咨询与建议

限定检索结果

文献类型

  • 685 篇 期刊文献
  • 478 篇 会议
  • 2 册 图书

馆藏范围

  • 1,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 800 篇 工学
    • 524 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 181 篇 信息与通信工程
    • 106 篇 控制科学与工程
    • 100 篇 电气工程
    • 91 篇 生物工程
    • 90 篇 电子科学与技术(可...
    • 75 篇 光学工程
    • 64 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 46 篇 机械工程
    • 39 篇 交通运输工程
    • 35 篇 化学工程与技术
    • 28 篇 材料科学与工程(可...
    • 27 篇 仪器科学与技术
    • 23 篇 网络空间安全
    • 19 篇 土木工程
  • 547 篇 理学
    • 285 篇 数学
    • 190 篇 物理学
    • 104 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 53 篇 系统科学
    • 43 篇 化学
  • 207 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 71 篇 医学
    • 61 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 35 篇 法学
    • 34 篇 社会学
  • 16 篇 经济学
  • 14 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 20 篇 semantics
  • 17 篇 training
  • 15 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 computational mo...
  • 13 篇 algorithm design...
  • 13 篇 accuracy
  • 12 篇 throughput
  • 12 篇 sensors
  • 11 篇 wireless sensor ...
  • 10 篇 roads
  • 10 篇 electroencephalo...
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 computer archite...
  • 9 篇 wireless communi...
  • 9 篇 resource managem...
  • 9 篇 optimization
  • 9 篇 schedules
  • 9 篇 synchronization

机构

  • 73 篇 department of co...
  • 72 篇 department of co...
  • 59 篇 shanghai key lab...
  • 41 篇 yerevan physics ...
  • 39 篇 department of ph...
  • 39 篇 faculty of scien...
  • 39 篇 departamento de ...
  • 39 篇 department for p...
  • 39 篇 department of ph...
  • 39 篇 institute of phy...
  • 39 篇 tomsk state univ...
  • 39 篇 institute of phy...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 dipartimento di ...
  • 38 篇 kirchhoff-instit...
  • 38 篇 graduate school ...
  • 37 篇 department of mo...
  • 37 篇 research center ...
  • 37 篇 fakultät für phy...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 1,067 篇 英文
  • 73 篇 其他
  • 26 篇 中文
检索条件"机构=Department of Computer Science and Shanghai Key Laboratory of Scalable Computing and Systems"
1165 条 记 录,以下是1001-1010 订阅
排序:
Corrigendum: “Provably-secure electronic cash based on certicateless partially-blind signatures”
收藏 引用
Electronic Commerce Research and Applications 2013年 第1期12卷 60-60页
作者: Lei Zhang Futai Zhang Bo Qin Shubo Liu East China Normal University Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing Shanghai China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Chair in Data Privacy Tarragona Catalonia Spain Nanjing Normal University School of Computer Science and Technology China Xi’an University of Technology School of Science Department of Maths China Wuhan University School of Computer Science Wuhan China
来源: 评论
Break index labeling of mandarin text via syntactic-to-prosodic tree mapping
Break index labeling of mandarin text via syntactic-to-proso...
收藏 引用
International Symposium on Chinese Spoken Language Processing
作者: Xiaotian Zhang Yao Qian Hai Zhao Frank K. Soong Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems Shanghai Jiaotong University Shanghai China Microsoft Research Asia Beijing China
In this study, we investigate the break index labeling problem with a syntactic-to-prosodic structure conversion. The statistical relationship between the mapped syntactic tree structure and prosodic tree structure of... 详细信息
来源: 评论
SelectCast: scalable Data Aggregation Scheme in Wireless Sensor Networks
收藏 引用
IEEE Transactions on Parallel and Distributed systems 2012年 第10期23卷 1958-1969页
作者: Cheng Wang Changjun Jiang Shaojie Tang Xiang-Yang Li Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science and Engineering Tsinghua National Laboratory for Information Science and Technology (TNLIST) University of Tongji China
In this work, for a wireless sensor network (WSN) of n randomly placed sensors with node density \lambda \in [1,n], we study the tradeoffs between the aggregation throughput and gathering efficiency. The gathering eff... 详细信息
来源: 评论
Multicast Capacity Scaling Laws for Multihop Cognitive Networks
收藏 引用
IEEE Transactions on Mobile computing 2012年 第11期11卷 1627-1639页
作者: Cheng Wang Shaojie Tang Xiang-Yang Li Changjun Jiang Key Laboratory of Embedded System and Service Computing Building of Electronics and Information Engineering Ministry of Education Shanghai China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji Shanghai China
In this paper, we study multicast capacity for cognitive networks. We consider the cognitive network model consisting of two overlapping ad hoc networks, called the primary ad hoc network (PaN) and secondary ad hoc ne... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed computing systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
AgileRegulator: A hybrid voltage regulator scheme redeeming dark silicon for power efficiency in a multicore architecture
AgileRegulator: A hybrid voltage regulator scheme redeeming ...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Guihai Yan Yingmin Li Yinhe Han Xiaowei Li Minyi Guo Xiaoyao Liang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China Department of Computer Science and Engineering Shanghai Jiaotong University China
The widening gap between the fast-increasing transistor budget but slow-growing power delivery and system cooling capability calls for novel architectural solutions to boost energy efficiency. Leveraging the fact of s... 详细信息
来源: 评论
Asymptotic throughput for large-scale wireless networks with general node density
收藏 引用
Wireless Networks 2012年 第5期19卷 559-575页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China The Tsinghua National Laboratory for Information Science and Technology (TNLIST) Department of Computer Science and Engineering Tongji University Shanghai China The Department of Computer Science Illinois Institute of Technology Chicago USA The TNLIST and School of Software Tsinghua University Beijing China CSE The Hong Kong University of Science and Technology Kowloon Hong Kong
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
来源: 评论
A PSO-inspired multi-robot search algorithm independent of global information
A PSO-inspired multi-robot search algorithm independent of g...
收藏 引用
IEEE Symposium on Swarm Intelligence
作者: Zhu, Qian Liang, Alei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Department of Computer Science Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
This paper presents an algorithm that coordinates mobile robots to find the desired targets without depending on precise global information. We compare the abstract solution space in PSO and physical environment that ... 详细信息
来源: 评论
Identity-Based key-Insulated Proxy Signature Without Random Oracles
收藏 引用
Journal of shanghai Jiaotong university(science) 2011年 第5期16卷 557-566页
作者: 陈剑洪 龙宇 陈克非 王永涛 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ... 详细信息
来源: 评论
An improved content-based data dissemination in human contact-based network
An improved content-based data dissemination in human contac...
收藏 引用
2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011
作者: Jiang, Chao Peng, Tao Liang, Alei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Department of Computer Science Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
Limited wireless communication devices carried by individuals make up human contact-based network. Such network often suffers from intermittent connectivity. This fact decreases successful ratio of information spreadi... 详细信息
来源: 评论