咨询与建议

限定检索结果

文献类型

  • 682 篇 期刊文献
  • 478 篇 会议
  • 2 册 图书

馆藏范围

  • 1,162 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 809 篇 工学
    • 518 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 180 篇 信息与通信工程
    • 104 篇 控制科学与工程
    • 100 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 91 篇 生物工程
    • 76 篇 光学工程
    • 64 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 46 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 29 篇 材料科学与工程(可...
    • 27 篇 仪器科学与技术
    • 25 篇 核科学与技术
    • 23 篇 网络空间安全
  • 547 篇 理学
    • 282 篇 数学
    • 190 篇 物理学
    • 104 篇 生物学
    • 80 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 44 篇 化学
  • 201 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 70 篇 医学
    • 60 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 35 篇 法学
    • 34 篇 社会学
  • 16 篇 经济学
  • 15 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 19 篇 semantics
  • 17 篇 training
  • 15 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 computational mo...
  • 13 篇 algorithm design...
  • 13 篇 accuracy
  • 12 篇 throughput
  • 12 篇 sensors
  • 11 篇 wireless sensor ...
  • 10 篇 roads
  • 10 篇 electroencephalo...
  • 10 篇 artificial intel...
  • 9 篇 computer archite...
  • 9 篇 wireless communi...
  • 9 篇 resource managem...
  • 9 篇 optimization
  • 9 篇 schedules
  • 9 篇 machine learning
  • 9 篇 synchronization

机构

  • 74 篇 department of co...
  • 70 篇 department of co...
  • 59 篇 shanghai key lab...
  • 40 篇 yerevan physics ...
  • 38 篇 department of ph...
  • 38 篇 faculty of scien...
  • 38 篇 departamento de ...
  • 38 篇 department for p...
  • 38 篇 department of ph...
  • 38 篇 institute of phy...
  • 38 篇 tomsk state univ...
  • 38 篇 institute of phy...
  • 38 篇 shanghai key lab...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 dipartimento di ...
  • 37 篇 kirchhoff-instit...
  • 37 篇 graduate school ...
  • 37 篇 key laboratory o...
  • 36 篇 department of mo...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 1,017 篇 英文
  • 122 篇 其他
  • 24 篇 中文
检索条件"机构=Department of Computer Science and Shanghai Key Laboratory of Scalable Computing and Systems"
1162 条 记 录,以下是201-210 订阅
排序:
cVTS: A Constrained Voronoi Tree Search Method for High Dimensional Analog Circuit Synthesis
cVTS: A Constrained Voronoi Tree Search Method for High Dime...
收藏 引用
Design Automation Conference
作者: Aidong Zhao Xianan Wang Zixiao Lin Zhaori Bi Xudong Li Changhao Yan Fan Yang Li Shang Dian Zhou Xuan Zeng Microelectronics Department State Key Laboratory of Integrated Chips and Systems Fudan University Shanghai China Department of Electrical Engineering University of Texas Dallas USA Department of Electrical and Computer Engineering University of California San Diego USA School of Data Science Fudan University Shanghai China School of Computer Science Fudan University Shanghai China
A constrained Voronoi tree-based domain decomposition method for high-dimensional Bayesian optimization is proposed to solve large scale analog circuit synthesis problems, which can be formulated as high-dimensional h...
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
End-to-End Streaming Customizable keyword Spotting Based on Text-Adaptive Neural Search  1
收藏 引用
18th National Conference on Man-Machine Speech Communication, NCMMSC 2023
作者: Yang, Baochen Guo, Jiaqi Li, Haoyu Xi, Yu Zhuo, Qing Yu, Kai X-LANCE Lab Department of Computer Science and Engineering MoE Key Lab of Artificial Intelligence AI Institute Shanghai Jiao Tong University Shanghai China State Key Laboratory of Media Convergence Production Technology and Systems Beijing China AISpeech Ltd. Suzhou China Department of Automation Tsinghua University Beijing China
Streaming keyword spotting (KWS) is an important technique for voice assistant wake-up. While KWS with a preset fixed keyword has been well studied, test-time customizable keyword spotting in streaming mode remains a ... 详细信息
来源: 评论
Two-stream Hierarchical Similarity Reasoning for Image-text Matching
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Ran Wang, Hanli Wang, Lei Kwong, Sam The Department of Computer Science & Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China Frontiers Science Center for Intelligent Autonomous Systems Shanghai201210 China DeepBlue Academy of Sciences Shanghai200336 China The Department of Computer Science City University of Hong Kong Hong Kong
Reasoning-based approaches have demonstrated their powerful ability for the task of image-text matching. In this work, two issues are addressed for image-text matching. First, for reasoning processing, conventional ap... 详细信息
来源: 评论
Heuristic Elastic Scaling for Kubernetes Heterogeneous Microservices
Heuristic Elastic Scaling for Kubernetes Heterogeneous Micro...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Song Wang Sheng He Yishuang Ning Xiang Gao Zhijun Ding Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Tongji University Shanghai China Kingdee Research Kingdee International Software Group Co. Ltd Shenzhen China Intelligent Computing Facility Innovation Center ZhejiangLab Hangzhou China
Kubernetes has become the basic platform for building cloud native applications. However, existing horizontal scaling methods based on Kubernetes have problems with resource redundancy. Furthermore, the combined horiz... 详细信息
来源: 评论
Abstraction-Based Synthesis of Controllers for Approximate Opacity
Abstraction-Based Synthesis of Controllers for Approximate O...
收藏 引用
IEEE Conference on Decision and Control
作者: Junyao Hou Siyuan Liu Xiang Yin Majid Zamani Department of Automation Key Laboratory of System Control and Information Processing Shanghai Jiao Tong University Shanghai China Division of Decision and Control Systems KTH Royal Institute of Technology Stockholm Sweden Department of Computer Science University of Colorado Boulder CO USA Department of Computer Science LMU Munich Munich Germany
Opacity is an important information-flow security property which characterizes the plausible deniability of certain “secret behaviors” in dynamical systems. In this paper, we study the problem of synthesizing contro...
来源: 评论
Family of Mutually Uncorrelated Codes for DNA Storage Address Design
IEEE Transactions on Nanobioscience
收藏 引用
IEEE Transactions on Nanobioscience 2025年 PP卷 PP页
作者: Liu, Zhenlu Cao, Ben Shao, Qi Zheng, Yanfen Wang, Bin Zhou, Shihua Zheng, Pan Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China University of Canterbury Upper Riccarton Department of Accounting and Information Systems Christchurch8140 New Zealand
Deoxyribonucleic acid (DNA) has become an ideal medium for long-term storage and retrieval due to its extremely high storage density and long-term stability. But access efficiency is an existing bottleneck in DNA stor... 详细信息
来源: 评论
Five infinite families of binary cyclic codes and their related codes with good parameters
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Hai Li, Chengju Ding, Cunsheng The Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Inspired by the recent work on binary cycli... 详细信息
来源: 评论
Neural Network-Based Safety Optimization Control for Constrained Discrete-Time systems
Neural Network-Based Safety Optimization Control for Constra...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Xueli Wang Shangwei Zhao Ming Yang Xiaoming Wu Xin Wang Shuo Xu Xu Hu Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Jinan China Department of Automation Shanghai Jiao Tong University Shanghai China Public Security Bureau of Jinan Jinan China
This paper proposes a constraint-aware safety control approach via adaptive dynamic programming (ADP) to address the control optimization issues for discrete-time systems subjected to state constraints. First, the con...
来源: 评论
Vehicle Check-In Data-driven POI Recommendation Based on Improved SVD and Graph Convolutional Network  19
Vehicle Check-In Data-driven POI Recommendation Based on Imp...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Liu, Yuwen Zhang, Jie Dou, Ruihan Zhou, Xiaokang Xu, Xiaolong Wang, Shoujin Qi, Lianyong College of Computer Science and Technology Qingdao China Nanjing University State Key Laboratory for Novel Software Technology Department of Computer Science and Technology China Shanghai Meteorological Information and Technology Support Center China University of Waterloo Faculty of Mathematics Waterloo Canada Shiga University Faculty of Data Science Japan Riken Center for Advanced Intelligence Project Riken Japan Nanjing University of Information Science and Technology School of Computer and Software China Macquarie University School of Computing Australia Qufu Normal University School of Computer Science China
The application of automobile tool software is becoming increasingly widespread, and its functions are becoming increasingly diverse. Using vehicle traffic data to give users with recommendations for Points-of-interes... 详细信息
来源: 评论