咨询与建议

限定检索结果

文献类型

  • 320 篇 会议
  • 220 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 359 篇 工学
    • 224 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 148 篇 信息与通信工程
    • 62 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 29 篇 生物工程
    • 27 篇 光学工程
    • 25 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 196 篇 理学
    • 117 篇 数学
    • 43 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 8 篇 化学
    • 7 篇 大气科学
  • 77 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 16 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 11 篇 optimization
  • 10 篇 wireless communi...
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 quality of servi...
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 beamforming
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 11 篇 state key labora...
  • 11 篇 computer enginee...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 state key lab of...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 integrated servi...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 11 篇 si jiangbo
  • 10 篇 al-dhahir naofal
  • 10 篇 meng deyu
  • 9 篇 halim yanikomero...
  • 9 篇 yanikomeroglu ha...
  • 8 篇 thiele lothar
  • 7 篇 xiaofei yang
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 kai ye
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 514 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
541 条 记 录,以下是361-370 订阅
排序:
Proxy re-encryption conjunctive keyword search against keyword guessing attack
Proxy re-encryption conjunctive keyword search against keywo...
收藏 引用
Computing, Communications and Applications Conference (ComComAp)
作者: Yang Yang Maode Ma Bogang Lin College of Mathematics and Computer Science Key Lab of Information Security of Networks Systems Fuzhou University Fuzhou Fujian China School of Electrical & Electronic Engineering Nanyang Technological University Singapore Singapore
Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword... 详细信息
来源: 评论
Clipping Noise-based Tone Injection for PAPR Reduction in OFDM Systems
Clipping Noise-based Tone Injection for PAPR Reduction in OF...
收藏 引用
IEEE International Conference on Communications
作者: Jun Hou Chintha Tellambura Jianhua Ge The State Key Lab. of Integrated Service Networks Xidian University Xi'an P. R. China Department of Electrical and Computer Engineering University of Alberta Edmonton AB Canada
Tone injection (TI) mitigates the high peak-to-average power ratio problem without incurring data rate loss or extra side information. However, optimal TI requires an exhaustive search over all possible constellations... 详细信息
来源: 评论
Distributed and synchronized measurements with FLOCKlab  12
Distributed and synchronized measurements with FLOCKLAB
收藏 引用
10th ACM Conference on Embedded Networked Sensor Systems, SenSys 2012
作者: Lim, Roman Walser, Christoph Ferrari, Federico Zimmerling, Marco Beutel, Jan Computer Engineering and Networks Lab ETH Zurich Switzerland
Developing, testing, debugging, and evaluating communication protocols for low-power wireless networks is a long and cumbersome task. Simulators can be helpful in the early stages of development, but their models of h... 详细信息
来源: 评论
Hybrid relaying and jamming for secure two-way relay networks with passive eavesdroppers
Hybrid relaying and jamming for secure two-way relay network...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Hui-Ming Wang Xiang-Gen Xia Qinye Yin Pengcheng Mu School of Electronic and Information Engineering Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi P. R. China Department of Electrical and Computer Engineering Chonbuk National University Jeonju DE Korea
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid coop... 详细信息
来源: 评论
The TREND experimental activities on "green" communication networks
The TREND experimental activities on "green" communication n...
收藏 引用
2013 24th Tyrrhenian International Workshop on Digital Communications - Green Information and Communications Technology, TIWDC 2013
作者: Meo, Michela Zhang, Yi Hu, Yige Idzikowski, Filip Budzisz, Lukasz Ganji, Fatemeh Haratcherev, Ivaylo Conte, Alberto Cianfrani, Antonio Chiaraviglio, Luca Coiro, Angelo Bolla, Raffaele Jaramillo Ortiz, Olga Bruschi, Roberto Gonzalez, Roberto Guerrero, Carmen Tego, Edion Matera, Francesco Keranidis, Stratos Kazdaridis, Giannis Korakis, Thanasis Dipartimento di Elettronica e Telecomunicazioni Politecnico di Torino Italy Telecommunication Networks Group Technische Universität Berlin Germany Networking Technology Domain Alcatel-Lucent Bell Labs. Nozay France DIET Department University of Rome Sapienza Italy Telecommunication Networks and Telematics Lab. RU of CNIT c/o University of Genoa Italy Departamento de Ingeniería Telemática Universidad Carlos III de Madrid Spain Fondazione Ugo Bordoni Rome Italy Department of Computer and Communication Engineering University of Thessaly Greece
Aimed at answering important questions about the energy demand of current telecom infrastructure and the design of sustainable and energy-efficient future networks, the research of a number of European partners is bro... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on Security and Privacy in Communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
A manually-actuated MRI compatible robotic manipulator for image-guided interventions
收藏 引用
Physica Medica 2014年 30卷 e55-e56页
作者: Eftychios G. Christoforou Christoforos Keroglou Andrew Webb Nikolaos V. Tsekos Ioannis Seimenis KIOS Research Center for Intelligent Systems and Networks University of Cyprus Cyprus Department of Electrical and Computer Engineering University of Cyprus Cyprus C.J. Gorter Center for High Field MRI Leiden University Medical Center Leiden Netherlands Medical Robotics Laboratory University of Houston Houston TX USA Med. Physics Lab Medical School Democritus University of Thrace Alexandroupolis Greece
来源: 评论
A bidirectional multi-band 60-GHz wireless-over-fiber transmission system with compacted base station and mobile terminal using a robust mm-Wave LO free technique
A bidirectional multi-band 60-GHz wireless-over-fiber transm...
收藏 引用
Optical Fiber Communication (OFC) Conference
作者: Chenhui Ye Liang Zhang Ming Zhu Anlin Yi Lan Rao Jianjun Yu Yikai Su Sailing He Gee-Kung Chang School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA USA State Key Laboratory of Modern Optical Instrumentation Zhejiang University Hangzhou China State Key Lab of Advanced Optical Communication Systems and Networks Shanghai Jiao Tong University Shanghai China
For the first time, bidirectional multi-band multi-gigabit wireless-over-fiber transmission at 60-GHz mm-wave band has been accomplished with centrally supplied LO service. It does not require mm-wave LO devices in ea... 详细信息
来源: 评论
Influence maximization for informed agents in collective behavior
Influence maximization for informed agents in collective beh...
收藏 引用
10th International Symposium on Distributed Autonomous Robotic Systems, DARS 2010
作者: Asiaee Taheri, Amir Afshar, Mohammad Asadpour, Masoud Social Networks Lab. School of Electrical and Computer Engineering University of Tehran Tehran Iran P.O. Box 19395-5746 Tehran Iran
Control of collective behavior is an active topic in biology, social, and computer science. In this work we investigate how a minority of informed agents can influence and control the whole society through local inter... 详细信息
来源: 评论