咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 388 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 570 篇 工学
    • 281 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 201 篇 软件工程
    • 124 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 46 篇 电气工程
    • 44 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 164 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 755 篇 英文
  • 35 篇 中文
  • 11 篇 其他
检索条件"机构=Broadband Wireless Communication and Sensor Network Technology Key Lab"
801 条 记 录,以下是311-320 订阅
排序:
Three-step three-party quantum secure direct communication
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2018年 第9期61卷 26-30页
作者: Shan-Shan Chen Lan Zhou Wei Zhong Yu-Bo Sheng Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Mathematics & Physics Nanjing University of Posts and Telecommunications Nanfing 210003 China Key Lab of Broadband Vireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired... 详细信息
来源: 评论
Efficient passive measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2019年 第5期99卷 052325-052325页
作者: Chun-Hui Zhang Chun-Mei Zhang Qin Wang Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Broadband Wireless Communication and Sensor Network Technology Key Laboratory of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 China Telecommunication and Networks National Engineering Research Center Nanjing University of Posts and Telecommunications Nanjing 210003 China
To date, only active-decoy-state methods have been adopted in current measurement-device-independent (MDI) quantum key distribution (QKD) protocols, causing security loopholes when modulating multiple light intensitie... 详细信息
来源: 评论
A Smart Content Caching and Replacement Scheme for UAV-Assisted Fog Computing network
A Smart Content Caching and Replacement Scheme for UAV-Assis...
收藏 引用
International Conference on wireless communications and Signal Processing (WCSP)
作者: Xujie Li Jichang Shen Ying Sun Ziya Wang Xuedong Zheng College of Computer and Information Engineering Hohai University Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Key Lab for Wireless Sensor network and Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China Nanjing China-Spacenet Satellite Telecom Co.Ltd China
For unmanned aerial vehicle (UAV)-assisted fog computing system, content caching is an effective way to reduce network delay. How to smartly sense the future requirement of the user equipment and cache the contents in... 详细信息
来源: 评论
Passive decoy-state quantum key distribution with the SARG04 protocol
Passive decoy-state quantum key distribution with the SARG04...
收藏 引用
作者: Liu, Kang Wei, Jie Zhang, Chun-Mei Wang, Qin Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing210003 China
We present a new scheme for realizing passive decoy-state quantum key distribution with the SARG04 protocol. It is based on parametric down-conversion sources, and we do not need to modulate the pumping light into dif... 详细信息
来源: 评论
Co-whitening of i-vectors for short and long duration speaker verification  19
Co-whitening of i-vectors for short and long duration speake...
收藏 引用
19th Annual Conference of the International Speech communication, INTERSPEECH 2018
作者: Xu, Longting Lee, Kong Aik Li, Haizhou Yang, Zhen Department of Electrical and Computer Engineering National University of Singapore Singapore Data Science Research Laboratories NEC Corporation Japan Broadband Wireless Communication and Sensor Network Technology Key Lab Nanjing University of Posts and Telecommunications China
An i-vector is a fixed-length and low-rank representation of a speech utterance. It has been used extensively in text-independent speaker verification. Ideally, speech utterances from the same speaker would map to an ... 详细信息
来源: 评论
Energy and Delay Co-aware Computation Offloading with Deep Learning in Fog Computing networks
Energy and Delay Co-aware Computation Offloading with Deep L...
收藏 引用
IEEE International Conference on Performance, Computing and communications (IPCCC)
作者: Xi Zhu Siguang Chen Songle Chen Geng Yang Jiangsu Key Lab of Broadband Wireless Communication and Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and Telecommunications Nanjing China
In data-rich everything connected world, the rapid and green data processing is essential, especially for some delay-sensitive and computation-intensive tasks. Motivated by these requirements, an energy and delay co-a...
来源: 评论
Delay Optimization Based on Improved Differential Evolutionary Algorithm for Task Offloading in Fog Computing networks
Delay Optimization Based on Improved Differential Evolutiona...
收藏 引用
International Conference on wireless communications and Signal Processing (WCSP)
作者: Xujie Li Guangzhao Zhang Xuedong Zheng Siyang Hua College of Computer and Information Hohai University Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Key Lab for Wireless Sensor network and Communication Chinese Academy of Sciences Shanghai China Nanjing China-Spacenet Satellite Telecom Co. Ltd Nanjing China Talent Science and Technology Co. Ltd Nanjing China
With the rapid development of communication technology, more and more devices tend to be intelligent. Intelligent devices with computing functions can provide computing services to reduce total task completion time in... 详细信息
来源: 评论
Secrecy outage analysis of integrated satellite-terrestrial relay networks  24
Secrecy outage analysis of integrated satellite-terrestrial ...
收藏 引用
24th Asia-Pacific Conference on communications, APCC 2018
作者: Tao, Xiangshuai Huang, Qingquan Yin, Chunyan Cheng, Guoqiang Ouyang, Jian Liu, Xin College of Communications Engineering Army Engineering University of PLA Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China Nanjing Institute of Telecommunication Technology Nanjing China
This paper addresses the secure transmission problem of an integrated satellite-terrestrial relay networks (ISTRN), where multiple malicious eavesdroppers attempt to overhear the confidential signals from the satellit... 详细信息
来源: 评论
Cooperative beamforming for uav-assisted cognitive relay networks with partial channel state information  4
Cooperative beamforming for uav-assisted cognitive relay net...
收藏 引用
4th IEEE International Conference on Computer and communications, ICCC 2018
作者: Zhu, Shengxiang Yang, Ke Ouyang, Jian Du, Yunjie College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Ministry of Education Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing China
In this paper, we propose a cooperative beamforming (BF) scheme for unmanned aerial vehicle (UAV)-assisted relay networks, where multiple UAVs are deployed as cognitive relays to assist the signal transmission between... 详细信息
来源: 评论
An Improved Centroid Localization Algorithm Based on Virtual Beacon Nodes for WSNs  3
An Improved Centroid Localization Algorithm Based on Virtual...
收藏 引用
3rd IEEE International Conference on Cloud Computing and Internet of Things, CCIOT 2018
作者: Jiang, Rui Wu, Qian Xu, Youyun Nanjing University of Posts and Telecommunications Telecommunication and Networks National Engineering Nanjing Jiangsu210023 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China
According to the application of range-free localization technology for wireless sensor networks (WSNs), an improved centroid localization algorithm is proposed in the paper. In this methodology, the centroid of the sp... 详细信息
来源: 评论