咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 388 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 570 篇 工学
    • 281 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 201 篇 软件工程
    • 124 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 46 篇 电气工程
    • 44 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 164 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 755 篇 英文
  • 35 篇 中文
  • 11 篇 其他
检索条件"机构=Broadband Wireless Communication and Sensor Network Technology Key Lab"
801 条 记 录,以下是231-240 订阅
排序:
Energy Efficiency Optimization in Heterogeneous networks Based on Deep Reinforcement Learning
Energy Efficiency Optimization in Heterogeneous Networks Bas...
收藏 引用
IEEE International Conference on communications Workshops, ICC
作者: Daoping Shi Feng Tian Shengchen Wu Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Universityof Posts and Telecommunications) Ministry of Education Nanjing China Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing China
To meet the rapid increasing requirement of service and application of communication, heterogeneous wireless networks with the macrocell and the femtocells are considered in this paper. How to deal with resource alloc... 详细信息
来源: 评论
Direct measurement of the concurrence of hybrid entangled state based on parity check measurements
收藏 引用
Chinese Physics B 2019年 第1期28卷 205-209页
作者: Man Zhang Lan Zhou Wei Zhong Yu-Bo Sheng Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China School of Science Nanjing University of Posts and TelecommunicationsNanjing 210003China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology(Ministry of Education) Nanjing University of Posts and TelecommunicationsNanjing 210003China
The hybrid entangled state is widely discussed in quantum information processing. In this paper, we propose the first protocol to directly measure the concurrence of the hybrid entangled state. To complete the measure... 详细信息
来源: 评论
SiamIRPN: Siamese Visual Tracking with Improved Region Proposal networks
SiamIRPN: Siamese Visual Tracking with Improved Region Propo...
收藏 引用
Frontiers of Robotics and Software Engineering (FRSE), International Conference on
作者: Dun Cao Renhua Dai Tianyu Zhao Fayez Alqahtani Amr Tolba R. Simon Sherratt Min Zhu School of Computer and Communications Engineering Changsha University of Science and Technology Changsha Hunan China Key Lab of Broadcast Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Software Engineering Department College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia Computer Science Department Community College King Saud University Riyadh Saudi Arabia School of Biomedical Engineering The University of Reading United Kingdom College of Information Science and Technology Zhejiang Shuren University Zhejiang China
Though introducing the Region Proposal network (RPN) from object detection enabled Siamese trackers’ success, RPN-based trackers still struggle in challenging scenarios. We posit that the reason comes from two major ...
来源: 评论
Secrecy Outage Probability Analysis Based on Cognitive Decode-and-Forward Relaying
收藏 引用
Computers, Materials & Continua 2020年 第3期62卷 1387-1395页
作者: Ruoyu Su Xiaojun Sun Fei Ding Dengyin Zhang Hongbo Zhu M.I.M.Wahab Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Tele-CommunicationsNanjing210003China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China School of Information Science and Engineering Southeast UniversityNanjing210018China Department of Electrical and Computer Engineering Faculty of Engineering and Applied ScienceMemorial University of NewfoundlandSt.John’sA1B 3X5Canada Department of Mechanical and Industrial Engineering Ryerson UniversityToronto M5B 2K3Canada
wireless communications have to face to several different security issues in practice due to the nature of *** information theory is well known to provide efficient approaches to address security issues in wireless co... 详细信息
来源: 评论
Optimization on Cooperative communications Based on network Coding in Multi-hop wireless networks
Optimization on Cooperative Communications Based on Network ...
收藏 引用
International wireless communications and Mobile Computing Conference, IWCMC
作者: Xiande Bu Chuan Liu Qiang Yu Lei Yin Feng Tian State Grid Laboratory of Electric Power Communication Network Global Energy Interconnection Research Institute Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Universityof Posts and Telecommunications) Ministry of Education Nanjing China
Cooperative communications (CC) based on network coding (NC) can significantly increase the capacity of wireless networks. In this paper, we investigate how to apply NC in multi-hop wireless networks with multiple rel... 详细信息
来源: 评论
Fog node selection for low latency communication and anomaly detection in fog networks
Fog node selection for low latency communication and anomaly...
收藏 引用
2019 International Conference on communications, Information System, and Computer Engineering, CISCE 2019
作者: Li, Yuxiao Zhang, Yazhong Liu, Yuxiang Meng, Qingmin Tian, Feng Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education College of Telecommunications and Information Engineering Nanjing210003 China
The application of 5G in IOT (Internet of things) puts forward strict requirements for network latency. In view of the fog network scenario with large-scale IOT devices, this paper proposes a procedure of unsupervised... 详细信息
来源: 评论
Privacy amplification scheme based on composite coding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Privacy amplification is an indispensable step in the post-processing of quantum key distribution, which can be used to compress the redundancy of shared key and improve the security level of the key. The commonly use... 详细信息
来源: 评论
The optimal positive operator-valued measure for state discrimination
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Evaluating the amount of information obtained from non-orthogonal quantum states is an important topic in the field of quantum information. The commonly used evaluation method is Holevo bound, which only provides a lo... 详细信息
来源: 评论
Measurement-device-independent quantum secure direct communication
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2020年 第3期63卷 2-7页
作者: ZengRong Zhou Yu Bo Sheng PengHao Niu LiuGuo Yin GuiLu Long Lajos Hanzo State Key Laboratory of Low-dimensional Quantum Physics Beijing 100084China Department of Physics Tsinghua UniversityBeijing 100084China Collaborative Innovation Center of Quantum Matter Beijing 100084China Beijing Academy of Quantum Information Beijing 100084China Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China College of Telecommunications&Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China Beijing National Research Center for Information Science and Technology Beijing 100084China School of Information and Technology Tsinghua UniversityBeijing 100084China School of Electronics and Computer Science University of SouthamptonSouthampton SO171BJUK
Quantum secure direct communication(QSDC)is a unique technique,which supports the secure transmission of confidential information directly through a quantum channel without the need for a secret key and for *** this s... 详细信息
来源: 评论
A Survey of Trusted network Trust Evaluation Methods  2nd
A Survey of Trusted Network Trust Evaluation Methods
收藏 引用
2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019
作者: Yin, An-Sheng Zhang, Shun-Yi Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210023 China Department of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
The proposed trusted network is respond to the increasingly prominent internal network security threats. At present, research on trusted networks focuses on two aspects: pre-network access check and dynamic evaluation... 详细信息
来源: 评论