咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是311-320 订阅
排序:
A key frame extraction algorithm oriented for video copy detection based on PCC and the histogram of video frames
收藏 引用
Journal of Computational Information Systems 2014年 第16期10卷 6999-7006页
作者: Peng, Fei Qian, Qin Long, Min College of Computer Science and Electronics Engineering Hunan University Changsha China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha China
Aim to improve the accuracy and the robustness of the video copy detection, a novel key frame extraction algorithm is proposed. The shot segmentation is accomplished by evaluating the Pearsons correlation coefficients... 详细信息
来源: 评论
Understanding the Robustness of 3D Object Detection with Bird'View Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bir...
收藏 引用
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023
作者: Zhu, Zijian Zhang, Yichi Chen, Hai Dong, Yinpeng Zhao, Shu Ding, Wenbo Zhong, Jiachen Zheng, Shibao Institute of Image Communication and Network Engineering Shanghai Jiao Tong University China Institute for Ai Tsinghua University BNRist Center Thbi Lab Dept. of Comp. Sci. and Tech. China School of Computer Science and Technology Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Information Materials and Intelligent Sensing Laboratory of Anhui Province China Saic Motor Ai Lab Zhongguancun Laboratory China
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird's-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with ... 详细信息
来源: 评论
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention
收藏 引用
Journal of Visual communication and Image Representation 2024年 98卷
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei Ye, Long School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
As a powerful forgery operation in the image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, especially in boundar... 详细信息
来源: 评论
A Deployable Architecture Against Application-level DDoS Attacks
A Deployable Architecture Against Application-level DDoS Att...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Xiaolin Chen Feng Wang Hui Deng Mu Mu Sanglu Lu Computer Science Department Chuxiong Normal University China State Key Laboratory of Novel Softwar Computer Appliance Key Lab of Yunnan Province China Computing Department Lancaster University United Kingdom State Key Laboratory of Novel Software Technology Nanjing University China
In application-level DDoS attacks, attackers mimic legitimate client behavior by sending proper-looking requests via bots. The previous DDoS solutions focus on bandwidth flooding attacks, and have encountered signific... 详细信息
来源: 评论
An Identification Method of Image-based for Output Pattern of Metamorphic Relation in Burnup Calculation Program  3
An Identification Method of Image-based for Output Pattern o...
收藏 引用
3rd International Academic Exchange Conference on Science and Technology Innovation, IAECST 2021
作者: Fu, Shengfu Yang, Xiaohua Li, Meng Wang, Fan Eng. and Technol. Res. Ctr. of Software Eval. and Test. for Intellectual Equipment of Hunan Province Hunan Prov. Hengyang421001 China CNNC Key Laboratory on High Trusted Computing Hunan Prov. Hengyang421001 China School of Computer Science and Technology University of South China Hunan Hengyang421001 China
It is challenging to verify the design and analysis software adequately for nuclear power areas because of the inflated cost, time-consuming benchmark problems development, and few verification examples. This situatio... 详细信息
来源: 评论
Isolating Compiler Bugs by Generating Effective Witness Programs with Large Language Models
arXiv
收藏 引用
arXiv 2023年
作者: Tu, Haoxin Zhou, Zhide Jiang, He Yusuf, Imam Nur Bani Li, Yuxian Jiang, Lingxiao School of Software Dalian University of Technology Dalian China School of Computing and Information Systems Singapore Management University Singapore Singapore Key Laboratory for Ubiquitous Network Service Software of Liaoning Province China DUT Artificial Intelligence Dalian China
Compiler bugs pose a significant threat to safety-critical applications, and promptly as well as effectively isolating these bugs is crucial for assuring the quality of compilers. However, the limited availability of ... 详细信息
来源: 评论
A straightforward method to judge the completeness of a polymorphic gate set
arXiv
收藏 引用
arXiv 2017年
作者: Li, Zhifang Luo, Wenjian Yue, Lihua Wang, Xufa School of Computer Science and Technology University of Science and Technology of China Hefei230027 China Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei230027 China
Polymorphic circuits are a special kind of circuits which possess some different build-in functions and these functions are activated by environment parameters, like light and VDD. Some theories have been proposed to ... 详细信息
来源: 评论
Localized Adaptive Channel and Power Selection With TinyML (LACPSA) in Dense IEEE 802.11 WLANs
Localized Adaptive Channel and Power Selection With TinyML (...
收藏 引用
IEEE International Conference on Smart Internet of Things (SmartIoT)
作者: Khalid Ibrahim Qureshi Cheng Lu Ruoheng Luo Muhammad Ali Lodhi Lei Wang Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University China
In dense IEEE 802.11 WLANs, optimized channel allocation and transmission power control are crucial for miti- gating interference and congestion. Traditional approaches face significant challenges due to limited chann... 详细信息
来源: 评论
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
A hybrid approach for scalable sub-tree anonymization over b...
收藏 引用
作者: Zhang, Xuyun Liu, Chang Nepal, Surya Yang, Chi Dou, Wanchun Chen, Jinjun Faculty of Engineering and Information Technology University of Technology Sydney PO Box 123 Broadway NSW 2007 Australia Centre for Information and Communication Technologies Commonwealth Scientific and Industrial Research Organisation Cnr Vimiera and Pembroke Roads Marsfield NSW 2122 Australia State Key Laboratory for Novel Software Technology Nanjing University 22 Hankou Road Nanjing Jiangsu Province 210093 China
In big data applications, data privacy is one of the most concerned issues because processing large-scale privacy-sensitive data sets often requires computation resources provisioned by public cloud services. Sub-tree... 详细信息
来源: 评论
Learning aggregated transmission propagation networks for haze removal and beyond
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Risheng Fan, Xin Hou, Minjun Jiang, Zhiying Luo, Zhongxuan Zhang, Lei DUT-RU International School of Information Science and Engineering Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian Department of Computing Hong Kong Polytechnic University
Single image dehazing is an important low-level vision task with many applications. Early researches have inves-tigated different kinds of visual priors to address this problem. However, they may fail when their assum... 详细信息
来源: 评论