咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 235 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 632 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 447 篇 工学
    • 279 篇 计算机科学与技术...
    • 210 篇 软件工程
    • 98 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 49 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 42 篇 电气工程
    • 37 篇 生物工程
    • 34 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 17 篇 安全科学与工程
    • 16 篇 光学工程
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 218 篇 理学
    • 150 篇 数学
    • 44 篇 系统科学
    • 41 篇 生物学
    • 37 篇 统计学(可授理学、...
    • 27 篇 物理学
    • 13 篇 化学
  • 137 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 14 篇 医学
    • 11 篇 基础医学(可授医学...
    • 10 篇 临床医学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 24 篇 feature extracti...
  • 16 篇 web services
  • 16 篇 training
  • 13 篇 support vector m...
  • 11 篇 data mining
  • 10 篇 roads
  • 10 篇 graph neural net...
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 optimization
  • 9 篇 accuracy
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 120 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 37 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 wang cheng
  • 17 篇 miao duoqian
  • 17 篇 wang hanli
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 xiwei liu
  • 11 篇 liu guanjun

语言

  • 595 篇 英文
  • 27 篇 中文
  • 13 篇 其他
检索条件"机构=Key Laboratory of Embedded System and Service Computing"
632 条 记 录,以下是451-460 订阅
排序:
Behavioral Authentication for Security and Safety
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Cheng Tang, Hao Zhu, Hangyu Zheng, Junhan Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Shanghai Artificial Intelligence Laboratory Shanghai200232 China
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system is secure or safe can be judged by whether the behavior of certain agent(... 详细信息
来源: 评论
Base Station Network Traffic Prediction Approach Based on LMA -DeepAR  6
Base Station Network Traffic Prediction Approach Based on LM...
收藏 引用
6th IEEE International Conference on Computer and Communication systems, ICCCS 2021
作者: Zhang, Jiachen Zuo, Xingquan Xu, Mingying Han, Jing Zhang, Baisheng Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing Uinversity of Posts and Telecommunications Beijing China Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing Uinversity of Posts and Telecommunications Beijing China Network Interface Virtualization Shanghai System Design Deptment Zhongxing Telecommunication Equipment Corporation Shanghai China
Accurate network traffic prediction of base station cell is very vital for the expansion and reduction of wireless devices in base station cell. The burst and uncertainty of base station cell network traffic makes the... 详细信息
来源: 评论
On the Expressive Power of Behavior Structure
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Cheng Zhu, Hangyu Lin, Yuhang Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Shanghai Artificial Intelligence Laboratory Shanghai200232 China
Efforts toward a comprehensive description of behavior have indeed facilitated the development of representation-based approaches that utilize deep learning to capture behavioral information. As behavior complexity in... 详细信息
来源: 评论
A MapReduce based parallel SVM for large scale spam filtering
A MapReduce based parallel SVM for large scale spam filterin...
收藏 引用
2011 8th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Caruana, Godwin Li, Maozhen Qi, Man School of Engineering and Design Brunel University Uxbridge Middlesex UB8 3PH United Kingdom Department of Computing Canterbury Christ Church University Canterbury Kent CT1 1QU United Kingdom Key Laboratory of Embedded Systems and Service Computing Ministry of Education Tongji University China
Spam continues to inflict increased damage. Varying approaches including Support Vector Machine (SVM) based techniques have been proposed for spam classification. However, SVM training is a computationally intensive p... 详细信息
来源: 评论
A Privacy Preserving Algorithm Based on R-constrained Dummy Trajectory in Mobile Social Network
收藏 引用
Procedia Computer Science 2018年 129卷 420-425页
作者: Lina Ni Yanfeng Yuan Xiao Wang Jiguo Yu Jinquan Zhang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Information Science and Engineering Qufu Normal University Shandong China
Recently the research of location privacy preserving has become a hot spot. Location privacy preserving involves not only a single location privacy but also the trajectory privacy where the mobile users in different l... 详细信息
来源: 评论
Parallelizing abnormal event detection in crowded scenes with GPU  12
Parallelizing abnormal event detection in crowded scenes wit...
收藏 引用
12th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2015
作者: Yavari, Mohammadreza Li, Maozhen Li, Siguang Qi, Man Department of Electronic and Computer Engineering Brunel University London UxbridgeUB8 3PH United Kingdom Key Laboratory of Embedded Systems and Service Computing Tongji University Shanghai200092 China Department of Computing Canterbury Christ Church University KentCT1 1QU United Kingdom
Analyzing human activities in surveillance videos a challenging task due to the high volume of data that needs to be processed in a timely manner. This paper presents a GPU based Gaussian Mixture Model (GMM) to detect... 详细信息
来源: 评论
Improved asymptotic multicast throughput for random extended networks
收藏 引用
Computer Communications 2010年 第18期33卷 2195-2202页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Jiujun Cheng Department of Computer Science and Technology Tongji University Shanghai China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL 60616 USA
We study the asymptotic throughput for random extended networks , where n ad hoc nodes are randomly deployed in a square region R ( n ) = 0 , n 2 . We directly consider the multicast throughput to unify the unicast an...
来源: 评论
Robust Beamforming for Downlink Multi-Cell systems: A Bilevel Optimization Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xingdi Xiong, Yu Yang, Kai Department of Computer Science and Technology Tongji University China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University China Shanghai Research Institute for Intelligent Autonomous Systems China
Utilization of inter-base station cooperation for information processing has shown great potential in enhancing the overall quality of communication services (QoS) in wireless communication networks. Nevertheless, suc... 详细信息
来源: 评论
LAMPT: LAbel Mask-Predicted Transformer for Extreme Multi-label Text Classification
LAMPT: LAbel Mask-Predicted Transformer for Extreme Multi-la...
收藏 引用
IEEE International Conference on Big Data
作者: Yifan Xu Minghao Zhu Junli Wang Chungang Yan Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education. National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China
Extreme Multi-label text Classification ( XMC) is a task of recalling the most relevant labels for each given text from an extremely large-scale label set. It is emphasized that XMC is a more complex classification ta... 详细信息
来源: 评论
Two-Dimensional Reverse Time Migration for Multi-Input Multi-Output system by Shot Correlation Method with Noise Effect
Two-Dimensional Reverse Time Migration for Multi-Input Multi...
收藏 引用
IEEE International Conference on Microwaves, Communications, Antennas and Electronic systems, COMCAS
作者: Huan Wang Yuxian Zhang Mei Song Tong Zhixiang Huang Naixing Feng School of Electronic and Information Engineering Anhui University Hefei Anhui China The Key Laboratory of Embedded System and Service Computing of the Ministry of Education College of Electronics and Information Engineering Tongji University Shanghai China
In this paper, we propose a shot correlation reverse time migration (SC-RTM) method for multiple-input-multiple-output (MIMO) ground penetrating radar (GPR) imaging to improve image contrast. In GPR applications, nois... 详细信息
来源: 评论