咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 195 篇 期刊文献

馆藏范围

  • 478 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 252 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 86 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 32 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 15 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 13 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 180 篇 理学
    • 116 篇 数学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 18 篇 化学
  • 88 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 state key labora...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 453 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
478 条 记 录,以下是281-290 订阅
排序:
SvdNPD: a negative data publication method based on the sensitive value distribution
SvdNPD: a negative data publication method based on the sens...
收藏 引用
International Workshop on Artificial Immune Systems (AIS)
作者: Linli Wu Wenjian Luo Dongdong Zhao University of Science and Technology of China Hefei Anhui CN Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China
Existing data publication methods retain the relationship between the quasi-identifier attributes and sensitive attributes of published data. We call them "positive data publication". However, it will lead t... 详细信息
来源: 评论
Real-time rendering for sea water based on height field model and light interaction
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第9期7卷 1975-1981页
作者: Xu, Jie Zhang, Yang Fu, Jinhua School of Software Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou450002 China College of Mathematics and Information Science Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou450002 China State Key-Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou450000 China School of Computer and Communication Engineering Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou450002 China
Real-time simulation of liquids like sea water is an important task nowadays in the field of computer graphics. In this paper, combined with simulation of light interaction, rendering of sea water at interactive rates... 详细信息
来源: 评论
A fine-grained algorithm for generating hard-toreverse negative databases
A fine-grained algorithm for generating hard-toreverse negat...
收藏 引用
International Workshop on Artificial Immune Systems (AIS)
作者: Dongdong Zhao Wenjian Luo Ran Liu Lihua Yue Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui China School of Computer Science China University of Geosciences Wuhan China
The negative database (NDB) is a new technique for privacy preserving and information hiding. It hides information by storing the complementary set instead of the original data. In order to protect the hidden informat... 详细信息
来源: 评论
Social sensing enhanced time estimation for bus service
Social sensing enhanced time estimation for bus service
收藏 引用
作者: Liu, Jin Li, Juan Cui, Xiaohui Niu, Xiaoguang Sun, Xiaoping Zhou, Jing State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China International School of Software Wuhan University Wuhan China Computer School Wuhan University Wuhan China Key Lab of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science Communication University of China China
The precise prediction of bus routes or the arrival time of buses for a traveler can enhance the quality of bus service. However, many social factors influence people's preferences for taking buses. These social f... 详细信息
来源: 评论
A hybrid active contour model with local Gaussian distribution fitting energy for image segmentation
收藏 引用
Journal of Information and Computational Science 2015年 第17期12卷 6515-6523页
作者: Zhang, Runru Huang, Zhangjin Gu, Naijie School of Computer Science and Technology University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Computing and Communication Software Hefei China Institute of Advanced Technology University of Science and Technology of China Hefei China
Active contour models have been widely applied in image segmentation with promising results. However, many of them fail to segment images successfully due to intensity inhomogeneity. To address this problem, we propos... 详细信息
来源: 评论
Performance research and optimization on CPython's interpreter
Performance research and optimization on CPython's interpret...
收藏 引用
Federated Conference on Computer Science and Information Systems (FedCSIS)
作者: Huaxiong Cao Naijie Gu Kaixin Ren Yi Li Anhui Province Key Laboratory of Computing and Communication Software Department of Computer Science and Technology University of Science and Technology of China Institute of Advanced Technology University of Science and Technology of China Hefei China
In this paper, the performance research on CPython's latest interpreter is presented, concluding that bytecode dispatching takes about 25 percent of total execution time on average. Based on this observation, a no... 详细信息
来源: 评论
Dynamic negotiation strategy based parallel-offer in cloud computing
收藏 引用
Journal of Computational Information Systems 2015年 第10期11卷 3691-3699页
作者: Hu, Jun Xu, Ru Xiao, Deyu College of Computer Science and Electronics Engineering Hunan University Changsha China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China
Cloud computing can dynamically provide service based on service level agreements that between cloud services and consumers. Establish a viable and efficient dynamic negotiation strategy is one of hot research in clou... 详细信息
来源: 评论
A Local Trust Model Based on Time Influence Function in P2P Networks
A Local Trust Model Based on Time Influence Function in P2P ...
收藏 引用
2015 6th IEEE International Conference on software Engineering and Service Science(ICSESS 2015)
作者: Yan-xia Cui Hong-yun Ning Yun-yun Du Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology Key Laboratory of Computer Vision and System Ministry of Education School of Computer and Communication Engineering Tianjin University of Technology
In peer-to-peer network environment, there is no centralized management authority to be relied on, so the service provider and service requester have to establish some assessment model, and evaluate the dynamic behavi... 详细信息
来源: 评论
Analysis of an M(λ1,λ2)/M/1/WV queue with controlled vacation interruption and variable arrival rate
收藏 引用
Mathematical and Computational Applications 2015年 第1期20卷 39-49页
作者: Wu, Wenqing Tang, Yinghui Visual Computing and Virtual Reality Key Laboratory of Sichuan Province Sichuan Normal University ChengduSichuan China School of Mathematics and Software Science Sichuan Normal University ChengduSichuan China
This paper studies a Markovian queue with multiple working vacations and controlled vacation interruption. If there are at least N customers waiting upon completion of a service at a lower rate, the vacation is interr... 详细信息
来源: 评论
Research and implementation of continuous wave radar ranging method based on tri-frequency
收藏 引用
High Technology Letters 2014年 第2期20卷 111-116页
作者: 袁其平 Fan Lijieare Tong Zhengrong Yang Xiufeng Cao Ye School of Electronics Information Engineering Tianjin University of Technology Key Laboratory of Film Electronics and Communication Devices and Key Laboratory of Intelligent Computing and Novel Software Technolgy School of Computer and Communication EngineeringTianjin University of Technology
In the traditional dual-frequency radar ranging system,there is a contradiction between ranging precision and ranging *** a tri-frequency ranging method is *** principle of the tri-frequency ranging is that the distan... 详细信息
来源: 评论