咨询与建议

限定检索结果

文献类型

  • 439 篇 会议
  • 274 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 716 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 501 篇 工学
    • 302 篇 计算机科学与技术...
    • 220 篇 软件工程
    • 114 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 65 篇 电子科学与技术(可...
    • 55 篇 电气工程
    • 51 篇 机械工程
    • 45 篇 生物工程
    • 35 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 19 篇 生物医学工程(可授...
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 13 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 11 篇 材料科学与工程(可...
  • 247 篇 理学
    • 160 篇 数学
    • 52 篇 生物学
    • 44 篇 系统科学
    • 35 篇 统计学(可授理学、...
    • 33 篇 物理学
    • 17 篇 化学
  • 140 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 25 篇 法学
    • 23 篇 社会学
  • 20 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 农学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 3 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 27 篇 petri nets
  • 26 篇 feature extracti...
  • 18 篇 training
  • 16 篇 web services
  • 13 篇 data mining
  • 11 篇 educational inst...
  • 11 篇 optimization
  • 11 篇 algorithm design...
  • 11 篇 accuracy
  • 10 篇 support vector m...
  • 10 篇 roads
  • 10 篇 graph neural net...
  • 9 篇 conferences
  • 9 篇 laboratories
  • 9 篇 computational mo...
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 vectors
  • 8 篇 schedules

机构

  • 119 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 31 篇 key laboratory o...
  • 30 篇 shenzhen city ke...
  • 17 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 12 篇 department of el...
  • 11 篇 college of compu...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 the key laborato...
  • 9 篇 ieee
  • 9 篇 key laboratory o...
  • 8 篇 institute of int...
  • 8 篇 college of infor...

作者

  • 37 篇 jiang changjun
  • 35 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 21 篇 ji zhen
  • 20 篇 zhao junqiao
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 zhen ji
  • 17 篇 yan chungang
  • 17 篇 wang cheng
  • 16 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 yu hang
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 li yan
  • 13 篇 fuqiang liu
  • 12 篇 xiang-yang li

语言

  • 669 篇 英文
  • 32 篇 中文
  • 18 篇 其他
检索条件"机构=Key Laboratory of Embedded System and Service Computer"
716 条 记 录,以下是211-220 订阅
排序:
Hand-based biometrics fusing palmprint and finger-knuckle-print
Hand-based biometrics fusing palmprint and finger-knuckle-pr...
收藏 引用
1st International Workshop on Emerging Techniques and Challenges for Hand-Based Biometrics, ETCHB 2010
作者: Shen, Linlin Bai, Li Ji, Zhen Shenzhen Key Laboratory of Embedded System Design School of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Science University of Nottingham Nottingham United Kingdom
Although biometrics technology has progressed substantially, its performance is still to be improved for real applications. This paper aims to improve the accuracy of personal identification, when only single sample i... 详细信息
来源: 评论
Monitor-based Liveness-enforcing Petri Net Supervisors for Flexible Manufacturing systems  33
Monitor-based Liveness-enforcing Petri Net Supervisors for F...
收藏 引用
第三十三届中国控制会议
作者: YOU Dan WANG Shouguang ZHOU MengChu WU Wenhui School of Information & Electronic Engineering Zhejiang Gongshang University IEEE State Key Laboratory for Manufacturing Systems Engineering Xi’ an Jiaotong University The Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA
Deadlocks are a rather undesirable phenomenon in flexible manufacturing systems(FMSs).This work,by adding monitors,develops a deadlock prevention policy for FMSs that can be modeled by a class of Petri nets called-S3 ... 详细信息
来源: 评论
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
An enhanced two-factor user authentication in wireless sensor networks
收藏 引用
Telecommunication systems 2013年 第1期55卷 105-113页
作者: Yuan, Jian-Jun Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University Shanghai China
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to acc...
来源: 评论
FLAP: An efficient WLAN initial access authentication protocol
收藏 引用
IEEE Transactions on Parallel and Distributed systems 2014年 第2期25卷 488-497页
作者: Li, Xinghua Bao, Fenye Li, Shuxin Ma, Jianfeng State Key Laboratory of Integrated Service Networks Key Laboratory of Computer Network and System Security of Shaanxi Province Xidian University 2 South Taibai Road Xi'an Shaanxi 710071 China Shandong Provincial Key Laboratory of Computer Network Jinan 250014 China Department of Computer Science Virginia Polytechnic Institute and State University 7054 Haycock Road Falls Church VA 22043 United States
Nowadays, with the rapid increase of WLAN-enabled mobile devices and the more widespread use of WLAN, it is increasingly important to have a more efficient initial link setup mechanism, and there is a demand for a fas... 详细信息
来源: 评论
Low-Rank Subspace Representation from Optimal Coded-Aperture for Unsupervised Classification of Hypersepctral Imagery
Low-Rank Subspace Representation from Optimal Coded-Aperture...
收藏 引用
IEEE International Conference on Image Processing
作者: Jianchen Zhu Tong Zhang Shengjie Zhao Key Laboratory of Embedded System and Service Computing Ministry of Education
This paper aims at developing a clustering approach with spectral images directly from the compressive measurements of coded aperture snapshot spectral imager (CASSI). Assuming that compressed measurements often lie a... 详细信息
来源: 评论
Real-Time Communication Method for mHealth Base on Extended XMPP Protocol
收藏 引用
Communications and Network 2013年 第3期5卷 590-595页
作者: Chenjie Shi Yu Fang The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ... 详细信息
来源: 评论
Single camera 3D lane detection and tracking based on EKF for urban intelligent vehicle
Single camera 3D lane detection and tracking based on EKF fo...
收藏 引用
IEEE International Conference on Vehicular Electronics and Safety, ICVES 2006
作者: Min, Tian Fuqiang, Liu Zhencheng, Hu IEEE Key Laboratory of Embedded System and Service Computing Ministry of Education China Electronic and Information Engineering Department Tongji University Shanghai 201804 China Department of Computer Science Kumamoto University Kumamoto 860-8555 Japan
Road boundary detection and tracking is an important and integral function in advanced driver-assistance system. This paper proposes an algorithm, which can follow multi-kinds of lane, straight and curved, quickly and... 详细信息
来源: 评论
Path Restoring Algorithm based on Vehicle Trajectory Mining
Path Restoring Algorithm based on Vehicle Trajectory Mining
收藏 引用
2016 IEEE International Conference on Big Data Analysis
作者: Yuanhui Sun Yaying Zhang Key Laboratory of Embedded System and Service Computing Tongji University
Path restoring is a path searching problem in the time-dependent road network with the time constraints of origin and destination. This paper proposes a path restoring algorithm to find the possible path that vehicles... 详细信息
来源: 评论
Prescribed Performance Path-Following Control for Rotor-Assisted Vehicles via an Improved Reinforcement Learning Mechanism
收藏 引用
IEEE Transactions on Neural Networks and Learning systems 2025年 PP卷 PP页
作者: Zhang, Guoqing Li, Zhihao Li, Jiqiang Zhang, Weidong Qiu, Bin Navigation College Liaoning Dalian116026 China State Key Laboratory of Maritime Technology and Safety Liaoning Dalian116026 China Hainan University School of Information and Communication Engineering Hainan Haikou570228 China Shanghai Jiao Tong University Department of Automation Shanghai200240 China Guilin University of Technology School of Computer Science and Engineering Guangxi Key Laboratory of Embedded Technology and Intelligent System Guilin541004 China
This article investigates an adaptive prescribed performance path-following control algorithm for rotor-assisted vehicles, incorporating reinforcement learning (RL) to execute energy-saving cruising missions. For obta... 详细信息
来源: 评论