咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是171-180 订阅
排序:
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence Information Technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
Modeling and analysis of collaboration network in large-scale complex software systems
Modeling and analysis of collaboration network in large-scal...
收藏 引用
作者: Sun, Shiwen Xia, Chengyi Wang, Li School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
Large-scale software systems represent an important class of artificial complex systems, which can be investigated from the complex network perspective. Based on the collaboration network model, the collaboration rela... 详细信息
来源: 评论
Mining important topological properties in large-scale computer software systems base on complex networks
Mining important topological properties in large-scale compu...
收藏 引用
World Congress on software Engineering
作者: Sun, Shiwen Xia, Chengyi Wang, Li Wang, Lanying School of Computer and Communication Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Periodical Department Hebei University Baoding China
Recently, large-scale computer software systems have attached a great deal of attention when they are regarded as complex networks composed of interacting units. In this paper, the collaboration relationships between ... 详细信息
来源: 评论
Random directional attack for fooling deep neural networks
arXiv
收藏 引用
arXiv 2019年
作者: Luo, Wenjian Wu, Chenwang Zhou, Nan Ni, Li Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China
Deep neural networks (DNNs) have been widely used in many fields such as images processing, speech recognition;however, they are vulnerable to adversarial examples, and this is a security issue worthy of attention. Be... 详细信息
来源: 评论
M-DFCPP: A runtime library for multi-machine dataflow computing
M-DFCPP: A runtime library for multi-machine dataflow comput...
收藏 引用
作者: Luo, Qiuming Liu, Senhong Huang, Jinke Li, Jinrong College of Computer Science and Software Engineering Shenzhen University Shenzhen China SKT Group Guangdong Province Key Laboratory of Popular High-Performance Computers Shenzhen China SKT Group Guangdong Province Engineering Center of China-made High Performance Data Computing System Shenzhen China
This article designs and implements a runtime library for general dataflow programming, DFCPP (Luo Q, Huang J, Li J, Du Z. Proceedings of the 52nd International Conference on Parallel Processing Workshops. ACM;2023:14... 详细信息
来源: 评论
DOA estimation for beam scanning radar based on sparse signal reconstruction with incomplete pulse
DOA estimation for beam scanning radar based on sparse signa...
收藏 引用
2022 IEEE International Conference on Signal Processing, communications and computing, ICSPCC 2022
作者: Wu, Ran Zhang, Yan Ni, Lihua Zhang, Kehao Liu, Ning Wan, Qun University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Northern Institute of Electronic Equipment Beijing100191 China Agile and Intelligent Computing Key Laboratory of Sichuan Province Chengdu611731 China
Direction of Arrival (DOA) is one of the commonly used measurement for source localization. However, the receiving equipment of modern electronic reconnaissance can not completely intercept the pulse signal in the com... 详细信息
来源: 评论
An immune based algorithm for Chinese network short text clustering
收藏 引用
Zidonghua Xuebao/ Acta Automatica Sinica 2009年 第7期35卷 896-902页
作者: He, Tao Cao, Xian-Bin Tan, Hui School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Laboratory of Software in Computing and Communication Anhui Province Hefei 230027 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Network short text clustering is a major technology in network content security. Since Chinese network short text is less of keywords and full of anomalous writings, the traditional text clustering method is not direc... 详细信息
来源: 评论
Cost-Optimized Microservice Deployment for IoT Application in Cloud-Edge Collaborative Environment  26
Cost-Optimized Microservice Deployment for IoT Application i...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Zhang, Xiaoyuan Tang, Bing Yang, Qing Xu, Wei Guo, Feiyan Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China Guangzhou Maritime University School of Information and Communication Engineering Guangzhou510725 China
With the popularity of cloud native and DevOps, container technology is widely used and combined with microservices. The deployment of container-based microservices in distributed cloud-edge infrastructure requires su... 详细信息
来源: 评论
A novel denoising method for infrared image based on bilateral filtering and non-local means
收藏 引用
Optoelectronics Letters 2017年 第3期13卷 237-240页
作者: 刘凤连 孙梦尧 蔡文娜 Key Laboratory of Computer Vision and System Ministry of Education of ChinaTianjin Key Laboratory of Intelligence Computing and Novel Software TechnologySchool of Computer and Communication EngineeringTianjin University of TechnologyTianjin 300384China
This paper presents an image denoising method based on bilateral filtering and non-local means. The non-local region texture or structure of the image has the characteristics of repetition, which can be used to effect... 详细信息
来源: 评论