咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是261-270 订阅
排序:
Theoretical and empirical analyses of Evolutionary Negative Selection Algorithms for a combinational optimization problem
Theoretical and empirical analyses of Evolutionary Negative ...
收藏 引用
International Conference on Bio-Inspired computing: Theories and Applications, BICTA
作者: Xingxin Pei Wenjian Luo Nature Inspired Computation and Application Laboratory School of Computer Science and Technology Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Evolutionary Negative Selection Algorithms (ENSAs) could be regarded as hybrid algorithms of Evolutionary Algorithms (EAs) and Negative Selection Algorithms (NSAs). The average time complexity of ENSAs on combinationa... 详细信息
来源: 评论
A Hybrid Algorithm for the Laser Stripe Centreline Extraction  17
A Hybrid Algorithm for the Laser Stripe Centreline Extractio...
收藏 引用
17th CIRP Conference on Computer Aided Tolerancing, CAT 2022
作者: Mao, Zirui Xu, Yuanping Guo, Benjun Li, Tukun Jiang, Xiangqian Shi, Yajing Cao, Yanlong Xu, Zhijie Zhang, Chaolong Huang, Jian School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computing and Engineering University of Huddersfield HuddersfieldHD1 3DH United Kingdom Key Laboratory of Advanced Manufacturing Technology of Zhejiang Province College of Mechanical Engineering Zhejiang University Hangzhou310027 China
Centreline extraction is one of the critical processes of structured light systems that play an increasingly important role in industry 4.0. This paper proposes a novel algorithm to extract the centreline by combining... 详细信息
来源: 评论
A Local Trust Model Based on Time Influence Function in P2P Networks
A Local Trust Model Based on Time Influence Function in P2P ...
收藏 引用
2015 6th IEEE International Conference on software Engineering and Service Science(ICSESS 2015)
作者: Yan-xia Cui Hong-yun Ning Yun-yun Du Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology Key Laboratory of Computer Vision and System Ministry of Education School of Computer and Communication Engineering Tianjin University of Technology
In peer-to-peer network environment, there is no centralized management authority to be relied on, so the service provider and service requester have to establish some assessment model, and evaluate the dynamic behavi... 详细信息
来源: 评论
IPRAR: A DFG-based approach to instruction clustering for multicluster VLIW DSP processor with SIMD structure
收藏 引用
Journal of Computational Information Systems 2014年 第3期10卷 1257-1269页
作者: Yang, Yangzhao Gu, Naijie Zhao, Zeng Ren, Kaixin School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China USTC and Loongson Technology Associated Laboratory Institute of Advanced Technology University of Science and Technology of China Hefei 230027 China
Modern Very Long Instruction (VLIW) DSP can improve performance by using instruction-level parallelism (ILP) and obtain better parallelism through instruction clustering. The essence of clustering is resource allocati... 详细信息
来源: 评论
Bi-dimensional Variational Mode Decomposition for Surface Texture Analysis  17
Bi-dimensional Variational Mode Decomposition for Surface Te...
收藏 引用
17th CIRP Conference on Computer Aided Tolerancing, CAT 2022
作者: Li, Zhuowei Xu, Yuanping Li, Tukun Shi, Yajing Jiang, Xiangqian Cao, Yanlong Zeng, Wenhan Xu, Zhijie Zhang, Chaolong Huang, Jian School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computing and Engineering University of Huddersfield HuddersfieldHD1 3DH United Kingdom Key Laboratory of Advanced Manufacturing Technology of Zhejiang Province College of Mechanical Engineering Zhejiang University Hangzhou310027 China
In surface metrology, filtration is one of the key operations which is used to decompose the components of the surface and extract a scale-limited surface for further assessment. Although many types of filters have be... 详细信息
来源: 评论
Improvement of key in ZigBee wireless network
收藏 引用
Information Technology Journal 2013年 第18期12卷 4593-4596页
作者: Li, Wenjie Cao, Qianqian Liu, Zhuzi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology China
Zigbee provides a connection to a variety of wireless devices and solves the problem of the communicating between different protocols. ZigBee can provide wireless communication which is low rate, low complexity, short... 详细信息
来源: 评论
Optimizing BLAS2 for a decoupled access/execute architecture processor
收藏 引用
Journal of Computational Information Systems 2014年 第3期10卷 1231-1241页
作者: Zhao, Zeng Gu, Naijie Yang, Yangzhao Ren, Kaixin School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China USTC and Loongson Technology Associated Laboratory Institute of Advanced Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China
Basic Linear Algebra Subroutines (BLAS) is a widely used basic mathematical library for high-performance computing. It has a great impact on the performance of supercomputers. This paper focuses on memory accessing op... 详细信息
来源: 评论
Network Security Evaluation Algorithm Based on Access Level Vectors
Network Security Evaluation Algorithm Based on Access Level ...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Kai Li Naijie Gu Kun Bi Hongzhu Ji Department of Computer Science and Technology University of Science and Technology of China Hefei China 230027 Anhui Province Key Lab. of Computing and Communication Software Hefei China 230027
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres... 详细信息
来源: 评论
Scheduling Model for Cognitive Radio
Scheduling Model for Cognitive Radio
收藏 引用
3rd International Conference on Cognitive Radio Oriented Wireless Networks and communications (CrownCom 2008)
作者: Ping Zhu Jinglong Li Xufa Wang Department of Computer Science and Technology Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
The priority queue model divides CR (cognitive radio) system users into primary user and secondary user. The primary user has preemptive priority over secondary user, while the same priority level users are FIFO serve... 详细信息
来源: 评论
A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems
A Preliminary Study on Why Using the Nonself Detector Set fo...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Baoliang Xu Wenjian Luo Xufa Wang Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al... 详细信息
来源: 评论