咨询与建议

限定检索结果

文献类型

  • 397 篇 会议
  • 233 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 277 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 97 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 39 篇 电气工程
    • 37 篇 生物工程
    • 33 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 215 篇 理学
    • 149 篇 数学
    • 44 篇 系统科学
    • 41 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 13 篇 化学
  • 135 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 24 篇 feature extracti...
  • 16 篇 web services
  • 16 篇 training
  • 13 篇 support vector m...
  • 11 篇 data mining
  • 10 篇 roads
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 graph neural net...
  • 9 篇 accuracy
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 121 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 36 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 wang cheng
  • 17 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 liu guanjun

语言

  • 594 篇 英文
  • 27 篇 中文
  • 13 篇 其他
检索条件"机构=The Key Laboratory of Embedded System and Service Computing"
631 条 记 录,以下是141-150 订阅
排序:
Learning Sequence Descriptor based on Spatio-Temporal Attention for Visual Place Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Junqiao Zhang, Fenglin Cai, Yingfeng Tian, Gengxuan Mu, Wenjie Ye, Chen Feng, Tiantian Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai China The MOE Key Lab of Embedded System and Service Computing Tongji University Shanghai China Institute of Intelligent Vehicles Tongji University Shanghai China School of Surveying and Geo-Informatics Tongji University Shanghai China
Visual Place Recognition (VPR) aims to retrieve frames from a geotagged database that are located at the same place as the query frame. To improve the robustness of VPR in perceptually aliasing scenarios, sequence-bas... 详细信息
来源: 评论
DSP Assembler Auto-Generation Technique and ToolChain Integration
DSP Assembler Auto-Generation Technique and ToolChain Integr...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Wanli Wang Jun Wu Haoqi Ren Zhifeng Zhang Electronics and Information Engineering College Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Computer Science Fudan University Shanghai China
To promote the application of DSP, a fast and accurate toolchain generation method must be realized. Unlike the traditional manual method, in this paper, we propose a toolchain generation algorithm based on the archit... 详细信息
来源: 评论
Base Station Network Traffic Prediction Approach Based on LMA -DeepAR  6
Base Station Network Traffic Prediction Approach Based on LM...
收藏 引用
6th IEEE International Conference on Computer and Communication systems, ICCCS 2021
作者: Zhang, Jiachen Zuo, Xingquan Xu, Mingying Han, Jing Zhang, Baisheng Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing Uinversity of Posts and Telecommunications Beijing China Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing Uinversity of Posts and Telecommunications Beijing China Network Interface Virtualization Shanghai System Design Deptment Zhongxing Telecommunication Equipment Corporation Shanghai China
Accurate network traffic prediction of base station cell is very vital for the expansion and reduction of wireless devices in base station cell. The burst and uncertainty of base station cell network traffic makes the... 详细信息
来源: 评论
Behavioral authentication for security and safety
收藏 引用
Security and Safety 2024年 第3期3卷 50-85页
作者: Cheng Wang Hao Tang Hangyu Zhu Junhan Zheng Changjun Jiang Department of Computer Science and Technology Tongji UniversityShanghai 201804China Key Laboratory of Embedded System and Service Computing Ministry of EducationShanghai 201804China Shanghai Artificial Intelligence Laboratory Shanghai 200232China
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain a... 详细信息
来源: 评论
The Relationship between Information Dissemination Channels, Health Belief, and COVID-19 Vaccination Intention: Evidence from China
收藏 引用
Journal of environmental and public health 2023年 第1期2023卷 6915125-6915125页
作者: Huang, Chuanwu Yan, Dongqi Liang, Shuang School of Digital Media and Design Arts Beijing University of Post and Telecommunication 100088 Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education 100088 Beijing China Beijing Key Laboratory of Network System and Network Culture 100876 Beijing China
In the context of the ongoing global epidemic of COVID-19 and frequent virus mutations, the implementation of vaccine is the key to the prevention and control of the epidemic at this stage. In order to provide recomme...
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
Two-stream Hierarchical Similarity Reasoning for Image-text Matching
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Ran Wang, Hanli Wang, Lei Kwong, Sam The Department of Computer Science & Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China Frontiers Science Center for Intelligent Autonomous Systems Shanghai201210 China DeepBlue Academy of Sciences Shanghai200336 China The Department of Computer Science City University of Hong Kong Hong Kong
Reasoning-based approaches have demonstrated their powerful ability for the task of image-text matching. In this work, two issues are addressed for image-text matching. First, for reasoning processing, conventional ap... 详细信息
来源: 评论
DAG-Aware Joint Task Scheduling and Cache Management in Spark Clusters
DAG-Aware Joint Task Scheduling and Cache Management in Spar...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Yinggen Xu Liu Liu Zhijun Ding The Key Lab of Embedded System and Service Computing Tongji University Shanghai China
Data dependency, often presented as directed acyclic graph (DAG), is a crucial application semantics for the performance of data analytic platforms such as Spark. Spark comes with two built-in schedulers, namely FIFO ... 详细信息
来源: 评论
A Cloudedge-Combined Data Placement Strategy Based on User Access Regions  6
A Cloudedge-Combined Data Placement Strategy Based on User A...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Cao, Eryang Wang, Pengwei Yan, Chungang Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai200092 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China School of Computer Science and Technology Donghua University Shanghai201620 China
To improve the availability of data in the cloud and avoid vendor lock-in risk, multi-cloud storage is attracting more and more attentions. However, accessing data from the cloud usually has some disadvantages such as... 详细信息
来源: 评论
Dynamic frequency selection and spatial interaction fusion for robust person search
收藏 引用
Information Fusion 2025年 124卷
作者: Qixian Zhang Duoqian Miao Qi Zhang Cairong Zhao Hongyun Zhang Ye Sun Ruizhi Wang School of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China School of Computer Science Fudan University Shanghai 200438 China
Person search aims to locate target individuals in large image databases captured by multiple non-overlapping cameras. Existing models primarily rely on spatial feature extraction to capture fine-grained local details...
来源: 评论