咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 202 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 546 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 382 篇 工学
    • 236 篇 计算机科学与技术...
    • 172 篇 软件工程
    • 80 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 42 篇 电子科学与技术(可...
    • 37 篇 电气工程
    • 34 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 生物工程
    • 16 篇 安全科学与工程
    • 15 篇 仪器科学与技术
    • 15 篇 化学工程与技术
    • 14 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 178 篇 理学
    • 122 篇 数学
    • 38 篇 系统科学
    • 31 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 23 篇 物理学
    • 12 篇 化学
  • 108 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 21 篇 法学
    • 19 篇 社会学
  • 10 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 24 篇 petri nets
  • 20 篇 feature extracti...
  • 14 篇 web services
  • 14 篇 training
  • 10 篇 roads
  • 10 篇 data mining
  • 9 篇 support vector m...
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 algorithm design...
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 conferences
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 wireless sensor ...
  • 8 篇 computational mo...
  • 8 篇 rough set theory
  • 7 篇 semantics

机构

  • 121 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 18 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 moe key laborato...
  • 8 篇 institute of int...
  • 8 篇 college of infor...

作者

  • 35 篇 changjun jiang
  • 34 篇 zhou mengchu
  • 31 篇 jiang changjun
  • 23 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 18 篇 ye chen
  • 17 篇 ding zhijun
  • 16 篇 wang hanli
  • 15 篇 yan chungang
  • 15 篇 wang cheng
  • 15 篇 miao duoqian
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 11 篇 liu guanjun
  • 10 篇 yaying zhang

语言

  • 514 篇 英文
  • 23 篇 中文
  • 12 篇 其他
检索条件"机构=MOE Key Laboratory of Embedded System and Service Computing"
546 条 记 录,以下是61-70 订阅
排序:
Virtual-Source and Virtual-Swarm-Based Particle Swarm Optimizer for Large-Scale Multi-Source Location via Robot Swarm
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Zhang, JunQi Lin, YuXuan Zhou, MengChu Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Multi-source location is a significant application in the field of robot swarm and is required to find all sources whose number and distribution are unknown in advance. With few parameters and fast search, Particle Sw... 详细信息
来源: 评论
DCOM-GNN: A Deep Clustering Optimization Method for Graph
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Haoran Wang, Junli Duan, Rui Yan, Chungang Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China
Deep clustering plays an important role in data analysis, and with the prevalence of graph data nowadays, various deep clustering models on graph are constantly proposed. However, due to the lack of more adequate clus... 详细信息
来源: 评论
Graph Ensemble Neural Network
SSRN
收藏 引用
SSRN 2023年
作者: Duan, Rui Yan, Chungang Wang, Junli Jiang, Changjun Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China
Ensemble methods have been shown to improve graph neural networks (GNNs). Existing ensemble methods on graphs determine a strong classifier by combining a set of trained base classifiers, i.e., combining the final out... 详细信息
来源: 评论
Convex Hull-based Algebraic Constraint for Visual Quadric SLAM
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Xiaolong Zhao, Junqiao Song, Shuangfu Zhu, Zhongyang Yuan, Zihan Ye, Chen Feng, Tiantian School of Computer Science and Technology Tongji University Shanghai China The MOE Key Lab of Embedded System and Service Computing Tongji University Shanghai China Institute of Intelligent Vehicles Tongji University Shanghai China School of Surveying and Geo-Informatics Tongji University Shanghai China
Using Quadrics as the object representation has the benefits of both generality and closed-form projection derivation between image and world spaces. Although numerous constraints have been proposed for dual quadric r... 详细信息
来源: 评论
Probabilistic bootstrap-based evolutionary algorithm for three-objective wind farm turbine position optimization
收藏 引用
Swarm and Evolutionary Computation 2025年 96卷
作者: Zhang, Chen Li, Haotian Li, Xiuxian Cheng, Jiujun Lei, Zhenyu Gao, Shangce Faculty of Engineering University of Toyama Toyama-shi 930-8555 Japan College of Electronics and Information Engineering Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China Ministry of Education Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Amid the worsening energy crisis, wind farm layout optimization (WFLO) to increase power generation, reduce costs, and mitigate potential environmental impacts is of great significance. This paper formulates three-obj... 详细信息
来源: 评论
Behavioral Unicity: On the Limits of Anonymized Social Behavior Metadata  1st
Behavioral Unicity: On the Limits of Anonymized Social Beh...
收藏 引用
1st Conference on Blockchain and Web3.0 Technology Innovation and Application, BWTAC 2024
作者: Tang, Hao Wang, Cheng Tongji University Shanghai201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Shanghai Artificial Intelligence Laboratory Shanghai200030 China Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Social behavior metadata has altered business models and human lifestyles. However, the inclusion of personal information in social behavior metadata poses risks of identity exposure for users. Under the requirements ... 详细信息
来源: 评论
A Behavioral Authentication Method for Mobile Based on Browsing Behaviors
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2020年 第6期7卷 1528-1541页
作者: Dongxiang Chen Zhijun Ding Chungang Yan Mimi Wang Department of Computer Science and Technology Tongji UniversityShanghai 201804China Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji UniversityShanghai 201804China IEEE
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio... 详细信息
来源: 评论
Upper Bounds on Lifetime of Three Dimensional Extended UWB Sensor Networks*
收藏 引用
Chinese Journal of Electronics 2023年 第2期19卷 307-312页
作者: Juan Xu Changjun Jiang Aihuang Guo Yongfa Hong Shu Li Cheng Wang School of Electronics and Information Engineering Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing of the Ministry of Education Tongji University Shanghai China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China
The upper bounds on lifetime of three dimensional extended Time hopping impulse radio Ultrawide band (TH-IR UWB) sensor networks are derived using percolation theory arguments. The TH-IR UWB sensor network consists of... 详细信息
来源: 评论
Joint DNN Partition and Thread Allocation Optimization for Energy-Harvesting MEC systems
Joint DNN Partition and Thread Allocation Optimization for E...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Yizhou Shi Liying Li Yue Zeng Peijin Cong Junlong Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education Shanghai China
Deep neural networks (DNNs) have demonstrated exceptional performance, leading to diverse applications across various mobile devices (MDs). Considering factors like portability and environmental sustainability, an inc... 详细信息
来源: 评论
Information Security Evaluation by Information Flow Analysis Based on Stochastic Petri Nets
Information Security Evaluation by Information Flow Analysis...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Hanqian Tu Dongming Xiang Wang Lin Guanjun Liu Department of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou China Department of Computer Science Key laboratory of Embedded System and Service Computing Ministry of Education Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Shanghai China
The Petri-net-based information flow analysis offers an effective approach for detecting information leakage by the concept of non-interference. Although the related studies propose efficient solutions, they lack quan... 详细信息
来源: 评论