咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 205 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 549 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 385 篇 工学
    • 238 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 81 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 43 篇 电子科学与技术(可...
    • 39 篇 电气工程
    • 34 篇 机械工程
    • 32 篇 交通运输工程
    • 28 篇 生物工程
    • 16 篇 安全科学与工程
    • 15 篇 仪器科学与技术
    • 15 篇 化学工程与技术
    • 14 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 180 篇 理学
    • 124 篇 数学
    • 38 篇 系统科学
    • 31 篇 生物学
    • 28 篇 统计学(可授理学、...
    • 23 篇 物理学
    • 12 篇 化学
  • 110 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 21 篇 法学
    • 19 篇 社会学
  • 11 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 24 篇 petri nets
  • 20 篇 feature extracti...
  • 14 篇 web services
  • 14 篇 training
  • 10 篇 roads
  • 10 篇 data mining
  • 10 篇 graph neural net...
  • 9 篇 support vector m...
  • 9 篇 optimization
  • 9 篇 algorithm design...
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 conferences
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 wireless sensor ...
  • 8 篇 computational mo...
  • 8 篇 rough set theory
  • 7 篇 semantics

机构

  • 121 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 18 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 moe key laborato...
  • 8 篇 institute of int...
  • 8 篇 college of infor...

作者

  • 35 篇 changjun jiang
  • 34 篇 zhou mengchu
  • 32 篇 jiang changjun
  • 23 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 18 篇 ye chen
  • 17 篇 ding zhijun
  • 16 篇 wang hanli
  • 15 篇 yan chungang
  • 15 篇 wang cheng
  • 15 篇 miao duoqian
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 11 篇 liu guanjun
  • 10 篇 yaying zhang

语言

  • 517 篇 英文
  • 23 篇 中文
  • 12 篇 其他
检索条件"机构=MOE Key Laboratory of Embedded System and Service Computing"
549 条 记 录,以下是451-460 订阅
排序:
Petri net modeling and one-wafer scheduling of single-arm multi-cluster tools
Petri net modeling and one-wafer scheduling of single-arm mu...
收藏 引用
2013 IEEE International Conference on Automation Science and Engineering, CASE 2013
作者: Zhu, Qinghua Wu, Naiqi Qiao, Yan Zhou, Mengchu School of Computer Guangdong University of Technology Guangzhou 510006 China Macau University of Science and Technology China Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou 510006 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102-1982 United States
It is very challenging to schedule a multi-cluster tool for it needs to coordinate the activities of multiple robots. This paper studies one-wafer cyclic scheduling for multi-cluster tools whose bottleneck cluster too... 详细信息
来源: 评论
SelectCast: Scalable Data Aggregation Scheme in Wireless Sensor Networks
收藏 引用
IEEE Transactions on Parallel and Distributed systems 2012年 第10期23卷 1958-1969页
作者: Cheng Wang Changjun Jiang Shaojie Tang Xiang-Yang Li Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science and Engineering Tsinghua National Laboratory for Information Science and Technology (TNLIST) University of Tongji China
In this work, for a wireless sensor network (WSN) of n randomly placed sensors with node density \lambda \in [1,n], we study the tradeoffs between the aggregation throughput and gathering efficiency. The gathering eff... 详细信息
来源: 评论
Knowledge Granulation in Interval-Valued Information systems
Knowledge Granulation in Interval-Valued Information Systems
收藏 引用
International Workshop on Intelligent systems and Applications, ISA
作者: Nan Zhang Duoqian Miao Can Gao Department of Computer Science and Technology University of Tongji Shanghai China Department of Electrical and Computer Engineering University of Alberta Edmonton AB Canada Key Laboratory of Embedded System and Service Computing of Ministry of Education University of Tongji Shanghai China
Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulat... 详细信息
来源: 评论
Information Security Evaluation by Information Flow Analysis Based on Stochastic Petri Nets
Information Security Evaluation by Information Flow Analysis...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Hanqian Tu Dongming Xiang Wang Lin Guanjun Liu Department of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou China Department of Computer Science Key laboratory of Embedded System and Service Computing Ministry of Education Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Shanghai China
The Petri-net-based information flow analysis offers an effective approach for detecting information leakage by the concept of non-interference. Although the related studies propose efficient solutions, they lack quan... 详细信息
来源: 评论
VCFGAN: A Two-stage Collaborative Filtering Framework based on Variational Autoencoders and Generative Adversarial Networks
VCFGAN: A Two-stage Collaborative Filtering Framework based ...
收藏 引用
Information systems and computing Technology (ISCTech), International Conference on
作者: Zhiqiang Huang Jinzhong Li Xueyu Huang Junqi Liu School of Software Engineering Jiangxi University of Science and Technology Nanchang China College of Electronics and Information Engineering Jinggangshan University Ji’an China Ministry of Education Key Laboratory of Embedded System and Service Computing (Tongji University) Shanghai China
Deep generative models, such as Generative Adversarial Networks (GAN) and Variational Autoencoders (VAE), are widely used in collaborative filtering. They usually learn users’ preferences for items directly from a hi... 详细信息
来源: 评论
On Theoretical Optimization of the Sensing Matrix for Sparse-Dictionary Signal Recovery
On Theoretical Optimization of the Sensing Matrix for Sparse...
收藏 引用
IEEE Global Conference on Signal and Information Processing (GlobalSIP)
作者: Jianchen Zhu Shengjie Zhao Xu Ma Gonzalo R. Arce Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai CHN School of Optics and Photonics Beijing Institute of Technology Beijing CHN Department of Electrical and Computer Engineering University of Delaware Newark Delaware USA
Compressive Sensing (CS) is a new paradigm for the efficient acquisition of signals that have sparse representation in a certain domain. Traditionally, CS has provided numerous methods for signal recovery over an orth...
来源: 评论
Berth-Crane allocation model and algorithm of container berths in the uncertain environment
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent systems and computing 2013年 212卷 785-792页
作者: Liu, Jian-xin Du, Yu-yue Hong, Yong-fa Sun, Lin-lin College of Information Science Engineering Shandong University of Science and Technology Qingdao 266590 Shandong China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China College of Civil Engineering and Architecture SUST Qingdao 266590 Shandong China
According to the randomness of the vessel's arrival time and handling time, the establishment of a randomly-oriented environment container berths-crane allocation model, the optimizing goal is to minimize the aver... 详细信息
来源: 评论
Effcient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
Security and Safety
收藏 引用
Security and Safety 2022年 第1期1卷 145-165页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua UniversityShanghai 201620China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer ScienceTongji UniversityShanghai 201804China Shanghai Network Financial Security Collaborative Innovation Center Tongji UniversityShanghai 201804China
Nowadays,large numbers of smart sensors(e.g.,road-side cameras)which com-municate with nearby base stations could launch distributed denial of services(DDoS)attack storms in intelligent transportation *** attacks disa... 详细信息
来源: 评论
An Effective and Robust Pedestrians Detecting Algorithm & Symposia
An Effective and Robust Pedestrians Detecting Algorithm & Sy...
收藏 引用
International Conference on Intelligent Transportation
作者: Zhipeng Li Yun Sun Fuqiang Liu Wenhuan Shi Key Laboratory of Embedded System and Service Computing supported by Ministry of Education University of Tongji Shanghai China School of Electronics and Information Engineering University of Tongji Shanghai China Department of Control Science and Technology Shanghai Jiaotong University Shanghai China
In this paper, we present a pedestrian detection approach using spatial histograms of oriented gradients feature. As spatial histograms of oriented gradients consist of marginal distributions of an image over local an... 详细信息
来源: 评论
A Money Laundering Structure Detection Method Based on Incremental Transaction Analysis
A Money Laundering Structure Detection Method Based on Incre...
收藏 引用
Data Science and Information Technology (DSIT), International Conference on
作者: Yifei Meng Zhong Li Key Laboratory of Embedded System and Service Computing Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China College of Information Science and Technology Donghua University Shanghai China
Money laundering is the process of legitimizing dirty money through complex transactions, posing a serious threat to a country’s financial stability and national security. Nowadays, with the prevalence of organized m...
来源: 评论