咨询与建议

限定检索结果

文献类型

  • 1,846 篇 会议
  • 974 篇 期刊文献

馆藏范围

  • 2,820 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,745 篇 工学
    • 919 篇 计算机科学与技术...
    • 706 篇 信息与通信工程
    • 699 篇 软件工程
    • 412 篇 电子科学与技术(可...
    • 288 篇 电气工程
    • 206 篇 光学工程
    • 188 篇 控制科学与工程
    • 159 篇 仪器科学与技术
    • 106 篇 机械工程
    • 89 篇 动力工程及工程热...
    • 82 篇 生物工程
    • 62 篇 网络空间安全
    • 55 篇 材料科学与工程(可...
    • 50 篇 航空宇航科学与技...
    • 46 篇 生物医学工程(可授...
    • 42 篇 交通运输工程
    • 39 篇 建筑学
    • 38 篇 土木工程
    • 37 篇 化学工程与技术
  • 836 篇 理学
    • 432 篇 数学
    • 294 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 97 篇 生物学
    • 91 篇 系统科学
    • 52 篇 化学
  • 317 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 113 篇 工商管理
    • 96 篇 图书情报与档案管...
  • 55 篇 法学
    • 38 篇 社会学
  • 38 篇 医学
    • 35 篇 临床医学
  • 21 篇 经济学
  • 12 篇 文学
  • 11 篇 军事学
  • 9 篇 农学
  • 4 篇 教育学
  • 2 篇 艺术学

主题

  • 187 篇 computer network...
  • 135 篇 laboratories
  • 104 篇 wireless sensor ...
  • 79 篇 bandwidth
  • 70 篇 computational mo...
  • 63 篇 quality of servi...
  • 59 篇 protocols
  • 55 篇 wireless communi...
  • 54 篇 real time system...
  • 53 篇 throughput
  • 53 篇 interference
  • 51 篇 computer archite...
  • 49 篇 application soft...
  • 49 篇 resource managem...
  • 49 篇 delay
  • 45 篇 wireless network...
  • 44 篇 processor schedu...
  • 43 篇 hardware
  • 42 篇 signal to noise ...
  • 42 篇 energy consumpti...

机构

  • 194 篇 computer enginee...
  • 118 篇 state key labora...
  • 115 篇 state key labora...
  • 81 篇 state key labora...
  • 74 篇 shandong provinc...
  • 56 篇 computer enginee...
  • 49 篇 key laboratory o...
  • 43 篇 peng cheng labor...
  • 42 篇 shandong enginee...
  • 39 篇 computer enginee...
  • 39 篇 state key labora...
  • 36 篇 state key labora...
  • 28 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 26 篇 state key labora...
  • 25 篇 eth zurich compu...
  • 22 篇 frontiers scienc...
  • 21 篇 shandong fundame...
  • 21 篇 jiangsu high tec...

作者

  • 112 篇 lothar thiele
  • 69 篇 thiele lothar
  • 47 篇 wattenhofer roge...
  • 45 篇 guo hong
  • 36 篇 wang xingjun
  • 35 篇 xingjun wang
  • 31 篇 zhigang zhang
  • 28 篇 han zhu
  • 27 篇 jian-jia chen
  • 24 篇 zhang zhigang
  • 23 篇 l. thiele
  • 23 篇 zhu han
  • 23 篇 hui li
  • 23 篇 xiang cheng
  • 22 篇 haowen shu
  • 22 篇 zhiping zhou
  • 21 篇 pratyush kumar
  • 21 篇 hong guo
  • 21 篇 jan beutel
  • 21 篇 shu haowen

语言

  • 2,637 篇 英文
  • 99 篇 中文
  • 84 篇 其他
检索条件"机构=Computer Engineering and Networks Laboratory"
2820 条 记 录,以下是201-210 订阅
排序:
The Task Collaborative Migration Method for Marine IoT Based on Edge Computing-RESTful Architecture
The Task Collaborative Migration Method for Marine IoT Based...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Yifan Hu Fuqiang Wang School of information and control engineering Qingdao University of Technology Qingdao China Shandong Computer Science Center and Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Marine Internet of Things (Marine IoT) has garnered increasing interest in monitoring oceanic environments. But establishing a Marine IoT system for observing and processing marine environmental data presents various ...
来源: 评论
On the Nonlinear Shaping Gain With Probabilistic Shaping and Carrier Phase Recovery
On the Nonlinear Shaping Gain With Probabilistic Shaping and...
收藏 引用
作者: Civelli, Stella Parente, Emanuele Forestieri, Enrico Secondini, Marco Institute of Telecommunications Computer Engineering and Photonics (TeCIP) Scuola Superiore Sant’Anna Pisa 56127 Italy Cnr-Istituto di Elettronica e di Ingegneria Dell’Informazione e Delle Telecomunicazioni Pisa 56127 Italy National Laboratory of Photonic Networks Cnit Pisa 56127 Italy
The performance of different probabilistic amplitude shaping (PAS) techniques in the nonlinear regime is investigated, highlighting its dependence on the PAS block length and the interaction with carrier phase recover... 详细信息
来源: 评论
Low-modal-crosstalk doped-fiber amplifiers in few-mode-fiber-based systems
收藏 引用
Photonics Research 2024年 第8期12卷 1768-1775页
作者: SHUAILUO HUANG LEI SHEN GANG QIAO YUANPENG DING YUYANG GAO JIAN CUI BAOLONG ZHU SIYUAN LIU MINGQING ZUO JINGLONG ZHU LEI ZHANG JIE LUO YONGQI HE ZHANGYUAN CHEN JUHAO LI State Key Laboratory of Advanced Optical Communication Systems and Networks Peking UniversityBeijing 100871China State Key Laboratory of Optical Fiber and Cable Manufacture Technology Yangtze Optical Fibre and Cable Joint Stock Limited CompanyWuhan 430073China School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Department of Networks China Mobile Communications Group Co.Ltd.Beijing 100033China Department of Fundamental Network Technology China Mobile Research InstituteBeijing 100053China Pengcheng Laboratory Shenzhen 518055China
Independent light propagation through one or multiple modes is commonly considered as a basic demand for mode manipulation in few-mode fiber(FMF)-or multimode fiber(MMF)-based optical systems such as transmission link... 详细信息
来源: 评论
Movable Frequency Diverse Array for Wireless Communication Security
收藏 引用
IEEE Transactions on Communications 2025年
作者: Cheng, Zihao Si, Jiangbo Li, Zan Liu, Pengpeng Huang, Yangchao Al-Dhahir, Naofal Xidian University State Key Laboratory of Integrated Services Networks Xian710071 China AFEU College of Information and Navigation China University of Texas at Dallas Department of Electrical and Computer Engineering RichardsonTX75080 United States
Frequency diverse array (FDA) is a promising antenna technology to achieve physical layer security by varying the frequency of each antenna at the transmitter. However, when the channels of the legitimate user and eav... 详细信息
来源: 评论
An Accountable Anonymous Voting Scheme Based on One-time Ring Signature
An Accountable Anonymous Voting Scheme Based on One-time Rin...
收藏 引用
Frontiers of Electronics, Information and Computation Technologies (ICFEICT), International Conference on
作者: Yunqi Gu Zhuowei Shen School of Cyber Science and Engineering Southeast University Key Laboratory of Computer Networks and Information Integration (Southeast University) Ministry of Education Nanjing China
Electronic voting plays an increasingly important role in both economic life and social activities. The electronic voting scheme based on one-time ring signature and blockchain solves the problems of voter anonymity, ...
来源: 评论
Low RCS High-Gain Broadband Substrate Integrated Waveguide Antenna Based on Elliptical Polarization Conversion Metasurface
arXiv
收藏 引用
arXiv 2025年
作者: Zhao, Cuiqin Shen, Dongya Duan, Yanming Wang, Yuting Xiao, Huihui Luo, Longxiang College of Big Data and Computer Science Hechi University Yizhou546300 China The Yunnan Provincial Engineering Laboratory of Cloud Wireless Access & Heterogeneous Networks Yunnan University Kunming650091 China
Designed an elliptical polarization conversion metasurface (PCM) for Ka-band applications, alongside a high-gain substrate integrated waveguide (SIW) antenna. The PCM elements are integrated into the antenna design in... 详细信息
来源: 评论
Directly wireless communication of human minds via non-invasive brain-computer-metasurface platform
收藏 引用
eLight 2022年 第1期2卷 132-142页
作者: Qian Ma Wei Gao Qiang Xiao Lingsong Ding Tianyi Gao Yajun Zhou Xinxin Gao Tao Yan Che Liu Ze Gu Xianghong Kong Qammer HAbbasi Lianlin Li Cheng‑Wei Qiu Yuanqing Li Tie Jun Cui Institute of Electromagnetic Space Southeast UniversityNanjing 210096China School of Automation Science and Engineering South China University of TechnologyGuangzhou 510641China State Key Laboratory of Millimeter Wave Southeast UniversityNanjing 210096China Center of Intelligent Metamaterials Pazhou Laboratory Guangzhou 510330China Research Center for Brain-Computer Interface Pazhou LabGuangzhou 510330China Department of Electrical and Computer Engineering National University of SingaporeSingaporeSingapore University of Glasgow James Watt School of EngineeringGlasgow G128QQUK State Key Laboratory of Advanced Optical Communication Systems and Networks Department of ElectronicsPeking UniversityBeijing 100871China
Brain-computer interfaces(BCIs),invasive or non-invasive,have projected unparalleled vision and promise for assisting patients in need to better their interaction with the *** by the BCI-based rehabilitation technolog... 详细信息
来源: 评论
A Six Components Seismic Detection Method Based on Rotation and Motion  13th
A Six Components Seismic Detection Method Based on Rotation ...
收藏 引用
13th International Field Exploration and Development Conference, IFEDC 2023
作者: Feng, Hai-Xin Li, You-Ming Si, Jie-Ge Li, Zheng-Bin Cao, Yu The 3rd Research Institute of CETC Beijing China Key Laboratory of Petroleum Resources Research Institute of Geology and Geophysics Chinese Academy of Sciences Beijing China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Peking University Beijing China Institute of Acoustics Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China
This paper is based on elastic wave propagation and six component seismic detection methods to detect underwater targets, which makes up for the shortcomings of traditional underwater acoustic passive detection method... 详细信息
来源: 评论
Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
收藏 引用
Security and Safety 2024年 第1期3卷 68-87页
作者: Zhiyu Huang Shuzhen Liu Zhichao Sheng Hongwen Yu Antonino Masaracchia Key Laboratory of Specialty Fiber Optics and Optical Access Networks Shanghai UniversityShanghai 200444China School of Electronics Electrical Engineering and Computer ScienceQueen's University BelfastBelfast BT71NNUK
In this paper,we study an unmanned aerial vehicle(UAV)-assisted communication system,where the UAV is dispatched to implement simultaneous transmission and reception(STR)in the existence of multiple malicious *** sche... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论