咨询与建议

限定检索结果

文献类型

  • 302 篇 会议
  • 148 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 297 篇 工学
    • 190 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 63 篇 信息与通信工程
    • 57 篇 控制科学与工程
    • 40 篇 电气工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 28 篇 生物工程
    • 16 篇 化学工程与技术
    • 16 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
  • 166 篇 理学
    • 110 篇 数学
    • 33 篇 生物学
    • 30 篇 系统科学
    • 18 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 13 篇 化学
    • 5 篇 大气科学
  • 78 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 20 篇 法学
    • 19 篇 社会学
  • 8 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 3 篇 经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 petri nets
  • 11 篇 educational inst...
  • 11 篇 feature extracti...
  • 10 篇 cameras
  • 10 篇 embedded system
  • 10 篇 accuracy
  • 9 篇 computer archite...
  • 9 篇 databases
  • 8 篇 computer science
  • 8 篇 throughput
  • 8 篇 optimization
  • 8 篇 synchronization
  • 8 篇 training
  • 7 篇 lattices
  • 7 篇 real time system...
  • 7 篇 laboratories
  • 7 篇 costs
  • 7 篇 field programmab...
  • 7 篇 rough set theory
  • 6 篇 conferences

机构

  • 73 篇 department of co...
  • 68 篇 key laboratory o...
  • 44 篇 key laboratory o...
  • 33 篇 the key laborato...
  • 32 篇 shenzhen city ke...
  • 19 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 college of compu...
  • 11 篇 department of co...
  • 10 篇 key laboratory o...
  • 9 篇 department of co...
  • 9 篇 ieee
  • 8 篇 shanghai artific...
  • 8 篇 college of compu...
  • 8 篇 moe key laborato...
  • 7 篇 department of co...
  • 7 篇 department of el...
  • 7 篇 school of comput...
  • 6 篇 the key laborato...
  • 5 篇 tongji universit...

作者

  • 30 篇 zhou mengchu
  • 24 篇 changjun jiang
  • 22 篇 jiang changjun
  • 21 篇 ji zhen
  • 18 篇 mengchu zhou
  • 17 篇 zhen ji
  • 15 篇 cheng wang
  • 14 篇 wang hanli
  • 13 篇 liu xiwei
  • 13 篇 wang cheng
  • 12 篇 xiang-yang li
  • 12 篇 miao duoqian
  • 12 篇 li yan
  • 12 篇 yu hang
  • 11 篇 xiwei liu
  • 10 篇 jiang lai
  • 10 篇 ding zhijun
  • 9 篇 liu guanjun
  • 9 篇 zhao junqiao
  • 8 篇 yan chungang

语言

  • 420 篇 英文
  • 22 篇 中文
  • 13 篇 其他
检索条件"机构=Computer and Embedded System Laboratory"
453 条 记 录,以下是41-50 订阅
排序:
Camera interface method in mobile handset and its performance comparison
Camera interface method in mobile handset and its performanc...
收藏 引用
2007 International Conference on Parallel Processing Workshops, ICPPW 2007
作者: Eom, Minyoung Oh, Jaegeun Seon, Wook Kim Compiler and Embedded System Laboratory Department of Electronics and Computer Engineering Korea University Seoul Korea Republic of
As 3G became the general tendency of mobile industry, new mobile handsets are challenged to show more and more functions. In order to process high-resolution images, the high-speed data transfer technology that was or... 详细信息
来源: 评论
Will the fibers of the future be considered fibers?
收藏 引用
National Science Review 2024年 第10期11卷 15-17页
作者: Dewen Xu Ya Liu Hailiang Wang Wei Yan Changjun Jiang Meifang Zhu State Key Laboratory for Modification of Chemical Fibers and Polymer Materials College of Materials Science and Engineering Donghua University Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Department of Computer Science and Technology Tongji University
Fiber materials are key materials that have changed human history and promoted the progress of human civilization. In ancient times, humans used feathers and animal skins for clothing, and later they widely employed n... 详细信息
来源: 评论
Constructing prioritized interaction test suite with interaction relationship
Constructing prioritized interaction test suite with interac...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Yuan, Jianjun Jiang, Zuowen Key Laboratory of Embedded System and Service Computing Ministry of Education of China Tongji University Shanghai China Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Interaction testing has addressed some issues on how to select a small subset of test cases. In many systems where interaction testing is needed, the entire test suite is not executed because of time or budget constra... 详细信息
来源: 评论
Application of a self-organizing fuzzy neural network controller with group-based genetic algorithm to greenhouse
Application of a self-organizing fuzzy neural network contro...
收藏 引用
2011 7th International Conference on Natural Computation, ICNC 2011
作者: Yao, Yuan Zhang, Kailong Zhou, Xingshe Shaanxi Provincial Key Embedded System Technology Laboratory School of Computer Northwestern Polytechnical University Xian China
As a complex nonlinear system, greenhouse can not be controlled perfectly by traditional control strategies. This paper proposes a self-organizing fuzzy neural network controller (SOFNNC) with group-based genetic algo... 详细信息
来源: 评论
Intrusion Detection system for IoMT through Blockchain-based Federated Learning  15
Intrusion Detection System for IoMT through Blockchain-based...
收藏 引用
15th IEEE International Conference on Security of Information and Networks, SIN 2022
作者: Zaabar, Bessem Cheikhrouhou, Omar Abid, Mohamed University of Sfax Computer Embedded System Laboratory CES-ENIS Tunisia Higher Institute of Computer Science of Mahdia University of Monastir Tunisia
Federated Learning (FL) is a feasible technology to collaboratively train a model without sharing private data. This approach differs from traditional machine learning techniques, which aggregate local datasets in a s... 详细信息
来源: 评论
Observable liveness of Petri nets with controllable and observable transitions
收藏 引用
Science China(Information Sciences) 2017年 第11期60卷 256-264页
作者: Guanjun LIU Changjun JIANG Department of Computer Science Tongji University Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University E-commerce Transactions and Information Services Collaborative Innovation Center of Shanghai University Knowledge Service Platform Tongji University
Observability and/or controllability are paid much attention to by researchers not only from the control science field[1–3]but also from the computer science field[4–9].Recently,Desel and Kilinc[4]proposed the notio... 详细信息
来源: 评论
A credible individual behavior profiling method for online payment fraud detection  21
A credible individual behavior profiling method for online p...
收藏 引用
4th International Conference on Data Storage and Data Engineering, DSDE 2021
作者: Cui, Jipeng Yan, Chungang Wang, Cheng Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science and Engineering Tongji University China
Online payment fraud detection relies on a credible characterization of individual behaviors. Existing individual behavior profiling methods have three problems in credibility. Firstly, they solely regard users as ind... 详细信息
来源: 评论
Improved Density Peaking Algorithm for Community Detection Based on Graph Representation Learning
收藏 引用
computer systems Science & Engineering 2022年 第12期43卷 997-1008页
作者: Jiaming Wang Xiaolan Xie Xiaochun Cheng Yuhan Wang Guangxi Key Laboratory of Embedded Technology and Intelligent System Guilin541006GuangxiChina School of Information Science and Engineering Guilin University of TechnologyGuilin541006GuangxiChina Department of Computer Science Middlesex UniversityLondon
There is a large amount of information in the network data that we canexploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of netw... 详细信息
来源: 评论
Robust Learning to Rank Based on Portfolio Theory and AMOSA Algorithm
收藏 引用
IEEE Transactions on systems, Man, and Cybernetics: systems 2017年 第6期47卷 1007-1018页
作者: Li, Jinzhong Liu, Guanjun Yan, Chungang Jiang, Changjun Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Watershed Ecology and Geographical Environment Monitoring NASG Department of Computer Science and Technology Jinggangshan University Ji'an343009 China
Effectiveness is the most important factor considered in the ranking models yielded by algorithms of learning to rank (LTR). Most of the related ranking models only focus on improving the average effectiveness but ign... 详细信息
来源: 评论
On complementary effect of blended behavioral analysis for identity theft detection in mobile social networks  1
收藏 引用
13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017
作者: Wang, Cheng Luo, Jing Yang, Bo Jiang, Changjun Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science and Technology Tongji University Shanghai China
User behavioral analysis is expected to act as a promising technique for identity theft detection in the Internet. The performance of this paradigm extremely depends on a good individual-level user behavioral model. S... 详细信息
来源: 评论