咨询与建议

限定检索结果

文献类型

  • 899 篇 会议
  • 200 篇 期刊文献

馆藏范围

  • 1,099 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 661 篇 工学
    • 377 篇 信息与通信工程
    • 334 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 192 篇 电子科学与技术(可...
    • 103 篇 仪器科学与技术
    • 74 篇 电气工程
    • 59 篇 控制科学与工程
    • 53 篇 生物工程
    • 43 篇 动力工程及工程热...
    • 41 篇 机械工程
    • 37 篇 光学工程
    • 36 篇 交通运输工程
    • 22 篇 网络空间安全
    • 20 篇 生物医学工程(可授...
    • 19 篇 航空宇航科学与技...
    • 13 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 建筑学
    • 8 篇 土木工程
  • 228 篇 理学
    • 127 篇 数学
    • 69 篇 物理学
    • 55 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 138 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 44 篇 工商管理
    • 33 篇 图书情报与档案管...
  • 13 篇 法学
    • 12 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 7 篇 医学
  • 5 篇 农学
  • 4 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 61 篇 wireless communi...
  • 58 篇 interference
  • 49 篇 simulation
  • 43 篇 resource managem...
  • 36 篇 delays
  • 36 篇 optimization
  • 34 篇 signal to noise ...
  • 34 篇 throughput
  • 34 篇 quality of servi...
  • 34 篇 energy efficienc...
  • 29 篇 bandwidth
  • 27 篇 conferences
  • 27 篇 algorithm design...
  • 26 篇 wireless network...
  • 25 篇 internet
  • 25 篇 receivers
  • 24 篇 mobile communica...
  • 23 篇 energy consumpti...
  • 22 篇 heuristic algori...
  • 21 篇 wireless sensor ...

机构

  • 486 篇 beijing key labo...
  • 117 篇 beijing key labo...
  • 73 篇 beijing key labo...
  • 46 篇 beijing laborato...
  • 46 篇 beijing universi...
  • 42 篇 beijing laborato...
  • 41 篇 college of elect...
  • 38 篇 beijing laborato...
  • 31 篇 beijing key labo...
  • 29 篇 school of inform...
  • 21 篇 beijing laborato...
  • 17 篇 beijing universi...
  • 17 篇 beijing laborato...
  • 16 篇 beijing laborato...
  • 16 篇 beijing universi...
  • 14 篇 beijing universi...
  • 10 篇 technology resea...
  • 10 篇 the beijing key ...
  • 10 篇 beijing key labo...
  • 10 篇 beijing laborato...

作者

  • 100 篇 xiangming wen
  • 87 篇 zhaoming lu
  • 74 篇 wen xiangming
  • 70 篇 lu zhaoming
  • 62 篇 yang yang
  • 60 篇 guo caili
  • 53 篇 caili guo
  • 53 篇 chunyan feng
  • 46 篇 zhimin zeng
  • 44 篇 tiankui zhang
  • 35 篇 luhan wang
  • 35 篇 wu muqing
  • 35 篇 changchuan yin
  • 33 篇 muqing wu
  • 32 篇 deng li
  • 31 篇 yin changchuan
  • 30 篇 feng botao
  • 30 篇 wenpeng jing
  • 29 篇 guochu shou
  • 29 篇 jun liu

语言

  • 1,026 篇 英文
  • 42 篇 中文
  • 31 篇 其他
检索条件"机构=Beijing Key Laboratory of Network System Architecture and Convergence Acknowledgment"
1099 条 记 录,以下是571-580 订阅
排序:
A joint learning and communications framework for federated learning over wireless networks
arXiv
收藏 引用
arXiv 2019年
作者: Chen, Mingzhe Yang, Zhaohui Saad, Walid Yin, Changchuan Vincent Poor, H. Cui, Shuguang Chinese University of Hong Kong Shenzhen518172 China Department of Electrical Engineering Princeton University PrincetonNJ08544 United States Centre for Telecommunications Research Department of Informatics King's College London WC2B 4BG United Kingdom Bradley Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24060 United States Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing100876 China Department of Electrical Engineering Princeton University PrincetonNJ08544 United States Shenzhen Research Institute of Big Data School of Science and Engineering Chinese University of Hong Kong Shenzhen518172 China
In this paper, the problem of training federated learning (FL) algorithms over a realistic wireless network is studied. In particular, in the considered model, wireless users execute an FL algorithm while training the... 详细信息
来源: 评论
Energy efficient channel sharing and power optimization for device-to-device networks
Lecture Notes of the Institute for Computer Sciences, Social...
收藏 引用
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 2017年 174卷 63-75页
作者: Xi, Zeguo Wen, Xiangming Lu, Zhaoming Zeng, Yan Hu, Zhiqun Lei, Tao Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing100876 China Beijing Laboratory of Advanced Information Networks Beijing100876 China
In device-to-device (D2D) networks, the system performance can be significantly improved with a well resource allocation scheme. In this paper, the issue of channel sharing and power allocation for deviceto-device (D2... 详细信息
来源: 评论
Analysis and Prediction of Content Popularity for Online Video Service:A Youku Case Study
收藏 引用
China Communications 2016年 第12期13卷 216-233页
作者: Chenyu Li Jun Liu Shuxin Ouyang Beijing Key Laboratory of Network System Architecture and Convergence Center for Data ScienceSchool of Information and Communication EngineeringBeijing University of Posts and Telecommunications
Understanding the characteristics and predicting the popularity of the newly published online videos can provide direct implications in various contexts such as service design, advertisement planning, network manageme... 详细信息
来源: 评论
Impedance measurement of RFID tag antenna based on different methods
Impedance measurement of RFID tag antenna based on different...
收藏 引用
IEEE International Symposium on Electromagnetic Compatibility (EMC-beijing)
作者: Chenwei Cai Weijun Hong Li Deng Shufang Li Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing People's Republic of China
RFID tag antennas use balanced feeding structure, which causes great challenge on antenna impedance measurement. Methods for balanced antenna impedance measurement can be divided into three categories: Balun method, i... 详细信息
来源: 评论
A SOFTWARE DEFINED SECURITY architecture FOR SDN-BASED 5G network  5
A SOFTWARE DEFINED SECURITY ARCHITECTURE FOR SDN-BASED 5G NE...
收藏 引用
2016 5th IEEE International Conference on network Infrastructure and Digital Content(IC-NIDC 2016)
作者: Xiaodong Liang Xiaofeng Qiu Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications
Software Defined networking(SDN) is considered to meet the future needs of the 5G mobile ***,there have been only a few works so far that address the security issues in SDMN(Software Defined Mobile networks),and all t... 详细信息
来源: 评论
network ANOMALY DETECTION BASED ON FREQUENT SUB-GRAPH MINING APPROACH AND ASSOCIATION ANALYSIS  5
NETWORK ANOMALY DETECTION BASED ON FREQUENT SUB-GRAPH MINING...
收藏 引用
2016 5th IEEE International Conference on network Infrastructure and Digital Content(IC-NIDC 2016)
作者: Fangyuan Cheng Xiaofeng Qiu Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications
In this paper,an anomaly detection method based on frequent sub-graph mining and association analysis is introduced to ensure the security of the *** this method,the network behavior data in SDN are represented as a g... 详细信息
来源: 评论
Signal Recognition Based on Signal Power Spectrum Fitting Feature Extraction
收藏 引用
beijing Youdian Daxue Xuebao/Journal of beijing University of Posts and Telecommunications 2018年 第2期41卷 114-118页
作者: Tian, Hao-Min Yin, Liang Ma, Yue Li, Shu-Fang Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing100876 China Computer Network Research Center Beijing University of Posts and Telecommunications Beijing100876 China School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing100876 China
Aiming at the problem of communication signal service type identification, the author proposes a polynomial fitting factor that extracts the power spectrum of the signal using the linear regression algorithm and the p... 详细信息
来源: 评论
Probabilistic Top-k Query:Model and Application on Web Traffic Analysis
收藏 引用
China Communications 2016年 第6期13卷 123-137页
作者: Xiaolin Gui Jun Liu Qiujian Lv Chao Dong Zhenming Lei Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and TelecommunicationsBeijing100876China Agricultural Bank of China Beijing 100161 China
Top-k ranking of websites according to traffic volume is important for Internet Service Providers(ISPs) to understand network status and optimize network resources. However, the ranking result always has a big deviati... 详细信息
来源: 评论
Distribution network topology reconstruction method based on lasso and its supplementary criterions  10th
Distribution network topology reconstruction method based on...
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Li, Xiaoyu Li, Shufang Li, Wenqi Tian, Shiming Pan, Mingming Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China State Grid Henan Electric Power Company Jinshui District Zhengzhou450052 China China Electric Power Research Institute Haidian District Beijing100192 China
In order to solve the problem of topology reconstruction in distribution network, a new data driven algorithm is proposed, which uses only the timing voltage to reconstruct the un-loopy and loopy distribution network ... 详细信息
来源: 评论
Dual-layer efficiency enhancement for future passive optical network
收藏 引用
Science China(Information Sciences) 2016年 第2期59卷 172-184页
作者: Yuefeng JI Xiaoxiong WANG Shizong ZHANG Rentao GU Tonglu GUO Zhaozhi GE State Key Lab of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications
Ever-increasing demands on bandwidth compel us to improve the bandwidth utilization of access networks. It is more important to enhance the efficiency of passive optical networks(PON) than other access technologies, a... 详细信息
来源: 评论