咨询与建议

限定检索结果

文献类型

  • 1,855 篇 会议
  • 1,001 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,871 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,767 篇 工学
    • 937 篇 计算机科学与技术...
    • 714 篇 信息与通信工程
    • 708 篇 软件工程
    • 414 篇 电子科学与技术(可...
    • 295 篇 电气工程
    • 206 篇 光学工程
    • 195 篇 控制科学与工程
    • 160 篇 仪器科学与技术
    • 106 篇 机械工程
    • 89 篇 动力工程及工程热...
    • 82 篇 生物工程
    • 64 篇 网络空间安全
    • 55 篇 材料科学与工程(可...
    • 51 篇 航空宇航科学与技...
    • 46 篇 生物医学工程(可授...
    • 44 篇 交通运输工程
    • 39 篇 建筑学
    • 38 篇 土木工程
    • 38 篇 化学工程与技术
  • 842 篇 理学
    • 434 篇 数学
    • 294 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 98 篇 生物学
    • 91 篇 系统科学
    • 54 篇 化学
  • 319 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 114 篇 工商管理
    • 99 篇 图书情报与档案管...
  • 55 篇 法学
    • 38 篇 社会学
  • 38 篇 医学
    • 35 篇 临床医学
  • 21 篇 经济学
  • 12 篇 文学
  • 11 篇 军事学
  • 9 篇 农学
  • 4 篇 教育学
  • 2 篇 艺术学

主题

  • 187 篇 computer network...
  • 135 篇 laboratories
  • 104 篇 wireless sensor ...
  • 79 篇 bandwidth
  • 70 篇 computational mo...
  • 63 篇 quality of servi...
  • 60 篇 protocols
  • 55 篇 wireless communi...
  • 54 篇 real time system...
  • 53 篇 throughput
  • 53 篇 interference
  • 51 篇 computer archite...
  • 50 篇 resource managem...
  • 49 篇 application soft...
  • 49 篇 delay
  • 45 篇 wireless network...
  • 44 篇 processor schedu...
  • 43 篇 hardware
  • 42 篇 signal to noise ...
  • 42 篇 energy consumpti...

机构

  • 195 篇 computer enginee...
  • 119 篇 state key labora...
  • 115 篇 state key labora...
  • 81 篇 state key labora...
  • 76 篇 shandong provinc...
  • 56 篇 computer enginee...
  • 51 篇 key laboratory o...
  • 43 篇 peng cheng labor...
  • 42 篇 shandong enginee...
  • 39 篇 computer enginee...
  • 39 篇 state key labora...
  • 36 篇 state key labora...
  • 28 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 25 篇 eth zurich compu...
  • 23 篇 shandong fundame...
  • 22 篇 frontiers scienc...
  • 21 篇 state key labora...

作者

  • 114 篇 lothar thiele
  • 69 篇 thiele lothar
  • 47 篇 wattenhofer roge...
  • 45 篇 guo hong
  • 36 篇 wang xingjun
  • 35 篇 xingjun wang
  • 31 篇 zhigang zhang
  • 28 篇 han zhu
  • 27 篇 jian-jia chen
  • 24 篇 hui li
  • 24 篇 zhang zhigang
  • 23 篇 l. thiele
  • 23 篇 zhu han
  • 23 篇 xiang cheng
  • 22 篇 haowen shu
  • 22 篇 zhiping zhou
  • 21 篇 pratyush kumar
  • 21 篇 hong guo
  • 21 篇 jan beutel
  • 20 篇 cheng xiang

语言

  • 2,654 篇 英文
  • 118 篇 其他
  • 99 篇 中文
检索条件"机构=Computer Engineering and Networks Laboratory"
2871 条 记 录,以下是941-950 订阅
排序:
Finite-Blocklength Multi-Antenna Covert Communication Aided By A UAV Relay
Finite-Blocklength Multi-Antenna Covert Communication Aided ...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Xinying Chen Min Sheng Nan Zhao Wei Xu Dusit Niyato School of Information and Communication Engineering Dalian University of Technology Dalian China Faculty of Information Technology University of Jyväskylä Jyväskylä Finland State Key Laboratory of Integrated Services Networks Xidian University Xi'an China National Mobile Communications Research Lab. Southeast University Nanjing Jiangsu China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore
We propose a UAV-relayed covert communication scheme with finite blocklength to maximize the effective transmission rate from the transmitter to the legitimate receiver against a flying warden. The transmitter adopts ... 详细信息
来源: 评论
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid
A Weight-based k-prototypes Algorithm for Anomaly Detection ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Bin Zhao Kai Fan Wei You Kan Yang Zilong Wang Hui Li State Key Laboratory of Integrated Service Networks Xidian University Xi’an China School of cyber engineering Xidian University Xi’an China Department of Computer Science University of Memphis Memphis USA
Anomaly detection is a typical method to find abnormal behaviors in smart grid, where the data may contain both categorical and numerical attributes with distinct significance. The k-prototypes algorithm is one of the... 详细信息
来源: 评论
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud
arXiv
收藏 引用
arXiv 2021年
作者: Yin, Fan Lu, Rongxing Zheng, Yandong Shao, Jun Yang, Xue Tang, Xiaohu Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu611756 China Canadian Institute for Cybersecurity Faculty of Computer Science University of New Brunswick FrederictonE3B 5A3 Canada School of Computer and Information Engineering Zhejiang Gongshang University Hangzhou310018 China Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518055 China
The cloud computing technique, which was initially used to mitigate the explosive growth of data, has been required to take both data privacy and users’ query functionality into consideration. Symmetric searchable en... 详细信息
来源: 评论
Backscatter-based cooperative NOMA  31
Backscatter-based cooperative NOMA
收藏 引用
31st IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2020
作者: Chen, Weiyu Ding, Haiyang Wang, Shilian Da Costa, Daniel Benevides Gong, Fengkui Juliano Nardelli, Pedro Henrique National University of Defence Technology College of Electronic Science and Technology Changsha China National University of Defence Technology College of Information and Communication Xi'an China Federal University of Ceará Department of Computer Engineering Sobral CE Brazil Xidian University State Key Laboratory of Integrated Service Networks Xi'an China Lappeenranta University of Technology School of Energy Systems Lappeenranta Finland
A backscatter cooperation (BC) mechanism is pro-posed for power-domain non-orthogonal multiple access (NOMA) downlink transmission. The key idea is to enable one user to split and then backscatter part of its received... 详细信息
来源: 评论
Relay and Jammer Selection Scheme in Wireless networks with the Statistical Information of Multiple Eavesdropping Channels
收藏 引用
Procedia computer Science 2020年 174卷 597-603页
作者: Mengling Liu Kan Yu Yajing Li Anming Dong Penghua Zhen School of Information Science and Engineering Qufu Normal University Rizhao 276826 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao 266510 China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan 250353 China Computer Science Center (National Supercomputer Center in Jinan) Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China
Physical layer security (PLS) based on cooperative communication has been regarded as a promising technique to enhance the system security. In this paper, considering the statistical information of multiple eavesdropp... 详细信息
来源: 评论
An improved co-designed AES-ECC cryptosystem for secure data transmission
An improved co-designed AES-ECC cryptosystem for secure data...
收藏 引用
作者: Hafsa, Amal Sghaier, Anissa Zeghid, Medien Malek, Jihene Machhout, Mohsen Department of Physics Electronics and Micro-Electronics Laboratory LR99ES30 EµE Lab Faculty of Sciences Monastir University Monastir Tunisia Department of Computer Engineering and Networks College of Engineering at Wadi Addawasir Prince Sattam Bin Abdulaziz University Saudi Arabia Department of Electronics Sousse University Higher Institute of Applied Sciences and Technology LR99ES30 EµE Lab Sousse Tunisia
Asymmetric cryptography is inherently slow because of its associated complex computing, while symmetric cryptography is speedy. However, the latter is suffering from a serious gap which is secure key exchange. To deal... 详细信息
来源: 评论
Impact of Array Orientations on Degrees of Freedom for Continuous Aperture Arrays (CAPA)
收藏 引用
IEEE Wireless Communications Letters 2025年
作者: Guo, Yunhui Zhang, Yang Wang, Zhaolin Shang, Minghao Chen, Yijian Liu, Yuanwei Xidian University State Key Laboratory of Integrated Service Networks Xi’an710071 China Queen Mary University of London School of Electronic Engineering and Computer Science LondonE1 4NS United Kingdom ZTE Corporation Algorithm Department Shenzhen518057 China The University of Hong Kong Department of Electrical and Electronic Engineering Hong Kong Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of
Continuous aperture arrays (CAPA) revolutionize conventional multiple-input multiple-output (MIMO) systems by leveraging spatially continuous electromagnetic surfaces to enhance degrees of freedom (DoFs). In this pape... 详细信息
来源: 评论
Adapting ClusTree for more challenging data stream environments
Adapting ClusTree for more challenging data stream environme...
收藏 引用
作者: Zgraja, Jakub Moulton, Richard Hugh Gama, João Kasprzak, Andrzej Woźniak, Michal Department of Systems and Computer Networks Wroclaw University of Science and Technology Wroclaw Poland Department of Electrical and Computer Engineering Queen's University KingstonON Canada Laboratory of Artificial Intelligence and Decision Support and Faculty of Economics University of Porto Porto Portugal
Data stream mining seeks to extract useful information from quickly-arriving, infinitely-sized and evolving data streams. Although these challenges have been addressed throughout the literature, none of them can be co... 详细信息
来源: 评论
Massive MIMO
Massive MIMO
收藏 引用
2022 IEEE Future networks World Forum (FNWF)
作者: Haijian Sun Chris Ng Yiming Huo Rose Qingyang Hu Ning Wang Chi-Ming Chen Kasturi Vasudevan Jin Yang Webert Montlouis Dauda Ayanda Kumar Vijay Mishra Kürşat Tekbıyık Nasir Hussain Harish Kumar Sahoo Yang Miao Department of Computer Science University of Wisconsin Whitewater IEEE Future Networks Massive MIMO Working Group University of Victoria Utah State University Zhengzhou University AT&T IEEE IIT KANPUR Verizon Communications Inc. Johns Hopkins University University of KwaZulu-Natal South Africa United States CCDC Army Research Laboratory Department of Electronics and Communication Engineering Istanbul Technical University Samsung Electronics America Veer Surendra Sai University of Technology India University of Twente The Netherlands
The use of a large number of antenna elements, known as Massive MIMO, is seen as a key enabling technology in the 5G and Beyond wireless ecosystem. The intelligent use of a multitude of antenna elements unleashes unpr... 详细信息
来源: 评论
反向连边在大型分层网络中的影响(英文)
收藏 引用
engineering 2024年 第5期 240-249页
作者: 曹浩森 胡斌斌 莫小雨 陈都鑫 高建喜 袁烨 陈关荣 Tamás Vicsek 管晓宏 张海涛 MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Mechanical and Aerospace Engineering Nanyang Technological University Jiangsu Key Laboratory of Networked Collective Intelligence School of Mathematics Southeast University Department of Computer Science Rensselaer Polytechnic Institute Department of Electronic Engineering City University of Hong Kong Department of Biological Physics E?tv?s University MOE Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi'an Jiaotong University
Hierarchical networks are frequently encountered in animal groups, gene networks, and artificial engineering systems such as multiple robots, unmanned vehicle systems, smart grids, wind farm networks,and so forth. The...
来源: 评论