咨询与建议

限定检索结果

文献类型

  • 994 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 1,217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 740 篇 工学
    • 425 篇 信息与通信工程
    • 373 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 218 篇 电子科学与技术(可...
    • 117 篇 仪器科学与技术
    • 83 篇 电气工程
    • 67 篇 控制科学与工程
    • 55 篇 生物工程
    • 46 篇 动力工程及工程热...
    • 45 篇 机械工程
    • 42 篇 光学工程
    • 38 篇 交通运输工程
    • 23 篇 网络空间安全
    • 21 篇 生物医学工程(可授...
    • 19 篇 航空宇航科学与技...
    • 14 篇 化学工程与技术
    • 10 篇 土木工程
    • 9 篇 材料科学与工程(可...
    • 9 篇 建筑学
  • 254 篇 理学
    • 147 篇 数学
    • 76 篇 物理学
    • 59 篇 统计学(可授理学、...
    • 57 篇 生物学
    • 26 篇 系统科学
    • 16 篇 化学
  • 156 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 49 篇 工商管理
    • 35 篇 图书情报与档案管...
  • 14 篇 法学
    • 13 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 9 篇 医学
  • 6 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 65 篇 wireless communi...
  • 61 篇 interference
  • 49 篇 simulation
  • 44 篇 resource managem...
  • 41 篇 quality of servi...
  • 38 篇 delays
  • 37 篇 signal to noise ...
  • 37 篇 energy efficienc...
  • 36 篇 throughput
  • 36 篇 optimization
  • 34 篇 bandwidth
  • 32 篇 mobile communica...
  • 30 篇 algorithm design...
  • 28 篇 wireless network...
  • 27 篇 conferences
  • 27 篇 internet
  • 26 篇 receivers
  • 25 篇 energy consumpti...
  • 23 篇 wireless sensor ...
  • 23 篇 training

机构

  • 486 篇 beijing key labo...
  • 116 篇 beijing key labo...
  • 73 篇 beijing key labo...
  • 48 篇 beijing universi...
  • 46 篇 beijing laborato...
  • 42 篇 beijing laborato...
  • 41 篇 college of elect...
  • 40 篇 laboratory of ne...
  • 38 篇 beijing laborato...
  • 31 篇 beijing key labo...
  • 29 篇 school of inform...
  • 21 篇 beijing laborato...
  • 17 篇 beijing universi...
  • 17 篇 beijing laborato...
  • 16 篇 beijing laborato...
  • 15 篇 beijing universi...
  • 14 篇 beijing universi...
  • 10 篇 technology resea...
  • 10 篇 the beijing key ...
  • 10 篇 beijing key labo...

作者

  • 101 篇 xiangming wen
  • 88 篇 zhaoming lu
  • 77 篇 wen xiangming
  • 73 篇 lu zhaoming
  • 63 篇 guo caili
  • 62 篇 yang yang
  • 58 篇 wu muqing
  • 56 篇 caili guo
  • 55 篇 chunyan feng
  • 48 篇 zhimin zeng
  • 45 篇 muqing wu
  • 45 篇 tiankui zhang
  • 45 篇 guochu shou
  • 41 篇 yihong hu
  • 36 篇 changchuan yin
  • 35 篇 luhan wang
  • 33 篇 li deng
  • 33 篇 deng li
  • 32 篇 yin changchuan
  • 30 篇 feng botao

语言

  • 1,143 篇 英文
  • 43 篇 中文
  • 31 篇 其他
检索条件"机构=Beijing Key Laboratory for Network System Architecture and Convergence"
1217 条 记 录,以下是651-660 订阅
排序:
Implementation of a Chinese Word Segmentation in Big Data Environment
Implementation of a Chinese Word Segmentation in Big Data En...
收藏 引用
International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Shijie Ruan Gang He Dechen Yu Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
A Chinese word segmentation is implement in big data environment in this paper. We develop a word segmentation system based on Double-Array Trie tree for dictionary and improving N-Gram algorithm for OOV words discove... 详细信息
来源: 评论
WiCloud: Innovative uses of network data on smart campus
WiCloud: Innovative uses of network data on smart campus
收藏 引用
International Conference on Computer Science & Education (ICCSE)
作者: Hongxing Li Guochu Shou Yihong Hu Zhigang Guo Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
Mobile Edge Computing (MEC) aims to provide mobile and cloud computing capabilities within the radio access network, and emphasizes the openness of the internet which can transfer the real-time radio network informati... 详细信息
来源: 评论
Relationship Analysis of network Virtual Identity Based on Spark
Relationship Analysis of Network Virtual Identity Based on S...
收藏 引用
International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Shaowu Lan Gang He Dechen Yu Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
With the development of Internet, there are massive network accounts on Internet when people tend to contact with each other by network applications. We define these network accounts as network Virtual Identities (NVI... 详细信息
来源: 评论
A cross-polarization discrimination compensation algorithm based on polarization modulation for the power amplifier energy efficiency improvement
A cross-polarization discrimination compensation algorithm b...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Jinjin Yuan Fangfang Liu Caili Guo Chunyan Feng Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
In the dual-polarized channel, the power amplifier (PA) energy efficiency is decreased by cross-polarization discrimination (XPD) effect which introduces cross power leakage and then reduces the BER performance of pol... 详细信息
来源: 评论
Mobile Edge Computing: Progress and Challenges
Mobile Edge Computing: Progress and Challenges
收藏 引用
IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
作者: Hongxing Li Guochu Shou Yihong Hu Zhigang Guo Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
Mobile Edge Computing (MEC) provides mobile and cloud computing capabilities within the access network, and aims to unite the telco and IT at the mobile network edge. This paper presents an investigation on the progre... 详细信息
来源: 评论
CONNECTIVITY FOR OVERLAID WIRELESS networkS WITH OUTAGE CONSTRAINTS
CONNECTIVITY FOR OVERLAID WIRELESS NETWORKS WITH OUTAGE CONS...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Yang Liu Chengzhi Li Changchuan Yin Huaiyu Dai Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China 100876
We study the connectivity of overlaid wireless networks where two users can communicate if the signal-to-interference ratio is larger than a threshold subject to an outage constraint. By using percolation theory, we f... 详细信息
来源: 评论
Improving mobility prediction performance with state based prediction method when the user departs from routine
Improving mobility prediction performance with state based p...
收藏 引用
IEEE International Conference on Big Data Analysis (ICBDA)
作者: Airui Li Qiujian Lv Yuanyuan Qiao Jie Yang Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications (BUPT) Beijing China
With the rapid increase of the mobile users, mobility prediction has attracted more and more attention. For the moment, a lot of location prediction methods have shown that humans are highly predictable in their movem... 详细信息
来源: 评论
Detecting Malicious Domains by Massive DNS Traffic Data Analysis
Detecting Malicious Domains by Massive DNS Traffic Data Anal...
收藏 引用
International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Shiqi Tian Cheng Fang Jun Liu Zhenming Lei Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications HAOHAN Data Technology Co. LTD. Beijing China
DNS (Domain name system) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities including the malicious operation. Monitoring the DNS traffic is... 详细信息
来源: 评论
Remote Video Interception system Implemented on USRP
Remote Video Interception System Implemented on USRP
收藏 引用
IEEE International Conference on Internet of Things
作者: Yuan Zhou Li Deng Weijun Hong Chen Zhang Shufang Li Zhen Wang Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China 100876
With the development of the technology, life is filled with increasing information equipment. When they work, a great deal of information will be radiated. For the leaked information, an interception system is built w... 详细信息
来源: 评论
A fast handoff scheme for ieee 802.11 networks using software defined networking
A fast handoff scheme for ieee 802.11 networks using softwar...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Biao Zhang Xiangming Wen Zhaoming Lu Tao Lei Xiaoguang Zhao Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Beijing Laboratory of Advanced Information Network Beijing China
Due to the limited coverage range of access points (APs) and the mobility of stations (STAs), handoff occurs frequently in IEEE 802.11 wireless local area network (WLAN). However, traditional handoff mechanisms employ... 详细信息
来源: 评论