咨询与建议

限定检索结果

文献类型

  • 683 篇 期刊文献
  • 478 篇 会议
  • 2 册 图书

馆藏范围

  • 1,163 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 809 篇 工学
    • 519 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 180 篇 信息与通信工程
    • 104 篇 控制科学与工程
    • 99 篇 电气工程
    • 91 篇 生物工程
    • 90 篇 电子科学与技术(可...
    • 76 篇 光学工程
    • 64 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 46 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 28 篇 材料科学与工程(可...
    • 27 篇 仪器科学与技术
    • 25 篇 核科学与技术
    • 23 篇 网络空间安全
  • 548 篇 理学
    • 282 篇 数学
    • 190 篇 物理学
    • 105 篇 生物学
    • 80 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 44 篇 化学
  • 201 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 71 篇 医学
    • 60 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 35 篇 法学
    • 34 篇 社会学
  • 16 篇 经济学
  • 15 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 19 篇 semantics
  • 17 篇 training
  • 15 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 computational mo...
  • 13 篇 algorithm design...
  • 13 篇 accuracy
  • 12 篇 throughput
  • 12 篇 sensors
  • 11 篇 wireless sensor ...
  • 10 篇 roads
  • 10 篇 electroencephalo...
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 computer archite...
  • 9 篇 wireless communi...
  • 9 篇 resource managem...
  • 9 篇 optimization
  • 9 篇 schedules
  • 9 篇 synchronization

机构

  • 75 篇 department of co...
  • 70 篇 department of co...
  • 59 篇 shanghai key lab...
  • 40 篇 yerevan physics ...
  • 38 篇 department of ph...
  • 38 篇 faculty of scien...
  • 38 篇 departamento de ...
  • 38 篇 department for p...
  • 38 篇 department of ph...
  • 38 篇 institute of phy...
  • 38 篇 tomsk state univ...
  • 38 篇 institute of phy...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 dipartimento di ...
  • 37 篇 kirchhoff-instit...
  • 37 篇 graduate school ...
  • 37 篇 key laboratory o...
  • 37 篇 shanghai key lab...
  • 36 篇 department of mo...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 1,018 篇 英文
  • 122 篇 其他
  • 24 篇 中文
检索条件"机构=Department of Computer Science and Shanghai Key Laboratory of Scalable Computing and Systems"
1163 条 记 录,以下是971-980 订阅
排序:
Online vigilance analysis combining video and electrooculography features
Online vigilance analysis combining video and electrooculogr...
收藏 引用
19th International Conference on Neural Information Processing, ICONIP 2012
作者: Du, Ruo-Fei Liu, Ren-Jie Wu, Tian-Xiang Lu, Bao-Liang Center for Brain-like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE-Microsoft Key Lab. for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE Key Laboratory of Systems Biomedicine Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China
In this paper, we propose a novel system to analyze vigilance level combining both video and Electrooculography (EOG) features. For one thing, the video features extracted from an infrared camera include percentage of... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论
Isotropic Hashing  12
Isotropic Hashing
收藏 引用
Annual Conference on Neural Information Processing systems
作者: Weihao Kong Wu-Jun Li Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University China
Most existing hashing methods adopt some projection functions to project the o-riginal data into several dimensions of real values, and then each of these projected dimensions is quantized into one bit (zero or one) b... 详细信息
来源: 评论
Poster abstracts
收藏 引用
Sleep and Biological Rhythms 2016年 第1期5卷 A1-A189页
作者: J. Ferrie M. Shipley F. Cappuccio E. Brunner M. Miller M. Kumari M. Marmot A. Coenen J. L. Castillo F. Araya G. Bustamante L. Montecino C. Torres S. Oporto J. Gronli E. Fiske R. Murison B. Bjorvatn E. Sorensen R. Ursin C. M. Portas S. Rajaraman A. Gribok N. Wesensten T. Balkin J. Reifman N. Dursunoglu S. Ozkurt S. Baser O. Delen S. Sarikaya P. Sadler P. Mitchell D. Françon M. Decobert B. Herve A. Richard G. Griebel P. Avenet B. Scatton G. L. Fur D. Eckert A. Jordan A. Wellman S. Smith A. Malhotra D. White D. Bruck I. Thomas A. Kritikos W. Oertel K. Stiasny-Kolster D. Garcia-Borreguero W. Poewe B. Hoegl R. Kohnen E. Schollmayer J. Keffel C. Trenkwalder A. Valle S. Roizenblatt F. Fregni P. Boggio S. Tufik K. Ward L. Robertson L. Palmer P. Eastwood D. Hillman J. Lee S. Mukherjee V. de Padova G. Barbato G. Ficca I. Zilli P. Salzarulo M. Veldi T. Hion V. Vasar M. Kull L. Nowak J. Davis Y. Latzer O. Tzischinsky S. Crowley M. Carskadon M. Anca-Herschkovitsch D. Frey J. Ortega C. Wiseman C. Farley K. Wright A. Campbell A. Neill K. Spiegel R. Leproult E. Tasali N. Scherberg E. van Cauter A. T. Noradina N. A. Karim I. Norlinah A. A. Raymond R. Sahathevan B. Hamidon E. Werth R. Poryazova R. Khatami C. Bassetti R. G. Beran L. Ainley G. Holand J. Duncan H. Kinney B. Davis B. Hood S. Frey C. Schmidt M. Hofstetter P. Peigneux C. Cajochen W.-P. Hu J.-D. Li C. Zhang L. Boehmer J. Siegel Q.-Y. Zhou Y. Sagawa H. Kondo T. Takemura H. Kanayama Y. Kaneko M. Sato T. Kanbayashi Y. Hishikawa T. Shimizu A. Viola L. James L. Schlangen D.-J. Dijk R. Andretic Y.-C. Kim K.-A. Han F. Jones R. Greenspan L. Sanford L. Yang X. Tang K. Dieter E. Uta H. Sven M. Richard N. Oyane S. Pallesen F. Holsten Y. Inoue M. Fujita N. Emura K. Kuroda N. Uchimura A. Johnston J. Astbury G. Kennedy K. Hoedlmoser M. Schabus T. Pecherstorfer S. Moser G. Gruber P. Anderer W. Klimesch N. Naidoo M. Ferber A. Pack D. Neu O. Mairesse G. Hoffmann A. Dris L. Lambrecht P. Linkowski P. Verbanck O. Le Bon N. Matsuura M. Yamao N. Adachi R. Aritomi Y. Komada H. Tanaka S. Shirak University College London London UK University College London London USA Warwick Medical School London UK Warwick Medical School Coventry USA Radboud University Nijmegen Nijmegen Netherlands Department of Neurology University of Chile Santiago Chile Neurology Service Hospital del Salvador Santiago Chile Family Health Center Juan Pablo II Santiago Chile Department of Biomedicine Section on Physiology Univeristy of Bergen Bergen Norway Department of Public Health and Primary Health Care Univeristy of Bergen Bergen Norway Department of Public Health and Primary Health Care University of Bergen Bergen Norway Norwegian Competence Center for Sleep Disorders Haukeland University Hospital Bergen Norway Department of Child and Adolescent Psychiatry Haukeland University Hospital Univeristy of Bergen Bergen Norway Department of Biomedicine University of Bergen Bergen Norway US Army Medical Research and Materiel Command Fort Detrick Frederick USA Walter Reed Army Institute of Research Silver Spring USA Department of Behavioral Biology Walter Reed Army Institute of Research Silver Spring USA Faculty Department of Pulmonology Pamukkale University Medical Denizli Turkey University of Ballarat Ballarat Australia Sanofi-Aventis Recherche et Developpement Paris France Brigham and Women’s Hospital Harvard Medical School Boston USA The University of Queensland Adelaide Australia School of Psychology University of Queensland Brisbane Australia The University of Queensland Brisbane Australia Victoria University Melbourne Australia Department of Psychology Victoria University Melbourne Australia School of Psychology Victoria University Melbourne Australia Philips-Universität Marburg Germany Philips-Universitaet-Marburg Marburg Germany Instituto de Investigaciones del Sueno Madrid Spain Universitätsklinik für Neurologie Innsbruck Austria Universitaetsklinik fuer Neurologie Innsbruck Austria IMEREM GmbH Nuernberg Germany Schwarz Pharma AG Monheim Germany
来源: 评论
Hybrid rule-based algorithm for coreference resolution
Hybrid rule-based algorithm for coreference resolution
收藏 引用
2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, EMNLP-CoNLL 2012 - Shared Task: Modeling Multilingual Unrestricted Coreference in OntoNotes
作者: Shou, Heming Zhao, Hai Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University China MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University China
This paper describes our coreference resolution system for the CoNLL-2012 shared task. Our system is based on the Stanford's dcoref deterministic system which applies multiple sieves with the order from high preci... 详细信息
来源: 评论
On guaranteed detectability for surveillance sensor networks
收藏 引用
International Journal of Distributed Sensor Networks 2012年 第7期2012卷 1-15页
作者: Zhu, Yanmin Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Shanghai Key Lab of Scalable Computing and Systems Shanghai 200240 China
Surveillance is an important class of applications for wireless senor networks (WSNs), whose central task is to detect events of interest. Existing approaches seriously suffer from blind spots and low energy efficienc... 详细信息
来源: 评论
Chinese coreference resolution via ordered filtering
Chinese coreference resolution via ordered filtering
收藏 引用
2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, EMNLP-CoNLL 2012 - Shared Task: Modeling Multilingual Unrestricted Coreference in OntoNotes
作者: Zhang, Xiaotian Wu, Chunyang Zhao, Hai Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University China MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University China
We in this paper present the model for our participation (BCMI) in the CoNLL-2012 Shared Task. This paper describes a pure rule-based method, which assembles different filters in a proper order. Different filters hand...
来源: 评论
A Bargaining-Based Approach for Incentive-Compatible Message Forwarding in Opportunistic Networks
A Bargaining-Based Approach for Incentive-Compatible Message...
收藏 引用
IEEE International Conference on Communications
作者: Fan Wu Tingting Chen Sheng Zhong Chunming Qiao Guihai Chen Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Department of Computer Science Oklahoma State University Department of Computer Science and Engineering SUNY at Buffalo
Opportunistic networking is an important technique to enable users to communicate in an environment where contemporaneous end-to-end paths are unavailable or unstable. To support end-to-end messaging in opportunistic ... 详细信息
来源: 评论
High Availability through Output Continuity
High Availability through Output Continuity
收藏 引用
IEEE International Conference on Cluster computing Workshops and Posters (CLUSTER WORKSHOPS)
作者: Wei Ye Yaozu Dong Ruhui Ma Alei Liang Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China Intel China Software Center Shanghai China
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio... 详细信息
来源: 评论
Improving unsegmented network coding for opportunistic routing in wireless mesh network
Improving unsegmented network coding for opportunistic routi...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Chen Chen Chao Dong Fan Wu Hai Wang Laixian Peng Jingnan Nie Institute of Communications Engineering PLA University of Science and Technology China Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University China
Unsegmented network coding was incorporated into opportunistic routing to improve inefficient schedule of segmented network coding due to delayed feedback. However, most unsegmented network coding schemes fail to cons... 详细信息
来源: 评论