咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 157 篇 期刊文献

馆藏范围

  • 366 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 154 篇 计算机科学与技术...
    • 120 篇 软件工程
    • 53 篇 控制科学与工程
    • 40 篇 信息与通信工程
    • 25 篇 电气工程
    • 25 篇 生物工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 17 篇 交通运输工程
    • 12 篇 化学工程与技术
    • 8 篇 光学工程
    • 8 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 7 篇 安全科学与工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 动力工程及工程热...
  • 142 篇 理学
    • 96 篇 数学
    • 29 篇 生物学
    • 28 篇 系统科学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 10 篇 化学
    • 7 篇 大气科学
  • 72 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 17 篇 petri nets
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 training
  • 8 篇 throughput
  • 8 篇 accuracy
  • 8 篇 synchronization
  • 8 篇 web services
  • 7 篇 optimization
  • 7 篇 data mining
  • 7 篇 schedules
  • 7 篇 mathematical mod...
  • 7 篇 rough set theory
  • 6 篇 lattices
  • 6 篇 wireless sensor ...
  • 6 篇 computers
  • 6 篇 prediction algor...
  • 6 篇 system recovery
  • 5 篇 computer science
  • 5 篇 information syst...

机构

  • 73 篇 department of co...
  • 73 篇 key laboratory o...
  • 47 篇 the key laborato...
  • 42 篇 key laboratory o...
  • 18 篇 department of el...
  • 13 篇 department of el...
  • 9 篇 the key laborato...
  • 9 篇 department of co...
  • 9 篇 key laboratory o...
  • 9 篇 shanghai artific...
  • 8 篇 college of infor...
  • 8 篇 ieee
  • 8 篇 college of compu...
  • 8 篇 moe key laborato...
  • 7 篇 department of co...
  • 7 篇 department of el...
  • 6 篇 department of co...
  • 6 篇 department of in...
  • 5 篇 tongji universit...
  • 5 篇 tnlist school of...

作者

  • 33 篇 zhou mengchu
  • 26 篇 changjun jiang
  • 21 篇 mengchu zhou
  • 21 篇 jiang changjun
  • 16 篇 cheng wang
  • 14 篇 wang cheng
  • 14 篇 wang hanli
  • 13 篇 liu xiwei
  • 12 篇 xiang-yang li
  • 12 篇 miao duoqian
  • 11 篇 xiwei liu
  • 10 篇 hai jin
  • 9 篇 ding zhijun
  • 9 篇 zhang junqi
  • 9 篇 jin hai
  • 9 篇 zhao junqiao
  • 8 篇 shaojie tang
  • 7 篇 duoqian miao
  • 7 篇 yan chungang
  • 6 篇 lina ni

语言

  • 340 篇 英文
  • 18 篇 中文
  • 11 篇 其他
检索条件"机构=Service Computing Technology and System Laboratory"
366 条 记 录,以下是171-180 订阅
排序:
Finite time anti-synchronization of complex-valued neural networks with bounded asynchronous time-varying delays
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Xiwei Li, Zihan Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
In this paper, we studied the finite time anti-synchronization of master-slave coupled complex-valued neural networks (CVNNs) with bounded asynchronous time-varying delays. With the decomposing technique and the gener... 详细信息
来源: 评论
A parallel computing model for container terminal logistics
A parallel computing model for container terminal logistics
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: Bin Li Weiming Shen School of Transportation Fujian University of Technology Fuzhou China The Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Existing planning and scheduling solutions for container terminal logistics systems (CTLS) are not sufficient today due to the highly complexity and uncertain environments. This paper reviews the advantages and shortc... 详细信息
来源: 评论
Global µ-stability and finite-time control of octonion-valued neural networks with unbounded delays✡
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Jingzhu Liu, Xiwei Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
Octonion-valued neural networks (OVNNs) are a type of neural networks for which the states and weights are octonions. In this paper, the global µ-stability and finite-time stability problems for octonion-valued n... 详细信息
来源: 评论
Using convolutional neural network with asymmetrical kernels to predict speed of elevated highway  2nd
Using convolutional neural network with asymmetrical kernels...
收藏 引用
2nd IFIP TC 12 International Conference on Intelligence Science, ICIS 2017
作者: Zang, Di Ling, Jiawei Cheng, Jiujun Tang, Keshuang Li, Xin Department of Computer Science and Technology Tongji University Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Transportation Information and Control Engineering Tongji University Shanghai China Shanghai Lujie Electronic Technology Co. Ltd. Pudong Shanghai China
In this paper, we present a deep learning based approach to performing the whole-day prediction of the traffic speed for the elevated highway. In order to learn the temporal features of traffic speed data in a hierarc... 详细信息
来源: 评论
Traffic parameters prediction using a three-channel convolutional neural network  2nd
Traffic parameters prediction using a three-channel convolut...
收藏 引用
2nd IFIP TC 12 International Conference on Intelligence Science, ICIS 2017
作者: Zang, Di Wang, Dehai Cheng, Jiujun Tang, Keshuang Li, Xin Department of Computer Science and Technology Tongji University Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Transportation Information and Control Engineering Tongji University Shanghai China Shanghai Lujie Electronic Technology Co. Ltd. PudongShanghai China
Traffic three elements consisting of flow, speed and occupancy are very important parameters representing the traffic information. Prediction of them is a fundamental problem of Intelligent Transportation systems (ITS... 详细信息
来源: 评论
An optimized Apriori algorithm based on sparse matrix for intrusion detection
收藏 引用
Open Cybernetics and systemics Journal 2014年 第1期8卷 8-11页
作者: Zeng, Xiaohui Lv, Jingxiang Li, Jingzhong Luo, Wenlang Dept. of Computer Science and Technology Jinggangshan University Ji’an China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
The original Apriori algorithm is widely used in the intrusion detection field, but it may consume incredible computing resources in the process of handling network packets. We propose our optimized-Apriori algorithm ... 详细信息
来源: 评论
Extracting all minimal siphons from maximal unmarked siphons in manufacturing-oriented Petri nets
Extracting all minimal siphons from maximal unmarked siphons...
收藏 引用
2011 7th IEEE International Conference on Automation Science and Engineering, CASE 2011
作者: Wang, ShouGuang Zhou, MengChu Wang, ChengYing College of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou 310018 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102-1982 United States MoE Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 200092 China
Deadlock control is an important research issue in automated manufacturing systems that have a high degree of resource sharing and concurrency. Since minimal siphons are closely tied with deadlocks in Petri net models... 详细信息
来源: 评论
Scheduling of time constrained dual-arm cluster tools with wafer revisiting
Scheduling of time constrained dual-arm cluster tools with w...
收藏 引用
2013 IEEE International Conference on Automation Science and Engineering, CASE 2013
作者: Qiao, Yan Wu, Naiqi Zhou, Mengchu Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou 510006 China Macau University of Science and Technology China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102-1982 United States
This work intends to schedule a dual-arm cluster tool for the atomic layer deposition (ALD) process with wafer residency time constraints. ALD is a typical wafer revisiting process. Based on the analysis of system pro... 详细信息
来源: 评论
Hierarchical attention generative adversarial networks for cross-domain sentiment classification
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Yuebing Miao, Duoqian Wang, Jiaqi Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China
Cross-domain sentiment classification (CDSC) is an importance task in domain adaptation and sentiment classification. Due to the domain discrepancy, a sentiment classifier trained on source domain data may not works w... 详细信息
来源: 评论
Bridge the Gap Between Network-Based Inference Method and Global Ranking Method in Personal Recommendation
Bridge the Gap Between Network-Based Inference Method and Gl...
收藏 引用
IEEE Conference on Industrial Electronics and Applications
作者: Xiwei Liu Department of Computer Science and Technology Tongji University China The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai 200092 China
In this paper, we study the relationship between the network-based inference method and global ranking method in personal recommendation. By some theoretical analysis, we prove that the recommendation result under the... 详细信息
来源: 评论