咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 220 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 359 篇 工学
    • 224 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 148 篇 信息与通信工程
    • 62 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 29 篇 生物工程
    • 27 篇 光学工程
    • 25 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 196 篇 理学
    • 117 篇 数学
    • 43 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 8 篇 化学
    • 7 篇 大气科学
  • 77 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 16 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 11 篇 optimization
  • 10 篇 wireless communi...
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 quality of servi...
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 beamforming
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 state key lab of...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 integrated servi...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 11 篇 si jiangbo
  • 10 篇 al-dhahir naofal
  • 10 篇 meng deyu
  • 9 篇 halim yanikomero...
  • 9 篇 yanikomeroglu ha...
  • 8 篇 thiele lothar
  • 7 篇 xiaofei yang
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 kai ye
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 513 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
540 条 记 录,以下是391-400 订阅
排序:
An identity-based secure routing protocol in WSNs
An identity-based secure routing protocol in WSNs
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Li, Weichang Li, Hongning Xie, Min Bu, Shupo Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou China
It has been proved that Asymmetric cryptography can be used in Wireless Sensor networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery ... 详细信息
来源: 评论
Wideband compressed sensing for cognitive radios
Wideband compressed sensing for cognitive radios
收藏 引用
2011 IEEE Military Communications Conference, MILCOM 2011
作者: Ayhan Sakarya, F. Nagel, George S. Tran, Lan H. Molnar, Joseph A. Networks and Communications Systems Branch Information Technology Division Naval Research Lab. Washington DC United States School of Electrical and Computer Engineering College of Engineering Georgia Institute of Technology Atlanta GA United States
Efficient utilization of spectral bands in a dynamic environment with a continuously changing occupation rate is challenging. Static spectral allocations preclude the use of unoccupied spectrum, unless the spectrum ma... 详细信息
来源: 评论
A general sharing model based on proxy re-encryption
A general sharing model based on proxy re-encryption
收藏 引用
7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
作者: Ma, Guojun Pei, Qingqi Wang, Yuchen Jiang, Xiaohong State Key Laboratory of Integrated Services Networks Xidian University Xi'an China School of Electronic Engineering University of Electronic Science and Technology of China Chengdu China Key Lab. of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t... 详细信息
来源: 评论
Magnetically induced simultaneous slow and fast light by phase control
Magnetically induced simultaneous slow and fast light by pha...
收藏 引用
Slow and Fast Light, Slow_Fast 2011
作者: Luo, Bin Guo, Hong CREAM Group State Key Lab. of Advanced Optical Communication Systems and Networks Inst. of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
A-type atom coupled by additional driving light and radio frequency (RF) field can generate controllable simultaneous slow and fast light at two frequencies. Distortions by radiative dampings are discussed and compens... 详细信息
来源: 评论
An efficient partial link monitoring scheme for inter-domain routing under dynamic traffic scenarios
An efficient partial link monitoring scheme for inter-domain...
收藏 引用
作者: Zhang, Pengfei Jin, Yaohui Sun, Weiqiang Guo, Wei Hu, Weisheng Ghani, N. State Key Lab. of Advanced Communication Systems and Networks Shanghai Jiao Tong University China Electrical and Computer Engineering Department University of New Mexico United States
We investigate link-state advertising in multi-domain networks with dynamic traffic. A novel triggering scheme is proposed to monitor a subset of domain links, and thereby achieve a balance between salability and accu... 详细信息
来源: 评论
A fast handoff method based on RSSI and LQI in wireless sensor network
A fast handoff method based on RSSI and LQI in wireless sens...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Miao, Zhang Li, Jingying School of Mechanical Engineering Northwestern Polytechnical University Xi'an Shaanxi 710072 China Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian Univ. Xi'an Shaanxi 710071 China
The thesis also puts forward a fast handoff method based on RSSI and LQI, which makes improvements on preset parameters, subnet selection, decision standards and reparation of switching failure. The new method which c... 详细信息
来源: 评论
Conflict-free transmission schedule based on network coding in wireless networks
Conflict-free transmission schedule based on network coding ...
收藏 引用
International Conference on Communications and Mobile Computing
作者: Wang, Jing Liu, Xiangyang Wang, Xinmei School of Information Engineering Chang'an University Xi'an China Computer Network Teaching Office Xi'an Communication College Xi'an China State Key Lab. of Integrated Service Networks Xidian University Xi'an China
In wireless networks, the cross-layer design of joint medium access control and network coding can avoid destructive interferences among concurrent transmissions. Wireless network codes in conjunction with conflict-fr... 详细信息
来源: 评论
Unicode-proof code injection attack on Windows CE A novel approach of evading intrusion detection system for mobile network
Unicode-proof code injection attack on Windows CE A novel ap...
收藏 引用
IEEE International Conference on Communication Software and networks
作者: Song, Yang Zhang, Yuqing Sun, Yingfei Yan, Jingbo National Computer Network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing China School of Information Science and Engineering Graduate University Chinese Academy of Sciences Beijing China Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xian China
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected int... 详细信息
来源: 评论
A comparison of Wireless Fidelity (Wi-Fi) fingerprinting techniques
A comparison of Wireless Fidelity (Wi-Fi) fingerprinting tec...
收藏 引用
International Conference on Information and Communication Technology Convergence (ICTC)
作者: Lersan B. Del Mundo Rafael Lean D. Ansay Cedric Angelo M. Festin Roel M. Ocampo Networks and Distributed Systems Laboratory Department of Computer Science University of the Philippines Diliman Quezon Philippines Computer Networks Lab Electrical and Electronics Engineering Institute University of the Philippines Diliman Quezon Philippines
Among several techniques proposed for indoor positioning using IEEE 802.11 Wireless Fidelity (Wi-Fi) based networks, those that rely on fingerprinting have been demonstrated to outperform those based on lateration, an... 详细信息
来源: 评论
Mechanisms for multi-level marketing  11
Mechanisms for multi-level marketing
收藏 引用
Proceedings of the 12th ACM conference on Electronic commerce
作者: Emek, Yuval Karidi, Ron Tennenholtz, Moshe Zohar, Aviv Computer Engineering and Networks Laboratory ETH Zurich Zurich Switzerland Microsoft Israel Innovation Lab. Herzeliya Israel Microsoft Israel R and D Center Technion - Israel Institute of Technology Herzeliya Israel Microsoft Research Silicon Valley Lab. Mountain View CA United States
Multi-level marketing is a marketing approach that motivates its participants to promote a certain product among their friends. The popularity of this approach increases due to the accessibility of modern social netwo... 详细信息
来源: 评论