咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 195 篇 期刊文献

馆藏范围

  • 478 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 252 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 86 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 32 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 15 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 13 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 180 篇 理学
    • 116 篇 数学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 18 篇 化学
  • 88 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 state key labora...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 453 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
478 条 记 录,以下是411-420 订阅
排序:
A new clustering strategy in ambulatory electrocardiogram waveform
A new clustering strategy in ambulatory electrocardiogram wa...
收藏 引用
2009 International Conference on Information Engineering and Computer Science, ICIECS 2009
作者: Yu, Tian Zheng, Gang School of Computer and Communication Engineering Tianjin University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 Tianjin China
Ambulatory electrocardiogram is used to record about 24 hours electrocardiogram waveform. The purpose is to find out the conspicuous variation in the recording data. A new strategy used to cluster the electrocardiogra... 详细信息
来源: 评论
A preliminary study on why using the nonself detector set for anomaly detection in artificial immune Systems
A preliminary study on why using the nonself detector set fo...
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Xu, Baoliang Luo, Wenjian Wang, Xufa Nature Inspired Computation and Applications Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al... 详细信息
来源: 评论
An immune based algorithm for Chinese network short text clustering
收藏 引用
Zidonghua Xuebao/ Acta Automatica Sinica 2009年 第7期35卷 896-902页
作者: He, Tao Cao, Xian-Bin Tan, Hui School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Laboratory of Software in Computing and Communication Anhui Province Hefei 230027 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Network short text clustering is a major technology in network content security. Since Chinese network short text is less of keywords and full of anomalous writings, the traditional text clustering method is not direc... 详细信息
来源: 评论
A real-time schedule method for aircraft landing scheduling problem based on cellular automaton  09
A real-time schedule method for aircraft landing scheduling ...
收藏 引用
2009 World Summit on Genetic and Evolutionary Computation, 2009 GEC Summit - 1st ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC'09
作者: Shenpeng, Yu Xianbin, Cao Maobin, Hu Wenbo, Du Jun, Zhang Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 86-551-3601545 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China School of Engineering Science University of Science and Technology of China Hefei 230026 86-551-3600127 China School of Electronic and Information Engineering Beihang University Beijing 100083 China
The Aircraft Landing Scheduling (ALS) problem is a typical hard multi-constraint optimization problem. In real applications, it is not most important to find the best solution but to provide a feasible landing schedul... 详细信息
来源: 评论
Constructing the Voronoi Diagram of Planar Point Set in Parallel
Constructing the Voronoi Diagram of Planar Point Set in Para...
收藏 引用
International Conference on Computational Intelligence and software Engineering (CiSE)
作者: Lanfang Dong Yuan Wu Shanhai Zhou Anhui Province Key Laboratory of Software In Computing and Communication College of computer science and technology University of Science and Technology Hefei China College of computer science & technology University of Science and Technology Hefei China
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ... 详细信息
来源: 评论
Dynamic assembly classification algorithm for short text
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2009年 第5期37卷 1019-1024页
作者: Yan, Rui Cao, Xian-Bin Li, Kai Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Laboratory of Software in Computing and Communication Hefei 230027 China Institute of Technical Security PLA Beijing 100091 China
Short text classification is a key technology in network content security application. However, the sparse features and unbalanced data of the short text make the traditional text classification method incompetent for... 详细信息
来源: 评论
Removal of Baseline Wander from Dynamic Electrocardiogram Signals
Removal of Baseline Wander from Dynamic Electrocardiogram Si...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Min Dai Shi-Liu Lian Tianjin Key Laboratory of Intelligent Computing & Novel Software Technology School of Computer and Communication Engineering Key Laboratory of Computer Vision and System Ministry of Education School of Computer and Communication Engineering Tianjin University of Technology Tianjin China
The traditional method based on moving average filter can remove the baseline wander in electrocardiogram signals, but also causes the loss of motive ECG signals, which makes distortions of filtered ECG signals. In th... 详细信息
来源: 评论
Link-weighted and distance-constrained channel assignment in single-radio wireless mesh networks
Link-weighted and distance-constrained channel assignment in...
收藏 引用
Conference on Local Computer Networks (LCN)
作者: Junfeng Jin Baohua Zhao Hao Zhou School of Computer Science University of Science and Technology Hefei Anhui China Province Key Laboratory of Software in Computing and Communication Hefei Anhui China School of Computer Science University of Science and Technology of China Hefei Anhui
In this work, we study a link-weighted and distance-constrained channel assignment problem in multi-channel mesh networks with stationary router nodes, such as community wireless networks. A good channel assignment is... 详细信息
来源: 评论
Theoretical and empirical analyses of Evolutionary Negative Selection Algorithms for a combinational optimization problem
Theoretical and empirical analyses of Evolutionary Negative ...
收藏 引用
International Conference on Bio-Inspired computing: Theories and Applications, BICTA
作者: Xingxin Pei Wenjian Luo Nature Inspired Computation and Application Laboratory School of Computer Science and Technology Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Evolutionary Negative Selection Algorithms (ENSAs) could be regarded as hybrid algorithms of Evolutionary Algorithms (EAs) and Negative Selection Algorithms (NSAs). The average time complexity of ENSAs on combinationa... 详细信息
来源: 评论
A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems
A Preliminary Study on Why Using the Nonself Detector Set fo...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Baoliang Xu Wenjian Luo Xufa Wang Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China University of Science and Technology of China Hefei Anhui CN
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al... 详细信息
来源: 评论