咨询与建议

限定检索结果

文献类型

  • 397 篇 会议
  • 233 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 277 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 97 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 39 篇 电气工程
    • 37 篇 生物工程
    • 33 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 215 篇 理学
    • 149 篇 数学
    • 44 篇 系统科学
    • 41 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 13 篇 化学
  • 135 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 24 篇 feature extracti...
  • 16 篇 web services
  • 16 篇 training
  • 13 篇 support vector m...
  • 11 篇 data mining
  • 10 篇 roads
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 graph neural net...
  • 9 篇 accuracy
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 121 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 36 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 wang cheng
  • 17 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 liu guanjun

语言

  • 594 篇 英文
  • 27 篇 中文
  • 13 篇 其他
检索条件"机构=Key Laboratory on Embedded System and Service Computing"
631 条 记 录,以下是341-350 订阅
排序:
A Novel Frequency Selective Sounding Scheme for TDD LTE-Advanced systems
A Novel Frequency Selective Sounding Scheme for TDD LTE-Adva...
收藏 引用
IEEE Global Communications Conference
作者: Shengjie Zhao Baolong Zhou Daqiang Zhang Key Lab of Embedded System and Service Computing Ministry of Education Tongji University
In this paper we propose a novel Frequency Selective SRS (FS-SRS) scheme to improve the quality of CSI. According to the CQIs (channel quality indications), which are periodically reported by each user, and the bandwi... 详细信息
来源: 评论
A survey on distributed compressed sensing: theory and applications
收藏 引用
Frontiers of Computer Science 2014年 第6期8卷 893-904页
作者: Hongpeng YIN Jinxing LI Yi CHAI Simon X. YANG College of Automation Chongqing University Chongqing 400030 China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing 400030 China State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing 400030 China School of Engineering University of Guelph Guelph N1G 2W1 Canada
The compressed sensing (CS) theory makes sample rate relate to signal structure and content. CS samples and compresses the signal with far below Nyquist sampling frequency simultaneously. However, CS only considers ... 详细信息
来源: 评论
A Kind of Identity Authentication Method Based on Browsing Behaviors
A Kind of Identity Authentication Method Based on Browsing B...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Junzhu Zhong Chungang Yan Wangyang Yu Peihai Zhao Mimi Wang The Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China Shaanxi Normal University Xi'an China
Due to the continued growth threat in Phishing, a kind of stable identity authentication method is highly needed based on individual characteristics just like browsing behaviors. Most of the existing researches focuse... 详细信息
来源: 评论
A Method to Check Liveness of WS3PR  33
A Method to Check Liveness of WS3PR
收藏 引用
第三十三届中国控制会议
作者: WANG ShouGuang LIU Miao ZHOU MengChu WU WenHui IEEE School of Information & Electronic Engineering Zhejiang Gongshang University State Key Laboratory for Manufacturing Systems Engineering Xi’an Jiaotong University School of Electro-Mechanical Engineering Xidian University The Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA
Petri nets are widely used to model flexible manufacturing systems(FMSs) because they can help analyze the properties and synthesize deadlock-free supervisory controllers of *** system of Simple Sequential Processes w... 详细信息
来源: 评论
A Petri Nets Based Approach for Detecting the Data Races and Deadlocks in OpenMP Program
A Petri Nets Based Approach for Detecting the Data Races and...
收藏 引用
2012 Third International Conference on Theoretical and Mathematical Foundations of Computer Science(ICTMF 2012)
作者: Yulong Xian Zhijun Ding Department of Computer Science and Technology Tongji University The Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University
Because of OpenMP programs shielding the underlying parallel execution and scheduling details,data races and deadlocks are tend to occur during program ***,this paper puts forward the modeling method of OpenMP program... 详细信息
来源: 评论
A fast restarting particle swarm optimizer
A fast restarting particle swarm optimizer
收藏 引用
Congress on Evolutionary Computation
作者: Junqi Zhang Xiong Zhu Wei Wang Jing Yao Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
Particle swarm optimization (PSO) is a swarm intelligence technique that optimizes a problem by iterative exploration and exploitation in the search space. However, PSO cannot achieve the preservation of population di... 详细信息
来源: 评论
Robust control reconfiguration of resource allocation systems with Petri nets and integer programming
Robust control reconfiguration of resource allocation system...
收藏 引用
作者: Li, Jun Zhou, Mengchu Guo, Tao Gan, Yahui Dai, Xianzhong Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education China School of Automation Southeast University Nanjing 210096 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102 United States
Supervisory control reconfiguration can handle the uncertainties including resource failures and task changes in discrete event systems. It was not addressed to exploit the robustness of closed-loop systems to accommo... 详细信息
来源: 评论
Social incentive policies to engage commercial building occupants in demand response
Social incentive policies to engage commercial building occu...
收藏 引用
2014 IEEE International Conference on Automation Science and Engineering, CASE 2014
作者: Li, Sisi Deng, Kun Zhou, Meng Chu Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07012 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China Coordinated Science Laboratory University of Illinois at Urbana-Champaign UrbanaIL61801 United States
Occupants' comfort is the primary target in a building operation. However their efforts are often neglected and ruled out from traditional control strategies of energy-efficient building management systems. Occupa... 详细信息
来源: 评论
A Self-Learning Clustering Algorithm Based on Clustering Coefficient
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8786卷 79-94页
作者: Zhong, Mingjie Ding, Zhijun Sun, Haichun Wang, Pengwei The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China Department of Computer Science University of Pisa Pisa56127 Italy
This paper presents a novel clustering algorithm based on clustering coefficient. It includes two steps: First, k-nearest-neighbor method and correlation convergence are employed for a preliminary clustering. Then, th... 详细信息
来源: 评论
An optimized Apriori algorithm based on sparse matrix for intrusion detection
收藏 引用
Open Cybernetics and systemics Journal 2014年 第1期8卷 8-11页
作者: Zeng, Xiaohui Lv, Jingxiang Li, Jingzhong Luo, Wenlang Dept. of Computer Science and Technology Jinggangshan University Ji’an China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
The original Apriori algorithm is widely used in the intrusion detection field, but it may consume incredible computing resources in the process of handling network packets. We propose our optimized-Apriori algorithm ... 详细信息
来源: 评论