咨询与建议

限定检索结果

文献类型

  • 124 篇 期刊文献
  • 119 篇 会议

馆藏范围

  • 243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 184 篇 工学
    • 128 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 79 篇 信息与通信工程
    • 28 篇 电子科学与技术(可...
    • 21 篇 控制科学与工程
    • 18 篇 机械工程
    • 18 篇 生物工程
    • 16 篇 电气工程
    • 15 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 10 篇 网络空间安全
    • 8 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 交通运输工程
    • 4 篇 化学工程与技术
    • 4 篇 航空宇航科学与技...
    • 4 篇 安全科学与工程
  • 68 篇 理学
    • 42 篇 数学
    • 21 篇 生物学
    • 14 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 4 篇 化学
  • 47 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 12 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 8 篇 法学
    • 5 篇 社会学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 7 篇 wireless communi...
  • 7 篇 optimization
  • 6 篇 cloud computing
  • 5 篇 simulation
  • 5 篇 delays
  • 5 篇 energy efficienc...
  • 4 篇 internet of thin...
  • 4 篇 transformer
  • 4 篇 resource managem...
  • 4 篇 cognitive radio
  • 4 篇 computational mo...
  • 4 篇 algorithm design...
  • 4 篇 correlation
  • 4 篇 edge computing
  • 4 篇 satellites
  • 3 篇 sensor nodes
  • 3 篇 object detection
  • 3 篇 routing
  • 3 篇 deep learning

机构

  • 54 篇 college of compu...
  • 43 篇 jiangsu high tec...
  • 12 篇 key lab of broad...
  • 10 篇 key lab of broad...
  • 10 篇 key lab of broad...
  • 8 篇 key lab of broad...
  • 8 篇 key lab. of broa...
  • 7 篇 chongqing key la...
  • 6 篇 guangdong key la...
  • 6 篇 jiangsu high tec...
  • 6 篇 department of el...
  • 6 篇 key lab of broad...
  • 6 篇 institute of ima...
  • 5 篇 national mobile ...
  • 5 篇 college of compu...
  • 5 篇 key lab of broad...
  • 5 篇 chongqing key la...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 college of compu...
  • 4 篇 school of microe...

作者

  • 27 篇 wang ruchuan
  • 12 篇 ruchuan wang
  • 11 篇 yang geng
  • 9 篇 sun lijuan
  • 9 篇 xiao fu
  • 8 篇 huang haiping
  • 7 篇 xu jian
  • 7 篇 wang ru-chuan
  • 6 篇 xianzhong xie
  • 5 篇 xie xianzhong
  • 5 篇 zhou mu
  • 5 篇 hu jinlong
  • 5 篇 chen lei
  • 5 篇 zhu wei-ping
  • 5 篇 wu xiaohuan
  • 5 篇 tian zengshan
  • 5 篇 yang zhen
  • 4 篇 mi jiacong
  • 4 篇 yan jun
  • 4 篇 qingwen han

语言

  • 237 篇 英文
  • 4 篇 中文
  • 2 篇 其他
检索条件"机构=Chongqing Key Lab of Computer Network and Communication Technology"
243 条 记 录,以下是91-100 订阅
排序:
Research on heart sound identification technology
收藏 引用
Science China(Information Sciences) 2012年 第2期55卷 281-292页
作者: CHENG XieFeng1,3,MA Yong2,LIU Chen1,ZHANG XueJun1 & GUO YuFeng11School of Electronic Science and Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China 2School of computer Science and technology,Nanjing University of Science and technology,Nanjing 210094,China 3key lab of Broudbard Wireless communication and Sensor network technology(Nanjing University of Posts and Telecommunications),Ministry of Education,Nanjing 210094,China 1. School of Electronic Science and Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China3. Ministry of Education Key Lab of Broudbard Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Nanjing 210094 China2. School of Computer Science and Technology Nanjing University of Science and Technology Nanjing 210094 China
In this article,both the basic principles and the experimental methods of identity recognition technology based on heart sounds are ***,the characteristics of heart sounds and the feasibility of heart sounds as a biom... 详细信息
来源: 评论
Fully secure unidirectional identity-based proxy re-encryption
Fully secure unidirectional identity-based proxy re-encrypti...
收藏 引用
14th International Conference on Information Security and Cryptology, ICISC 2011
作者: Luo, Song Shen, Qingni Chen, Zhong College of Computer Science and Engineering Chongqing University of Technology Chongqing China School of Software and Microelectronics MoE Key Lab. of Network and Software Assurance Peking University Beijing China Institute of Software School of Electronics Engineering and Computer Science Peking University China Ministry of Education China
Proxy re-encryption (PRE) allows the proxy to translate a ciphertext encrypted under Alice's public key into another ciphertext that can be decrypted by Bob's secret key. Identity-based proxy re-encryption (IB... 详细信息
来源: 评论
Zero-pole cancellation for identity-based aggregators:a constant-size designated verifier-set signature
收藏 引用
Frontiers of computer Science 2020年 第4期14卷 197-210页
作者: E CHEN Yan ZHU Changlu LIN Kewei LV School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China College of Mathematics and Informatics Fujian Normal UniversityFuzhou350117China Fujian Provincial Key Lab of Network Security&Cryptology Fujian Normal UniversityFuzhou350007China Institute of Information Engineering DCS Research CenterChinese Academy of SciencesBeijing100093China
In this paper we present a designated verifier-set signature(DVSS),in which the signer allows to designate many verifiers rather than one verifier,and each designated verifier can verify the validity of signature by *... 详细信息
来源: 评论
Quantum subsystem codes drived from negacyclic codes
Quantum subsystem codes drived from negacyclic codes
收藏 引用
International Conference on Wavelet Active Media technology and Information Processing (ICWAMTIP)
作者: Jianzhang Chen Jianping Li Jie Lin Yuanyuan Huang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Chongqing Key Lab of Computer Network and Communication Technology Department of Network Engineering Chengdu University of Information Technology Chengdu China
In this paper, we utilize negacyclic codes to construct a family of optimal subsystem codes with parameters [[q 2 +1,(q-1) 2 , 4, q-1]] q > where q = 1(mod4), q = p τ , τ ≥ 1 and p is an odd prime. These constru... 详细信息
来源: 评论
Dynamic scheduling for workflow applications over virtualized optical networks
Dynamic scheduling for workflow applications over virtualize...
收藏 引用
2011 IEEE Conference on computer communications Workshops, INFOCOM WKSHPS 2011
作者: Ding, Jingyu Wang, Yan Le, Jiajin Jin, Yaohui School of Computer Sci. Tech. Donghua Univ. China Huawei Technology China State Key Lab of Advanced Optical Communication System and Network Shanghai Jiao Tong University China
Joint scheduling of both computation and communication resources for workflow based distributed computing application over optical networks has been studied recently. Most algorithms proposed in previous work are main... 详细信息
来源: 评论
INTELLIGENT INFORMATION network SECURITY AND MANAGEMENT
收藏 引用
China communications 2016年 第7期13卷 3-6页
作者: Yixian Yang Zhongshan Zhang Wenjing Li Information Security Center(ISC) Beijing University of Posts and Telecommunications(BUPT) National Engineering Laboratory for Disaster Backup and Recovery the School of Computer and Communication Engineering in the University of Science and Technology Beijing(USTB) State Key Lab of Networking and Switching Technologies Network Management Research Center at BUPT National Innovation Research Group of China
Intelligent Information network Security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of mo... 详细信息
来源: 评论
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital communications and networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论
Performance analysis of data aggregation algorithms in wireless sensor networks
Performance analysis of data aggregation algorithms in wirel...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Xu, Jian Yang, Geng Chen, Zheng-Yu Chen, Lei Yang, Zhen College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China
Resource-constrained is a critical issue in Wireless Sensor networks (WSN) applications. Data aggregation (or data fusion) is one of the key techniques to solve the problem. Data aggregation can effectively reduce the... 详细信息
来源: 评论
Video smoke removal based on low-rank tensor completion via spatial-temporal continuity constraint
Video smoke removal based on low-rank tensor completion via ...
收藏 引用
作者: Zhu, Hu Xu, Guoxia Liu, Lu Deng, Lizhen Jiangsu Province Key Lab on Image Processing and Image Communication Nanjing University of Posts and Telecommunication Nanjing China Department of Computer Science Norwegian University of Science and Technology Gjovik Norway National Engineering Research Center of Communication and Network Technology Nanjing University of Posts and Telecommunication Nanjing China
Smoke has a very bad effect on the outdoor vision system. Not only are the videos with poor visual effects obtained, but also the quality and structure of the videos are reduced. In this paper, we propose a video smok... 详细信息
来源: 评论
Research on image compression and transmission mechanism for wireless multimedia sensor networks
Research on image compression and transmission mechanism for...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Xiao, Fu Zhang, Pan Sun, Li-Juan Wang, Jing Wang, Ru-Chuan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China
A image compression and adaptive smoothing transmission mechanism for wireless multimedia sensor networks. Goal of our work is to minimize image distortion with the multimedia sensor network conditions varying constan... 详细信息
来源: 评论