咨询与建议

限定检索结果

文献类型

  • 397 篇 会议
  • 233 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 277 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 97 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 39 篇 电气工程
    • 37 篇 生物工程
    • 33 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 215 篇 理学
    • 149 篇 数学
    • 44 篇 系统科学
    • 41 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 13 篇 化学
  • 135 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 24 篇 feature extracti...
  • 16 篇 web services
  • 16 篇 training
  • 13 篇 support vector m...
  • 11 篇 data mining
  • 10 篇 roads
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 graph neural net...
  • 9 篇 accuracy
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 121 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 36 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 wang cheng
  • 17 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 liu guanjun

语言

  • 594 篇 英文
  • 27 篇 中文
  • 13 篇 其他
检索条件"机构=The key Laboratory of Embedded System and Service Computing"
631 条 记 录,以下是441-450 订阅
排序:
Maximally permissive control of flexible manufacturing systems with fewest disjunctive constraints
Maximally permissive control of flexible manufacturing syste...
收藏 引用
2012 International Conference onAdvanced Mechatronic systems, ICAMechS 2012
作者: Chen, YuFeng Zhou, MengChu Li, XiaoOu School of Electro-Mechanical Engineering Xidian University Xi'an 710071 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102 United States Departamento de Computación CINVESTAV-IPN Av. IPN 2508 Col. Zacatenco México DF C.P. 07360 Mexico
For Petri net models whose legal reachability spaces are non-convex, one cannot optimally control them by the conjunctions of linear constraints. This work proposes a method to find a set of linear constraints such th... 详细信息
来源: 评论
A distributed SVM ensemble for image classification and annotation
A distributed SVM ensemble for image classification and anno...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Nasullah Khalid Alham Maozhen Li Yang Liu Mahesh Ponraj Man Qi School of Engineering and Design Brunel University Uxbridge UK The Key Laboratory of Embedded Systems and Service Computing Ministry of Education University of Tongji China Department of Computing Canterbury Christ Church University Canterbury Kent UK
Combination of classifiers leads to a substantial reduction of classification errors in a wide range of applications. Among them SVM ensembles with bagging have shown better performance in classification than a single... 详细信息
来源: 评论
A Relational Taxonomy of services for Large Scale service Repositories
A Relational Taxonomy of Services for Large Scale Service Re...
收藏 引用
IEEE International Conference on Web services (ICWS)
作者: Yan Wu Chungang Yan Zhijun Ding Pengwei Wang Changjun Jiang Mengchu Zhou Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Electronics and Information Engineering Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
With the rapid development of service-oriented computing (SOC) and service-oriented architecture (SOA), the number of services is rapidly increasing. How to organize and manage services effectively in repositories to ... 详细信息
来源: 评论
Inertial estimator learning automata
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2012年 第6期E95-A卷 1041-1048页
作者: Zhang, Junqi Ni, Lina Xie, Chen Gao, Shangce Tang, Zheng Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 200092 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Department of Intellectual Information Systems Engineering University of Toyama Toyama-shi 930-8555 Japan
This paper presents an inertial estimator learning automata scheme by which both the short-term and long-term perspectives of the environment can be incorporated in the stochastic estimator-the long term information c... 详细信息
来源: 评论
Design issues in ZigBee-based sensor network for healthcare applications
Design issues in ZigBee-based sensor network for healthcare ...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Jin Soo Choi Meng Chu Zhou Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA Key Laboratory of Embedded System and Service Computing Ministry of Education University of Tongji Shanghai China ECE Department New Jersey Institute of Technology Newark NJ USA
IEEE 802.15.4/ZigBee sensor networks support small power consumption and node expansion compared to other network standards for WSN. Body sensor networks (BSN) require a number of sensors for sensing medical informati... 详细信息
来源: 评论
Petri net-based real-time scheduling of time-constrained single-arm cluster tools with activity time variation
Petri net-based real-time scheduling of time-constrained sin...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Yan Qiao NaiQi Wu MengChu Zhou Department of Industrial Engineering School of Mechatronics Engineering Guangdong University of Technology Guangzhou China The Key Laboratory of Embedded System and Service Computing Ministry of Education University of Tongji Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
It is challenging to schedule time-constrained cluster tools subject to activity time variation. With the help of their Petri net model, a real-time control policy is used to offset the activity time variation. Based ... 详细信息
来源: 评论
Multicast Capacity Scaling Laws for Multihop Cognitive Networks
收藏 引用
IEEE Transactions on Mobile computing 2012年 第11期11卷 1627-1639页
作者: Cheng Wang Shaojie Tang Xiang-Yang Li Changjun Jiang Key Laboratory of Embedded System and Service Computing Building of Electronics and Information Engineering Ministry of Education Shanghai China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji Shanghai China
In this paper, we study multicast capacity for cognitive networks. We consider the cognitive network model consisting of two overlapping ad hoc networks, called the primary ad hoc network (PaN) and secondary ad hoc ne... 详细信息
来源: 评论
Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting
Petri net-based scheduling analysis of dual-arm cluster tool...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: Yan Qiao NaiQi Wu MengChu Zhou Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
With wafer revisit, it is complicated to schedule cluster tools in semiconductor fabrication. In wafer fabrication processes, such as atomic layer deposition (ALD), the wafers need to visit some process modules for a ... 详细信息
来源: 评论
A Tree Pruning Algorithm For MIMO Sphere Decoding Based On Path Metric
A Tree Pruning Algorithm For MIMO Sphere Decoding Based On P...
收藏 引用
IEEE Vehicular Technology Conference
作者: Shiliang Wang Xiaolong Guo Songlin Sun Tiehong Tian Shizhen Sun Xiaojun Jing Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China 100876 China Unicom System Integration Limited Corporation
Tree pruning can significantly reduce the complexity of sphere decoding (SD). How to determine the pruning rule is an open problem of tree pruning. In this paper, we propose a pruning strategy for SD based on path met... 详细信息
来源: 评论
Software services protection security protocol based on software watermarking in cloud environment
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 176-181页
作者: Xu, Jin-Chao Zeng, Guo-Sun Wang, Wei Department of Computer Science and Technology Tongji University Shanghai 201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China
Aimed to resist the infringement of software services in cloud environment, a software services protection security protocol based on software watermarking in cloud environment was presented. On the consideration of a... 详细信息
来源: 评论