咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 220 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 360 篇 工学
    • 224 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 147 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 59 篇 电子科学与技术(可...
    • 44 篇 电气工程
    • 29 篇 生物工程
    • 28 篇 光学工程
    • 26 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 198 篇 理学
    • 117 篇 数学
    • 45 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 9 篇 化学
    • 7 篇 大气科学
  • 77 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 16 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 11 篇 optimization
  • 10 篇 wireless communi...
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 9 篇 quality of servi...
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 beamforming
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 state key lab of...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 integrated servi...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 11 篇 si jiangbo
  • 10 篇 al-dhahir naofal
  • 10 篇 meng deyu
  • 9 篇 halim yanikomero...
  • 9 篇 yanikomeroglu ha...
  • 8 篇 xiaofei yang
  • 8 篇 thiele lothar
  • 8 篇 kai ye
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 513 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
540 条 记 录,以下是491-500 订阅
排序:
Wavelength-Division-Multiplexed Transmission and Dispersion Compensation Enabled by Soliton Microcombs and Cascaded Microrings
Wavelength-Division-Multiplexed Transmission and Dispersion ...
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Yuanbin Liu Hongyi Zhang Jiacheng Liu Liangjun Lu Jiangbing Du Yu Li Zuyuan He Jianping Chen Linjie Zhou Andrew W. Poon Department of Electronic Engineering State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Lab of Navigation and Location Services Shanghai Institute for Advanced Communication and Data Science Shanghai Jiao Tong University Shanghai China SJTU-Pinghu Institute of Intelligent Optoelectronics Pinghu China Department of Electronic and Computer Engineering Photonic Device Laboratory The Hong Kong University of Science and Technology Clear Water Bay Hong Kong
We demonstrate wavelength-division-multiplexed data transmission and dispersion compensation of 25 Gb/s $\times 9$ on-off-keying signals over a 20-km singlemode fiber using an integrated single-soliton microcomb and... 详细信息
来源: 评论
Multi-scale GCN-assisted two-stage network for joint segmentation of retinal layers and disc in peripapillary OCT images
arXiv
收藏 引用
arXiv 2021年
作者: Li, Jiaxuan Jin, Peiyao Zhu, Jianfeng Zou, Haidong Xu, Xun Tang, Min Zhou, Minwen Gan, Yu He, Jiangnan Ling, Yuye Su, Yikai John Hopcroft Center for Computer Science Shanghai Jiao Tong University Shanghai200240 China Department of Preventative Ophthalmology Shanghai Eye Disease Prevention and Treatment Center Shanghai Eye Hospital Shanghai200040 China Department of Ophthalmology Shanghai General Hospital Shanghai Jiao Tong University Shanghai200080 China Department of Electrical and Computer Engineering The University of Alabama AL35487 United States State Key Lab of Advanced Optical Communication Systems and Networks Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China
An accurate and automated tissue segmentation algorithm for retinal optical coherence tomography (OCT) images is crucial for the diagnosis of glaucoma. However, due to the presence of the optic disc, the anatomical st... 详细信息
来源: 评论
Low-Latency Layer-Aware Proactive and Passive Container Migration in Meta Computing
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Mengjie Li, Yihua Mou, Fangyi Tang, Zhiqing Lou, Jiong Guo, Jianxiong Jia, Weijia Institute of Artificial Intelligence and Future Networks Beijing Normal University China Faculty of Arts and Sciences Beijing Normal University China Guangdong Key Lab of AI and Multi-Modal Data Processing BNU-HKBU United International College China Department of Computer Science and Engineering Shanghai Jiao Tong University China Department of Informatics University of Zurich Zurich Switzerland
Meta computing is a new computing paradigm that Copyright © 2024, The Authors. All rights reserved.
来源: 评论
Collaborative Edge Service Placement for Maximizing QoS with Distributed Data Cleaning
Collaborative Edge Service Placement for Maximizing QoS with...
收藏 引用
International Workshop on Quality of Service
作者: Yuzhu Liang Wenhua Wang Xi Zheng Qin Liu Liang Wang Tian Wang School of Artificial Intelligence Beijing Normal University Beijing China School of Computing Macquarie University NSW Australia College of Computer Science and Electronic Engineering Hunan University Changsha China School of Computer Science Northwestern Polytechnical University Xi'an China BNU-UIC Institute of Artificial Intelligence and Future Networks Beijing Normal University Zhuhai China Guangdong Key Lab of AI and Multi-Modal Data Processing BNU-HKBU United International College Zhuhai China
The proliferation of dirty data on Internet of Things (IoT) devices can undermine the accuracy of data-driven decision-making by affecting the distribution of original data. The Quality of Service (QoS) of data cleani...
来源: 评论
A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G networks
A New Hybrid Cipher based on Prime Numbers Generation Comple...
收藏 引用
ACS/IEEE International Conference on computer Systems and Applications
作者: Adda Boualem Abdelkader Berrouachedi Marwane Ayaida Hisham Kholidy Elhadj Benkhelifa Department of Computer Science Ibn Khaldoun University Tiaret Algeria Paragraphe Lab University of Paris 8 Paris France Polytechnique Hauts-de-France CNRS Univ. Lille UMR 8520 - IEMN France CReSTIC EA 3804 Univ. Reims Champagne Ardenne France Dept. of Networks and Computer Security College of Engineering SUNY Polytechnic Institute Utica New Yourk USA Smart Systems AI and Cybersecurity Research Centre Staffordshire Univ UK
Today’s cellular networks (known as 2G, 3G, and 4G) provide a solid foundation for connecting things. The Internet of Things (IoT) is helping people live and work smarter and take full control of their lives. In addi...
来源: 评论
A Mixed-Signal Framework for Modelling Fourier-Domain Optical Coherence Tomography
A Mixed-Signal Framework for Modelling Fourier-Domain Optica...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Yuye Ling Mengyuan Wang Yu Gan Xinwen Yao Leopold Schmetterer Chuanqing Zhou Yikai Su John Hopcroft Center for Computer Science Shanghai Jiao Tong University Shanghai China University of Alabama AL USA Singapore Eye Research Institute Singapore National Eye Centre Singapore School of Chemical and Biomedical Engineering Nanyang Technological University Singapore School of Biomedical Engineering Shanghai Jiao Tong University Shanghai China State Key Lab of Advanced Optical Communication Systems and Networks Shanghai Jiao Tong University Shanghai China
We investigate the signal digitization procedure in FD-OCT and propose a novel mixed-signal framework to model its image formation. It turns out FD-OCT is a shift-variant system, if conventional IDFT is used to recons... 详细信息
来源: 评论
Online Container Scheduling for Low-Latency IoT Services in Edge Cluster Upgrade: A Reinforcement Learning Approach
arXiv
收藏 引用
arXiv 2023年
作者: Cui, Hanshuai Tang, Zhiqing Lou, Jiong Jia, Weijia Institute of Artificial Intelligence and Future Networks Beijing Normal University Zhuhai519087 China School of Artificial Intelligence Beijing Normal University Beijing100875 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Guangdong Key Lab of AI and Multi-Modal Data Processing BNU-HKBU United International College Zhuhai519087 China
In Mobile Edge Computing (MEC), Internet of Things (IoT) devices offload computationally-intensive tasks to edge nodes, where they are executed within containers, reducing the reliance on centralized cloud infrastruct... 详细信息
来源: 评论
VELO: A Vector Database-Assisted Cloud-Edge Collaborative LLM QoS Optimization Framework
arXiv
收藏 引用
arXiv 2024年
作者: Yao, Zhi Tang, Zhiqing Lou, Jiong Shen, Ping Jia, Weijia Institute of Artificial Intelligence and Future Networks Beijing Normal University Zhuhai519087 China School of Artificial Intelligence Beijing Normal University Beijing100875 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Guangdong Key Lab of AI and Multi-Modal Data Processing BNU-HKBU United International College Zhuhai519087 China
The Large Language Model (LLM) has gained significant popularity and is extensively utilized across various domains. Most LLM deployments occur within cloud data centers, where they encounter substantial response dela... 详细信息
来源: 评论
Study on user's identification system in insider threats
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 121-126页
作者: Pei, Qing-Qi Zhao, Peng Zhang, Hong-Bin Wang, Chao Yin, Hao Institute of China Electronic System Engineering Corporation Beijing 100141 China Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Institute of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang 050018 China
Monitoring user's abnormal behaviors, which is an effective method to detect impersonation, is used for impersonation detection in insider threats. A model is built by using TAN-based Bayesian network to reflect t... 详细信息
来源: 评论
The TREND experimental activities on “green” communication networks
The TREND experimental activities on “green” communication...
收藏 引用
Tyrrhenian International Workshop on Digital Communications - Enhanced Surveillance of Aircraft and Vehicles, TIWDC/ESAV
作者: Michela Meo Yi Zhang Yige Hu Filip Idzikowski Łukasz Budzisz Fatemeh Ganji Ivaylo Haratcherev Alberto Conte Antonio Cianfrani Luca Chiaraviglio Angelo Coiro Raffaele Bolla Olga Jaramillo Ortiz Roberto Bruschi Roberto Gonzalez Carmen Guerrero Edion Tego Francesco Matera Stratos Keranidis Giannis Kazdaridis Thanasis Korakis Dipartimento di Elettronica e Telecomunicazioni Politecnico di Torino Italy Networking Technology Domain Alcatel-Lucent Bell Labs Nozay France DIET Department University of Rome “Sapienza” Italy Fondazione Ugo Bordoni Rome Italy Telecommunication Networks Group Technische Universität Berlin Germany Telecommunication Networks and Telematics Lab RU of CNIT c/o University of Genoa Italy Departamento de Ingeniería Telemática Universidad Carlos III de Madrid Spain Department of Computer and Communication Engineering University of Thessaly Greece
Aimed at answering important questions about the energy demand of current telecom infrastructure and the design of sustainable and energy-efficient future networks, the research of a number of European partners is bro... 详细信息
来源: 评论