咨询与建议

限定检索结果

文献类型

  • 397 篇 会议
  • 236 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 448 篇 工学
    • 279 篇 计算机科学与技术...
    • 209 篇 软件工程
    • 98 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 49 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 41 篇 电气工程
    • 37 篇 生物工程
    • 34 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 217 篇 理学
    • 151 篇 数学
    • 44 篇 系统科学
    • 41 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 13 篇 化学
  • 137 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 14 篇 医学
    • 11 篇 基础医学(可授医学...
    • 10 篇 临床医学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 24 篇 feature extracti...
  • 16 篇 web services
  • 16 篇 training
  • 13 篇 support vector m...
  • 11 篇 data mining
  • 10 篇 roads
  • 10 篇 optimization
  • 10 篇 graph neural net...
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 accuracy
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 121 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 37 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 wang cheng
  • 17 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 liu guanjun

语言

  • 597 篇 英文
  • 27 篇 中文
  • 13 篇 其他
检索条件"机构=The key Laboratory of Embedded System and Service Computing"
634 条 记 录,以下是331-340 订阅
排序:
A distributed SVM for scalable image annotation
A distributed SVM for scalable image annotation
收藏 引用
2011 8th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Alham, Nasullah Khalid Li, Maozhen Liu, Yang Hammoud, Suhel Ponraj, Mahesh School of Engineering and Design Brunel University Uxbridge Middlesex UB8 3PH United Kingdom Key Laboratory of Embedded Systems and Service Computing Ministry of Education Tongji University China
Machine learning techniques have facilitated image retrieval by automatically classifying and annotating images with keywords. Among them Support Vector Machines (SVMs) are used extensively due to their generalization... 详细信息
来源: 评论
Heuristic Elastic Scaling for Kubernetes Heterogeneous Microservices  21
Heuristic Elastic Scaling for Kubernetes Heterogeneous Micro...
收藏 引用
21st International Conference on Networking, Sensing and Control, ICNSC 2024
作者: Wang, Song He, Sheng Ning, Yishuang Gao, Xiang Ding, Zhijun The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China The Department of Computer Science and Technology Tongji University Shanghai201804 China Kingdee Research Kingdee International Software Group Co. Ltd Shenzhen518057 China Intelligent Computing Facility Innovation Center ZhejiangLab Hangzhou30012 China
Kubernetes has become the basic platform for building cloud native applications. However, existing horizontal scaling methods based on Kubernetes have problems with resource redundancy. Furthermore, the combined horiz... 详细信息
来源: 评论
Load balancing in MapReduce environments for data intensive applications
Load balancing in MapReduce environments for data intensive ...
收藏 引用
2011 8th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Liu, Yang Li, Maozhen Alham, Nasullah Khalid Hammoud, Suhel Ponraj, Mahesh School of Engineering and Design Brunel University Uxbridge Middlesex UB8 3PH United Kingdom Key Laboratory of Embedded Systems and Service Computing Ministry of Education Tongji University China
The distributed computations are widely used in the modern world for processing large scale jobs. Hadoop framework which is based on Google MapReduce model becomes popular due to its great processing power and ease to... 详细信息
来源: 评论
Ontology based file retrieval framework for resource limited mobile devices
Ontology based file retrieval framework for resource limited...
收藏 引用
2011 8th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Jan, Sadaqat Li, Maozhen Al-Sultany, Ghaidaa Al-Raweshidy, Hamed School of Engineering and Design Brunel University Uxbridge Middlesex UB8 3PH United Kingdom Key Laboratory of Embedded Systems and Service Computing Ministry of Education Tongji University China
Recent advances in mobile technologies have emerged new challenges for researchers. File management and retrieval on resource-limited devices has become a challenging problem as these devices are now equipped with lar... 详细信息
来源: 评论
Facial Action Video Capture Interactive mode Designed For embedded Device
Facial Action Video Capture Interactive mode Designed For Em...
收藏 引用
第三十四届中国控制会议
作者: Zixuan Gan Wenhua Shi Chen Ye Tongji University The Key Laboratory of Embedded System and Services Computing Ministry of Education Tongji University
This study was designed to develop solutions for facial action human computer interaction on embedded devices. This paper presents a new facial detection algorithm using dimension reduction and regionalization computi... 详细信息
来源: 评论
An optimized Apriori algorithm based on sparse matrix for intrusion detection
收藏 引用
Open Cybernetics and systemics Journal 2014年 第1期8卷 8-11页
作者: Zeng, Xiaohui Lv, Jingxiang Li, Jingzhong Luo, Wenlang Dept. of Computer Science and Technology Jinggangshan University Ji’an China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
The original Apriori algorithm is widely used in the intrusion detection field, but it may consume incredible computing resources in the process of handling network packets. We propose our optimized-Apriori algorithm ... 详细信息
来源: 评论
Extracting all minimal siphons from maximal unmarked siphons in manufacturing-oriented Petri nets
Extracting all minimal siphons from maximal unmarked siphons...
收藏 引用
2011 7th IEEE International Conference on Automation Science and Engineering, CASE 2011
作者: Wang, ShouGuang Zhou, MengChu Wang, ChengYing College of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou 310018 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102-1982 United States MoE Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 200092 China
Deadlock control is an important research issue in automated manufacturing systems that have a high degree of resource sharing and concurrency. Since minimal siphons are closely tied with deadlocks in Petri net models... 详细信息
来源: 评论
Intrusion detection using mobile agent in ad-hoc networks
Intrusion detection using mobile agent in ad-hoc networks
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yan Xia Ren-Fa Li Ken-Li Li Key Laboratory of Embedded System and Computing College of Computer and Communication Hunan University Changsha China
Security has become an important issue for mobile ad hoc networks especially for the more security-sensitive applications used in military and critical networks. As a positive protection, intrusion detection system ha... 详细信息
来源: 评论
Real-time action recognition with enhanced motion vector CNNs
Real-time action recognition with enhanced motion vector CNN...
收藏 引用
2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016
作者: Zhang, Bowen Wang, Limin Wang, Zhe Qiao, Yu Wang, Hanli Shenzhen Key Lab of Comp. Vis. and Pat. Rec. Shenzhen Institutes of Advanced Technology CAS China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Computer Vision Lab ETH Zurich Switzerland
The deep two-stream architecture [23] exhibited excellent performance on video based action recognition. The most computationally expensive step in this approach comes from the calculation of optical flow which preven... 详细信息
来源: 评论
Bridge the Gap Between Network-Based Inference Method and Global Ranking Method in Personal Recommendation
Bridge the Gap Between Network-Based Inference Method and Gl...
收藏 引用
IEEE Conference on Industrial Electronics and Applications
作者: Xiwei Liu Department of Computer Science and Technology Tongji University China The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai 200092 China
In this paper, we study the relationship between the network-based inference method and global ranking method in personal recommendation. By some theoretical analysis, we prove that the recommendation result under the... 详细信息
来源: 评论