
收藏 引用
IEEE Symposium on Computational Intelligence in Cyber Security
作者: Liu, Ran Luo, Wenjian Wang, Xufa School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software Engineering in Computing and Communication Hefei 230027 Anhui China
The negative database (NDB) is a complement of the corresponding database. The NDB could protect the privacy of the data, but it should be complete and hard-to-reverse. However, existent techniques cannot generate the... 详细信息
来源: 评论
A Global-Energy-Balancing Real-Time Routing in Wireless Sensor Networks
A Global-Energy-Balancing Real-Time Routing in Wireless Sens...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Peilong Li Yu Gu Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy e... 详细信息
来源: 评论
A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks
A Secure Routing Protocol with Malicious Nodes Detecting and...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Yuan-xi Jiang Bao-hua Zhao Department of Computer Science Anhui Province Key Laboratory of software in Computing and Communication University of Science and Technology Hefei Anhui China
Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routin... 详细信息
来源: 评论