咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 220 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 360 篇 工学
    • 224 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 147 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 59 篇 电子科学与技术(可...
    • 44 篇 电气工程
    • 29 篇 生物工程
    • 28 篇 光学工程
    • 26 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 198 篇 理学
    • 117 篇 数学
    • 45 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 9 篇 化学
    • 7 篇 大气科学
  • 77 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 16 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 11 篇 optimization
  • 10 篇 wireless communi...
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 9 篇 quality of servi...
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 beamforming
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 state key lab of...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 integrated servi...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 11 篇 si jiangbo
  • 10 篇 al-dhahir naofal
  • 10 篇 meng deyu
  • 9 篇 halim yanikomero...
  • 9 篇 yanikomeroglu ha...
  • 8 篇 xiaofei yang
  • 8 篇 thiele lothar
  • 8 篇 kai ye
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 513 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
540 条 记 录,以下是381-390 订阅
排序:
A GCICA grant-free random access scheme for M2M communications in crowded massive MIMO systems
arXiv
收藏 引用
arXiv 2020年
作者: Han, Huimei Fang, Lushun Lu, Weidang Zhai, Wenchao Li, Ying Zhao, Jun College of Information Engineering Zhejiang University of Technology Hangzhou Zhejiang310032 China College of Information Engineering China Jiliang University Hangzhou Zhejiang310018 China State Key Lab of Integrated Services Networks Xidian University Xi’an710071 China School of Computer Science and Engineering Nanyang Technological University Singapore
A high success rate of grant-free random access scheme is proposed to support massive access for machine-to-machine communications in massive multiple-input multiple-output systems. This scheme allows active user equi... 详细信息
来源: 评论
Algorithms for Globally-Optimal Secure Signaling over Gaussian MIMO Wiretap Channels Under Interference Constraints
arXiv
收藏 引用
arXiv 2020年
作者: Dong, Limeng Loyka, Sergey Li, Yong Ministry of Education Key Lab for Intelligent Networks and Network Security School of Information and Communications Engineering Xi’an Jiaotong University Xi’anShaanxi710049 China School of Electrical Engineering and Computer Science University of Ottawa Canada School of Electronics and Information Northwestern Polytechnical University Xian China
Multi-user Gaussian MIMO wiretap channel is considered under interference power constraints (IPC), in addition to the total transmit power constraint (TPC). Algorithms for global maximization of its secrecy rate are p... 详细信息
来源: 评论
Physical layer security enhancement using artificial noise in cellular vehicle-to-everything (C-V2X) networks
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Chao Li, Zan Xia, Xiang-Gen Shi, Jia Si, Jiangbo Zou, Yulong Integrated Service Networks Lab Xidian University Xi’an710071 China College of Communications Engineering Xidian University Xi’an710071 China Department of Electrical and Computer Engineering University of Delaware NewarkDE19716 United States School of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China
The secure transmission of confidential information in cellular vehicle-to-everything (C-V2X) communication networks is vitally important for user’s personal safety. However, for C-V2X there have not been much studie... 详细信息
来源: 评论
A Novel Random Access Scheme for M2M Communication in Crowded Asynchronous Massive MIMO Systems
arXiv
收藏 引用
arXiv 2020年
作者: Han, Huimei Zhai, Wenchao Wu, Zhefu Li, Ying Zhao, Jun Chen, Mingda College of Information Engineering Zhejiang University of Technology HangzhouZhejiang Province China College of Information Engineering China Jiliang University HangzhouZhejiang Province China State Key Lab of Integrated Services Networks Xidian University Xian710071 China School of Computer Science and Engineering Nanyang Technological University Singapore
A new random access scheme is proposed to solve the intra-cell pilot collision for M2M communication in crowded asynchronous massive multiple-input multiple-output (MIMO) systems. The proposed scheme utilizes the prop... 详细信息
来源: 评论
Boosting fronthaul capacity: Global optimization of power sharing for centralized radio access network
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Jiankang Chen, Sheng Guo, Xinying Shi, Jia Hanzo, Lajos School of Electronics and Computer Science University of Southampton United Kingdom King Abdulaziz University Jeddah Saudi Arabia College of Information Science and Engineering Henan University of Technology China Integrated Service Networks Lab Xidian University Xi'an China
The limited fronthaul capacity imposes a challenge on the uplink of centralized radio access network (C-RAN). We propose to boost the fronthaul capacity of massive multipleinput multiple-output (MIMO) aided C-RAN by g... 详细信息
来源: 评论
An ML estimation based robust Chinese remainder theorem for reals
An ML estimation based robust Chinese remainder theorem for ...
收藏 引用
IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)
作者: Wenjie Wang Xiaoping Li Xiang-Gen Xia MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xian Shaanxi P. R. China Xidian University Xian China Department of Electrical and Computer Engineering University of Delaware Newark DE USA
In this paper, we consider the CRT problem for real numbers with noisy remainders that follow wrapped Gaussian distributions. We propose the maximum likelihood (ML) estimation based CRT when the remainder noises may n... 详细信息
来源: 评论
On privacy protection of latent dirichlet allocation model training
arXiv
收藏 引用
arXiv 2019年
作者: Zhao, Fangyuan Ren, Xuebin Yang, Shusen Yang, Xinyu School of Computer Science and Technology Xi'an Jiaotong University China National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi'an Jiaotong University China
Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for discovery of hidden semantic architecture of text datasets, and plays a fundamental role in many machine learning applications. However, like... 详细信息
来源: 评论
ZSTAD: Zero-Shot Temporal Activity Detection
ZSTAD: Zero-Shot Temporal Activity Detection
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Lingling Zhang Xiaojun Chang Jun Liu Minnan Luo Sen Wang Zongyuan Ge Alexander Hauptmann School of Computer Science and Technology Xi'an Jiaotong University Xian China Ministry of Education Key Lab For Intelligent Networks and Network Security Xian China Faculty of Information Technology Monash University Australia National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Xian China School of Information Technology and Electrical Engineering The University of Queensland Australia School of Computer Science Carnegie Mellon University USA
An integral part of video analysis and surveillance is temporal activity detection, which means to simultaneously recognize and localize activities in long untrimmed videos. Currently, the most effective methods of te... 详细信息
来源: 评论
Multi-view Vector-valued Manifold Regularization for Multi-label Image Classification
arXiv
收藏 引用
arXiv 2019年
作者: Luo, Yong Tao, Dacheng Xu, Chang Xu, Chao Liu, Hong Wen, Yonggang School of Electronics Engineering and Computer Science Peking University Beijing100871 China Centre for Quantum Computation and Intelligent Systems University of Technology Sydney Jones Street Ultimo SydneyNSW2007 Australia Engineering Lab on Intelligent Perception for Internet of Things Shenzhen Graduate School Peking University China Division of Networks and Distributed Systems School of Computer Engineering Nanyang Technological University Singapore Singapore
—In computer vision, image datasets used for classification are naturally associated with multiple labels and comprised of multiple views, because each image may contain several objects (e.g. pedestrian, bicycle and ... 详细信息
来源: 评论
An Operating System Level Data Migration Scheme in Hybrid DRAM-NVM Memory Architecture
An Operating System Level Data Migration Scheme in Hybrid DR...
收藏 引用
Design, Automation & Test in Europe Conference & Exhibition
作者: Reza Salkhordeh Hossein Asadi Data Storage Systems & Networks (DSN) Lab Department of Computer Engineering Sharif University of Technology Tehran Iran
With the emergence of Non-Volatile Memories (NVMs) and their shortcomings such as limited endurance and high power consumption in write requests, several studies have suggested hybrid memory architecture employing bot... 详细信息
来源: 评论