咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 971 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,561 篇 工学
    • 1,010 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 168 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 434 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 32 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 35 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,228 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2414 条 记 录,以下是1051-1060 订阅
排序:
A Distributed Dynamic Adaptive and Fast Balancing SDN Controller Management  6
A Distributed Dynamic Adaptive and Fast Balancing SDN Contro...
收藏 引用
6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2018
作者: Liu, Yang He, Qian Li, Xiongying Zhou, Shuiming Guangxi Transportation Research and Consulting Co. Ltd Nanning530007 China Guangxi Key Laboratory of Cryptograph and Information Security Guangxi University Key Laboratory of Cloud Computing and Complex System Guilin University of Electronic Technology Guilin541004 China
Tradition Software Defined Network (SDN) suffers from single point failure and uneven load distribution problems. Multiple SDN controllers work together to construct a distributed dynamic adaptive cluster with dynamic... 详细信息
来源: 评论
Network Risk Assessment Based on Improved MulVAL Framework and HMM  2nd
Network Risk Assessment Based on Improved MulVAL Framework a...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Wang, Chundong Li, Kongbo Tian, Yunkun He, Xiaonan Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin E-Hualu Information Technology Co. Ltd. Tianjin China
With the increasingly extensive applications of the network, the security of internal network of enterprises is facing more and more threats from the outside world, which implies the importance to master the network r... 详细信息
来源: 评论
Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection  2nd
Two-Level Feature Selection Method for Low Detection Rate At...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Wang, Chundong Ye, Xin He, Xiaonan Tian, Yunkun Gong, Liangyi Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin E-Hualu Information Technology Co. Ltd. Tianjin300350 China
In view of the fact that some attacks have low detection rates in intrusion detection dataset, a two-level feature selection method based on minimal-redundancy-maximal-relevance (mRMR) and information gain (IG) was pr... 详细信息
来源: 评论
Large-scale video compression: recent advances and challenges
收藏 引用
Frontiers of Computer Science 2018年 第5期12卷 825-839页
作者: Tao TIAN Hanli WANG Department of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China Shanghai Engineering Research Center of Industrial Vision Perception & Intelligent Computing Shanghai 200092 China
The evolution of social network and multimedia technologies encourage more and more people to generate and upload visual information, which leads to the generation of large-scale video data. Therefore, preeminent comp... 详细信息
来源: 评论
A Deep Concept-aware Model for predicting and explaining restaurant future status
A Deep Concept-aware Model for predicting and explaining res...
收藏 引用
IEEE International Conference on Web services (ICWS)
作者: Hao Liao Xiaojie Zhang Xin Li Mingyang Zhou Alexandre Vidmer Rui Mao Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Guangdong Province Engineering Center of China-made High Performance Data Computing System Shenzhen City Key Laboratory of Service Computing and Application Shenzhen China Institute of Big Data Intelligent Management and Decision Shenzhen University Shenzhen China
Nowadays, with the development of web services, the survival of online service has captured public attention significantly. Future prediction of business is crucial to the shopkeepers. Predicting how the business will... 详细信息
来源: 评论
Learning How to Avoiding Obstacles for End-to-End Driving with Conditional Imitation Learning  19
Learning How to Avoiding Obstacles for End-to-End Driving wi...
收藏 引用
Proceedings of the 2019 2nd International Conference on Signal Processing and Machine Learning
作者: Enwei Zhang Hongtu Zhou Yongchao Ding Junqiao Zhao Chen Ye The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University School of Electronics and Information Engineering Shanghai P. R. China Tongji University School of Electronics and Information Engineering Shanghai P. R. China Tongji University School of Electronics and Information Engineering P. R. China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University School of Electronics and Information Engineering P. R. China
Obstacle avoiding is one of the most complex tasks for autonomous driving systems, which was also ignored by many cutting-edge end-to-end learning-based methods. The difficulties stem from the integrated process of de... 详细信息
来源: 评论
Random Occlusion Recovery with Noise Channel for Person Re-identification  16th
Random Occlusion Recovery with Noise Channel for Person Re-i...
收藏 引用
16th International Conference on Intelligent computing, ICIC 2020
作者: Zhang, Kun Wu, Di Yuan, Changan Qin, Xiao Wu, Hongjie Zhao, Xingming Zhang, Lijun Du, Yuchuan Wang, Hanli Institute of Machine Learning and Systems Biology School of Electronics and Information Engineering Tongji University Shanghai China Guangxi Academy of Science Nanning530025 China School of Computer and Information Engineering Nanning Normal University Nanning530299 China School of Computer Science and Technology Soochow University Suzhou215006 China School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou215009 China Fudan University Shanghai200433 China Key Laboratory of Computational Neuroscience and Brain-Inspired Intelligence Ministry of Education Shanghai China Collaborative Innovation Center of Intelligent New Energy Vehicle and School of Automotive Studies Tongji University Shanghai201804 China The Key Laboratory of Road and Traffic Engineering of the Ministry of Education Department of Transportation Engineering Tongji University Shanghai201804 China Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing and Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Person re-identification, as the basic task of a multi-camera surveillance system, plays an important role in a variety of surveillance applications. However, the current mainstream person re-identification model base... 详细信息
来源: 评论
Age-Upon-Decisions Minimizing Scheduling in Internet of Things: To Be Random or to Be Deterministic?
Age-Upon-Decisions Minimizing Scheduling in Internet of Thin...
收藏 引用
作者: Dong, Yunquan Chen, Zhengchuan Liu, Shanyun Fan, Pingyi Letaief, Khaled Ben School of Electronic and Information Engineering Nanjing University of Information Science and Technology Nanjing210044 China Key Laboratory of Dependable Service Computing in Cyber-Physical Society Ministry of Education Chongqing China Department of Electronic Engineering Tsinghua University Beijing China Department of Electrical and Computer Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
In this article, we consider an Internet of Things (IoT) system in which a sensor delivers updates to a monitor with exponential service time and first-come-first-served (FCFS) discipline. We investigate the freshness... 详细信息
来源: 评论
Finite time anti-synchronization of complex-valued neural networks with bounded asynchronous time-varying delays
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Xiwei Li, Zihan Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
In this paper, we studied the finite time anti-synchronization of master-slave coupled complex-valued neural networks (CVNNs) with bounded asynchronous time-varying delays. With the decomposing technique and the gener... 详细信息
来源: 评论
Improving read performance of lsm-tree based KV stores via dual grained caches  21
Improving read performance of lsm-tree based KV stores via d...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and systems, HPCC/SmartCity/DSS 2019
作者: Li, Xiang Xu, Guangping Fan, Hao Lu, Hongli Tang, Bo Xue, Yanbing Zong, Ziliang School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Department of Computer Science Texas State University San MarcosTX United States
key-value (KV) stores based on the Log-Structure Merge tree (LSM-tree) have been widely used in modern storage systems (e.g. LevelDB and RocksDB) to achieve high write throughput. However, conventional LSM-tree design... 详细信息
来源: 评论