咨询与建议

限定检索结果

文献类型

  • 1,467 篇 会议
  • 995 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,604 篇 工学
    • 1,045 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 322 篇 信息与通信工程
    • 246 篇 控制科学与工程
    • 175 篇 电子科学与技术(可...
    • 171 篇 电气工程
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 69 篇 材料科学与工程(可...
    • 67 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 63 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 789 篇 理学
    • 435 篇 数学
    • 154 篇 生物学
    • 144 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 66 篇 化学
    • 32 篇 大气科学
  • 422 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 176 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 85 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 41 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 35 篇 federated learni...
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 51 篇 national enginee...
  • 47 篇 key laboratory o...
  • 41 篇 school of comput...
  • 41 篇 shandong provinc...
  • 40 篇 school of cyber ...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 33 篇 university of ch...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 24 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 cheng wang
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 20 篇 hu shengshan
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,223 篇 英文
  • 146 篇 其他
  • 102 篇 中文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2464 条 记 录,以下是1101-1110 订阅
排序:
Learning How to Avoiding Obstacles for End-to-End Driving with Conditional Imitation Learning  19
Learning How to Avoiding Obstacles for End-to-End Driving wi...
收藏 引用
Proceedings of the 2019 2nd International Conference on Signal Processing and Machine Learning
作者: Enwei Zhang Hongtu Zhou Yongchao Ding Junqiao Zhao Chen Ye The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University School of Electronics and Information Engineering Shanghai P. R. China Tongji University School of Electronics and Information Engineering Shanghai P. R. China Tongji University School of Electronics and Information Engineering P. R. China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University School of Electronics and Information Engineering P. R. China
Obstacle avoiding is one of the most complex tasks for autonomous driving systems, which was also ignored by many cutting-edge end-to-end learning-based methods. The difficulties stem from the integrated process of de... 详细信息
来源: 评论
Random Occlusion Recovery with Noise Channel for Person Re-identification  16th
Random Occlusion Recovery with Noise Channel for Person Re-i...
收藏 引用
16th International Conference on Intelligent computing, ICIC 2020
作者: Zhang, Kun Wu, Di Yuan, Changan Qin, Xiao Wu, Hongjie Zhao, Xingming Zhang, Lijun Du, Yuchuan Wang, Hanli Institute of Machine Learning and Systems Biology School of Electronics and Information Engineering Tongji University Shanghai China Guangxi Academy of Science Nanning530025 China School of Computer and Information Engineering Nanning Normal University Nanning530299 China School of Computer Science and Technology Soochow University Suzhou215006 China School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou215009 China Fudan University Shanghai200433 China Key Laboratory of Computational Neuroscience and Brain-Inspired Intelligence Ministry of Education Shanghai China Collaborative Innovation Center of Intelligent New Energy Vehicle and School of Automotive Studies Tongji University Shanghai201804 China The Key Laboratory of Road and Traffic Engineering of the Ministry of Education Department of Transportation Engineering Tongji University Shanghai201804 China Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing and Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Person re-identification, as the basic task of a multi-camera surveillance system, plays an important role in a variety of surveillance applications. However, the current mainstream person re-identification model base... 详细信息
来源: 评论
Age-Upon-Decisions Minimizing Scheduling in Internet of Things: To Be Random or to Be Deterministic?
Age-Upon-Decisions Minimizing Scheduling in Internet of Thin...
收藏 引用
作者: Dong, Yunquan Chen, Zhengchuan Liu, Shanyun Fan, Pingyi Letaief, Khaled Ben School of Electronic and Information Engineering Nanjing University of Information Science and Technology Nanjing210044 China Key Laboratory of Dependable Service Computing in Cyber-Physical Society Ministry of Education Chongqing China Department of Electronic Engineering Tsinghua University Beijing China Department of Electrical and Computer Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
In this article, we consider an Internet of Things (IoT) system in which a sensor delivers updates to a monitor with exponential service time and first-come-first-served (FCFS) discipline. We investigate the freshness... 详细信息
来源: 评论
Finite time anti-synchronization of complex-valued neural networks with bounded asynchronous time-varying delays
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Xiwei Li, Zihan Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
In this paper, we studied the finite time anti-synchronization of master-slave coupled complex-valued neural networks (CVNNs) with bounded asynchronous time-varying delays. With the decomposing technique and the gener... 详细信息
来源: 评论
Improving read performance of lsm-tree based KV stores via dual grained caches  21
Improving read performance of lsm-tree based KV stores via d...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and systems, HPCC/SmartCity/DSS 2019
作者: Li, Xiang Xu, Guangping Fan, Hao Lu, Hongli Tang, Bo Xue, Yanbing Zong, Ziliang School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Department of Computer Science Texas State University San MarcosTX United States
key-value (KV) stores based on the Log-Structure Merge tree (LSM-tree) have been widely used in modern storage systems (e.g. LevelDB and RocksDB) to achieve high write throughput. However, conventional LSM-tree design... 详细信息
来源: 评论
Improved impossible differential cryptanalysis of large-block Rijndael
收藏 引用
Science China(Information Sciences) 2019年 第3期62卷 5-18页
作者: Ya LIU Yifan SHI Dawu GU Bo DAI Fengyu ZHAO Wei LI Zhiqiang LIU Zhiqiang ZENG Engineering Research Center of Optical Instrument and System Ministry of Education Shanghai Key Lab of Modern Optical System University of Shanghai for Science and Technology State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science and Technology Donghua University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Science and Technology on Information Assurance Laboratory
Rijndael is a substitution-permutation network(SPN) block cipher for the AES development process. Its block and key sizes range from 128 to 256 bits in steps of 32 bits, which can be denoted by Rijndael-b-k, where b... 详细信息
来源: 评论
Multi-granularity ensemble sample selection and label correction for classification with noisy labels
收藏 引用
Applied Soft computing 2025年 180卷
作者: Kecan Cai Hongyun Zhang Witold Pedrycz Duoqian Miao Chaofan Chen Department of Computer Science and Technology Tongji University Shanghai 201804 PR China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 PR China Department of Electrical and Computer Engineering University of Alberta Edmonton AB T6G 2R3 Canada Systems Research Institute Polish Academy of Sciences 00-901 Warsaw Poland Istinye University Faculty of Engineering and Natural Sciences Department of Computer Engineering Sariyer/Istanbul Turkiye
Sample selection is crucial in classification tasks with noisy labels, yet most existing sample selection methods rely on a single criterion. These approaches often face challenges, including low purity of selected cl...
来源: 评论
Hierarchical attention generative adversarial networks for cross-domain sentiment classification
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Yuebing Miao, Duoqian Wang, Jiaqi Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China
Cross-domain sentiment classification (CDSC) is an importance task in domain adaptation and sentiment classification. Due to the domain discrepancy, a sentiment classifier trained on source domain data may not works w... 详细信息
来源: 评论
Several classes of linear codes with few weights derived from Weil sums
收藏 引用
Finite Fields and Their Applications 2025年 108卷
作者: Zhao Hu Mingxiu Qiu Nian Li Xiaohu Tang Liwei Wu Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education the Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Hubei University Wuhan 430062 China State Key Laboratory of Integrated Service Networks Xi'an 710071 China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan 430062 China Information Coding & Transmission Key Lab of Sichuan Province CSNMT Int. Coop. Res. Centre (MoST) Southwest Jiaotong University Chengdu 610031 China Wuhan Maritime Communication Research Institute China
Linear codes with few weights have applications in secret sharing, authentication codes, association schemes and strongly regular graphs. In this paper, several classes of t -weight linear codes over F q are presented...
来源: 评论
A two-phase approach for locally differentially private fuzzy co-clustering
收藏 引用
Information Sciences 2025年 718卷
作者: Pengfei Zhang Jianlong An Xiang Cheng Youwen Zhu Ji Zhang Zhikun Zhang State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining No. 168 Shungeng Road Tianjiaan District 232001 Huainan China School of Computer Science and Engineering Anhui University of Science and Technology No. 168 Shungeng Road Tianjiaan District 232001 Huainan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics No. 237 Longquan Road Kunming 650221 Yunnan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) No. 3501 Daxue Road Jinan 255020 Shandong China Key Laboratory of Equipment Data Security and Guarantee Technology Guilin University of Electronic Technology No. 1 Jinji Road Guilin 541010 Guangxi China State Key Laboratory of Networking and Switching Technology No. 10 Xitucheng Road Haidian District 100876 Beijing China Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Haidian District 100876 Beijing China College of Computer and Data Science Nanjing University of Aeronautics and Astronautics No. 29 Yudao Street Qinhuai District Nanjing 210016 Jiangsu China School of Mathematics Physics and Computing University of Southern Queensland West Street Toowoomba 4350 Queensland Australia College of Computer Science and Technology Zhejiang University No. 38 Zheda Road Xihu District 310027 Hangzhou China
Clustering analysis is important for providing personalized services across various user experience optimization. As an advanced clustering technique, Fuzzy Co-Clustering ( FCC ) excels at handling high-dimensional da... 详细信息
来源: 评论