咨询与建议

限定检索结果

文献类型

  • 899 篇 会议
  • 200 篇 期刊文献

馆藏范围

  • 1,099 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 661 篇 工学
    • 377 篇 信息与通信工程
    • 334 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 192 篇 电子科学与技术(可...
    • 103 篇 仪器科学与技术
    • 74 篇 电气工程
    • 59 篇 控制科学与工程
    • 53 篇 生物工程
    • 43 篇 动力工程及工程热...
    • 41 篇 机械工程
    • 37 篇 光学工程
    • 36 篇 交通运输工程
    • 22 篇 网络空间安全
    • 20 篇 生物医学工程(可授...
    • 19 篇 航空宇航科学与技...
    • 13 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 建筑学
    • 8 篇 土木工程
  • 228 篇 理学
    • 127 篇 数学
    • 69 篇 物理学
    • 55 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 138 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 44 篇 工商管理
    • 33 篇 图书情报与档案管...
  • 13 篇 法学
    • 12 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 7 篇 医学
  • 5 篇 农学
  • 4 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 61 篇 wireless communi...
  • 58 篇 interference
  • 49 篇 simulation
  • 43 篇 resource managem...
  • 36 篇 delays
  • 36 篇 optimization
  • 34 篇 signal to noise ...
  • 34 篇 throughput
  • 34 篇 quality of servi...
  • 34 篇 energy efficienc...
  • 29 篇 bandwidth
  • 27 篇 conferences
  • 27 篇 algorithm design...
  • 26 篇 wireless network...
  • 25 篇 internet
  • 25 篇 receivers
  • 24 篇 mobile communica...
  • 23 篇 energy consumpti...
  • 22 篇 heuristic algori...
  • 21 篇 wireless sensor ...

机构

  • 486 篇 beijing key labo...
  • 117 篇 beijing key labo...
  • 73 篇 beijing key labo...
  • 46 篇 beijing laborato...
  • 46 篇 beijing universi...
  • 42 篇 beijing laborato...
  • 41 篇 college of elect...
  • 38 篇 beijing laborato...
  • 31 篇 beijing key labo...
  • 29 篇 school of inform...
  • 21 篇 beijing laborato...
  • 17 篇 beijing universi...
  • 17 篇 beijing laborato...
  • 16 篇 beijing laborato...
  • 16 篇 beijing universi...
  • 14 篇 beijing universi...
  • 10 篇 technology resea...
  • 10 篇 the beijing key ...
  • 10 篇 beijing key labo...
  • 10 篇 beijing laborato...

作者

  • 100 篇 xiangming wen
  • 87 篇 zhaoming lu
  • 74 篇 wen xiangming
  • 70 篇 lu zhaoming
  • 62 篇 yang yang
  • 60 篇 guo caili
  • 53 篇 caili guo
  • 53 篇 chunyan feng
  • 46 篇 zhimin zeng
  • 44 篇 tiankui zhang
  • 35 篇 luhan wang
  • 35 篇 wu muqing
  • 35 篇 changchuan yin
  • 33 篇 muqing wu
  • 32 篇 deng li
  • 31 篇 yin changchuan
  • 30 篇 feng botao
  • 30 篇 wenpeng jing
  • 29 篇 guochu shou
  • 29 篇 jun liu

语言

  • 1,026 篇 英文
  • 42 篇 中文
  • 31 篇 其他
检索条件"机构=Beijing Key Laboratory of Network System Architecture and Convergence Acknowledgment"
1099 条 记 录,以下是641-650 订阅
排序:
CONNECTIVITY FOR OVERLAID WIRELESS networkS WITH OUTAGE CONSTRAINTS
CONNECTIVITY FOR OVERLAID WIRELESS NETWORKS WITH OUTAGE CONS...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Yang Liu Chengzhi Li Changchuan Yin Huaiyu Dai Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China 100876
We study the connectivity of overlaid wireless networks where two users can communicate if the signal-to-interference ratio is larger than a threshold subject to an outage constraint. By using percolation theory, we f... 详细信息
来源: 评论
Improving mobility prediction performance with state based prediction method when the user departs from routine
Improving mobility prediction performance with state based p...
收藏 引用
IEEE International Conference on Big Data Analysis (ICBDA)
作者: Airui Li Qiujian Lv Yuanyuan Qiao Jie Yang Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications (BUPT) Beijing China
With the rapid increase of the mobile users, mobility prediction has attracted more and more attention. For the moment, a lot of location prediction methods have shown that humans are highly predictable in their movem... 详细信息
来源: 评论
Detecting Malicious Domains by Massive DNS Traffic Data Analysis
Detecting Malicious Domains by Massive DNS Traffic Data Anal...
收藏 引用
International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Shiqi Tian Cheng Fang Jun Liu Zhenming Lei Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications HAOHAN Data Technology Co. LTD. Beijing China
DNS (Domain name system) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities including the malicious operation. Monitoring the DNS traffic is... 详细信息
来源: 评论
Remote Video Interception system Implemented on USRP
Remote Video Interception System Implemented on USRP
收藏 引用
IEEE International Conference on Internet of Things
作者: Yuan Zhou Li Deng Weijun Hong Chen Zhang Shufang Li Zhen Wang Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China 100876
With the development of the technology, life is filled with increasing information equipment. When they work, a great deal of information will be radiated. For the leaked information, an interception system is built w... 详细信息
来源: 评论
A fast handoff scheme for ieee 802.11 networks using software defined networking
A fast handoff scheme for ieee 802.11 networks using softwar...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Biao Zhang Xiangming Wen Zhaoming Lu Tao Lei Xiaoguang Zhao Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Beijing Laboratory of Advanced Information Network Beijing China
Due to the limited coverage range of access points (APs) and the mobility of stations (STAs), handoff occurs frequently in IEEE 802.11 wireless local area network (WLAN). However, traditional handoff mechanisms employ... 详细信息
来源: 评论
ANALYSIS OF MOBILE SUBSCRIBERS' BEHAVIOR PATTERN BASED ON NON-NEGATIVE MATRIX FACTORIZATION
ANALYSIS OF MOBILE SUBSCRIBERS' BEHAVIOR PATTERN BASED ON NO...
收藏 引用
2016 5th IEEE International Conference on network Infrastructure and Digital Content(IC-NIDC 2016)
作者: Han Deng Yonggang Qi Jun Liu Jie Yang Beijing Key Laboratory of Network System Architecture and Convergence Center for Data Science Beijing University of Posts and Telecommunications
As the increasing number of intelligent mobile phones that are available for people which lead to tones of network flow data are ***,how to dig the user's behavior pattern by using the data collected form mobile p... 详细信息
来源: 评论
A Cross-Polarization Discrimination Compensation Algorithm for Polarization Modulation
A Cross-Polarization Discrimination Compensation Algorithm f...
收藏 引用
IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications
作者: Jinjin Yuan Fangfang Liu Caili Guo Chunyan Feng Yao Nie Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications
In dual-polarized channel, the BER performance of polarization modulation (PM) can be decreased by cross-polarization discrimination (XPD) effect which can introduce cross power leakage. Therefore, a XPD compensation ... 详细信息
来源: 评论
Analysis of mobile subscribers' behavior pattern based on non-negative matrix factorization
Analysis of mobile subscribers' behavior pattern based on no...
收藏 引用
IEEE International Conference on network Infrastructure and Digital Content (IC-NIDC)
作者: Han Deng Yonggang Qi Jun Liu Jie Yang Center for Data Science Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Network System Architecture and Convergence
As the increasing number of intelligent mobile phones that are available for people which lead to tones of network flow data are produced. Hence, how to dig the user's behavior pattern by using the data collected ... 详细信息
来源: 评论
Improving Mobility Prediction Performance with State Based Prediction Method When the User Departs from Routine
Improving Mobility Prediction Performance with State Based P...
收藏 引用
2016 IEEE International Conference on Big Data Analysis
作者: Airui Li Qiujian Lv Yuanyuan Qiao Jie Yang Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications (BUPT)
With the rapid increase of the mobile users, mobility prediction has attracted more and more attention. For the moment, a lot of location prediction methods have shown that humans are highly predictable in their movem... 详细信息
来源: 评论
Resource scheduling virtualization in service-oriented future Internet architecture
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2015年 第4期22卷 92-100页
作者: Li Lan Chen Jianya Cui Hongyan Huang Tao Liu Yunjie State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications
Service-oriented future internet architecture(SOFIA) is a clean-slate network architecture. In SOFIA, a service request is mainly processed through service resolution and network resource allocation. To realize the ... 详细信息
来源: 评论