咨询与建议

限定检索结果

文献类型

  • 1,848 篇 会议
  • 979 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,842 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,746 篇 工学
    • 920 篇 计算机科学与技术...
    • 706 篇 信息与通信工程
    • 699 篇 软件工程
    • 412 篇 电子科学与技术(可...
    • 289 篇 电气工程
    • 206 篇 光学工程
    • 188 篇 控制科学与工程
    • 159 篇 仪器科学与技术
    • 106 篇 机械工程
    • 89 篇 动力工程及工程热...
    • 82 篇 生物工程
    • 62 篇 网络空间安全
    • 55 篇 材料科学与工程(可...
    • 50 篇 航空宇航科学与技...
    • 46 篇 生物医学工程(可授...
    • 42 篇 交通运输工程
    • 39 篇 建筑学
    • 38 篇 土木工程
    • 37 篇 化学工程与技术
  • 836 篇 理学
    • 432 篇 数学
    • 294 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 97 篇 生物学
    • 91 篇 系统科学
    • 52 篇 化学
  • 317 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 113 篇 工商管理
    • 96 篇 图书情报与档案管...
  • 55 篇 法学
    • 38 篇 社会学
  • 38 篇 医学
    • 35 篇 临床医学
  • 21 篇 经济学
  • 12 篇 文学
  • 11 篇 军事学
  • 9 篇 农学
  • 4 篇 教育学
  • 2 篇 艺术学

主题

  • 187 篇 computer network...
  • 135 篇 laboratories
  • 104 篇 wireless sensor ...
  • 79 篇 bandwidth
  • 70 篇 computational mo...
  • 63 篇 quality of servi...
  • 59 篇 protocols
  • 55 篇 wireless communi...
  • 54 篇 real time system...
  • 53 篇 throughput
  • 53 篇 interference
  • 51 篇 computer archite...
  • 49 篇 application soft...
  • 49 篇 resource managem...
  • 49 篇 delay
  • 45 篇 wireless network...
  • 44 篇 processor schedu...
  • 43 篇 hardware
  • 42 篇 signal to noise ...
  • 42 篇 energy consumpti...

机构

  • 195 篇 computer enginee...
  • 119 篇 state key labora...
  • 115 篇 state key labora...
  • 81 篇 state key labora...
  • 74 篇 shandong provinc...
  • 56 篇 computer enginee...
  • 49 篇 key laboratory o...
  • 43 篇 peng cheng labor...
  • 42 篇 shandong enginee...
  • 39 篇 computer enginee...
  • 39 篇 state key labora...
  • 36 篇 state key labora...
  • 28 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 26 篇 state key labora...
  • 25 篇 eth zurich compu...
  • 22 篇 frontiers scienc...
  • 21 篇 shandong fundame...
  • 21 篇 jiangsu high tec...

作者

  • 114 篇 lothar thiele
  • 69 篇 thiele lothar
  • 47 篇 wattenhofer roge...
  • 45 篇 guo hong
  • 36 篇 wang xingjun
  • 35 篇 xingjun wang
  • 31 篇 zhigang zhang
  • 28 篇 han zhu
  • 27 篇 jian-jia chen
  • 24 篇 hui li
  • 24 篇 zhang zhigang
  • 23 篇 l. thiele
  • 23 篇 zhu han
  • 23 篇 xiang cheng
  • 22 篇 haowen shu
  • 22 篇 zhiping zhou
  • 21 篇 pratyush kumar
  • 21 篇 hong guo
  • 21 篇 jan beutel
  • 21 篇 shu haowen

语言

  • 2,659 篇 英文
  • 99 篇 中文
  • 84 篇 其他
检索条件"机构=Computer Engineering and Networks Laboratory"
2842 条 记 录,以下是221-230 订阅
排序:
Overview of Task Offloading of Wireless Sensor Network in Edge Computing Environment
Overview of Task Offloading of Wireless Sensor Network in Ed...
收藏 引用
IEEE International Conference on Electronic Information and Communication Technology (ICEICT)
作者: XiQiang Hou YiFan Hu Fuqiang Wang School of information and control engineering Qingdao University of Technology Qingdao China Shandong Computer Science Center and Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Computer Science Center and Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology (Shandong Academy of Sciences) China
This review article introduces the concepts, server architecture and application scenarios of Mobile Edge Computing (MEC) and Wireless Sensor Network (WSN). By differentiating between rechargeable and non-rechargeable...
来源: 评论
Autonomous Navigation of Agricultural Robots Utilizing Path Points and Deep Reinforcement Learning
Autonomous Navigation of Agricultural Robots Utilizing Path ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Jipeng Kang Zhibin Zhang Yajie Liang Xu Chen Key Laboratory of Wireless Networks and Mobile Computing School of Computer Science Inner Mongolia University Hohhot China Engineering Research Center of Ecological Big Data School of Computer Science Inner Mongolia University Hohhot China
When using deep reinforcement learning algorithms for reactive navigation, it is common to encounter situations where the agent gets stuck in a local optimum. In autonomous exploration without any prior knowledge, the... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
Multidimensional Voronoi Constellations vs. Short Blocklength Probabilistic Shaping: A Comparison for Multilevel Coding Approach
arXiv
收藏 引用
arXiv 2024年
作者: Sheng, Yajie Chen, Bin Lei, Yi Deng, Jingxin Xu, Jiwei Fu, Mengfan Zhuge, Qunbi Li, Shen Department of Computer Science and Information Engineering Hefei University of Technology Hefei China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China Department of Electrical and Computer Engineering Université Laval Québec Canada
Performance of concatenated multilevel coding with probabilistic shaping (PS) and Voronoi constellations (VCs) is analysed over AWGN channel. Numerical results show that VCs provide up to 1.3 dB SNR gains over PS-QAM ... 详细信息
来源: 评论
Incremental Semi-Supervised Learning for Data Streams Classification in Internet of Things
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2489-2501页
作者: Jiang, Jun Wang, Bin Tang, Quan Zhong, Guoxiang Tang, Xuhao Rodrigues, Joel J. P. C. Pengcheng Laboratory Department of New Networks Shenzhen China South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Lusófona University COPELABS Campo Grande 376 Lisbon1749-024 Portugal
Data stream classification is widely used in Internet of Things (IoT) scenarios such as health monitoring, anomaly detection and online diagnosis. Due to the continuous data stream changing dynamically over time, it i... 详细信息
来源: 评论
Enhancing Low-Latency and High-Reliability Data Forwarding for In-Vehicle Time-Sensitive networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Sun, Haitong Zhang, Haijun Guan, Wanqing Liu, Xiangnan Ma, Hui Leung, Victor C.M. Hebei Key Laboratory of Space-Air-Ground Intelligent Communication China Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services University of Science and Technology Beijing Beijing100083 China School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm11428 Sweden Department of Computer Science and Software Engineering Shenzhen University Shenzhen518061 China
To satisfy the low delay, low jitter, and high success rate requirements for in-vehicle networks, IEEE 802.1 Task Group proposed Time-Sensitive Networking (TSN), which has aroused increasing attention in managing time... 详细信息
来源: 评论
Imperceptible Face Forgery Attack via Adversarial Semantic Mask
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Decheng Su, Qixuan Peng, Chunlei Wang, Nannan Gao, Xinbo State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Xidian University Shaanxi Xi’an710071 China Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversar... 详细信息
来源: 评论
Comparative E-Voting Security Evaluation: Multi-Modal Authentication Approaches
Comparative E-Voting Security Evaluation: Multi-Modal Authen...
收藏 引用
Blockchain Computing and Applications (BCCA), International Conference on
作者: Elsi Ahmadieh Nour El Madhoun Department Communications and Computer Networks Engineering Faculty of Technology Lebanese University Beirut Lebanon ISEP LISITE Laboratory France CNRS LIP6 Sorbonne Université Paris France
The decentralized, distributed ledger, a fundamental aspect of blockchain technology, plays a pivotal role in various sectors, including electronic voting (e-voting) systems. When considering e-voting, the significanc... 详细信息
来源: 评论
Constructing Quadratic and Cubic Negabent Functions over Finite Fields
Constructing Quadratic and Cubic Negabent Functions over Fin...
收藏 引用
IEEE International Symposium on Information Theory
作者: Fei Guo Zilong Wang Guang Gong State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Department of Electrical and Computer Engineering University of Waterloo Waterloo Ontario Canada
Bent functions have flat absolute Walsh-Hadamard spectra and negabent functions have flat absolute nega-Hadamard spectra. Those properties are wide applications in cryptography for constructing cryptographically stron...
来源: 评论
Sentiment Analysis to manage Health Crisis in Smart Cities  18
Sentiment Analysis to manage Health Crisis in Smart Cities
收藏 引用
18th IEEE International Conference on computer Science and Information Technologies, CSIT 2023
作者: Bouhissi, Houda El Itmacene, Ouardia Oubekkou, Milissa Pavlova, Olga Hovorushchenko, Tetiana Shestakevych, Tetiana University of Bejaia LMED Laboratory Faculty of Exact Sciences Bejaia06000 Algeria University of Bejaia Faculty of Exact Sciences Bejaia06000 Algeria Khmelnytskyi National University Department of Computer Engineering & Information Systems Khmelnytskyi Ukraine Lviv Polytechnic National University Information Systems and Networks Department Lviv Ukraine
Sentiment analysis is a branch of natural language processing that analyzes textual data and provides insights into users' opinions. In the context of smart cities, sentiment analysis seeks to seamlessly integrate... 详细信息
来源: 评论