咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 195 篇 期刊文献

馆藏范围

  • 478 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 252 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 86 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 32 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 15 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 13 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 180 篇 理学
    • 116 篇 数学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 18 篇 化学
  • 88 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 8 篇 state key labora...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 453 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
478 条 记 录,以下是431-440 订阅
排序:
Airborne moving vehicle detection for urban traffic surveillance
Airborne moving vehicle detection for urban traffic surveill...
收藏 引用
11th International IEEE Conference on Intelligent Transportation Systems, ITSC 2008
作者: Lin, Renjun Cao, Xianbin Xu, Yanwu Wei, Chuangxian Qiao, Hong University of Science and Technology China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China Institute of Automation Chinese Academy of Sciences Beijing 100080 China University of Manchester United Kingdom
At present, moving vehicle detection on airborne platform has been an important technology for urban traffic surveillance. In such a situation, most commonly used methods (e.g. image subtraction) could hardly work wel... 详细信息
来源: 评论
Scheduling aircraft landing based on clonal selection algorithm and receding horizon control
Scheduling aircraft landing based on clonal selection algori...
收藏 引用
11th International IEEE Conference on Intelligent Transportation Systems, ITSC 2008
作者: Jia, Xiaolan Cao, Xianbin Guo, Yuanping Qiao, Hong Zhang, Jun University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China Institute of Automation Chinese Academy of Sciences Beijing 100080 China School of Electronic and Information Engineering Beihang University Beijing 100083 China
The task of Aircraft Landing Scheduling (ALS) is to give a landing sequence and landing times for a given set of aircrafts where many constraints must be satisfied. ALS is an NP-hard problem with large-scale and multi... 详细信息
来源: 评论
An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor Networks
An Energy-Aware Coverage Based Node Scheduling Scheme for Wi...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Jinxia Liu Naijie Gu Songsong He Dept. of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei Anhui 230027 China
A fundamental issue in wireless sensor network is to extend network lifetime while maintaining network coverage and connectivity. Protection for sensors themselves is another important concern. An Energyaware Coverage... 详细信息
来源: 评论
Infrared Facial Expression Recognition Using Wavelet Transform
Infrared Facial Expression Recognition Using Wavelet Transfo...
收藏 引用
International Symposium on Computer Science and Computational Technology, ISCSCT
作者: Shangfei Wang Siliang Lv Xufa Wang Department of Computer Science and Technology Key Laboratory of Software Computing and Communication Anhui University of Science and Technology Hefei Anhui China
Since infrared images reflect the temperature-field distributing of vein¿s embranchment of the face, expression recognition from them should focus on changes of thermal distribution on facial muscles and blood ve... 详细信息
来源: 评论
Airborne moving vehicle detection for urban traffic surveillance
Airborne moving vehicle detection for urban traffic surveill...
收藏 引用
International Conference on Intelligent Transportation
作者: Renjun Lin Xianbin Cao Yanwu Xu Chuangxian Wei Hong Qiao Anhui Province Key Laboratory of Software Computing and Communication University of Science and Technology Hefei China University of Manchester Institute of Science and Technology UK Institute of Automation Chinese Academy and Sciences Beijing China
At present, moving vehicle detection on airborne platform has been an important technology for urban traffic surveillance. In such a situation, most commonly used methods (e.g. image subtraction) could hardly work wel... 详细信息
来源: 评论
Representative Template Set Generation Method for Pedestrian Detection
Representative Template Set Generation Method for Pedestrian...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Pei Wu Xian-Bin Cao Yan-Wu Xu Hong Qiao Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Institute of Automation Chinese Academy and Sciences Beijing China
Template matching is an effective approach for pedestrian detection. In order to achieve real-time and accurate detection, how to obtain a suitable representative template set is still an open problem due to the large... 详细信息
来源: 评论
A low-cost pedestrian-detection system with a single optical camera
A low-cost pedestrian-detection system with a single optical...
收藏 引用
作者: Cao, Xian-Bin Qiao, Hong Keane, John IEEE Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China Laboratory of Complex Systems and Intelligent Science Institute of Automation Chinese Academy of Sciences Beijing 100080 China School of Informatics University of Manchester M60 1QD Manchester United Kingdom University of Manchester M13 9PL Manchester United Kingdom
The ultimate purpose of a pedestrian-detection system (PDS) is to reduce pedestrian-vehicle-related injury. Most such systems tend to adopt expensive sensors, such as infrared devices, in expectation of better perform... 详细信息
来源: 评论
Network Security Evaluation Algorithm Based on Access Level Vectors
Network Security Evaluation Algorithm Based on Access Level ...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Kai Li Naijie Gu Kun Bi Hongzhu Ji Department of Computer Science and Technology University of Science and Technology of China Hefei China 230027 Anhui Province Key Lab. of Computing and Communication Software Hefei China 230027
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres... 详细信息
来源: 评论
Scheduling Model for Cognitive Radio
Scheduling Model for Cognitive Radio
收藏 引用
3rd International Conference on Cognitive Radio Oriented Wireless Networks and communications (CrownCom 2008)
作者: Ping Zhu Jinglong Li Xufa Wang Department of Computer Science and Technology Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
The priority queue model divides CR (cognitive radio) system users into primary user and secondary user. The primary user has preemptive priority over secondary user, while the same priority level users are FIFO serve... 详细信息
来源: 评论
Scheduling Aircraft Landing Based on Clonal Selection Algorithm and Receding Horizon Control
Scheduling Aircraft Landing Based on Clonal Selection Algori...
收藏 引用
International Conference on Intelligent Transportation
作者: Xiaolan Jia Xianbin Cao Yuanping Guo Hong Qiao Jun Zhang Province Key Laboratory of Software Computing and Communication University of Science and Technology Hefei Anhui China University of Manchester Institute of Science and Technology UK Institute of Automation Chinese Academy and Sciences Beijing China School of Electronic and Information Engineering Beihang University Beijing China
The task of aircraft landing scheduling (ALS) is to give a landing sequence and landing times for a given set of aircrafts where many constraints must be satisfied. ALS is an NP-hard problem with large-scale and multi... 详细信息
来源: 评论