咨询与建议

限定检索结果

文献类型

  • 685 篇 期刊文献
  • 478 篇 会议
  • 2 册 图书

馆藏范围

  • 1,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 800 篇 工学
    • 524 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 181 篇 信息与通信工程
    • 106 篇 控制科学与工程
    • 100 篇 电气工程
    • 91 篇 生物工程
    • 90 篇 电子科学与技术(可...
    • 75 篇 光学工程
    • 64 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 46 篇 机械工程
    • 39 篇 交通运输工程
    • 35 篇 化学工程与技术
    • 28 篇 材料科学与工程(可...
    • 27 篇 仪器科学与技术
    • 23 篇 网络空间安全
    • 19 篇 土木工程
  • 547 篇 理学
    • 285 篇 数学
    • 190 篇 物理学
    • 104 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 53 篇 系统科学
    • 43 篇 化学
  • 207 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 71 篇 医学
    • 61 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 35 篇 法学
    • 34 篇 社会学
  • 16 篇 经济学
  • 14 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 20 篇 semantics
  • 17 篇 training
  • 15 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 computational mo...
  • 13 篇 algorithm design...
  • 13 篇 accuracy
  • 12 篇 throughput
  • 12 篇 sensors
  • 11 篇 wireless sensor ...
  • 10 篇 roads
  • 10 篇 electroencephalo...
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 computer archite...
  • 9 篇 wireless communi...
  • 9 篇 resource managem...
  • 9 篇 optimization
  • 9 篇 schedules
  • 9 篇 synchronization

机构

  • 73 篇 department of co...
  • 72 篇 department of co...
  • 59 篇 shanghai key lab...
  • 41 篇 yerevan physics ...
  • 39 篇 department of ph...
  • 39 篇 faculty of scien...
  • 39 篇 departamento de ...
  • 39 篇 department for p...
  • 39 篇 department of ph...
  • 39 篇 institute of phy...
  • 39 篇 tomsk state univ...
  • 39 篇 institute of phy...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 dipartimento di ...
  • 38 篇 kirchhoff-instit...
  • 38 篇 graduate school ...
  • 37 篇 department of mo...
  • 37 篇 research center ...
  • 37 篇 fakultät für phy...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 1,067 篇 英文
  • 73 篇 其他
  • 26 篇 中文
检索条件"机构=Department of Computer Science and Shanghai Key Laboratory of Scalable Computing and Systems"
1165 条 记 录,以下是131-140 订阅
排序:
Prompt Learning on Temporal Interaction Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xi Zhang, Siwei Xiong, Yun Wu, Xixi Zhang, Jiawei Sun, Xiangguo Zhang, Yao Zhao, Feng Kang, Yulin Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Shanghai China IFM Lab Department of Computer Science University of California DavisCA United States Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong Ant Group Shanghai Hangzhou China
Temporal Interaction Graphs (TIGs) are widely utilized to represent real-world systems, such as e-commerce and social networks. To facilitate representation learning on TIGs, researchers have proposed a series of TIG ... 详细信息
来源: 评论
Stealthy Attacks on Sampled-Data Control and Encryption-Based Countermeasures
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Shang, Jun Li, Yuzhe Chen, Tongwen Tongji University Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110004 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada
This paper investigates stealthy attacks on sampled-data control systems, where a continuous process is sampled periodically, and the resultant discrete output and control signals are transmitted through dual channels... 详细信息
来源: 评论
GLC++: Source-Free Universal Domain Adaptation through Global-Local Clustering and Contrastive Affinity Learning
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Sanqing Zou, Tianpei Röhrbein, Florian Lu, Cewu Chen, Guang Tao, Dacheng Jiang, Changjun The School of Automotive Engineering Department of Computer Science Tongji University China The Faculty of Computer Science Chemnitz University of Technology Germany The Department of Computer Science Shanghai Jiao Tong University China The School of Computer Science Faculty of Engineering The University of Sydney Australia The Department of Computer Science Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University China
Deep neural networks often exhibit sub-optimal performance under covariate and category shifts. Source-Free Domain Adaptation (SFDA) presents a promising solution to this dilemma, yet most SFDA approaches are restrict... 详细信息
来源: 评论
Triple Point Masking
收藏 引用
IEEE Transactions on Circuits and systems for Video Technology 2025年
作者: Liu, Jiaming Kong, Linghe Wu, Yue Gong, Maoguo Li, Hao Miao, Qiguang Ma, Wenping Qin, Can The Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China The School of Computer Science and Technology Key Laboratory of Collaborative Intelligence Systems Ministry of Education Xidian University Xi’an710071 China The School of Electronic Engineering Key Laboratory of Collaborative Intelligence Systems Ministry of Education Xidian University Xi’an710071 China The College of Mathematics Science Inner Mongolia Normal University Hohhot010022 China The School of Artificial Intelligence Key Laboratory of Intelligent Perception and Image Understanding Ministry of Education Xidian University Xi’an710071 China The Department of Electrical and Computer Engineering Northeastern University BostonMA02115 United States
Existing 3D mask learning methods encounter performance bottlenecks under limited data, and our objective is to overcome this limitation. In this paper, we introduce a triple point masking scheme, named TPM, which ser... 详细信息
来源: 评论
Federated Learning With Client Clustering Selection and Quality-Aware Model Aggregation(2024)
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Peng, Y. Wang, C. Shi, H. Ma, R. Guan, H. Yang, Hanbo Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China Beijing Simulation Center National Key Laboratory of Modeling and Simulation for Complex Systems Beijing China
The Industrial Internet of Things (IIoT) is revolutionizing industries through device interconnectivity, enabling real-time data collection and transmission for enhanced monitoring, control, and automation. This has l... 详细信息
来源: 评论
Balancing Flexibility and Compliance in Response to Long-Tailed Business Process Changes
SSRN
收藏 引用
SSRN 2023年
作者: Zhu, Jingwei Peng, Jun Zhang, Liang Truong, Hong-Linh School of Computer Science Fudan University Shanghai Key Laboratory of Data Science Shanghai Institute of Intelligent Electronics & Systems 2005 Songhu Road Yangpu District Shanghai200438 China Department of Computer Science Aalto University Espoo Finland
The resilience of process-aware information systems (PAIS) is vital for enterprises' competitiveness in the ever-changing world. Enterprises need continuously maintain business processes in PAIS against uncertaint... 详细信息
来源: 评论
cVTS: A Constrained Voronoi Tree Search Method for High Dimensional Analog Circuit Synthesis  23
cVTS: A Constrained Voronoi Tree Search Method for High Dime...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Aidong Zhao Xianan Wang Zixiao Lin Zhaori Bi Xudong Li Changhao Yan Fan Yang Li Shang Dian Zhou Xuan Zeng State Key Laboratory of Integrated Chips and Systems Microelectronics Department Fudan University Shanghai China Department of Electrical Engineering University of Texas at Dallas USA Department of Electrical and Computer Engineering University of California at San Diego USA School of Data Science Fudan University Shanghai China School of Computer Science Fudan University Shanghai China
A constrained Voronoi tree-based domain decomposition method for high-dimensional Bayesian optimization is proposed to solve large scale analog circuit synthesis problems, which can be formulated as high-dimensional h...
来源: 评论
Continuity Scaling: A Rigorous Framework for Detecting and Quantifying Causality Accurately
收藏 引用
Research 2022年 第4期2022卷 137-146页
作者: Xiong Ying Si-Yang Leng Huan-Fei MaD Qing Nie Ying-Cheng Lai Wei Lin School of Mathematical Sciences SCMSand SCAMFudan UniversityShanghai 200433China Research Institute for Inteligent Complex Systems CCSBand LCNBIFudan UniversityShanghai 200433China State Key Laboratory of Medical Neurobiology and MOE Frontiers Center for Brain Science Institutes of Brain ScienceFudan UniversityShanghai 200032China Institute of AI and Robotics Academy for Engineering and TechnologyFudan UniversityShanghai 200433China School of Mathematical Sciences Soochow UniversitySuzhou 215006China Department of Mathematics Department of Developmental and Cll BiologyAnd NSF-Simons Center for Multiscale Cell Fate ResearchUniversity of CaliforniaIrvineCA 92697-3875USA School of Electrical ComputerAnd Energy EngineeringArizona State UniversityTempeArizona 85287-5706USA Shanghai Artificial Intelligence Laboratory Shanghai 200232China
Data-based detection and quantification of causation in complex,nonlinear dynamical systems is of paramount importance to science,engineering,and *** by the widely used methodology in recent years,the cross-map-based ... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Block Broyden's methods for solving nonlinear equations  23
Block Broyden's methods for solving nonlinear equations
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing systems
作者: Chengchang Liu Cheng Chen Luo Luo John C.S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shanghai Key Laboratory of Trustworthy Computing East China Normal University School of Data Science Fudan University
This paper studies quasi-Newton methods for solving nonlinear equations. We propose block variants of both good and bad Broyden's methods, which enjoy explicit local superlinear convergence rates. Our block good B...
来源: 评论