咨询与建议

限定检索结果

文献类型

  • 683 篇 期刊文献
  • 478 篇 会议
  • 2 册 图书

馆藏范围

  • 1,163 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 809 篇 工学
    • 519 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 180 篇 信息与通信工程
    • 104 篇 控制科学与工程
    • 99 篇 电气工程
    • 91 篇 生物工程
    • 90 篇 电子科学与技术(可...
    • 76 篇 光学工程
    • 64 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 46 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 28 篇 材料科学与工程(可...
    • 27 篇 仪器科学与技术
    • 25 篇 核科学与技术
    • 23 篇 网络空间安全
  • 548 篇 理学
    • 282 篇 数学
    • 190 篇 物理学
    • 105 篇 生物学
    • 80 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 44 篇 化学
  • 201 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 71 篇 医学
    • 60 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 35 篇 法学
    • 34 篇 社会学
  • 16 篇 经济学
  • 15 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 19 篇 semantics
  • 17 篇 training
  • 15 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 computational mo...
  • 13 篇 algorithm design...
  • 13 篇 accuracy
  • 12 篇 throughput
  • 12 篇 sensors
  • 11 篇 wireless sensor ...
  • 10 篇 roads
  • 10 篇 electroencephalo...
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 computer archite...
  • 9 篇 wireless communi...
  • 9 篇 resource managem...
  • 9 篇 optimization
  • 9 篇 schedules
  • 9 篇 synchronization

机构

  • 75 篇 department of co...
  • 70 篇 department of co...
  • 59 篇 shanghai key lab...
  • 40 篇 yerevan physics ...
  • 38 篇 department of ph...
  • 38 篇 faculty of scien...
  • 38 篇 departamento de ...
  • 38 篇 department for p...
  • 38 篇 department of ph...
  • 38 篇 institute of phy...
  • 38 篇 tomsk state univ...
  • 38 篇 institute of phy...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 dipartimento di ...
  • 37 篇 kirchhoff-instit...
  • 37 篇 graduate school ...
  • 37 篇 key laboratory o...
  • 37 篇 shanghai key lab...
  • 36 篇 department of mo...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 1,018 篇 英文
  • 122 篇 其他
  • 24 篇 中文
检索条件"机构=Department of Computer Science and Shanghai Key Laboratory of Scalable Computing and Systems"
1163 条 记 录,以下是951-960 订阅
排序:
Improving Unsegmented Network Coding for Opportunistic Routing in Wireless Mesh Network
Improving Unsegmented Network Coding for Opportunistic Routi...
收藏 引用
IEEE Wireless Communications and Networking Conference (WCNC)
作者: Chen, Chen Dong, Chao Wu, Fan Wang, Hai Peng, Laixian Nie, Jingnan Institute of Communications Engineering P.L.A. University of Science and Technology China Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
Unsegmented network coding was incorporated into opportunistic routing to improve inefficient schedule of segmented network coding due to delayed feedback. However, most unsegmented network coding schemes fail to cons... 详细信息
来源: 评论
Dynamic bandwidth allocation& guarantee for virtualized networks in cloud
Dynamic bandwidth allocation& guarantee for virtualized netw...
收藏 引用
International Conference on Information, Communications and Signal Processing
作者: Xuan Luo Pengfei Zhang Tong Ye Yaohui Jin Jianping Wang Network and Information Center Shanghai Jiaotong University State Key Laboratory of Advanced Optical Communication Systems & Networks Shanghai Jiaotong University Department of Computer Science City University of Hong Kong
Among all SLAs(Service Level Agreements) about network resources in the cloud, a critical problem would be achieving bandwidth guarantee under all communication environment (e.g., when misbehaved VMs exist) while keep... 详细信息
来源: 评论
Accountable authority key policy attribute-based encryption
收藏 引用
science China(Information sciences) 2012年 第7期55卷 1631-1638页
作者: WANG YongTao 1,2 ,CHEN KeFei 1,3 ,LONG Yu 1,4 & LIU ZhaoHui 2 1 department of computer science and Engineering,shanghai Jiao Tong University,shanghai 200240,China 2 China Information Technology Security Evaluation Center,Beijing 100085,China 3 shanghai key laboratory of scalable computing and systems,shanghai Jiao Tong University,shanghai,200240,China 4 State key laboratory of Information Security,Graduate School of Chinese Academy of sciences,100039,China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China China Information Technology Security Evaluation Center Beijing China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut... 详细信息
来源: 评论
key-frame extraction for video captured by smart phones
Key-frame extraction for video captured by smart phones
收藏 引用
IEEE International Conference on Robotics and Biomimetics
作者: Shuangshuang Ji Huaping Liu Bin Wang Fuchun Sun School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai China Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and Systems Beijing P.R.China Beijing Baidu Netcom Science Technology Co. Ltd
In this paper, the key-frame extraction for video clips which are captured by smart phones are investigated. A weighted temporal consistent fuzzy clustering technology is used to cluster the video frames. The image-le... 详细信息
来源: 评论
High availability through output continuity
High availability through output continuity
收藏 引用
2012 IEEE International Conference on Cluster computing Workshops, Cluster Workshops 2012
作者: Ye, Wei Dong, Yaozu Ma, Ruhui Liang, Alei Guan, Haibing Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Intel China Software Center Shanghai 200241 China
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio... 详细信息
来源: 评论
Sparse probabilistic relational projection  26
Sparse probabilistic relational projection
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Li, Wu-Jun Yeung, Dit-Yan Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong
Probabilistic relational PCA (PRPCA) can learn a projection matrix to perform dimensionality reduction for relational data. However, the results learned by PRPCA lack interpretability because each principal component ... 详细信息
来源: 评论
Workload-aware opportunistic routing in multi-channel, multi-radio wireless mesh networks
Workload-aware opportunistic routing in multi-channel, multi...
收藏 引用
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012
作者: Wu, Fan Vaidya, Nitin Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China ECE Coordinated Science Lab University of Illinois Urbana-Champaign United States
Opportunistic routing emerged as a novel technique to cope with the problem of highly unpredictable and lossy wireless channels in urban wireless mesh networks. However, existing opportunistic routing protocols only c... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
A fully abstract view for local cause semantics
A fully abstract view for local cause semantics
收藏 引用
7th International Conference on Advances in Grid and Pervasive computing, GPC 2012
作者: Xue, Jianxin Dong, Xiaoju Department of Computer Science MOE-MS Key Laboratory for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University Shanghai China
Recent technological trends have pushed concurrency and mobile computing to the mainstream. Too many semantics have been proposed to picture the behavior of concurrent systems, and their relationship has been a hot to... 详细信息
来源: 评论
An ant colony system algorithm for the problem of server consolidation in virtualized data centers
收藏 引用
Journal of Computational Information systems 2012年 第16期8卷 6631-6640页
作者: Gao, Yongqiang Guan, Haibing Qi, Zhengwei Wang, Bin Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
The problem of server sprawl is common in today's data centers. Virtualization-based server consolidation is a vital mechanism to solve the server sprawl problem in modern data centers by consolidating multiple vi... 详细信息
来源: 评论