咨询与建议

限定检索结果

文献类型

  • 30 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 16 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 11 篇 信息与通信工程
    • 8 篇 电子科学与技术(可...
    • 4 篇 仪器科学与技术
    • 3 篇 光学工程
    • 2 篇 机械工程
    • 2 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 生物工程
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
    • 1 篇 安全科学与工程
  • 8 篇 理学
    • 4 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 4 篇 wireless communi...
  • 4 篇 quality of servi...
  • 4 篇 mobile communica...
  • 3 篇 bandwidth
  • 2 篇 routing
  • 2 篇 reinforcement le...
  • 2 篇 simulation
  • 2 篇 hidden markov mo...
  • 2 篇 resource managem...
  • 2 篇 convergence
  • 2 篇 internet
  • 2 篇 passive optical ...
  • 2 篇 algorithm design...
  • 2 篇 cities and towns
  • 2 篇 entropy
  • 2 篇 correlation
  • 2 篇 complexity theor...
  • 2 篇 ieee 802.11 stan...
  • 2 篇 mathematical mod...
  • 2 篇 streaming media

机构

  • 5 篇 beijing key lab....
  • 4 篇 beijing key labo...
  • 4 篇 beijing key lab....
  • 3 篇 beijing key lab....
  • 3 篇 college of elect...
  • 3 篇 beijing key labo...
  • 3 篇 state key lab. o...
  • 2 篇 state key labora...
  • 2 篇 state key lab. o...
  • 2 篇 school of intern...
  • 2 篇 state key labora...
  • 2 篇 state key lab.of...
  • 2 篇 beijing laborato...
  • 2 篇 mit senseable ci...
  • 2 篇 beijing laborato...
  • 2 篇 beijing key lab ...
  • 2 篇 state key lab of...
  • 2 篇 beijing key labo...
  • 2 篇 tsinghua sem adv...
  • 2 篇 performance engi...

作者

  • 9 篇 hongyan cui
  • 5 篇 li deng
  • 5 篇 yunjie liu
  • 4 篇 xiong xiong
  • 3 篇 luhan wang
  • 3 篇 weijun hong
  • 3 篇 guo caili
  • 3 篇 xiangming wen
  • 2 篇 zheng wei
  • 2 篇 qiao yuanyuan
  • 2 篇 yuan yao
  • 2 篇 saad walid
  • 2 篇 debbah mérouane
  • 2 篇 simeone osvaldo
  • 2 篇 keliang du
  • 2 篇 yuefeng ji
  • 2 篇 zhentao zhao
  • 2 篇 haiwen niu
  • 2 篇 chenhang ma
  • 2 篇 yu liu

语言

  • 39 篇 英文
  • 1 篇 其他
检索条件"机构=Beijing Key Lab. of Network System Architecture and Convergence"
40 条 记 录,以下是11-20 订阅
An efficient Virtual network embedding algorithm based on subgraph
An efficient Virtual Network embedding algorithm based on su...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Lan Li Jianya Chen Tao Huang Hongyan Cui Beijing Key Lab. of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
network virtualization, known as a promising technique, has emerged as an effective method to overcome the ossification of the Internet. By enabling the co-existence of multiple heterogeneous Virtual networks (VNs) ov... 详细信息
来源: 评论
network traffic prediction based on Hadoop
Network traffic prediction based on Hadoop
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Hongyan Cui Yuan Yao Kuo Zhang Fangfang Sun Yunjie Liu Beijing Key Lab. of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
With the growing popularity of smart phones and the rapid development of Internet, the traditional network management system cannot adapt itself to the requirement intelligently. If we can use historic data to predict... 详细信息
来源: 评论
Oscillation resolution for massive cell phone traffic data  1
Oscillation resolution for massive cell phone traffic data
收藏 引用
1st Workshop on Mobile Data, MobiData 2016, co-located with MobiSys 2016
作者: Qi, Ling Qiao, Yuanyuan Abdesslem, Fehmi Ben Ma, Zhanyu Yang, Jie Center for Data Science Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Network BUPT Beijing China Decisions Networks and Analytics Laboratory SICS Stockholm Sweden Center for Data Science Pattern Recognition and Intelligent System Lab BUPT Beijing China
Cellular towers capture logs of mobile subscribers whenever their devices connect to the network. When the logs show data traffic at a cell tower generated by a device, it reveals that this device is close to the towe... 详细信息
来源: 评论
A recyclab.e platform-tolerant RFID tag antenna with cross-plane loop-fed
A recyclable platform-tolerant RFID tag antenna with cross-p...
收藏 引用
International RF and Microwave Conference, RFM
作者: Weijun Hong Yang Fu Qing Chen Li Deng Xiong Xiong Beijing Key Lab. of Network System Architecture and Convergence Beijing Univ. of Posts and Telecommunications Beijing China
To avoid performance fluctuation of radio frequency identification (RFID) system while the tag is attached on objects with different materials, a platform-tolerant UHF RFID tag antenna with stable high gain is propose... 详细信息
来源: 评论
Expected Q-learning for self-organizing resource allocation in LTE-U with downlink-uplink decoupling  23
Expected Q-learning for self-organizing resource allocation ...
收藏 引用
23rd European Wireless Conference, EW 2017
作者: Hu, Ye MacKenzie, Richard Hao, Mo Beijing Laboratory of Advanced Information Network Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing100876 China BT TSO Adastral Park Ipswich United Kingdom Tsinghua SEM Advanced ICT Lab Beijing100084 China
Exponentially growing demand on mobile data facilitates the need to increase spectrum efficiency and also to gain access to additional spectrum bands. LTE-U provides a way for LTE service to be provided, in some regul... 详细信息
来源: 评论
DQ-RM: Deep Reinforcement Learning-based Route Mutation Scheme for Multimedia Services  16
DQ-RM: Deep Reinforcement Learning-based Route Mutation Sche...
收藏 引用
16th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2020
作者: Zhang, Tao Xu, Changqiao Zhang, Bingchi Kuang, Xiaohui Wang, Yue Yang, Shujie Muntean, Gabriel-Miro State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China School of International Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Science and Technology on Information System Security Beijing China Beijing Key Laboratory of Network System Architecture and Convergence Beijing China Performance Engineering Lab. School of Electronic Engineering Dublin City University Dublin Ireland
Increasingly growing various multimedia services (e.g., interactive live video and so on) have brought tremendous pressure on existing static defense techniques. To cope with inherent drawback of static defense techni... 详细信息
来源: 评论
User relationship analysis in campus based on WiFi Hotspots
User relationship analysis in campus based on WiFi Hotspots
收藏 引用
International Conference on Computer Science & Education (ICCSE)
作者: Bonan Wang Qianqian Wang Guochu Shou Yihong Hu Zhigang Guo Beijing Key Lab.of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
With the rapid development of mobile Internet, the way users access the network becomes diverse, which provide much convenience for us to collect huge amount of users' information. In this paper, we present a mode... 详细信息
来源: 评论
Anomaly Detection for User Behavior in Wireless network Based on Cross Entropy
Anomaly Detection for User Behavior in Wireless Network Base...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Chunxiao Zhang Yihong Hu Xinning Zhu Zhigang Guo Junfei Huang Beijing Key Lab. of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Wi-Fi technology is becoming more and more popular and anomaly detection for user behavior is much required in many fields such as public security, therefore anomaly detection for offline user behavior based on Wi-Fi ... 详细信息
来源: 评论
Streaming media traffic characterizations analysis in mobile Internet
Streaming media traffic characterizations analysis in mobile...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Hongyan Cui Jia Wang Fangfang Sun Yunjie Liu Kwang-Cheng Chen Key Lab. of network system architecture and convergence Beijing University of Posts and Telecommunications State Key Lab. of Networking and Switching Technology Department of Electrical Engineering National Taiwan University
In spite of great efforts to expand the network infrastructure, it is still hard to catch the rapid growing need to serve tremendous subscribers with significant traffic. To effectively allocate the resource among mob... 详细信息
来源: 评论
WiFi Band-Stop FSS for Increased Privacy Protection in Smart Building
WiFi Band-Stop FSS for Increased Privacy Protection in Smart...
收藏 引用
The 6th International Symposium on Microwave,Antenna,Propagation,and Electromagnetic Compatibility Technologies(MAPE 2015)
作者: Xiong Xiong Weijun Hong Zhentao Zhao Li Deng Shufang Li College of Electronic and Information Engineering South China University of Technology Beijing Key Lab. of Network System Architecture and Convergence Beijing Univ. of Posts and Telecommunications
This paper proposes a periodic double ring strip frequency selective surface(FSS) with dual-band stop behavior. The FSS elements are designed to be etched on the transparent coating of glass substrate in smart build... 详细信息
来源: 评论