咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 220 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 359 篇 工学
    • 224 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 148 篇 信息与通信工程
    • 62 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 29 篇 生物工程
    • 27 篇 光学工程
    • 25 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 196 篇 理学
    • 117 篇 数学
    • 43 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 8 篇 化学
    • 7 篇 大气科学
  • 77 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 16 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 11 篇 optimization
  • 10 篇 wireless communi...
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 quality of servi...
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 beamforming
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 state key lab of...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 integrated servi...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 11 篇 si jiangbo
  • 10 篇 al-dhahir naofal
  • 10 篇 meng deyu
  • 9 篇 halim yanikomero...
  • 9 篇 yanikomeroglu ha...
  • 8 篇 thiele lothar
  • 7 篇 xiaofei yang
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 kai ye
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 513 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
540 条 记 录,以下是321-330 订阅
排序:
Semantics-Guided Contrastive Network for Zero-Shot Object Detection
arXiv
收藏 引用
arXiv 2021年
作者: Yan, Caixia Chang, Xiaojun Luo, Minnan Liu, Huan Zhang, Xiaoqin Zheng, Qinghua The Ministry of Education Key Lab of Intelligent Networks and Network Security National Engineering Lab for Big Data Analytics School of Electronic and Information Engineering Xi'an Jiaotong University Shaanxi710049 China The ReLER Lab AAAI Faculty of Engineering and Information Technology University of Technology Sydney Australia The College of Computer Science and Artificial Intelligence Wenzhou University China
Zero-shot object detection (ZSD), the task that extends conventional detection models to detecting objects from unseen categories, has emerged as a new challenge in computer vision. Most existing approaches tackle the... 详细信息
来源: 评论
Generation of multi-channel short-pulse sources using nonlinear optical loop mirror based on photonic crystal fiber
Generation of multi-channel short-pulse sources using nonlin...
收藏 引用
OFC/NFOEC 2007 - Optical Fiber Communication and the National Fiber Optic Engineers Conference 2007
作者: Dong, Yi Li, Zhaohui Yu, Changyuan Wen, Yang Jing Wang, Yixin Lu, Chao Hu, Weisheng Cheng, Tee Hiang State Key Lab of Advanced Optical Communication Systems and Networks Shanghai Jiao Tong University 800 Dongchuan Rd. Shanghai 200240 China School of Electrical and Electronic Engineering Nanyang Technological University Singapore 639798 Singapore Institutes for Infocomm Research A STAR 21 Heng Mui Keng Terrace Singapore 119613 Singapore Dept. of Electrical and Computer Engineering National University of Singapore 4 Engineering Dr. 3 Singapore 117576 Singapore Department of Electronic and Information Engineering Hong Kong Polytechnic University Hong Kong Hong Kong
Fourteen C+L-band synchronized multi-channel short pulse sources are generated based on XPM and FWM effects in nonlinear optical loop mirror. Walk-off effect is reduced effectively by using 10m high nonlinear dispersi... 详细信息
来源: 评论
A delay guaranteed and services differentiated MAC protocol based on location and reservation in near-space
收藏 引用
Journal of Convergence Information Technology 2011年 第2期6卷 120-130页
作者: Chen, Chen Gao, Xinbo Pei, Qingqi National Key Lab. of Integrated Service Networks Xidian Univ Xi'an 710071 China School of Electronic Engineering Xidian Univ Xi'an 710071 China Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian Univ Xi'an 710071 China
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broa... 详细信息
来源: 评论
Hybrid relaying and jamming for secure two-way relay networks with passive eavesdroppers
Hybrid relaying and jamming for secure two-way relay network...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Hui-Ming Wang Xiang-Gen Xia Qinye Yin Pengcheng Mu School of Electronic and Information Engineering Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi P. R. China Department of Electrical and Computer Engineering Chonbuk National University Jeonju DE Korea
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid coop... 详细信息
来源: 评论
Hemispherical Massive MIMO Architecture for High-Altitude Platform Station (HAPS)
Hemispherical Massive MIMO Architecture for High-Altitude Pl...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Omid Abbasi Halim Yanikomeroglu Georges Kaddoum Department of Systems and Computer Engineering Non-Terrestrial Networks (NTN) Lab Carleton University Ottawa ON Canada Department of Electrical Engineering École de Technologie Supérieure (ETS) Université du Québec Montréal QC Canada
In this paper, we present a novel hemispherical antenna array (HAA) designed for High-Altitude Platform Stations (HAPS). Traditional rectangular antenna arrays for HAPS suffer from a significant limitation - their ant... 详细信息
来源: 评论
Multi-task learning for object keypoints detection and classification
收藏 引用
Pattern Recognition Letters 2020年 130卷 182-188页
作者: Jie Xu Lin Zhao Shanshan Zhang Chen Gong Jian Yang PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China State Key Laboratory of Integrated Services Networks Xidian Univeristy Xi’an 710071 China
Object keypoints detection and classification are both central research topics in computer vision . Due to their wide range potential applications in the real world, substantial efforts have been taken to advance thei...
来源: 评论
Robust Reinforcement Learning for Risk-Sensitive Linear Quadratic Gaussian Control
arXiv
收藏 引用
arXiv 2022年
作者: Cui, Leilei Başar, Tamer Jiang, Zhong-Ping The Control and Networks Lab Department of Electrical and Computer Engineering Tandon School of Engineering New York University BrooklynNY11201 United States The Coordinated Science Laboratory University of Illinois Urbana-Champaign UrbanaIL61801 United States
This paper proposes a novel robust reinforcement learning framework for discrete-time linear systems with model mismatch that may arise from the sim-to-real gap. A key strategy is to invoke advanced techniques from co... 详细信息
来源: 评论
Unicode-proof Code Injection Attack on Windows CE- A Novel Approach of Evading Intrusion Detection System for Mobile Network
Unicode-proof Code Injection Attack on Windows CE- A Novel A...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and networks(2011第三届通信软件与网络国际会议 ICCSN2011)
作者: Yang Song Yuqing Zhang Yingfei Sun JingBo Yan National Computer Network Intrusion Protection Center Graduate University of Chinese Academy of Scie School of Information Science and Engineering Graduate University of Chinese Academy of Sciences Bei Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xia
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected... 详细信息
来源: 评论
Integrated Routing and Traffic Signal Control for CAVs via Reinforcement Learning Approach
Integrated Routing and Traffic Signal Control for CAVs via R...
收藏 引用
International Conference on Intelligent Transportation
作者: Jiho Park Guohui Zhang Chieh Wang Hong Wang Zhong-Ping Jiang Department of Electrical and Computer Engineering Control and Networks Lab Tandon School of Engineering New York University Brooklyn NY USA Department of Civil and Environmental Engineering University of Hawaii at Manoa Honolulu HI USA Oak Ridge National Laboratory Oak Ridge TN USA
Incorporating Connected and Automated Vehicles (CAVs) into urban traffic networks presents opportunities and challenges for traffic management systems. This paper aims to develop an integrated routing and traffic sign... 详细信息
来源: 评论
Covert surveillance via proactive eavesdropping under channel uncertainty
arXiv
收藏 引用
arXiv 2020年
作者: Cheng, Zihao Si, Jiangbo Li, Zan Wang, Danyang Al-Dhahir, Naofal Integrated Service Networks Lab of Xidian University Xi'an710071 China University of Texas Dallas United States Department of Electrical and Computer Engineering University of Texas Dallas RichardsonTX75080 United States
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance. Different from the ex... 详细信息
来源: 评论