咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是271-280 订阅
排序:
Authentication storage scheme based on trusted embedded devices
Authentication storage scheme based on trusted embedded devi...
收藏 引用
2023 International Conference on Intelligent Systems, communications, and Computer Networks, ISCCN 2023
作者: Qi, Longyun Liu, Wei Zhang, Xiao Zhao, Baohua Li, Ke Li, Xiangnan Wang, Hui Lin, Jiangnan State Grid Electric Power Research Institute Jiangsu Province Nanjing211106 China Nanjing Nanrui Information and Communication Technology Company Limited Jiangsu Province Nanjing210000 China State Grid Corporation of China Beijing100031 China Global Energy Interconnection Research Institute Company Limited Beijing102222 China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing100190 China
In the data era, encrypted storage of files is a basic requirement for data security. Because most computing devices and storage devices lack data protection functions or their own data protection ability is poor, the... 详细信息
来源: 评论
Deep hybrid residual learning with statistic priors for single image super-resolution
Deep hybrid residual learning with statistic priors for sing...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Risheng Liu Xiangyu Wang Xin Fan Haojie Li Zhongxuan Luo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Department of Computing The Hong Kong Polytechnic University DUT-RU International School of Information & Software Engineering Dalian University of Technology
This paper considers single image super-resolution (SISR), which is an important low-level vision task and has various applications in multimedia society. Recently, deep neural networks have archived good performance ... 详细信息
来源: 评论
Design and Implementation of Links Generation for Inter Domain Routing System  12
Design and Implementation of Links Generation for Inter Doma...
收藏 引用
12th International Conference on Information Science and Technology, ICIST 2022
作者: Wang, Yu Qiao, Zhi Yin, Junru Zhang, Mingliang College of Software Henan University of Engineering Zhengzhou China College of Information and Electrical Engineering China Agriculture University Beijing China College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Network Research Department Zhengzhou China
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of... 详细信息
来源: 评论
Generating an Approximately Optimal Detector Set by Evolving Random Seeds
Generating an Approximately Optimal Detector Set by Evolving...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Jie Zhang Wenjian Luo Baoliang Xu Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
The detector generation algorithm is the core of a negative selection algorithm (NSA). In most previous work, the NSAs generate the detector set randomly, which cannot guarantee to obtain an efficient detector set. To... 详细信息
来源: 评论
Leveraging geometric correlation for input-adaptive facial landmark regression
Leveraging geometric correlation for input-adaptive facial l...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yuyao Feng Risheng Liu Xin Fan Kang Huyan Zhongxuan Luo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province DUT-RU International School of Information & Software Engineering Dalian University of Technology Department of Computing The Hong Kong Polytechnic University
Facial analysis plays very important role in many vision applications, such as authentication and entertainments. The very early works in the 1990s mostly focus on estimating geometric deformations of facial landmarks... 详细信息
来源: 评论
Interpersonal Relationship Analysis with Dyadic EEG Signals via Learning Spatial-Temporal Patterns
arXiv
收藏 引用
arXiv 2024年
作者: Ji, Wenqi Liu, Fang Du, Xinxin Liu, Niqi Zhou, Chao Yu, Minjing Zhao, Guozhen Liu, Yong-Jin BNRist Department of Computer Science and Technology MOE Key Laboratory of Pervasive Computing Tsinghua University China State Key Laboratory of Media Convergence and Communication Communication University of China China Institute of Software Chinese Academy of Sciences China College of Intelligence and Computing Tianjin University China CAS Key Laboratory of Behavioral Science Institute of Psychology China
Interpersonal relationship quality is pivotal in social and occupational contexts. Existing analysis of interpersonal relationships mostly rely on subjective self-reports, whereas objective quantification remains chal... 详细信息
来源: 评论
Analysis of an M(λ1,λ2)/M/1/WV queue with controlled vacation interruption and variable arrival rate
收藏 引用
Mathematical and Computational Applications 2015年 第1期20卷 39-49页
作者: Wu, Wenqing Tang, Yinghui Visual Computing and Virtual Reality Key Laboratory of Sichuan Province Sichuan Normal University ChengduSichuan China School of Mathematics and Software Science Sichuan Normal University ChengduSichuan China
This paper studies a Markovian queue with multiple working vacations and controlled vacation interruption. If there are at least N customers waiting upon completion of a service at a lower rate, the vacation is interr... 详细信息
来源: 评论
Asymmetric Group key Agreement Protocol from Short Signatures
Asymmetric Group Key Agreement Protocol from Short Signature...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Kunyu Shen Lei Zhang Rui Zhang Qihao Fang Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China Science and Technology on Communication Security Laboratory Chengdu Sichuan China
Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel not... 详细信息
来源: 评论
An emotional harmony generation system
An emotional harmony generation system
收藏 引用
Congress on Evolutionary Computation
作者: Bin Xu Shangfei Wang Xian Li Key Laboratory of Computing Software of Anhui Province School of Computer Science and Technology University of Science and Technology China Department of Automation University of Science and Technology China
This paper proposes an emotional harmony composition system using a series of predefined rules and interactive genetic algorithm. Two kinds of rules are defined: One is harmony composition rules used for composing har... 详细信息
来源: 评论
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOTH QUALITATIVE KNOWLEDGE AND QUANTITATIVE DATA
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOT...
收藏 引用
IEEE International Conference on Multimedia and Expo Workshops
作者: Zhen Gao Shangfei Wang Chongliang Wu Jun Wang Qiang Ji Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute
In this paper, we propose to capture Action Unit (AU) relations existing in both qualitative knowledge and quantitative data through Credal Networks (CN). Each node of the CN represents an AU label, and the links and ... 详细信息
来源: 评论