咨询与建议

限定检索结果

文献类型

  • 41 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 62 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 24 篇 计算机科学与技术...
    • 19 篇 信息与通信工程
    • 17 篇 软件工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 6 篇 电气工程
    • 6 篇 交通运输工程
    • 4 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 2 篇 控制科学与工程
    • 2 篇 船舶与海洋工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 光学工程
    • 1 篇 城乡规划学
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 22 篇 理学
    • 18 篇 数学
    • 7 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 2 篇 系统科学
    • 1 篇 生物学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 2 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 军事学

主题

  • 6 篇 sensors
  • 3 篇 approximation al...
  • 3 篇 smart phones
  • 3 篇 mobile communica...
  • 2 篇 global positioni...
  • 2 篇 roads
  • 2 篇 smartphones
  • 2 篇 delays
  • 2 篇 resource managem...
  • 2 篇 monitoring
  • 2 篇 wireless sensor ...
  • 2 篇 tensile stress
  • 2 篇 algorithm design...
  • 2 篇 dynamic programm...
  • 2 篇 vehicles
  • 2 篇 energy efficienc...
  • 1 篇 sensor nodes
  • 1 篇 complex networks
  • 1 篇 conferences
  • 1 篇 urban areas

机构

  • 27 篇 department of co...
  • 26 篇 shanghai key lab...
  • 5 篇 hong kong univer...
  • 4 篇 moe-microsoft ke...
  • 3 篇 department of co...
  • 3 篇 center for brain...
  • 3 篇 moe-microsoft ke...
  • 2 篇 school of mathem...
  • 2 篇 department of el...
  • 2 篇 department of ps...
  • 2 篇 department of co...
  • 2 篇 shanghai key lab...
  • 2 篇 hkust fok ying t...
  • 2 篇 moe key laborato...
  • 2 篇 department of co...
  • 2 篇 shanghai key lab...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 center for brain...
  • 2 篇 department of co...

作者

  • 18 篇 yanmin zhu
  • 17 篇 zhu yanmin
  • 8 篇 lu bao-liang
  • 7 篇 jiadi yu
  • 4 篇 tong liu
  • 4 篇 zhang qian
  • 4 篇 yu jiadi
  • 3 篇 guan haibing
  • 3 篇 ruobing jiang
  • 3 篇 ni lionel m.
  • 3 篇 peng yong
  • 3 篇 li minglu
  • 3 篇 juan li
  • 2 篇 wang yin
  • 2 篇 jiang ruobing
  • 2 篇 forman george
  • 2 篇 gao min
  • 2 篇 wang yongjian
  • 2 篇 li bo
  • 2 篇 wang shen

语言

  • 62 篇 英文
检索条件"机构=Shanghai Key Lab. of Scalable Computing and Systems"
62 条 记 录,以下是1-10 订阅
排序:
Taxi travel time based Geographically Weighted Regression Model (GWR) for modeling public housing prices in Singapore  29
Taxi travel time based Geographically Weighted Regression Mo...
收藏 引用
29th International Conference on Geoinformatics, Geoinformatics 2022
作者: Wang, Yi'an Cai, Fangyi Cheng, Shih-Fen Wu, Bo Cao, Kai School of Geographic Sciences East China Normal University Shanghai China East China Normal University Key Laboratory of Geographic Information Science Ministry of Education Shanghai China East China Normal University Key Lab. of Spatial-temporal Big Data Analysis and Application of Natural Resources in Megacities Ministry of Natural Resources Shanghai China National University of Singapore Department of Geography Singapore School of Computing and Information Systems Singapore Management University Singapore School of Geography and Environment Jiangxi Normal University Jiangxi Nanchang China
In this research, a taxi travel time based Geographically Weighted Regression model (GWR) is proposed and utilized to model the public housing price in the case study of Singapore. In addition, a comparison between th... 详细信息
来源: 评论
Task Offloading and Dispatching for MEC with Selfish Mobile Devices and Access Points
Task Offloading and Dispatching for MEC with Selfish Mobile ...
收藏 引用
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
作者: Lu Fang Tong Liu Yanmin Zhu Yuanyuan Yang School of Computer Engineering and Science Shanghai University Shanghai Engineering Research Center of Intelligent Computing System Shanghai Key Lab of Scalable Computing and Systems Stony Brook University
Multi-access Edge computing (MEC) comes forth as a promising computing paradigm to meet the low-delay requirements of computation-intensive applications. In this work, we focus on the task offloading and dispatching p... 详细信息
来源: 评论
Accuracy-Guaranteed Event Detection via Collab.rative Mobile Crowdsensing with Unreliable Users  15th
Accuracy-Guaranteed Event Detection via Collaborative Mobile...
收藏 引用
15th EAI International Conference on Collab.rative computing: Networking, Applications and Worksharing, Collab.rateCom 2019
作者: Liu, Tong Wu, Wenbin Zhu, Yanmin Tong, Weiqin School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Lab of Scalable Computing and Systems Shanghai China
Recently, mobile crowdsensing has become a promising paradigm to collect rich spatial sensing data, by taking advantage of widely distributed sensing devices like smartphones. Based on sensing data, event detection ca... 详细信息
来源: 评论
Exploring architectural ingredients of adversarially robust deep neural networks  21
Exploring architectural ingredients of adversarially robust ...
收藏 引用
Proceedings of the 35th International Conference on Neural Information Processing systems
作者: Hanxun Huang Yisen Wang Sarah Erfani Quanquan Gu James Bailey Xingjun Ma School of Computing and Information Systems The University of Melbourne Victoria Australia Key Lab. of Machine Perception School of Artificial Intelligence Peking University Beijing China and Institute for Artificial Intelligence Peking University Beijing China University of California Los Angeles School of Computer Science Fudan University Shanghai China
Deep neural networks (DNNs) are known to be vulnerable to adversarial attacks. A range of defense methods have been proposed to train adversarially robust DNNs, among which adversarial training has demonstrated promis...
来源: 评论
Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Hanxun Wang, Yisen Erfani, Sarah Gu, Quanquan Bailey, James Ma, Xingjun School of Computing and Information Systems The University of Melbourne VIC Australia Key Lab. of Machine Perception School of Artificial Intelligence Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China University of California Los Angeles United States School of Computer Science Fudan University Shanghai China
Deep neural networks (DNNs) are known to be vulnerable to adversarial attacks. A range of defense methods have been proposed to train adversarially robust DNNs, among which adversarial training has demonstrated promis... 详细信息
来源: 评论
Improved impossible differential cryptanalysis of large-block Rijndael
收藏 引用
Science China(Information Sciences) 2019年 第3期62卷 5-18页
作者: Ya LIU Yifan SHI Dawu GU Bo DAI Fengyu ZHAO Wei LI Zhiqiang LIU Zhiqiang ZENG Engineering Research Center of Optical Instrument and System Ministry of Education Shanghai Key Lab of Modern Optical System University of Shanghai for Science and Technology State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science and Technology Donghua University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Science and Technology on Information Assurance Laboratory
Rijndael is a substitution-permutation network(SPN) block cipher for the AES development process. Its block and key sizes range from 128 to 256 bits in steps of 32 bits, which can be denoted by Rijndael-b-k, where b... 详细信息
来源: 评论
Espresso: Brewing Java for More Non-Volatility with Non-volatile Memory
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Mingyu Zhao, Ziming Li, Haoyu Li, Heting Chen, Haibo Zang, Binyu Guan, Haibing Shanghai Key Lab. of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University
Fast, byte-addressable non-volatile memory (NVM) em-braces both near-DRAM latency and disk-like persistence, which has generated considerable interests to revolutionize system software stack and programming models. Ho... 详细信息
来源: 评论
Accelerating Traditional File systems on Non-volatile Main Memory
Accelerating Traditional File Systems on Non-volatile Main M...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Weitong Jin Yanmin Zhu Linpeng Huang Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Lab of Scalable Computing and Systems
New non-volatile memory (NVM) technologies, e.g., Phase Change Memory (PCM), are emerging with main features such as byte addressability, cheapness and large size, and will be deployed to serve as main memory. For fas... 详细信息
来源: 评论
Topology and survivability analysis for flight flow networks: Case studies of three China airline companies  11
Topology and survivability analysis for flight flow networks...
收藏 引用
11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017
作者: Gao, Xiaofeng Dang, Yaru Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab of Scalable Computing and Systems Dept. of Computer Science Shanghai Jiao Tong University Shanghai China Civil Aviation SandT Educational Evaluation Research Center Civil Aviation University of China Tianjin China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
In this paper we study the survivability feature of airline networks. To measure survivability, we comprehensively consider the network structure measures such as degree distribution, average path length, clustering c... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论