咨询与建议

限定检索结果

文献类型

  • 7,876 篇 会议
  • 2,897 篇 期刊文献
  • 45 篇 学位论文
  • 1 册 图书
  • 1 篇 科技报告

馆藏范围

  • 10,820 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 7,980 篇 工学
    • 5,622 篇 信息与通信工程
    • 4,536 篇 计算机科学与技术...
    • 3,949 篇 电气工程
    • 1,838 篇 软件工程
    • 997 篇 电子科学与技术(可...
    • 389 篇 仪器科学与技术
    • 327 篇 交通运输工程
    • 311 篇 控制科学与工程
    • 239 篇 机械工程
    • 111 篇 动力工程及工程热...
    • 80 篇 光学工程
    • 74 篇 生物工程
    • 60 篇 航空宇航科学与技...
    • 41 篇 生物医学工程(可授...
    • 31 篇 材料科学与工程(可...
    • 31 篇 测绘科学与技术
  • 1,278 篇 理学
    • 850 篇 数学
    • 238 篇 物理学
    • 155 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 119 篇 生物学
    • 54 篇 化学
  • 510 篇 管理学
    • 441 篇 管理科学与工程(可...
    • 96 篇 工商管理
    • 72 篇 图书情报与档案管...
  • 306 篇 文学
    • 302 篇 新闻传播学
  • 64 篇 医学
    • 49 篇 临床医学
  • 63 篇 法学
    • 57 篇 社会学
  • 46 篇 军事学
    • 40 篇 军队指挥学
  • 40 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 6 篇 教育学
  • 3 篇 艺术学

主题

  • 10,820 篇 network coding
  • 1,333 篇 encoding
  • 1,107 篇 decoding
  • 1,087 篇 relays
  • 985 篇 throughput
  • 652 篇 wireless network...
  • 578 篇 routing
  • 461 篇 wireless communi...
  • 415 篇 receivers
  • 409 篇 protocols
  • 343 篇 network topology
  • 340 篇 wireless sensor ...
  • 338 篇 vectors
  • 313 篇 peer to peer com...
  • 289 篇 bandwidth
  • 283 篇 signal to noise ...
  • 226 篇 reliability
  • 223 篇 broadcasting
  • 218 篇 delays
  • 216 篇 interference

机构

  • 76 篇 chinese univ hon...
  • 60 篇 department of el...
  • 54 篇 aalborg univ dep...
  • 47 篇 chinese univ hon...
  • 46 篇 caltech dept ele...
  • 44 篇 iowa state univ ...
  • 44 篇 department of el...
  • 42 篇 texas a&m univ d...
  • 40 篇 shanghai jiao to...
  • 36 篇 tsinghua univ de...
  • 34 篇 xidian univ stat...
  • 32 篇 nanyang technol ...
  • 31 篇 caltech pasadena...
  • 31 篇 univ calgary dep...
  • 29 篇 department of el...
  • 26 篇 department of in...
  • 26 篇 school of inform...
  • 26 篇 department of el...
  • 26 篇 southeast univ n...
  • 25 篇 univ calif san d...

作者

  • 132 篇 medard muriel
  • 77 篇 lucani daniel e.
  • 50 篇 li baochun
  • 49 篇 muriel medard
  • 48 篇 fragouli christi...
  • 46 篇 wang chih-chun
  • 45 篇 yeung raymond w.
  • 44 篇 fitzek frank h. ...
  • 39 篇 yang shenghao
  • 36 篇 rajan b. sundar
  • 35 篇 sadeghi parastoo
  • 35 篇 li zongpeng
  • 33 篇 barros joao
  • 33 篇 christina fragou...
  • 31 篇 heide janus
  • 31 篇 peng mugen
  • 30 篇 médard muriel
  • 30 篇 fan pingyi
  • 29 篇 markopoulou athi...
  • 29 篇 langberg michael

语言

  • 10,504 篇 英文
  • 156 篇 其他
  • 143 篇 中文
  • 9 篇 土耳其文
  • 3 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"主题词=Network coding"
10820 条 记 录,以下是501-510 订阅
排序:
Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF networkS SOFTWARE TOOLS AND APPLICATIONS 2019年 第5-Sup期22卷 11047-11055页
作者: Zhang, Guangzhi Cai, Shaobin Harbin Engn Univ Dept Comp Sci Harbin Heilongjiang Peoples R China Suihua Univ Suihua Peoples R China
The McEliece cryptosystem based on rank-metric codes is presented to offer both security and error-correction simultaneously in random network coding system. In the multicast network, the original messages are encoded... 详细信息
来源: 评论
Capacity and Achievable Rate Regions for Linear network coding Over Ring Alphabets
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2019年 第1期65卷 220-234页
作者: Connelly, Joseph Zeger, Kenneth Univ Calif San Diego Dept Elect & Comp Engn La Jolla CA 92093 USA
The rate of a network code is the ratio of the block size of the network's messages to that of its edge codewords. We compare the linear capacities and achievable rate regions of networks using finite field alphab... 详细信息
来源: 评论
A Code and Rate Equivalence Between Secure network and Index coding
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY 2021年 第1期2卷 106-120页
作者: Ong, Lawrence Vellambi, Badri N. Kliewer, Jorg Yeoh, Phee Lep Univ Newcastle Sch Elect Engn & Comp Callaghan NSW 2308 Australia Univ Cincinnati Coll Engn & Appl Sci Cincinnati OH 45221 USA New Jersey Inst Technol Dept Elect & Comp Engn Newark NJ 07102 USA Univ Sydney Sch Elect & Informat Engn Sydney NSW 2006 Australia
Establishing code equivalences between index coding and network coding provides important insights for code design. Previous works showed an equivalence relation between any index-coding instance and a network-coding ... 详细信息
来源: 评论
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2019年 91卷 416-425页
作者: Chang, Jinyong Ji, Yanyan Xu, Maozhi Xue, Rui Xian Univ Architecture & Technol Sch Informat & Control Engn Xian Shaanxi Peoples R China Peking Univ Sch Math Sci Beijing Peoples R China North Univ China Sch Informat & Commun Engn Taiyuan Shanxi Peoples R China Chinese Acad Sci Inst Informat Engn SKLOIS Beijing Peoples R China
Homomorphic (broadcast) message authentication code (MAC for short) scheme is a powerful tool for network coding to resist the pollution attack. However, many existing schemes only support the single generation transm... 详细信息
来源: 评论
Spectrum Sharing With network coding for Multiple Cognitive Users
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2019年 第1期6卷 230-238页
作者: Li, Nan Xiao, Ming Rasmussen, Lars Kildehoj KTH Royal Inst Technol Sch Elect Engn S-10044 Stockholm Sweden KTH Royal Inst Technol ACCESS Linnaeus Ctr S-10044 Stockholm Sweden
In this paper, an intelligently cooperative communication network with cognitive users is considered, where in a primary system and a secondary system, respectively, a message is communicated to their respective recei... 详细信息
来源: 评论
A Bi-objective integer linear programming model for the routing and network coding assignment problem in WDM optical networks with dedicated protection
收藏 引用
COMPUTER COMMUNICATIONS 2019年 第Jan.期133卷 51-58页
作者: Dao Thanh Hai Vietnam Natl Univ Int Sch Lab Data Sci & Optimizat Complex Syst Hanoi Vietnam
The explosive traffic growths are pushing the transport network close to its capacity limitation, raising critical issues about fiber capacity crunch. In this context, network coding has been emerging as the promising... 详细信息
来源: 评论
The network coding Algorithm Based on Rate Selection for Device-to-Device Communications
收藏 引用
IEEE ACCESS 2019年 7卷 23396-23406页
作者: Wang, Qi Zhang, Xiang Wang, Qingshan Liu, Peng Deng, Bin Hefei Univ Technol Sch Math Hefei 230009 Anhui Peoples R China Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Zhejiang Peoples R China
In this paper, we investigate the problem associated with minimizing the total energy consumption used by all devices when recovering their missing packets. It is accomplished by applying network coding based on the s... 详细信息
来源: 评论
Modeling and Analysis of Two-Way Relay networks: A Joint Mechanism Using NOMA and network coding
收藏 引用
IEEE ACCESS 2019年 7卷 152679-152689页
作者: Wei, Fanbo Zhou, Ting Xu, Tianheng Hu, Honglin Chinese Acad Sci Shanghai Adv Res Inst Shanghai 201210 Peoples R China Univ Chinese Acad Sci Sch Elect Elect & Commun Engn Beijing 100049 Peoples R China
As a promising technology, non-orthogonal multiple access (NOMA) enhances spectral efficiency and system capacity by allocating the same resource to multiple users. network coding (NC) has the advantages of compressin... 详细信息
来源: 评论
Multi-Hop D2D Communications With network coding: From a Performance Perspective
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2019年 第3期68卷 2270-2282页
作者: Huang, Jun Liao, Yong Xing, Cong-Cong Chang, Zheng Chongqing Univ Posts & Telecom Sch Comp Sci Chongqing 400065 Peoples R China Chongqing Univ Posts & Telecom Sch Commun & Informat Engn Chongqing 400065 Peoples R China Nicholls State Univ Dept Math & Comp Sci Thibodaux LA 70310 USA Univ Jyvaskyla Fac Informat Technol FI-40014 Jyvaskyla Finland
Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communicati... 详细信息
来源: 评论
Privacy Protection for Internet of Drones: A network coding Approach
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2019年 第2期6卷 1719-1730页
作者: Chen, Yu-Jia Wang, Li-Chun Natl Chiao Tung Univ Dept Elect & Comp Engn Hsinchu 300 Taiwan
This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones (IoD). Nowadays, drones equipped with cameras can provide surveillance and aerial photography applicat... 详细信息
来源: 评论