咨询与建议

限定检索结果

文献类型

  • 7,876 篇 会议
  • 2,897 篇 期刊文献
  • 45 篇 学位论文
  • 1 册 图书
  • 1 篇 科技报告

馆藏范围

  • 10,820 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 7,980 篇 工学
    • 5,622 篇 信息与通信工程
    • 4,536 篇 计算机科学与技术...
    • 3,949 篇 电气工程
    • 1,838 篇 软件工程
    • 997 篇 电子科学与技术(可...
    • 389 篇 仪器科学与技术
    • 327 篇 交通运输工程
    • 311 篇 控制科学与工程
    • 239 篇 机械工程
    • 111 篇 动力工程及工程热...
    • 80 篇 光学工程
    • 74 篇 生物工程
    • 60 篇 航空宇航科学与技...
    • 41 篇 生物医学工程(可授...
    • 31 篇 材料科学与工程(可...
    • 31 篇 测绘科学与技术
  • 1,278 篇 理学
    • 850 篇 数学
    • 238 篇 物理学
    • 155 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 119 篇 生物学
    • 54 篇 化学
  • 510 篇 管理学
    • 441 篇 管理科学与工程(可...
    • 96 篇 工商管理
    • 72 篇 图书情报与档案管...
  • 306 篇 文学
    • 302 篇 新闻传播学
  • 64 篇 医学
    • 49 篇 临床医学
  • 63 篇 法学
    • 57 篇 社会学
  • 46 篇 军事学
    • 40 篇 军队指挥学
  • 40 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 6 篇 教育学
  • 3 篇 艺术学

主题

  • 10,820 篇 network coding
  • 1,333 篇 encoding
  • 1,107 篇 decoding
  • 1,087 篇 relays
  • 985 篇 throughput
  • 652 篇 wireless network...
  • 578 篇 routing
  • 461 篇 wireless communi...
  • 415 篇 receivers
  • 409 篇 protocols
  • 343 篇 network topology
  • 340 篇 wireless sensor ...
  • 338 篇 vectors
  • 313 篇 peer to peer com...
  • 289 篇 bandwidth
  • 283 篇 signal to noise ...
  • 226 篇 reliability
  • 223 篇 broadcasting
  • 218 篇 delays
  • 216 篇 interference

机构

  • 76 篇 chinese univ hon...
  • 60 篇 department of el...
  • 54 篇 aalborg univ dep...
  • 47 篇 chinese univ hon...
  • 46 篇 caltech dept ele...
  • 44 篇 iowa state univ ...
  • 44 篇 department of el...
  • 42 篇 texas a&m univ d...
  • 40 篇 shanghai jiao to...
  • 36 篇 tsinghua univ de...
  • 34 篇 xidian univ stat...
  • 32 篇 nanyang technol ...
  • 31 篇 caltech pasadena...
  • 31 篇 univ calgary dep...
  • 29 篇 department of el...
  • 26 篇 department of in...
  • 26 篇 school of inform...
  • 26 篇 department of el...
  • 26 篇 southeast univ n...
  • 25 篇 univ calif san d...

作者

  • 132 篇 medard muriel
  • 77 篇 lucani daniel e.
  • 50 篇 li baochun
  • 49 篇 muriel medard
  • 48 篇 fragouli christi...
  • 46 篇 wang chih-chun
  • 45 篇 yeung raymond w.
  • 44 篇 fitzek frank h. ...
  • 39 篇 yang shenghao
  • 36 篇 rajan b. sundar
  • 35 篇 sadeghi parastoo
  • 35 篇 li zongpeng
  • 33 篇 barros joao
  • 33 篇 christina fragou...
  • 31 篇 heide janus
  • 31 篇 peng mugen
  • 30 篇 médard muriel
  • 30 篇 fan pingyi
  • 29 篇 markopoulou athi...
  • 29 篇 langberg michael

语言

  • 10,504 篇 英文
  • 156 篇 其他
  • 143 篇 中文
  • 9 篇 土耳其文
  • 3 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"主题词=Network coding"
10820 条 记 录,以下是4621-4630 订阅
排序:
Degrees of Freedom of Cache-Aided Wireless Interference networks
Degrees of Freedom of Cache-Aided Wireless Interference Netw...
收藏 引用
作者: Hachem, Jad Niesen, Urs Diggavi, Suhas N. Department of Electrical Engineering University of California at Los Angeles Los AngelesCA90095 United States Qualcomm NJ Research Center BridgewaterNJ08807 United States
We study the role of caches in wireless interference networks. We focus on content caching and delivery across a Gaussian interference network, where both transmitters and receivers are equipped with caches. We provid... 详细信息
来源: 评论
Active Topology Inference in Store, Code, and Forward networks  15
Active Topology Inference in Store, Code, and Forward Networ...
收藏 引用
15th International Symposium on Wireless Communication Systems, ISWCS 2018
作者: Larmore, Gregory Harrison, Willie K. Department of Electrical and Computer Engineering University of Colorado Colorado Springs Colorado SpringsCO80918 United States Department of Electrical and Computer Engineering Brigham Young University ProvoUT84602 United States
This paper presents a technique for active topology inference in store, code, and forward networks. Many techniques exist for topology inference and are well suited for storeand- forward and cut-through switching;howe... 详细信息
来源: 评论
The Optimal Solution of Communication Resource Allocation in Distributed System Integrated on Cloud Computing  6th
The Optimal Solution of Communication Resource Allocation in...
收藏 引用
6th International Conference on Context-Aware Systems and Applications, ICCASA 2017 and 3rd International Conference on Nature of Computation and Communication, ICTCC 2017
作者: Dang, Hung Vi Nguyen, Tien Sy Le, Van Son Nguyen, Xuan Huy Department of Information Technology Danang University of Education Da Nang Viet Nam Information and Communications Publishing House Hanoi Viet Nam Institute of Information Technology Vietnam Academy of Science and Technology Hanoi Viet Nam
Cloud computing has been growing rapidly in the world over the past decade. The Studies and development of this system has met the demand of large number of users in the world. In order to share shared resources, most... 详细信息
来源: 评论
Multi-encoder Transformer network for Automatic Post-Editing  3
Multi-encoder Transformer Network for Automatic Post-Editing
收藏 引用
3rd Conference on Machine Translation, WMT 2018 at the Conference on Empirical Methods in Natural Language Processing, EMNLP 2018
作者: Shin, Jaehun Lee, Jong-Hyeok Department of Computer Science and Engineering Pohang University of Science and Technology Korea Republic of
This paper describes the POSTECH’s submission to the WMT 2018 shared task on Automatic Post-Editing (APE). We propose a new neural end-to-end post-editing model based on the transformer network. We modified the encod... 详细信息
来源: 评论
Data dissemination using instantly decodable binary codes in fog-radio access networks
Data dissemination using instantly decodable binary codes in...
收藏 引用
作者: Douik, Ahmed Sorour, Sameh Department of Electrical Engineering California Institute of Technology PasadenaCA91125 United States Department of Electrical and Computer Engineering University of Idaho MoscowID83844 United States
This paper considers a device-To-device (D2D) fog-radio access network wherein a set of users are required to store/receive a set of files. The D2D devices are connected to a subset of the cloud data centers and thus ... 详细信息
来源: 评论
A generalized method for securing the cloud
A generalized method for securing the cloud
收藏 引用
2017 International Conference on Recent Innovations in Signal Processing and Embedded Systems, RISE 2017
作者: Salimath, Nagesh Sheetlani, Jitendra Dept of Computer Science SSSUTMS SehoreMP India SOCA SSSUTMS SehoreMP India
This paper refers to secure the cloud in the scenario of overflow problem of a network coding storage system. From the analysis and experiments, it shows the impacts of overflow problem in a network coding scheme, whi... 详细信息
来源: 评论
Distributed Cooperative Spectrum Sensing Strategy Based on the Joint Use of network coding and Transform-Domain Processing
Distributed Cooperative Spectrum Sensing Strategy Based on t...
收藏 引用
7th International ICST Conference on Communications and networking in China (CHINACOM)
作者: Wu Xuanli Luo Mingxin Jiang Laiwei Sun Lukuan Harbin Inst Technol Sch Elect & Informat Engn Harbin 150006 Peoples R China
In cognitive radio, spectrum sensing is used to find spectrum hole and identify the primary users. Cognitive users should continuously sense the spectrum and detect the presence of primary user as soon as possible. Wh... 详细信息
来源: 评论
A novel energy aware coded opportunistic routing for social cognitive radio networks  12th
A novel energy aware coded opportunistic routing for social ...
收藏 引用
12th International Conference on Communications and networking in China, CHINACOM 2017
作者: Xiao, Shoubai Lu, Renhao Zhong, Xiaoxiong Nanchang Institute of Science and Technology Nanchang330108 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Graduate School at Shenzhen Tsinghua University Shenzhen518055 China
As a huge numbers of heterogeneous devices will be connected in social cognitive radio networks (SCRNs), it needs more frequency spectrum. Moreover, dynamic spectrum availability and heterogeneous devices make it more... 详细信息
来源: 评论
network coding aware power control in wireless networks
Network coding aware power control in wireless networks
收藏 引用
Annual Conference on Information Sciences and Systems (CISS)
作者: Kai Su Dan Zhang Narayan B. Mandayam WINLAB Rutgers University North Brunswick NJ
In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, there have been fewer efforts on understa... 详细信息
来源: 评论
A MONETARY MECHANISM FOR STABILIZING COOPERATIVE DATA EXCHANGE WITH SELFISH USERS
A MONETARY MECHANISM FOR STABILIZING COOPERATIVE DATA EXCHAN...
收藏 引用
作者: ISHAN TYAGI Texas A&M University
学位级别:硕士
In this research, we address the stability issues in Cooperative Data Exchange (CDE), one of the central problems in wireless network coding. We consider a setting in which the users are selfish, i. e., would like to ... 详细信息
来源: 评论