咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是141-150 订阅
排序:
Coverage-preserving Data Gathering in Wireless Sensor Networks
Coverage-preserving Data Gathering in Wireless Sensor Networ...
收藏 引用
ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Hongli Xu Liusheng Huang Jumin Wu Yang Wang Depart. of Computer Science and Technology Anhui Province key Laboratory of Software in Computing and Communication University of Science and Technology Hefei China
The power is the most significant resource in wireless sensor nodes, so energy conservation is the most important factor in designing the protocol for sensor networks. In this paper, we study the problem of energy-eff... 详细信息
来源: 评论
A Hormone-based Clustering Algorithm in Wireless Sensor Networks
A Hormone-based Clustering Algorithm in Wireless Sensor Netw...
收藏 引用
2010 2nd International Conference on Computer Engineering and Technology(2010年第二届计算机工程与技术国际会议 ICCET 2010)
作者: Dayuan Dong Haifeng You Yipeng Zhang Xufa Wang Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology of China HefeiChina
Clustering problem is one of the hottest issues in wireless sensor networks (WSNs). The strategy for selection of cluster head has not been sufficiently investigated. In this paper,we propose a hormone-based clusterin... 详细信息
来源: 评论
Z-NetMF: A Biased Embedding Method Based on Matrix Factorization  9th
Z-NetMF: A Biased Embedding Method Based on Matrix Factoriza...
收藏 引用
9th International Conference on communications, Signal Processing, and Systems, CSPS 2020
作者: Sun, Yuchen Wan, Liangtian Sun, Lu Wang, Xianpeng Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian116620 China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian116026 China State Key Laboratory of Marine Resource Utilization in South China Sea and School of Information and Communication Engineering Hainan University Haikou570228 China
Network embedding represents the graph in low dimensions, improving the processing of big scale tasks. As node2vec can only be modeled as a tensor, and NetMF cannot be generalized to a biased form directly. In this pa... 详细信息
来源: 评论
Accurate classification of time series based on a new robust similarity measure
收藏 引用
Journal of Computational Information Systems 2013年 第9期9卷 3521-3528页
作者: He, Xiaoxu Shao, Chenxi Xiong, Yan School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
Among different time series data mining, time series classification is one of the most important aspects. How to design a suitable similarity measure of similarity is a burning issue for accurate time series classific... 详细信息
来源: 评论
Load-Balanced and Length-Minimized Link Scheduling for Multi-Channel TDMA Wireless Mesh Networks
收藏 引用
Chinese Journal of Electronics 2023年 第4期19卷 733-736页
作者: Junfeng Jin Baohua Zhao Hao Zhou School of Computer Science and Technology University of Science and Technology of China Hefei China State Key Laboratory of Networking and Switching Technology Beijing China Province Key Laboratory of Software in Computing and Communication Hefei China
To minimize the length of scheduling and guarantee the load balance of channels, a Load-balanced and length-minimized link scheduling (LBLM) algorithm is proposed. LBLM algorithm is a heuristic scheme, which assigns t... 详细信息
来源: 评论
Test Case Generation Based on Program Invariant and Adaptive Random Algorithm
Test Case Generation Based on Program Invariant and Adaptive...
收藏 引用
Advances in Information Technology and Education
作者: Yuan Yuan Zeng Fanping Zhu Guanmiao Deng Chaoqiang Xiong Neng Department of Computer University of Science and Technology of China Anhui Province Key Lab of Software in Computing and Communication
Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation st... 详细信息
来源: 评论
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array for 5G Application  5
A Gong-Si-Shaped Heterogeneous Circular-Polarization Array f...
收藏 引用
5th IEEE International Conference on Electronic Information and communication Technology, ICEICT 2022
作者: Zhou, Wei Qi, Junwei Li, Yingsong Huang, Zhixiang Yang, Lixia College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui Province Key Laboratory of Target Recognition and Feature Extraction LuAn230088 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Hefei China
In this work, a Gong-Si-shaped circularly polarized (CP) array with power driver for 5G is proposed. The radiator of the constructed CP array consists of two Chinese-like characters ' and '' with the simil... 详细信息
来源: 评论
The Library for Hadoop Deflate Compression Based on FPGA Accelerator with Load Balance  20
The Library for Hadoop Deflate Compression Based on FPGA Acc...
收藏 引用
20th International Conference on Parallel and Distributed computing, Applications and Technologies, PDCAT 2019
作者: Du, Haixin Zhang, Jiankui Sha, Shihao Ye, Cai Luo, Qiuming College of Computer Science and Software Engineering Shenzhen University NHPCC/Guangdong Key Laboratory of Popular HPC Guangdong Province Engineering Center of China-made High Performance Data Computing System Shenzhen China
Hadoop application will produce lots of intermediate results in the map/reduce process that requires disk I/O and network transmission. By compressing the large-scale data of intermediate result, it will greatly impro... 详细信息
来源: 评论
Multi-swarm particle swarm optimization with multiple learning strategies  14
Multi-swarm particle swarm optimization with multiple learni...
收藏 引用
16th Genetic and Evolutionary Computation Conference Companion, GECCO 2014 Companion
作者: Peng, Meng-Qi Gong, Yue-Jiao Li, Jing-Jing Lin, Ying-Biao Department of Computer Science Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Key Laboratory of Software Technology Education Department of Guangdong Province China School of Computer Science South China Normal University China
Inspired by the division of labor and migration behavior in nature, this paper proposes a novel particle swarm optimization algorithm with multiple learning strategies (PSO-MLS). In the algorithm, particles are divide... 详细信息
来源: 评论
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Junteng Wang Wenjian Luo Yamin Hu Hao Jiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei China
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not sa... 详细信息
来源: 评论