咨询与建议

限定检索结果

文献类型

  • 993 篇 会议
  • 221 篇 期刊文献

馆藏范围

  • 1,214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 738 篇 工学
    • 426 篇 信息与通信工程
    • 373 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 214 篇 电子科学与技术(可...
    • 115 篇 仪器科学与技术
    • 82 篇 电气工程
    • 67 篇 控制科学与工程
    • 55 篇 生物工程
    • 46 篇 动力工程及工程热...
    • 45 篇 机械工程
    • 41 篇 光学工程
    • 38 篇 交通运输工程
    • 23 篇 网络空间安全
    • 21 篇 生物医学工程(可授...
    • 18 篇 航空宇航科学与技...
    • 14 篇 化学工程与技术
    • 10 篇 土木工程
    • 9 篇 材料科学与工程(可...
    • 9 篇 建筑学
  • 251 篇 理学
    • 146 篇 数学
    • 75 篇 物理学
    • 60 篇 统计学(可授理学、...
    • 57 篇 生物学
    • 26 篇 系统科学
    • 15 篇 化学
  • 156 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 49 篇 工商管理
    • 35 篇 图书情报与档案管...
  • 14 篇 法学
    • 13 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 9 篇 医学
  • 6 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 65 篇 wireless communi...
  • 61 篇 interference
  • 49 篇 simulation
  • 44 篇 resource managem...
  • 41 篇 quality of servi...
  • 38 篇 delays
  • 37 篇 signal to noise ...
  • 37 篇 energy efficienc...
  • 36 篇 throughput
  • 36 篇 optimization
  • 34 篇 bandwidth
  • 32 篇 mobile communica...
  • 30 篇 algorithm design...
  • 28 篇 wireless network...
  • 27 篇 conferences
  • 27 篇 internet
  • 26 篇 receivers
  • 25 篇 energy consumpti...
  • 23 篇 wireless sensor ...
  • 23 篇 training

机构

  • 484 篇 beijing key labo...
  • 116 篇 beijing key labo...
  • 73 篇 beijing key labo...
  • 48 篇 beijing universi...
  • 46 篇 beijing laborato...
  • 41 篇 college of elect...
  • 41 篇 beijing laborato...
  • 40 篇 laboratory of ne...
  • 38 篇 beijing laborato...
  • 31 篇 beijing key labo...
  • 28 篇 school of inform...
  • 21 篇 beijing laborato...
  • 17 篇 beijing universi...
  • 17 篇 beijing laborato...
  • 16 篇 beijing laborato...
  • 15 篇 beijing universi...
  • 13 篇 beijing universi...
  • 10 篇 technology resea...
  • 10 篇 the beijing key ...
  • 10 篇 beijing key labo...

作者

  • 101 篇 xiangming wen
  • 88 篇 zhaoming lu
  • 77 篇 wen xiangming
  • 73 篇 lu zhaoming
  • 63 篇 guo caili
  • 62 篇 yang yang
  • 58 篇 wu muqing
  • 56 篇 caili guo
  • 55 篇 chunyan feng
  • 48 篇 zhimin zeng
  • 45 篇 muqing wu
  • 45 篇 tiankui zhang
  • 45 篇 guochu shou
  • 41 篇 yihong hu
  • 36 篇 changchuan yin
  • 35 篇 luhan wang
  • 33 篇 li deng
  • 33 篇 deng li
  • 32 篇 yin changchuan
  • 30 篇 feng botao

语言

  • 1,109 篇 英文
  • 62 篇 其他
  • 43 篇 中文
检索条件"机构=Beijing Key Laboratory of Network System Architecture and Convergence"
1214 条 记 录,以下是651-660 订阅
排序:
Mobile Edge Computing: Progress and Challenges
Mobile Edge Computing: Progress and Challenges
收藏 引用
IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
作者: Hongxing Li Guochu Shou Yihong Hu Zhigang Guo Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
Mobile Edge Computing (MEC) provides mobile and cloud computing capabilities within the access network, and aims to unite the telco and IT at the mobile network edge. This paper presents an investigation on the progre... 详细信息
来源: 评论
A cross-polarization discrimination compensation algorithm based on polarization modulation for the power amplifier energy efficiency improvement
A cross-polarization discrimination compensation algorithm b...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Jinjin Yuan Fangfang Liu Caili Guo Chunyan Feng Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
In the dual-polarized channel, the power amplifier (PA) energy efficiency is decreased by cross-polarization discrimination (XPD) effect which introduces cross power leakage and then reduces the BER performance of pol... 详细信息
来源: 评论
CONNECTIVITY FOR OVERLAID WIRELESS networkS WITH OUTAGE CONSTRAINTS
CONNECTIVITY FOR OVERLAID WIRELESS NETWORKS WITH OUTAGE CONS...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Yang Liu Chengzhi Li Changchuan Yin Huaiyu Dai Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China 100876
We study the connectivity of overlaid wireless networks where two users can communicate if the signal-to-interference ratio is larger than a threshold subject to an outage constraint. By using percolation theory, we f... 详细信息
来源: 评论
Improving mobility prediction performance with state based prediction method when the user departs from routine
Improving mobility prediction performance with state based p...
收藏 引用
IEEE International Conference on Big Data Analysis (ICBDA)
作者: Airui Li Qiujian Lv Yuanyuan Qiao Jie Yang Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications (BUPT) Beijing China
With the rapid increase of the mobile users, mobility prediction has attracted more and more attention. For the moment, a lot of location prediction methods have shown that humans are highly predictable in their movem... 详细信息
来源: 评论
Remote Video Interception system Implemented on USRP
Remote Video Interception System Implemented on USRP
收藏 引用
IEEE International Conference on Internet of Things
作者: Yuan Zhou Li Deng Weijun Hong Chen Zhang Shufang Li Zhen Wang Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China 100876
With the development of the technology, life is filled with increasing information equipment. When they work, a great deal of information will be radiated. For the leaked information, an interception system is built w... 详细信息
来源: 评论
Detecting Malicious Domains by Massive DNS Traffic Data Analysis
Detecting Malicious Domains by Massive DNS Traffic Data Anal...
收藏 引用
International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Shiqi Tian Cheng Fang Jun Liu Zhenming Lei Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications HAOHAN Data Technology Co. LTD. Beijing China
DNS (Domain name system) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities including the malicious operation. Monitoring the DNS traffic is... 详细信息
来源: 评论
A fast handoff scheme for ieee 802.11 networks using software defined networking
A fast handoff scheme for ieee 802.11 networks using softwar...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Biao Zhang Xiangming Wen Zhaoming Lu Tao Lei Xiaoguang Zhao Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Beijing Laboratory of Advanced Information Network Beijing China
Due to the limited coverage range of access points (APs) and the mobility of stations (STAs), handoff occurs frequently in IEEE 802.11 wireless local area network (WLAN). However, traditional handoff mechanisms employ... 详细信息
来源: 评论
ANALYSIS OF MOBILE SUBSCRIBERS' BEHAVIOR PATTERN BASED ON NON-NEGATIVE MATRIX FACTORIZATION
ANALYSIS OF MOBILE SUBSCRIBERS' BEHAVIOR PATTERN BASED ON NO...
收藏 引用
2016 5th IEEE International Conference on network Infrastructure and Digital Content(IC-NIDC 2016)
作者: Han Deng Yonggang Qi Jun Liu Jie Yang Beijing Key Laboratory of Network System Architecture and Convergence Center for Data Science Beijing University of Posts and Telecommunications
As the increasing number of intelligent mobile phones that are available for people which lead to tones of network flow data are ***,how to dig the user's behavior pattern by using the data collected form mobile p... 详细信息
来源: 评论
Research and Implementation of Resource Scheduling Mechanisms Based on Software Defined Security
Research and Implementation of Resource Scheduling Mechanism...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Zelang Wang Guochu Shou Yihong Hu Zhigang Guo Beijing Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
Compared with the traditional stiff and decentralized security mechanisms, software-defined security SDS provides a flexible and centralized solution through extract security strategy from the hardware to the software... 详细信息
来源: 评论
A Cross-Polarization Discrimination Compensation Algorithm for Polarization Modulation
A Cross-Polarization Discrimination Compensation Algorithm f...
收藏 引用
IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications
作者: Jinjin Yuan Fangfang Liu Caili Guo Chunyan Feng Yao Nie Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications
In dual-polarized channel, the BER performance of polarization modulation (PM) can be decreased by cross-polarization discrimination (XPD) effect which can introduce cross power leakage. Therefore, a XPD compensation ... 详细信息
来源: 评论