咨询与建议

限定检索结果

文献类型

  • 37 篇 会议
  • 11 篇 期刊文献

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 18 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 5 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 电气工程
    • 2 篇 化学工程与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
  • 18 篇 理学
    • 11 篇 数学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 生物学
    • 2 篇 化学
  • 8 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 3 篇 educational inst...
  • 2 篇 computer science
  • 2 篇 memetic algorith...
  • 2 篇 deep learning
  • 2 篇 genetic mutation...
  • 2 篇 neural networks
  • 2 篇 evolutionary mul...
  • 2 篇 algorithm design...
  • 2 篇 local search
  • 2 篇 moea/d
  • 2 篇 remote laborator...
  • 2 篇 uncertainty
  • 2 篇 hardware
  • 1 篇 online resources
  • 1 篇 wavelet transfor...
  • 1 篇 digital images
  • 1 篇 rational point
  • 1 篇 differential sys...
  • 1 篇 conferences
  • 1 篇 vehicle dynamics

机构

  • 3 篇 school of mathma...
  • 3 篇 school of inform...
  • 3 篇 yunnan collegiat...
  • 3 篇 school of mathma...
  • 3 篇 school of comput...
  • 2 篇 school of engine...
  • 2 篇 fundamental teac...
  • 2 篇 school of inform...
  • 2 篇 provincial big d...
  • 2 篇 fujian provincia...
  • 1 篇 cifar on
  • 1 篇 mark and mary st...
  • 1 篇 institute for in...
  • 1 篇 school of mathma...
  • 1 篇 waisman center d...
  • 1 篇 nipissing univer...
  • 1 篇 nonlinear analys...
  • 1 篇 school of comput...
  • 1 篇 school of mathem...
  • 1 篇 school of manage...

作者

  • 2 篇 yang bin
  • 2 篇 marco h. terra
  • 2 篇 wang wu
  • 2 篇 zheng rong yang
  • 2 篇 yang yihuai
  • 2 篇 zhao wu
  • 2 篇 xiaodong wu
  • 2 篇 wu xiaodong
  • 2 篇 lei yuan
  • 2 篇 carlos m. masser...
  • 2 篇 shen shikai
  • 2 篇 denis f. wolf
  • 2 篇 chen yinsong
  • 2 篇 gao yangshui
  • 2 篇 lim chee peng
  • 2 篇 song wen
  • 2 篇 li zhong
  • 2 篇 she yumei
  • 2 篇 yu samson s.
  • 1 篇 yu zhihang

语言

  • 48 篇 英文
检索条件"机构=School of Mathmatics and Computer Science"
48 条 记 录,以下是11-20 订阅
排序:
A Biba Access Control Model based Trsuted Computing
A Biba Access Control Model based Trsuted Computing
收藏 引用
2011 4th IEEE International Conference on computer science and Information Technology(ICCSIT 2011)
作者: Song Wen Zhao Wu Lei Yuan Bo Hang School of Mathmatics and Computer Science Xiangfan University
The integrity of information security and Biba model were studied. The low-water mark policy of Biba model and an implementation LOMAC are analyzed. Based trusted computing idea and integrity measurement of trusted co... 详细信息
来源: 评论
System modification case studies
System modification case studies
收藏 引用
31st Annual International computer Software and Applications Conference, COMPSAC 2007
作者: Ding, Yulin Zhang, Yan School of Computer Science University of Adelaide Adelaide SA 5005 Australia School of Computing and Mathmatics University of Western Sydney Penrith South DC NSW 1797 Australia
Computation Tree Logic (CTL) model update is an approach for software verification and modification, where the minimal change principle is employed to generate admissible models that represent the corrected software d... 详细信息
来源: 评论
Extraction of the rice leaf disease image based on BP neural network
Extraction of the rice leaf disease image based on BP neural...
收藏 引用
2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009
作者: Liu, Libo Zhou, Guomin Institute of Agricultural Information Chinese Academy of Agriculture Sciences Beijing China School of Mathmatics and Computer Science Ningxia University Yinchuan Ningxia China
Rice leaf diseases have occurred all over the world,including *** have had a significant impact on rice quality and ***,the control method rely mainly on artificial *** this study,BP neural network classifiers were de... 详细信息
来源: 评论
A decomposition based memetic multi-objective algorithm for continuous multi-objective optimization problem  27
A decomposition based memetic multi-objective algorithm for ...
收藏 引用
27th Chinese Control and Decision Conference, CCDC 2015
作者: Wang, Na Wang, Hongfeng Fu, Yaping Wang, Dingwei Fundamental Teaching Department of Computer and Mathmatics Shenyang Normal University Shenyang China School of Information Science and Engineering Northeastern University Shenyang China
Multi-objective evolution algorithm based on decomposition (MOEA/D) had been successfully applied into many multi-objective optimization problems, which had gained a lot of attention from the community of evolutionary... 详细信息
来源: 评论
Error analysis on floating-point arithmetic in C programming language library functions
Error analysis on floating-point arithmetic in C programming...
收藏 引用
4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013
作者: Tang, Min Zeng, Xia Song, Kai Liu, Jian Software Engineering Institute East China Normal University Shanghai China School of Mathmatics and Computer Science Guilin University of Electronic Technology Guilin China
Verification and interval arithmetic are the fundamental methods that we deal with in error analysis. Verification strategy is used in most error analysis on solution sets of linear and nonlinear systems. On the other... 详细信息
来源: 评论
Digital Image Processing Using Noise Removal Technique: A Non-Linear Approach
Digital Image Processing Using Noise Removal Technique: A No...
收藏 引用
computer science and Data Engineering (CSDE), IEEE Asia-Pacific Conference on
作者: Rishal Ravikesh Chand Mohammed Farik Neeraj Anand Sharma Department of Computer Science and Mathmatics School of Science and Technology The University of Fiji
An undesirable by-product of a captured image is Image Noise - random distribution of brightness and color misinformation. Denoising is one of the common components which is present in digital image processing techniq... 详细信息
来源: 评论
Improved Prediction of HIV-1 Protease Genotypic Resistance Testing Assays using a Consensus Technique
Improved Prediction of HIV-1 Protease Genotypic Resistance T...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: A.C. Thomas Zheng Rong Yang School of Engineering Computer Science and Mathmatics University of Exeter Exeter UK
Mutations in HIV-1 drug targets can cause reduced affinity to antiretroviral inhibitors, leading to the emergence of resistant variants resulting in failure of treatment in infected individuals. Resistance testing is ... 详细信息
来源: 评论
Joint Covert and Secure Communications for Intelligent Reflecting Surface (IRS)-Aided Wireless Networks
Joint Covert and Secure Communications for Intelligent Refle...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Yang, Yihuai Shen, Shikai She, Yumei Wang, Wu Yang, Bin Gao, Yangshui School of Information and Technology Kunming University Kunming650214 China Yunnan Collegiate Key Laboratory for Data Governance and Intelligent Decision Kunming650214 China School of Mathmatics and Computer Science Yunnan Minzu University Kunming650500 China School of Computer and Information Engineering Chuzhou University Chuzhou239000 China
This work investigates joint covert and secure communications via intelligent reflecting surface (IRS) in a non-line-of-sight (NLOS) wireless network in the presence of an eavesdropper and a warden. We consider a coor... 详细信息
来源: 评论
Group Role Assignment with a Training Plan  18
Group Role Assignment with a Training Plan
收藏 引用
18th IEEE International Conference on Networking, Sensing and Control, ICNSC 2021
作者: Zhang, Libo Yu, Zhihang Zhu, Haibin Sheng, Yin Southwest University School of Artificial Intelligence Chongqing China Nipissing University Department of Computer Science and Mathmatics North BayON Canada State Key Laboratory of Air Traffic Management System and Technology Nanjing China
Training is a cost-effective way to enhance individual ability, which is also of great significance for group development. According to Role-Based Collaboration (RBC), the performance of an agent on a specific role is... 详细信息
来源: 评论
Symbolic model checking the knowledge in Herbivore protocol
Symbolic model checking the knowledge in Herbivore protocol
收藏 引用
Lecture Notes in computer science
作者: Luo, Xiangyu Su, Kaile Gu, Ming Wu, Lijun Yang, Jinji College of Computer Science and Technology Huaqiao University Xiamen China School of Software Tsinghua University Beijing China College of Mathmatics Physics and Information Engineering Zhejiang Normal University Jinhua China Institute for Integrated and Intelligent Systems Griffith University Brisbane QLD Australia School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer South China Normal University Guangzhou China
The importance of anonymity has increased over the past few years in many applications. Herbivore is a distributed anonymous communication system, providing private file sharing and messaging over the Internet. In thi... 详细信息
来源: 评论