咨询与建议

限定检索结果

文献类型

  • 124 篇 期刊文献
  • 119 篇 会议

馆藏范围

  • 243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 184 篇 工学
    • 128 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 79 篇 信息与通信工程
    • 28 篇 电子科学与技术(可...
    • 21 篇 控制科学与工程
    • 18 篇 机械工程
    • 18 篇 生物工程
    • 16 篇 电气工程
    • 15 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 10 篇 网络空间安全
    • 8 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 交通运输工程
    • 4 篇 化学工程与技术
    • 4 篇 航空宇航科学与技...
    • 4 篇 安全科学与工程
  • 68 篇 理学
    • 42 篇 数学
    • 21 篇 生物学
    • 14 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 4 篇 化学
  • 47 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 12 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 8 篇 法学
    • 5 篇 社会学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 7 篇 wireless communi...
  • 7 篇 optimization
  • 6 篇 cloud computing
  • 5 篇 simulation
  • 5 篇 delays
  • 5 篇 energy efficienc...
  • 4 篇 internet of thin...
  • 4 篇 transformer
  • 4 篇 resource managem...
  • 4 篇 cognitive radio
  • 4 篇 computational mo...
  • 4 篇 algorithm design...
  • 4 篇 correlation
  • 4 篇 edge computing
  • 4 篇 satellites
  • 3 篇 sensor nodes
  • 3 篇 object detection
  • 3 篇 routing
  • 3 篇 deep learning

机构

  • 54 篇 college of compu...
  • 43 篇 jiangsu high tec...
  • 12 篇 key lab of broad...
  • 10 篇 key lab of broad...
  • 10 篇 key lab of broad...
  • 8 篇 key lab of broad...
  • 8 篇 key lab. of broa...
  • 7 篇 chongqing key la...
  • 6 篇 guangdong key la...
  • 6 篇 jiangsu high tec...
  • 6 篇 department of el...
  • 6 篇 key lab of broad...
  • 6 篇 institute of ima...
  • 5 篇 national mobile ...
  • 5 篇 college of compu...
  • 5 篇 key lab of broad...
  • 5 篇 chongqing key la...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 college of compu...
  • 4 篇 school of microe...

作者

  • 27 篇 wang ruchuan
  • 12 篇 ruchuan wang
  • 11 篇 yang geng
  • 9 篇 sun lijuan
  • 9 篇 xiao fu
  • 8 篇 huang haiping
  • 7 篇 xu jian
  • 7 篇 wang ru-chuan
  • 6 篇 xianzhong xie
  • 5 篇 xie xianzhong
  • 5 篇 zhou mu
  • 5 篇 hu jinlong
  • 5 篇 chen lei
  • 5 篇 zhu wei-ping
  • 5 篇 wu xiaohuan
  • 5 篇 tian zengshan
  • 5 篇 yang zhen
  • 4 篇 mi jiacong
  • 4 篇 yan jun
  • 4 篇 qingwen han

语言

  • 237 篇 英文
  • 4 篇 中文
  • 2 篇 其他
检索条件"机构=Chongqing Key Lab of Computer Network and Communication Technology"
243 条 记 录,以下是171-180 订阅
排序:
LFDD: Local False Data Detection for In-network Aggregation in Wireless Sensor networks
LFDD: Local False Data Detection for In-Network Aggregation ...
收藏 引用
International Symposium on Computational Intelligence and Design
作者: Chao Ding Lijun Yang Meng Wu College of Computer Science Nanjing University of Posts and Telecommunications Key Lab of "Broadband Wireless Communication and Sensor Network Technology" of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China
To minimize the damage of false data injection attack, detecting the false injected data for the in-network aggregation in sensor networks at an early stage becomes a necessary and challenging task. In this paper, we ... 详细信息
来源: 评论
A low communication cost and delay guaranteed multicast approach for next generation vehicular ad hoc networks
A low communication cost and delay guaranteed multicast appr...
收藏 引用
IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)
作者: Chengchao Ji Zhengkun Mi Wennai Wang Shenghui Zhao School of Computer and Information Chuzhou University Chuzhou China Key Lab of Broadband Wireless Communication and Sensor Network Technology (Ministry of Education) Nanjing University of Posts and Telecommunications Nanjing China
Vehicle Ad hoc networks (VANETs) is an emerging wireless network technology whereby information is generally shared among vehicles through multi-hopping In literature, a number of routing approaches has been proposed ... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
R-PMD: robust passive motion detection using PHY information with MIMO
R-PMD: robust passive motion detection using PHY information...
收藏 引用
IEEE International Conference on Performance, Computing and communications (IPCCC)
作者: Hai Zhu Fu Xiao Lijuan Sun xiaohui Xie Panlong Yang Ruchuan Wang College of Computer Nanjing University of Posts and Telecommunications China Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education China College of Communications Engineering PLA University of Science and Technology China
Robust Device-free passive (Dfp) detection is an essential primitive for a broad range of applications such as intrusion detection and smart space. Most recent works focus on finer-grained Channel State Information (C... 详细信息
来源: 评论
Improving the Transmission Rate by A Two-Phase Hybrid Duplex Scheme for Gaussian Relay Channel
Improving the Transmission Rate by A Two-Phase Hybrid Duplex...
收藏 引用
IEEE International Conference on communications (ICC)
作者: Jianxin Duan Zhengchuan Chen Zhong Tian Min Wang Li Zhen Dapeng O. Wu Tony Q. S. Quek School of Microelectronics and Communication Engineering. Chongquing University Chongqing China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Optoelectronics Engineering Chongqing University of Posts and Telecommunications Chongqing China Department of Computer Science City University of Hong Kong Hong Kong Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore
Combining half-duplex (HD) and full-duplex (FD) is promising in improving the information transmission rate of relay channels. This work proposes a novel two-phase hybrid duplex scheme for Gaussian relay channel where... 详细信息
来源: 评论
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription Generation of Traditional Chinese Medicine
arXiv
收藏 引用
arXiv 2023年
作者: Pu, Hua Mi, Jiacong Lu, Shan He, Jieyue School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Jiangsu Nanjing210018 China Nanjing Fenghuo Tiandi Communication Technology Co. Ltd Jiangsu Nanjing211161 China
Traditional Chinese medicine (TCM) prescription is the most critical form of TCM treatment, and uncovering the complex nonlinear relationship between symptoms and TCM is of great significance for clinical practice and... 详细信息
来源: 评论
SiamIRPN: Siamese Visual Tracking with Improved Region Proposal networks
SiamIRPN: Siamese Visual Tracking with Improved Region Propo...
收藏 引用
2023 International Conference on Frontiers of Robotics and Software Engineering, FRSE 2023
作者: Cao, Dun Dai, Renhua Zhao, Tianyu Alqahtani, Fayez Tolba, Amr Sherratt, R. Simon Zhu, Min Changsha University of Science and Technology School of Computer and Communications Engineering Hunan Changsha China Nanjing University of Posts and Telecommunications Ministry of Education Key Lab of Broadcast Wireless Communication and Sensor Network Technology China King Saud University College of Computer and Information Sciences Software Engineering Department Riyadh12372 Saudi Arabia King Saud University Community College Computer Science Department Riyadh11437 Saudi Arabia The University of Reading School of Biomedical Engineering RG6 6AY United Kingdom Zhejiang Shuren University College of Information Science and Technology Zhejiang31000 China
Though introducing the Region Proposal network (RPN) from object detection enabled Siamese trackers' success, RPN-based trackers still struggle in challenging scenarios. We posit that the reason comes from two maj... 详细信息
来源: 评论
Age of Information in Internet of Vehicles: A Discrete-Time Multisource Queueing Model
收藏 引用
IEEE Transactions on communications 2024年 第5期73卷 3298-3317页
作者: Zhang, Tianci Chen, Zhengchuan Tian, Zhong Wang, Min Zhen, Li Wu, Dapeng Oliver Li, Yonghui Quek, Tony Q. S. Chongqing University School of Microelectronics and Communication Engineering China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security China Chongqing University of Posts and Telecommunications School of Optoelectronics Engineering China City University of HongKong Department of Computer Science Hong Kong Hong Kong The University of Sydney School of Electrical and Information Engineering Australia Singapore University of Technology and Design 487372 Singapore Yonsei University Yonsei Frontier Lab Korea Republic of
This work studies information freshness of a V2I status updating link in IoV. The status updating link is modeled as a multi-source Ber/Geo/1/1 non-preemptive or preemptive queue. We focus on statistical characteristi... 详细信息
来源: 评论
Divide and Conquer: a Two-Step Method for High Quality Face De-identification with Model Explainability
Divide and Conquer: a Two-Step Method for High Quality Face ...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Yunqian Wen Bo Liu Jingyi Cao Rong Xie Li Song Institute of Image Communication and Network Engineering Shanghai Jiao Tong University School of Computer Science University of Technology Sydney MoE Key Lab of Artificial Intelligence AI Institute Shanghai Jiao Tong University
Face de-identification involves concealing the true identity of a face while retaining other facial characteristics. Current target-generic methods typically disentangle identity features in the latent space, using ad...
来源: 评论
Perfect Power Visualization-Performance Optimization with Java
Perfect Power Visualization-Performance Optimization with Ja...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Chenqi Bao Alexander Flueck Jianmin Bao Xuan Shen Computer of Engineering Illinois Institute of Technology (College of IOTNanjing University of Posts and Telecommunications)Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology (College of IOT Nanjing University of Posts and Telecommunications)Ministry of Education
Visualization is critical in power systems engineering since the gigantic amount of data generated by power systems is difficult,and at times impossible,to be analyzed numerically. Therefore,the need for powerful visu... 详细信息
来源: 评论