咨询与建议

限定检索结果

文献类型

  • 208 篇 会议
  • 156 篇 期刊文献

馆藏范围

  • 364 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 251 篇 工学
    • 155 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 53 篇 控制科学与工程
    • 40 篇 信息与通信工程
    • 26 篇 电气工程
    • 25 篇 生物工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 17 篇 交通运输工程
    • 12 篇 化学工程与技术
    • 9 篇 光学工程
    • 9 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 7 篇 安全科学与工程
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
  • 143 篇 理学
    • 96 篇 数学
    • 28 篇 生物学
    • 28 篇 系统科学
    • 21 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 9 篇 化学
    • 7 篇 大气科学
  • 72 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 17 篇 petri nets
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 training
  • 8 篇 throughput
  • 8 篇 accuracy
  • 8 篇 synchronization
  • 8 篇 web services
  • 7 篇 data mining
  • 7 篇 schedules
  • 7 篇 mathematical mod...
  • 7 篇 rough set theory
  • 6 篇 lattices
  • 6 篇 optimization
  • 6 篇 wireless sensor ...
  • 6 篇 computers
  • 6 篇 system recovery
  • 5 篇 computer science
  • 5 篇 information syst...
  • 5 篇 deep learning

机构

  • 73 篇 department of co...
  • 72 篇 key laboratory o...
  • 47 篇 the key laborato...
  • 41 篇 key laboratory o...
  • 18 篇 department of el...
  • 13 篇 department of el...
  • 9 篇 the key laborato...
  • 9 篇 department of co...
  • 9 篇 key laboratory o...
  • 9 篇 shanghai artific...
  • 8 篇 college of infor...
  • 8 篇 ieee
  • 8 篇 college of compu...
  • 8 篇 moe key laborato...
  • 7 篇 department of co...
  • 7 篇 department of el...
  • 6 篇 department of co...
  • 6 篇 department of in...
  • 5 篇 tongji universit...
  • 5 篇 tnlist school of...

作者

  • 33 篇 zhou mengchu
  • 26 篇 changjun jiang
  • 21 篇 mengchu zhou
  • 21 篇 jiang changjun
  • 16 篇 cheng wang
  • 15 篇 wang hanli
  • 14 篇 wang cheng
  • 13 篇 liu xiwei
  • 12 篇 xiang-yang li
  • 12 篇 miao duoqian
  • 10 篇 xiwei liu
  • 10 篇 hai jin
  • 9 篇 ding zhijun
  • 9 篇 zhang junqi
  • 9 篇 jin hai
  • 9 篇 zhao junqiao
  • 8 篇 shaojie tang
  • 7 篇 yan chungang
  • 6 篇 lina ni
  • 6 篇 qiao yan

语言

  • 338 篇 英文
  • 18 篇 中文
  • 11 篇 其他
检索条件"机构=Service Computing Technology and System Laboratory"
364 条 记 录,以下是41-50 订阅
排序:
An optimized Apriori algorithm based on sparse matrix for intrusion detection
收藏 引用
Open Cybernetics and systemics Journal 2014年 第1期8卷 8-11页
作者: Zeng, Xiaohui Lv, Jingxiang Li, Jingzhong Luo, Wenlang Dept. of Computer Science and Technology Jinggangshan University Ji’an China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
The original Apriori algorithm is widely used in the intrusion detection field, but it may consume incredible computing resources in the process of handling network packets. We propose our optimized-Apriori algorithm ... 详细信息
来源: 评论
Autonomic Performance and Power Control on Virtualized Servers:Survey, Practices, and Trends
收藏 引用
Journal of Computer Science & technology 2014年 第4期29卷 631-645页
作者: 周笑波 蒋昌俊 IEEE ACM Department of Computer Science University of Colorado Colorado Springs U.S.A. The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University CCF Department of Computer Science and Technology Tongji University
Modern datacenter servers hosting popular Internet services face significant and multi-facet challenges in performance and power control. The user-perceived performance is the result of a complex interaction of comple... 详细信息
来源: 评论
On complementary effect of blended behavioral analysis for identity theft detection in mobile social networks  1
收藏 引用
13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017
作者: Wang, Cheng Luo, Jing Yang, Bo Jiang, Changjun Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science and Technology Tongji University Shanghai China
User behavioral analysis is expected to act as a promising technique for identity theft detection in the Internet. The performance of this paradigm extremely depends on a good individual-level user behavioral model. S... 详细信息
来源: 评论
Multi‐granularity re‐ranking for visible‐infrared person re‐identification
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 770-779页
作者: Yadi Wang Hongyun Zhang Duoqian Miao Witold Pedrycz Department of Computer Science and Technology Tongji UniversityShanghaiChina Key Laboratory of Embedded System and Service Computing Ministry of EducationShanghaiChina Department of Electrical and Computer Engineering University of AlbertaEdmontonAlbertaCanada System Research Institute Polish Academy of SciencesWarsawPoland
Visible‐infrared person re‐identification(VI‐ReID)is a supplementary task of single‐modality re‐identification,which makes up for the defect of conventional re‐identification under insufficient *** is more chall... 详细信息
来源: 评论
A service selection method based on web service clusters
收藏 引用
Journal of Applied Sciences 2013年 第24期13卷 5734-5738页
作者: Liu, Wei Du, Yu-Yue Yan, Chun College of Information Science and Engineering Shandong University of Science and Technology 266590 Qingdao China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University 200092 Shanghai China
service selection is an essential issue in service discovery based on Web service clusters. The ratio of trust value to price is introduced to select the most suitable service in a cluster. The method of computing the... 详细信息
来源: 评论
Adaptive social network construction using Gaussian mixture model
收藏 引用
Information technology Journal 2011年 第12期10卷 2252-2259页
作者: Guo, Xin Xiang, Yang Chen, Qian Wei, Wei Department of Computer Science and Technology School of Electronic and Information Engineering Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China
A Social network graph shows social interactions and relationships between individuals in a specific social environment, which is very helpful for analyzing social relationships, activities, structures, etc. The autho... 详细信息
来源: 评论
A Novel Mutual Information based Ant Colony Classifier  5
A Novel Mutual Information based Ant Colony Classifier
收藏 引用
2017 International Conference on Progress in Informatics and computing(PIC)
作者: Hang Yu Xiaoxiao Qian Yang Yu Jiujun Cheng Ying Yu Shangce Gao College of Computer Science and Technology Taizhou University Faculty of Engineering University of Toyama Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University
By constructing a list of IF-THEN rules, the traditional ant colony optimization(ACO) has been successfully applied on data classification with not only a promising accuracy but also a user comprehensibility. However,... 详细信息
来源: 评论
Performance analysis for large scale parallel microscopic traffic simulation system
Performance analysis for large scale parallel microscopic tr...
收藏 引用
International Symposium on Advances in Computer and Sensor Networks and systems, 2008
作者: Fei, Yin Dongliang, Zhang Department of Computer Science and Technology Tongji University The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai 201804 China
In this paper, we present the parallel implementation of the traffic microsimulation PMTS (Parallel Microscopic Traffic Simulation) focusing on the performance issues. The parallelization of PMTS is domain decompositi... 详细信息
来源: 评论
Robust Learning to Rank Based on Portfolio Theory and AMOSA Algorithm
收藏 引用
IEEE Transactions on systems, Man, and Cybernetics: systems 2017年 第6期47卷 1007-1018页
作者: Li, Jinzhong Liu, Guanjun Yan, Chungang Jiang, Changjun Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Watershed Ecology and Geographical Environment Monitoring NASG Department of Computer Science and Technology Jinggangshan University Ji'an343009 China
Effectiveness is the most important factor considered in the ranking models yielded by algorithms of learning to rank (LTR). Most of the related ranking models only focus on improving the average effectiveness but ign... 详细信息
来源: 评论
Upper Bounds on Lifetime of Three Dimensional Extended UWB Sensor Networks
收藏 引用
电子学报(英文版) 2010年 第2期19卷 307-312页
作者: XU Juan JIANG Changjun GUO Aihuang HONG Yongfa LI Shu WANG Cheng School of Electronics and Information Engineering Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing of the Ministry of Education Tongji University Shanghai China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China
The upper bounds on lifetime of three dimensional extended Time hopping impulse radio Ultrawide band (TH-IR UWB) sensor networks are derived using percolation theory arguments. The TH-IR UWB sensor network consists of... 详细信息
来源: 评论