咨询与建议

限定检索结果

文献类型

  • 397 篇 会议
  • 236 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 448 篇 工学
    • 279 篇 计算机科学与技术...
    • 209 篇 软件工程
    • 98 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 49 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 41 篇 电气工程
    • 37 篇 生物工程
    • 34 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 217 篇 理学
    • 151 篇 数学
    • 44 篇 系统科学
    • 41 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 13 篇 化学
  • 137 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 14 篇 医学
    • 11 篇 基础医学(可授医学...
    • 10 篇 临床医学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 24 篇 feature extracti...
  • 16 篇 web services
  • 16 篇 training
  • 13 篇 support vector m...
  • 11 篇 data mining
  • 10 篇 roads
  • 10 篇 optimization
  • 10 篇 graph neural net...
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 accuracy
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 121 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 37 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 wang cheng
  • 17 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 liu guanjun

语言

  • 597 篇 英文
  • 27 篇 中文
  • 13 篇 其他
检索条件"机构=the Key Laboratory of Embedded System and Service Computing"
634 条 记 录,以下是251-260 订阅
排序:
Composite behavioral modeling for identity theft detection in online social networks
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Cheng Yang, Bo Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education China
In this work, we aim at building a bridge from poor behavioral data to an effective, quick-response, and robust behavior model for online identity theft detection. We concentrate on this issue in online social network... 详细信息
来源: 评论
Non-Intrusive Load Disaggregation Using Semi-Supervised Learning Method
Non-Intrusive Load Disaggregation Using Semi-Supervised Lear...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Nan Miao Shengjie Zhao Qingjiang Shi Rongqing Zhang The Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University Shanghai China School of Software Engineering The Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University Shanghai China School of Software Engineering Tongji University Shanghai China
With the emerging of smart metering around the world, there is a growing demand to analyse the residential energy usage. In this paper, we propose a Deep Neural Network (DNN)-based approach for non-intrusive load moni... 详细信息
来源: 评论
A robust facial descriptor for face recognition
A robust facial descriptor for face recognition
收藏 引用
International Conference on Applications and Techniques in Cyber Security and Intelligence, ATCSI 2017
作者: Liu, Na Duan, Huixian Song, Lei Yan, Zhiguo Cyber Physical System R&D Center The Third Research Institute of Ministry of Public Security Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Shanghai International Technology and Trade United Co. Ltd Shanghai China
Illumination, occlusion, pose and expression variations are the most common challenging problems for face recognition in many real-world applications. However, existing face recognition methods are proposed to handle ... 详细信息
来源: 评论
Low-Rate Non-Intrusive Appliance Load Monitoring Based on Graph Signal Processing
Low-Rate Non-Intrusive Appliance Load Monitoring Based on Gr...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Bing Zhang Shengjie Zhao Qingjiang Shi Rongqing Zhang The Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University Shanghai China School of Software Engineering The Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University Shanghai China School of Software Engineering Tongji University Shanghai China
Thanks to the large-scale smart meters deployments around the world, non-intrusive appliance load monitoring (NILM) is receiving popularity. It aims to disaggregate the total electricity load of a home into individual... 详细信息
来源: 评论
Adaptive rate-distortion prediction for multiple reference selection and inter-mode decision
Adaptive rate-distortion prediction for multiple reference s...
收藏 引用
13th Pacific-Rim Conference on Multimedia, PCM 2012
作者: Zhao, Tiesong Zhang, Yun Kwong, Sam Wang, Hanli Chen, Qian Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
To minimize Rate-Distortion (RD) cost in video coding, RD Optimization (RDO) technique is adopted, which also brings increasingly computational complexity in Motion Estimation (ME), multiple reference selection and mo... 详细信息
来源: 评论
A Kind of Identity Authentication Method Based on Browsing Behaviors
A Kind of Identity Authentication Method Based on Browsing B...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Junzhu Zhong Chungang Yan Wangyang Yu Peihai Zhao Mimi Wang The Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China Shaanxi Normal University Xi'an China
Due to the continued growth threat in Phishing, a kind of stable identity authentication method is highly needed based on individual characteristics just like browsing behaviors. Most of the existing researches focuse... 详细信息
来源: 评论
A Method to Check Liveness of WS3PR  33
A Method to Check Liveness of WS3PR
收藏 引用
第三十三届中国控制会议
作者: WANG ShouGuang LIU Miao ZHOU MengChu WU WenHui IEEE School of Information & Electronic Engineering Zhejiang Gongshang University State Key Laboratory for Manufacturing Systems Engineering Xi’an Jiaotong University School of Electro-Mechanical Engineering Xidian University The Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA
Petri nets are widely used to model flexible manufacturing systems(FMSs) because they can help analyze the properties and synthesize deadlock-free supervisory controllers of *** system of Simple Sequential Processes w... 详细信息
来源: 评论
Feature selection on chinese text classification using character N-grams
收藏 引用
3rd International Conference on Rough Sets and Knowledge Technology, RSKT 2008
作者: Wei, Zhihua Miao, Duoqian Chauchat, Jean-Hugues Zhong, Caiming Tongji University Key Laboratory Embedded System and Service Computing Ministry of Education Cao'an Road Shanghai 201804 China Laboratoire ERIC Université Lumière Lyon 2 5 avenue Pierre Mendès-France Bron Cedex 69676 France
In this paper, we perform Chinese text classification using n-gram text representation on TanCorp which is a new large corpus special for Chinese text classification more than 14,000 texts divided into 12 classes. We ... 详细信息
来源: 评论
Artificial impostors for location privacy preservation
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Cheng Xie, Zhiyang Department of Computer Science and Engineering Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education China
The progress of location-based services has led to severe concerns about location privacy leakage. However, existing methods are still incompetent for effective and efficient location privacy preservation (LPP). They ... 详细信息
来源: 评论
A New Modified Reachability Graph of ω-independent Petri Nets and its Application
A New Modified Reachability Graph of ω-independent Petri Ne...
收藏 引用
2nd International Conference on Communication Technology(ICCT 2015)
作者: Ru Yang Zhijun Ding Meiqin Pan The Key Laboratory of Embedded System and Service Computing Ministry of Education College of international business Shanghai International Studies University
Analysis approaches of liveness are important to Petri nets theory,but the relevant research work in the past is still *** paper proposed a new modified reachability graph(NMRG) approach for liveness analysis of ω-in... 详细信息
来源: 评论