咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 202 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 501 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 365 篇 工学
    • 224 篇 计算机科学与技术...
    • 170 篇 软件工程
    • 74 篇 信息与通信工程
    • 70 篇 控制科学与工程
    • 36 篇 机械工程
    • 35 篇 电气工程
    • 35 篇 电子科学与技术(可...
    • 31 篇 交通运输工程
    • 28 篇 生物工程
    • 14 篇 仪器科学与技术
    • 14 篇 安全科学与工程
    • 11 篇 动力工程及工程热...
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 10 篇 光学工程
    • 7 篇 材料科学与工程(可...
  • 172 篇 理学
    • 125 篇 数学
    • 34 篇 系统科学
    • 31 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 20 篇 物理学
    • 9 篇 化学
  • 108 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 22 篇 法学
    • 20 篇 社会学
  • 11 篇 医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 21 篇 petri nets
  • 14 篇 web services
  • 12 篇 feature extracti...
  • 11 篇 training
  • 10 篇 data mining
  • 9 篇 graph neural net...
  • 8 篇 conferences
  • 8 篇 throughput
  • 8 篇 rough set theory
  • 7 篇 information syst...
  • 7 篇 support vector m...
  • 7 篇 lattices
  • 7 篇 laboratories
  • 7 篇 mapreduce
  • 7 篇 computational mo...
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 6 篇 roads
  • 6 篇 vectors
  • 6 篇 schedules

机构

  • 121 篇 key laboratory o...
  • 78 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 department of co...
  • 11 篇 key laboratory o...
  • 10 篇 school of engine...
  • 10 篇 school of softwa...
  • 9 篇 department of co...
  • 9 篇 ieee
  • 9 篇 key laboratory o...
  • 8 篇 school of electr...
  • 8 篇 college of compu...
  • 7 篇 college of infor...
  • 7 篇 department of co...

作者

  • 31 篇 changjun jiang
  • 30 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 20 篇 cheng wang
  • 19 篇 yan chungang
  • 18 篇 ding zhijun
  • 16 篇 wang cheng
  • 16 篇 wang hanli
  • 13 篇 li maozhen
  • 13 篇 mengchu zhou
  • 13 篇 miao duoqian
  • 13 篇 chungang yan
  • 12 篇 liu xiwei
  • 11 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 10 篇 liu guanjun
  • 10 篇 shengjie zhao
  • 10 篇 zhao junqiao
  • 9 篇 xiwei liu
  • 9 篇 liu yang

语言

  • 473 篇 英文
  • 21 篇 中文
  • 10 篇 其他
检索条件"机构=The Key Laboratory of Embedded System and Service Computing of the Ministry of Education"
501 条 记 录,以下是161-170 订阅
排序:
Large-scale video compression: recent advances and challenges
收藏 引用
Frontiers of Computer Science 2018年 第5期12卷 825-839页
作者: Tao TIAN Hanli WANG Department of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China Shanghai Engineering Research Center of Industrial Vision Perception & Intelligent Computing Shanghai 200092 China
The evolution of social network and multimedia technologies encourage more and more people to generate and upload visual information, which leads to the generation of large-scale video data. Therefore, preeminent comp... 详细信息
来源: 评论
Hierarchical attention generative adversarial networks for cross-domain sentiment classification
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Yuebing Miao, Duoqian Wang, Jiaqi Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China
Cross-domain sentiment classification (CDSC) is an importance task in domain adaptation and sentiment classification. Due to the domain discrepancy, a sentiment classifier trained on source domain data may not works w... 详细信息
来源: 评论
On complementary effect of blended behavioral analysis for identity theft detection in mobile social networks  1
收藏 引用
13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017
作者: Wang, Cheng Luo, Jing Yang, Bo Jiang, Changjun Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science and Technology Tongji University Shanghai China
User behavioral analysis is expected to act as a promising technique for identity theft detection in the Internet. The performance of this paradigm extremely depends on a good individual-level user behavioral model. S... 详细信息
来源: 评论
Transport complexity of data dissemination in large-scale online social networks  19
Transport complexity of data dissemination in large-scale on...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Wang, Cheng Zhu, Hangyu Wang, Chaodong Zhao, Qin Zhang, Bo Key Laboratory of Embedded Systems Service Computing Ministry of Education Tongji University Shanghai China East China Branch China Academy of Information and Communications Technology Shanghai China Department of Computer Science Shanghai Normal University Tongji University Shanghai China
In this paper, we aim to measure the transport difficulty of data dissemination in online social networks (OSNs). We focus on a usual type of interest-driven social sessions in OSNs, called Social-InterestCast, under ... 详细信息
来源: 评论
Joint Transmit Power and Trajectory Optimization for Two-Way Multi-Hop UAV Relaying Networks
Joint Transmit Power and Trajectory Optimization for Two-Way...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Bing Li Shengjie Zhao Rongqing Zhang Hao Zhang Hanli Wang Liuqing Yang School of Software Engineering Tongji University Shanghai China National Mobile Communications Research Laboratory Southeast University China Ministry of Education Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China School of Electronic and Information Engineer Tongji University Shanghai China Department of Electrical & Computer Engineering Colorado State University CO USA
Unmanned aerial vehicle (UAV) has been regarded as a promising means to supplement ground communications. As flying relays, UAVs can be rapidly and flexibly deployed to assist data transmissions in many practical scen... 详细信息
来源: 评论
Analysis and Design of Ironless Axial Flux Permanent Magnet Synchronous Motor  10
Analysis and Design of Ironless Axial Flux Permanent Magnet ...
收藏 引用
10th International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC 2018
作者: Zhang, Yufeng Liu, Na Guo, Shan Tong, Jun Zhou, Qixun Xi'an University of Science and Technology Xi'an China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
In this paper, a single stator twin external rotors ironless AFPMSM for robot applications is studied. The design method of the motor is proposed. The magnetic circuit calculation and the main motor size equations are... 详细信息
来源: 评论
Random Occlusion Recovery with Noise Channel for Person Re-identification  16th
Random Occlusion Recovery with Noise Channel for Person Re-i...
收藏 引用
16th International Conference on Intelligent computing, ICIC 2020
作者: Zhang, Kun Wu, Di Yuan, Changan Qin, Xiao Wu, Hongjie Zhao, Xingming Zhang, Lijun Du, Yuchuan Wang, Hanli Institute of Machine Learning and Systems Biology School of Electronics and Information Engineering Tongji University Shanghai China Guangxi Academy of Science Nanning530025 China School of Computer and Information Engineering Nanning Normal University Nanning530299 China School of Computer Science and Technology Soochow University Suzhou215006 China School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou215009 China Fudan University Shanghai200433 China Key Laboratory of Computational Neuroscience and Brain-Inspired Intelligence Ministry of Education Shanghai China Collaborative Innovation Center of Intelligent New Energy Vehicle and School of Automotive Studies Tongji University Shanghai201804 China The Key Laboratory of Road and Traffic Engineering of the Ministry of Education Department of Transportation Engineering Tongji University Shanghai201804 China Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing and Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Person re-identification, as the basic task of a multi-camera surveillance system, plays an important role in a variety of surveillance applications. However, the current mainstream person re-identification model base... 详细信息
来源: 评论
Particle swarm optimization based on pairwise comparisons  9th
Particle swarm optimization based on pairwise comparisons
收藏 引用
9th International Conference on Swarm Intelligence, ICSI 2018
作者: Zhang, JunQi Chen, JianQing Zhu, XiXun Wang, ChunHui Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China
Particle swarm optimization (PSO) is a widely-adopted optimization algorithm which is based on particles’ fitness evaluations and their swarm intelligence. However, it is difficult to obtain the exact fitness evaluat... 详细信息
来源: 评论
Application of SIRUS in credit card fraud detection  1
收藏 引用
7th International Conference on Computational Data and Social Networks, CSoNet 2018
作者: Zhang, Yuwei Liu, Guanjun Luan, Wenjing Yan, Chungang Jiang, Changjun Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
Credit card fraud problem is very common in recent years. It not only causes economic loss to people, but also causes trust crisis to enterprises. Due to the imbalance of data, fraud detection has always been tricky. ... 详细信息
来源: 评论
Toward the First SDN Programming Capacity Theorem on Realizing High-Level Programs on Low-Level Datapaths
Toward the First SDN Programming Capacity Theorem on Realizi...
收藏 引用
2018 IEEE Conference on Computer Communications, INFOCOM 2018
作者: Leet, Christopher Wang, Xin Richard Yang, Y. Aspnes, James Department of Computer Science Yale University United States Department of Computer Science Tongji University China Key Laboratory of Embedded System and Service Computing Ministry of Education China
High-Ievel programming and programmable data paths are two key capabilities of software-defined networking (SDN). A fundamental problem linking these two capabilities is whether a given high-level SDN program can be r... 详细信息
来源: 评论