咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 204 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 548 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 384 篇 工学
    • 238 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 81 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 43 篇 电子科学与技术(可...
    • 39 篇 电气工程
    • 34 篇 机械工程
    • 32 篇 交通运输工程
    • 28 篇 生物工程
    • 16 篇 安全科学与工程
    • 15 篇 仪器科学与技术
    • 15 篇 化学工程与技术
    • 14 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 180 篇 理学
    • 124 篇 数学
    • 38 篇 系统科学
    • 31 篇 生物学
    • 28 篇 统计学(可授理学、...
    • 23 篇 物理学
    • 12 篇 化学
  • 109 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 21 篇 法学
    • 19 篇 社会学
  • 11 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 24 篇 petri nets
  • 20 篇 feature extracti...
  • 14 篇 web services
  • 14 篇 training
  • 10 篇 roads
  • 10 篇 data mining
  • 10 篇 graph neural net...
  • 9 篇 support vector m...
  • 9 篇 optimization
  • 9 篇 algorithm design...
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 conferences
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 wireless sensor ...
  • 8 篇 computational mo...
  • 8 篇 rough set theory
  • 7 篇 semantics

机构

  • 120 篇 key laboratory o...
  • 74 篇 department of co...
  • 72 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 18 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 moe key laborato...
  • 8 篇 institute of int...
  • 8 篇 college of infor...

作者

  • 35 篇 changjun jiang
  • 34 篇 zhou mengchu
  • 32 篇 jiang changjun
  • 23 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 18 篇 ye chen
  • 17 篇 ding zhijun
  • 16 篇 wang hanli
  • 15 篇 yan chungang
  • 15 篇 wang cheng
  • 15 篇 miao duoqian
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 11 篇 zhijun ding
  • 11 篇 liu guanjun
  • 10 篇 yaying zhang

语言

  • 518 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=The MoE Key Laboratory of Embedded System and Service Computing"
548 条 记 录,以下是531-540 订阅
排序:
Incorporation of Ordinal Optimization into Learning Automata for High Learning Efficiency
Incorporation of Ordinal Optimization into Learning Automata...
收藏 引用
IEEE International Conference on Automation Science and Engineering
作者: JunQi Zhang Cheng Wang Di Zang MengChu Zhou Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Department of Electrical and Computer Engineering New Jersey Institute of Technology
Learning automata (LA) represent important leaning mechanisms with applications in automated system design, biological system modeling, computer vision, and transportation. They play the critical roles in modeling a p... 详细信息
来源: 评论
Maximum delay anonymous clustering feature tree based privacy-preserving data publishing in social networks
收藏 引用
Procedia Computer Science 2019年 147卷 643-646页
作者: Jinquan Zhang Bowen Zhao Guochao Song Lina Ni Jiguo Yu College of Computer Science and Engineering Shandong University of Science and Technology Qingdao 266590 China Shandong Province Key Laboratory of Wisdom Mine Information Technology Shandong University of Science and Technology Qingdao 266590 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong 250014 China Shandong Computer Science Center (National Supercomputer Center in Jinan) Jinan Shandong 250014 China
Clustering analysis has been widely used in pattern recognition and image processing in recent years, which is an important research field of data mining. Data publishing in social networks is threatened by the leakag... 详细信息
来源: 评论
Hybrid uniform distribution of particle swarm optimizer
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2010年 第10期E93-A卷 1782-1791页
作者: Zhang, Junqi Tan, Ying Ni, Lina Xie, Chen Tang, Zheng Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Qingdao China Tongji University Shanghai 200092 China Key Laboratory of Machine Perception Ministry of Education Qingdao China Department of Machine Intelligence School of Electronics Engineering and Computer Science Peking University Beijing 100871 China College of Info Sci and Engi Shandong University of Science and Technology Qingdao China Department of Intellectual Information Systems Engineering University of Toyama Toyama-shi 930-8555 Japan
Particle swarm optimizer (PSO) is a stochastic global optimization technique based on a social interaction metaphor. Because of the complexity, dynamics and randomness involved in PSO, it is hard to theoretically anal... 详细信息
来源: 评论
Variable petri nets for mobility
arXiv
收藏 引用
arXiv 2021年
作者: Ding, Zhijun Yang, Ru Cui, Puwen Zhou, MengChu Jiang, Changjun Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China Department of Computer Science and Technology Tongji University Shanghai201804 China Institute of Systems Engineering Macau University of Science and Technology Macau999078 China Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
Mobile computing systems, service-based systems and some other systems with mobile interacting components have recently received much attention. However, because of their characteristics such as mobility and disconnec... 详细信息
来源: 评论
Admission Control for Non-preprovisioned service Flow in Wireless Metropolitan Area Networks
Admission Control for Non-preprovisioned Service Flow in Wir...
收藏 引用
European Conference on Universal Multiservice Networks (ECUMN)
作者: Liping Wang Fuqiang Liu Yusheng Ji Nararat Ruangchaijatupon The Key Laboratory of |Embedded System and Service Computing| Ministry of Education China Ministry of Education Tongji University Shanghai China Graduate University of Advanced Studies (SOKENDAI) Tokyo Japan National Institute of Information Japan School of Electronics and Information Engineering University of Tongji Shanghai China The Graduate University for Advanced Studies Tokyo Japan National Institute of Informatics Japan
Improving the admission control process in wireless metropolitan area networks (WMAN) based on the IEEE 802.16e standard can improve the QoS. Because IEEE 802.16e supports five classes of service as well as mobility, ... 详细信息
来源: 评论
Random Occlusion Recovery with Noise Channel for Person Re-identification  16th
Random Occlusion Recovery with Noise Channel for Person Re-i...
收藏 引用
16th International Conference on Intelligent computing, ICIC 2020
作者: Zhang, Kun Wu, Di Yuan, Changan Qin, Xiao Wu, Hongjie Zhao, Xingming Zhang, Lijun Du, Yuchuan Wang, Hanli Institute of Machine Learning and Systems Biology School of Electronics and Information Engineering Tongji University Shanghai China Guangxi Academy of Science Nanning530025 China School of Computer and Information Engineering Nanning Normal University Nanning530299 China School of Computer Science and Technology Soochow University Suzhou215006 China School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou215009 China Fudan University Shanghai200433 China Key Laboratory of Computational Neuroscience and Brain-Inspired Intelligence Ministry of Education Shanghai China Collaborative Innovation Center of Intelligent New Energy Vehicle and School of Automotive Studies Tongji University Shanghai201804 China The Key Laboratory of Road and Traffic Engineering of the Ministry of Education Department of Transportation Engineering Tongji University Shanghai201804 China Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing and Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Person re-identification, as the basic task of a multi-camera surveillance system, plays an important role in a variety of surveillance applications. However, the current mainstream person re-identification model base... 详细信息
来源: 评论
GLC++: Source-Free Universal Domain Adaptation through Global-Local Clustering and Contrastive Affinity Learning
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Sanqing Zou, Tianpei Röhrbein, Florian Lu, Cewu Chen, Guang Tao, Dacheng Jiang, Changjun The School of Automotive Engineering Department of Computer Science Tongji University China The Faculty of Computer Science Chemnitz University of Technology Germany The Department of Computer Science Shanghai Jiao Tong University China The School of Computer Science Faculty of Engineering The University of Sydney Australia The Department of Computer Science Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University China
Deep neural networks often exhibit sub-optimal performance under covariate and category shifts. Source-Free Domain Adaptation (SFDA) presents a promising solution to this dilemma, yet most SFDA approaches are restrict... 详细信息
来源: 评论
An improved PSO algorithm with simulated annealing for constrained function optimization
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) 2011年 第SUPPL. 1期42卷 175-179页
作者: Si, Cheng-Yong Yang, Dong-Sheng Tian, Hong-Jun Wang, Lei Wu, Qi-Di College of Electronics and Information Engineering Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China Shanghai Economic and Information Committee Shanghai 200040 China
To solve the problem of infeasible solutions in the constrained function optimization, a constraint-handling technique based on simulated annealing is proposed. The improved particle swarm optimization is also used to... 详细信息
来源: 评论
Integrated verification model atsFPM based on functional, time and spatial constraints
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 740-750页
作者: Niu, Jun Zeng, Guo-Sun Chen, Bo Department of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing of Ministry of Education Shanghai 201804 China College of Information Engineering Zhejiang Business Technology Institute Ningbo 315012 China
Nowadays complex information system's integrated formal models of function verification and performance evaluation lack properties constraint about space aspect. This paper presents an integrated verification mode... 详细信息
来源: 评论
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on Computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论