咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 219 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 573 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 403 篇 工学
    • 247 篇 计算机科学与技术...
    • 180 篇 软件工程
    • 87 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 43 篇 电子科学与技术(可...
    • 41 篇 电气工程
    • 35 篇 机械工程
    • 33 篇 交通运输工程
    • 30 篇 生物工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 16 篇 安全科学与工程
    • 15 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 195 篇 理学
    • 135 篇 数学
    • 39 篇 系统科学
    • 33 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 13 篇 化学
  • 116 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 21 篇 法学
    • 19 篇 社会学
  • 12 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 26 篇 petri nets
  • 21 篇 feature extracti...
  • 16 篇 web services
  • 14 篇 training
  • 10 篇 roads
  • 10 篇 data mining
  • 10 篇 graph neural net...
  • 10 篇 computational mo...
  • 10 篇 synchronization
  • 9 篇 conferences
  • 9 篇 support vector m...
  • 9 篇 algorithm design...
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 optimization
  • 8 篇 schedules
  • 8 篇 wireless sensor ...
  • 8 篇 system recovery
  • 8 篇 rough set theory

机构

  • 120 篇 key laboratory o...
  • 83 篇 department of co...
  • 71 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 18 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...
  • 9 篇 moe key laborato...
  • 8 篇 institute of int...

作者

  • 38 篇 changjun jiang
  • 35 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 23 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 ding zhijun
  • 18 篇 yan chungang
  • 18 篇 ye chen
  • 17 篇 wang hanli
  • 16 篇 miao duoqian
  • 15 篇 wang cheng
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 xiwei liu
  • 11 篇 liu guanjun
  • 10 篇 yaying zhang

语言

  • 540 篇 英文
  • 24 篇 中文
  • 12 篇 其他
检索条件"机构=The Key Lab of Embedded System and Service Computing"
573 条 记 录,以下是521-530 订阅
排序:
Automatic vector-based road structure mapping using multi-beam lidar
arXiv
收藏 引用
arXiv 2018年
作者: He, Xudong Zhao, Junqiao Sun, Lu Huang, Yewei Zhang, Xinglian Li, Jun Ye, Chen Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education Shanghai Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai School of Surveying and Geo-Informatics Tongji University Shanghai China School of Automotive Studies Tongji University Shanghai China
In this paper, we studied a SLAM method for vector-based road structure mapping using multi-beam LiDAR. We propose to use the polyline as the primary mapping element instead of grid cell or point cloud, because the ve... 详细信息
来源: 评论
HeavyTracker: An Efficient Algorithm for Heavy-Hitter Detection in High-Speed Networks
HeavyTracker: An Efficient Algorithm for Heavy-Hitter Detect...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Jiakun Yu Yu-E Sun He Huang Yang Du Guoju Gao Hongli Xu Shigang Chen School of Computer Science and Technology Soochow University Suzhou China School of Rail Transportation Soochow University Suzhou China Ministry of Education Key Laboratory of Embedded System and Service Computing (Tongji University) Shanghai China School of Computer Science and Technology University of Science and Technology of China Hefei China
Detecting heavy hitters that constitute the majority of network traffic is a critical task in network measurement. However, the highly skewed network traffic and the size-limited on-chip memory pose great challenges f... 详细信息
来源: 评论
Software services protection security protocol based on software watermarking in cloud environment
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 176-181页
作者: Xu, Jin-Chao Zeng, Guo-Sun Wang, Wei Department of Computer Science and Technology Tongji University Shanghai 201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China
Aimed to resist the infringement of software services in cloud environment, a software services protection security protocol based on software watermarking in cloud environment was presented. On the consideration of a... 详细信息
来源: 评论
TiEV: The tongji intelligent electric vehicle in the intelligent vehicle future challenge of China
arXiv
收藏 引用
arXiv 2018年
作者: Zhao, Junqiao Ye, Chen Wu, Yan Guan, Linting Cai, Lewen Sun, Lu Yang, Tao He, Xudong Li, Jun Ding, Yongchao Zhang, Xinglian Wang, Xinchen Huang, Jinlin Zhang, Enwei Huang, Yewei Jiang, Wei Zhang, Shaoming Xiong, Lu Feng, Tiantian Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai Department of Computer Science and Technology School of electrics and Information Engineering Tongji University Shanghai School of Surveying and Geo-Informatics Tongji University Shanghai China School of Automotive Studies Tongji University Shanghai China
TiEV is an autonomous driving platform implemented by the Tongji University of China. The vehicle is drive-by-wire and is fully powered by electricity. We devised the software system of TiEV from scratch, which is cap... 详细信息
来源: 评论
Optimal scheduling of single-arm multi-cluster tools with two-space buffering modules
Optimal scheduling of single-arm multi-cluster tools with tw...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: FaJun Yang NaiQi Wu Yan Qiao MengChu Zhou Department of Industrial Engineering Guangdong University of Technology Guangzhou China Institute of Systems Engineering Macau University of Science and Technology Macau Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
A multi-cluster tool is composed of a number of single-cluster tools linked by buffering modules. The capacity of a buffering module can be one or two. Aiming at finding an optimal one-wafer cyclic schedule, this work... 详细信息
来源: 评论
DSC: Deep scan context descriptor for large-scale place recognition
arXiv
收藏 引用
arXiv 2021年
作者: Cui, Jiafeng Huang, Tengfei Cai, Yingfeng Zhao, Junqiao Xiong, Lu Yu, Zhuoping School of Automobile Tongji University Shanghai China Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Institute of Intelligent Vehicles Tongji University Shanghai China
LiDAR-based place recognition is an essential and challenging task both in loop closure detection and global relocalization. We propose Deep Scan Context (DSC), a general and discriminative global descriptor that capt... 详细信息
来源: 评论
RETRACTED ARTICLE: Stability analysis of dynamic collaboration model under two-lane case
收藏 引用
Nonlinear Dynamics 2014年 第1期81卷 1021-1021页
作者: Li, Zhipeng Zhang, Run Xu, Shangzhi Qian, Yeqing The Key Laboratory of Embedded System and Service Computing Supported by Ministry of Education Tongji University Shanghai China
来源: 评论
New reachability trees for unbounded Petri nets
New reachability trees for unbounded Petri nets
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: ShouGuang Wang MengChu Zhou MengDi Gan Dan You Yue Li School of Information & Electronic Engineering Zhejiang Gongshang University Hangzhou China State Key Laboratory for Manufacturing Systems Engineering Xi'an Jiaotong University Xi'an China MoE Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Reachability is an important dynamic property of Petri nets. Its determination given an unbounded net and initial marking has remained an open problem since 1960s. Due to its extreme difficulty, a great deal of resear... 详细信息
来源: 评论
Optimal Linear Crossover for Mitigating Negative Transfer in Evolutionary Multitasking
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Liu, Zhaobo Yuan, Jianhua Zhang, Haili Zeng, Tao Zhu, Zexuan Shenzhen University Institute for Advanced Study Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Shenzhen Polytechnic University School of Undergraduate Education Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University Shenzhen City Key Laboratory of Embedded System Design Shenzhen518060 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of China Chongqing400044 China
Evolutionary multitasking algorithms use information exchange among individuals in a population to solve multiple optimization problems simultaneously. Negative transfer is a critical factor that affects the performan... 详细信息
来源: 评论
Route search algorithm on P2P networks based on Gnutella protocol: Light-flooding
收藏 引用
Jisuanji Gongcheng/Computer Engineering 2005年 第11期31卷 112-114页
作者: Yue, Guangxue Department of Computer Science Huaihua University Huaihua 418000 China Key Lab. of Embedded Computing and System of Hunan Hunan University Changsha 410082 China
By analyzing search algorithm on Gnutella networks protocol, combining its advantages both the Gossip distributed forward search and spanning tree algorithm, this paper realizes a kind of high-efficient route searches... 详细信息
来源: 评论