咨询与建议

限定检索结果

文献类型

  • 237 篇 会议
  • 108 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 163 篇 计算机科学与技术...
    • 122 篇 软件工程
    • 62 篇 信息与通信工程
    • 31 篇 电子科学与技术(可...
    • 26 篇 电气工程
    • 20 篇 控制科学与工程
    • 18 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 光学工程
    • 9 篇 仪器科学与技术
    • 8 篇 生物工程
    • 6 篇 环境科学与工程(可...
    • 5 篇 网络空间安全
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
  • 93 篇 理学
    • 69 篇 数学
    • 22 篇 统计学(可授理学、...
    • 13 篇 系统科学
    • 12 篇 物理学
    • 11 篇 生物学
  • 67 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 5 篇 法学
    • 5 篇 社会学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 14 篇 sensors
  • 11 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 10 篇 approximation al...
  • 10 篇 resource managem...
  • 10 篇 algorithm design...
  • 9 篇 monitoring
  • 9 篇 servers
  • 9 篇 virtualization
  • 8 篇 wireless communi...
  • 8 篇 optimization
  • 7 篇 graphics process...
  • 7 篇 semantics
  • 6 篇 roads
  • 6 篇 schedules
  • 6 篇 pricing
  • 6 篇 hardware
  • 6 篇 vehicles
  • 5 篇 conferences
  • 5 篇 throughput

机构

  • 73 篇 shanghai key lab...
  • 59 篇 shanghai key lab...
  • 40 篇 department of co...
  • 26 篇 shanghai key lab...
  • 20 篇 shanghai key lab...
  • 11 篇 shanghai key lab...
  • 10 篇 department of co...
  • 9 篇 school of softwa...
  • 9 篇 shanghai key lab...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 state key labora...
  • 7 篇 school of softwa...
  • 5 篇 school of electr...
  • 5 篇 institute of par...
  • 5 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 hong kong univer...
  • 4 篇 school of softwa...
  • 4 篇 moe-microsoft ke...

作者

  • 40 篇 chen guihai
  • 39 篇 guan haibing
  • 33 篇 guihai chen
  • 30 篇 wu fan
  • 26 篇 yanmin zhu
  • 26 篇 fan wu
  • 22 篇 zhu yanmin
  • 21 篇 haibing guan
  • 19 篇 gao xiaofeng
  • 16 篇 qi zhengwei
  • 14 篇 xiaofeng gao
  • 13 篇 li wu-jun
  • 11 篇 chen haibo
  • 11 篇 guo minyi
  • 10 篇 zhengwei qi
  • 10 篇 liang alei
  • 9 篇 lu bao-liang
  • 9 篇 zang binyu
  • 9 篇 zheng zhenzhe
  • 8 篇 zhenzhe zheng

语言

  • 334 篇 英文
  • 10 篇 其他
  • 2 篇 中文
检索条件"机构=Shanghai Key Lab of Scalable Computing and Systems"
346 条 记 录,以下是261-270 订阅
排序:
Isotropic hashing
Isotropic hashing
收藏 引用
26th Annual Conference on Neural Information Processing systems 2012, NIPS 2012
作者: Kong, Weihao Li, Wu-Jun Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University China
Most existing hashing methods adopt some projection functions to project the original data into several dimensions of real values, and then each of these projected dimensions is quantized into one bit (zero or one) by... 详细信息
来源: 评论
A generic construction of accountable decryption and its applications
A generic construction of accountable decryption and its app...
收藏 引用
17th Australasian Conference on Information Security and Privacy, ACISP 2012
作者: Zhou, Xuhua Ding, Xuhua Chen, Kefei Shanghai Jiao Tong University China Singapore Management University Singapore Singapore Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
We propose a new cryptographic notion called accountable decryption by which, given a ciphertext, a decryptor proves both the correctness of his decryption and the plaintext authenticity to a public verifier. We defin... 详细信息
来源: 评论
Fast Viterbi map matching with tunable weight functions  12
Fast Viterbi map matching with tunable weight functions
收藏 引用
20th ACM SIGSPATIAL International Conference on Advances in Geographic Information systems, ACM SIGSPATIAL GIS 2012
作者: Wei, Hong Wang, Yin Forman, George Zhu, Yanmin Guan, Haibing Shanghai Key Lab. of Scalable Computing and Systems Shanghai Jiao Tong University China Hewlett-Packard Labs. Palo Alto CA United States
This paper describes a map matching program submitted to the ACM SIGSPATIAL Cup 2012. We first summarize existing map matching algorithms into three categories, and compare their performance thoroughly. In general, gl... 详细信息
来源: 评论
Workload-aware opportunistic routing in multi-channel, multi-radio wireless mesh networks
Workload-aware opportunistic routing in multi-channel, multi...
收藏 引用
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012
作者: Wu, Fan Vaidya, Nitin Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China ECE Coordinated Science Lab University of Illinois Urbana-Champaign United States
Opportunistic routing emerged as a novel technique to cope with the problem of highly unpredictable and lossy wireless channels in urban wireless mesh networks. However, existing opportunistic routing protocols only c... 详细信息
来源: 评论
High availability through output continuity
High availability through output continuity
收藏 引用
2012 IEEE International Conference on Cluster computing Workshops, Cluster Workshops 2012
作者: Ye, Wei Dong, Yaozu Ma, Ruhui Liang, Alei Guan, Haibing Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Intel China Software Center Shanghai 200241 China
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio... 详细信息
来源: 评论
Annihilators of fast discrete fourier spectra attacks
Annihilators of fast discrete fourier spectra attacks
收藏 引用
7th International Workshop on Security, IWSEC 2012
作者: Wang, Jingjing Chen, Kefei Zhu, Shixiong Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China Science and Technology on Communication Security Laboratory Chengdu China
Spectra attacks proposed recently are more data efficient than algebraic attacks against stream cipher. They are also time-and-space efficient. A measurement of the security of a stream cipher against spectra attacks ... 详细信息
来源: 评论
Improving Unsegmented Network Coding for Opportunistic Routing in Wireless Mesh Network
Improving Unsegmented Network Coding for Opportunistic Routi...
收藏 引用
IEEE Wireless Communications and Networking Conference (WCNC)
作者: Chen, Chen Dong, Chao Wu, Fan Wang, Hai Peng, Laixian Nie, Jingnan Institute of Communications Engineering P.L.A. University of Science and Technology China Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
Unsegmented network coding was incorporated into opportunistic routing to improve inefficient schedule of segmented network coding due to delayed feedback. However, most unsegmented network coding schemes fail to cons... 详细信息
来源: 评论
CATS: Cache Aware Task-Stealing based on online profiling in multi-socket multi-core architectures  12
CATS: Cache Aware Task-Stealing based on online profiling in...
收藏 引用
26th ACM International Conference on Supercomputing, ICS'12
作者: Chen, Quan Guo, Minyi Huang, Zhiyi Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science Shanghai Jiao Tong University China Department of Computer Science University of Otago New Zealand
Multi-socket Multi-core architectures with shared caches in each socket have become mainstream when a single multi-core chip cannot provide enough computing capacity for high performance computing. However, traditiona... 详细信息
来源: 评论
EEG-based fatigue classification by using parallel hidden Markov model and pattern classifier combination
EEG-based fatigue classification by using parallel hidden Ma...
收藏 引用
19th International Conference on Neural Information Processing, ICONIP 2012
作者: Sun, Hui Lu, Bao-Liang Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE-Microsoft Key Lab. for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE Key Laboratory of Systems Biomedicine Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China
Fatigue is the most important reason leading to traffic accidents. In order to ensure traffic safety, various methods based on electroencephalogram (EEG) are proposed. But most of them, either regression or classifica... 详细信息
来源: 评论
Online vigilance analysis combining video and electrooculography features
Online vigilance analysis combining video and electrooculogr...
收藏 引用
19th International Conference on Neural Information Processing, ICONIP 2012
作者: Du, Ruo-Fei Liu, Ren-Jie Wu, Tian-Xiang Lu, Bao-Liang Center for Brain-like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE-Microsoft Key Lab. for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE Key Laboratory of Systems Biomedicine Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China
In this paper, we propose a novel system to analyze vigilance level combining both video and Electrooculography (EOG) features. For one thing, the video features extracted from an infrared camera include percentage of... 详细信息
来源: 评论