咨询与建议

限定检索结果

文献类型

  • 38 篇 会议
  • 22 篇 期刊文献

馆藏范围

  • 60 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 30 篇 计算机科学与技术...
    • 22 篇 软件工程
    • 12 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 电气工程
    • 2 篇 环境科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
  • 26 篇 理学
    • 21 篇 数学
    • 6 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 3 篇 物理学
    • 1 篇 大气科学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 3 篇 convolution
  • 3 篇 algebra
  • 2 篇 model checking
  • 2 篇 data mining
  • 2 篇 privacy
  • 2 篇 wireless network...
  • 1 篇 tools
  • 1 篇 self-aware
  • 1 篇 object detection
  • 1 篇 scalability
  • 1 篇 numerical ration...
  • 1 篇 reinforcement le...
  • 1 篇 dynamical system...
  • 1 篇 approximation al...
  • 1 篇 user profile
  • 1 篇 vehicle behavior...
  • 1 篇 software defined...
  • 1 篇 relative error
  • 1 篇 lstm
  • 1 篇 trim47 gene

机构

  • 7 篇 shanghai key lab...
  • 6 篇 shanghai key lab...
  • 5 篇 school of inform...
  • 5 篇 shanghai key lab...
  • 4 篇 software enginee...
  • 3 篇 state key lab. o...
  • 3 篇 shanghai key lab...
  • 3 篇 shanghai key lab...
  • 3 篇 moe engineering ...
  • 3 篇 school of softwa...
  • 2 篇 school of mathem...
  • 2 篇 tongji universit...
  • 2 篇 shanghai key lab...
  • 2 篇 lab. of computer...
  • 2 篇 department of ps...
  • 2 篇 shanghai key lab...
  • 2 篇 tongji universit...
  • 2 篇 state key lab of...
  • 2 篇 fujian institute...
  • 2 篇 shanghai key lab...

作者

  • 7 篇 shi yuanming
  • 7 篇 wang ting
  • 3 篇 li xuhui
  • 3 篇 zhou yong
  • 3 篇 jiang yuning
  • 3 篇 luo xiangfeng
  • 3 篇 jing liu
  • 3 篇 ting wang
  • 3 篇 zhengfeng yang
  • 2 篇 xia bican
  • 2 篇 wu min
  • 2 篇 tang xuan
  • 2 篇 tian xiuxia
  • 2 篇 shi qingjiang
  • 2 篇 wang xiaoling
  • 2 篇 liu xin
  • 2 篇 peng chao
  • 2 篇 yang lu
  • 2 篇 zhan naijun
  • 2 篇 mei jingyi

语言

  • 54 篇 英文
  • 6 篇 其他
检索条件"机构=Shanghai Key Lab. of Trustworthy Computing Software Engineering"
60 条 记 录,以下是31-40 订阅
排序:
More than an answer: Neural pivot network for visual qestion answering  17
More than an answer: Neural pivot network for visual qestion...
收藏 引用
25th ACM International Conference on Multimedia, MM 2017
作者: Zhou, Yiyi Ji, Rongrong Su, Jinsong Wu, Yongjian Wu, Yunsheng Fujian Key Laboratory of Sensing and Computing for Smart City Xiamen University 361005 China School of Information Science and Engineering Xiamen University 361005 China School of Software Xiamen University 361005 China Tencent YouTu Lab. Tencent Technology Shanghai China
Most of existing works in visual question answering (VQA) are dedicated to improving the performance of answer predictions, while leaving the explanation of answering unexploited. We argue that, exploiting the explana... 详细信息
来源: 评论
Perturbation techniques for convergence analysis of proximal gradient method and other first-order algorithms via variational analysis
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Xiangfeng Ye, Jane J. Yuan, Xiaoming Zeng, Shangzhi Zhang, Jin Shanghai Key Lab for Trustworthy Computing School of Computer Science and Software Engineering East China Normal University China Department of Mathematics and Statistics University of Victoria Canada Department of Mathematics University of Hong Kong Hong Kong Hong Kong Department of Mathematics University of Hong Kong Hong Kong Hong Kong Department of Mathematics Hong Kong Baptist University Hong Kong HKBU Institute of Research and Continuing Education Shenzhen China
We develop new perturbation techniques for conducting convergence analysis of various first-order algorithms for a class of nonsmooth optimization problems. We consider the iteration scheme of an algorithm to construc... 详细信息
来源: 评论
On the Convergence Rate of a Class of Proximal-Based Decomposition Methods for Monotone Variational Inequalities
收藏 引用
Journal of the Operations Research Society of China 2015年 第3期3卷 347-362页
作者: Xiang-Feng Wang Shanghai Key Lab for Trustworthy Computing Software Engineering InstituteEast China Normal UniversityShanghai 200062China
A unified efficient algorithm framework of proximal-based decomposition methods has been proposed for monotone variational inequalities in 2012,while only global convergence is proved at the same *** this paper,we giv... 详细信息
来源: 评论
More Than Address: Pre-Identify Your Income with the Open Data
More Than Address: Pre-Identify Your Income with the Open Da...
收藏 引用
International Conference on Cloud computing and Big Data, CCBD 2015
作者: Li, Ruoyu Xiong, Huanyu Zhao, Hui Software Engineering Institute East China Normal University Shanghai China Shanghai Key Lab. of Trustworthy Computing East China Normal University China
Modern e-commerce websites collect immense amounts of transaction data, and almost each of them is associated with at least one delivery address. To promote sales, e-commerce operators are eager to identify the custom... 详细信息
来源: 评论
A validated method of solving initial value problem for ODEs
A validated method of solving initial value problem for ODEs
收藏 引用
Proceedings of the Asia-Pacific Conference on Computer Science and Applications, CSAC 2014
作者: Tang, Min Wu, Min Deng, Guoqiang Shanghai Key Lab of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China School of Mathematics & Computing Science Guilin University of Electrical Technology Guilin China
In this paper, we present an interval method to test existence and uniqueness of solutions to the initial value problem of ODEs, and an iterative computational test is proposed to compute validated solutions of ODEs. ... 详细信息
来源: 评论
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
Joint Power Splitting and Secure Beamforming Design in the W...
收藏 引用
IEEE Global Communications Conference
作者: Mingxiong Zhao Suili Feng Xiangfeng Wang Meng Zhang Yuan Liu Hao Fu School of Electronic and Information Engineering South China University of Technology Shanghai Key Lab. of Trustworthy Computing Software Engineering Institute East China Normal Univ.
In this work, we maximize the secrecy rate of the wireless-powered untrusted amplify-and-forward relay networks by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal al... 详细信息
来源: 评论
More Than Address: Pre-Identify Your Income with the Open Data
More Than Address: Pre-Identify Your Income with the Open Da...
收藏 引用
International Conference on Cloud computing and Big Data (CCBD)
作者: Ruoyu Li Huanyu Xiong Hui Zhao Software Engineering Institute East China Normal University Shanghai China Shanghai Key Lab of Trustworthy Computing East China Normal University China
Modern e-commerce websites collect immense amounts of transaction data, and almost each of them is associated with at least one delivery address. To promote sales, e-commerce operators are eager to identify the custom... 详细信息
来源: 评论
On deploying relays for connected indoor sensor networks
收藏 引用
Journal of Communications and Networks 2014年 第3期16卷 335-343页
作者: Zhu, Yanmin Xue, Cuiyao Cai, Haibin Yu, Jiadi Ni, Lei Li, Minglu Li, Bo Shanghai Key Lab. of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University China Department of Computer Science and Engineering Shanghai Jiao Tong University China Software Engineering Institute East China Normal University China Shanghai Jiao Tong University Hong Kong University of Science and Technology Hong Kong
This paper considers the crucial problem of deploying wireless relays for achieving a connected wireless sensor network in indoor environments, an important aspect related to the management of the sensor network. Seve... 详细信息
来源: 评论
Coalgebras for fuzzy transition systems
Coalgebras for fuzzy transition systems
收藏 引用
作者: Wu, Hengyang Chen, Yixiang Information Engineer College Hangzhou Dianzi University Hangzhou 310018 China MoE Engineering Research Center for Software/Hardware Co-design Technology and Application Shanghai Key Lab for Trustworthy Computing East China Normal University Shanghai 200062 China
This paper studies a coalgebraic theory of fuzzy transition systems. Main conclusions include: the functor FA for deterministic fuzzy transition systems and the functor (Pa°F)A for nondeterministic fuzzy transiti... 详细信息
来源: 评论
Comprehensive economic strength assessment based on decision tree algorithm
收藏 引用
Computer Modelling and New Technologies 2014年 第12期18卷 403-407页
作者: Hou, Yuan Wu, Min Shanghai Key Lab of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China
In this paper, we apply some computer software techniques in socio-economics to study an economic decision-making problem, the comprehensive economic strength assessment problem. To achieve delicacy socio-economical d... 详细信息
来源: 评论