咨询与建议

限定检索结果

文献类型

  • 761 篇 会议
  • 482 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 827 篇 工学
    • 385 篇 计算机科学与技术...
    • 327 篇 信息与通信工程
    • 293 篇 软件工程
    • 224 篇 电子科学与技术(可...
    • 160 篇 光学工程
    • 120 篇 电气工程
    • 94 篇 仪器科学与技术
    • 75 篇 控制科学与工程
    • 50 篇 机械工程
    • 38 篇 动力工程及工程热...
    • 38 篇 生物工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
    • 17 篇 安全科学与工程
    • 16 篇 网络空间安全
    • 15 篇 生物医学工程(可授...
  • 424 篇 理学
    • 207 篇 物理学
    • 171 篇 数学
    • 68 篇 统计学(可授理学、...
    • 41 篇 生物学
    • 38 篇 系统科学
    • 18 篇 化学
  • 131 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 48 篇 工商管理
    • 38 篇 图书情报与档案管...
  • 22 篇 医学
    • 18 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 19 篇 法学
    • 16 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 农学

主题

  • 32 篇 bandwidth
  • 29 篇 quality of servi...
  • 28 篇 computer science
  • 24 篇 resource managem...
  • 24 篇 optical fiber co...
  • 23 篇 computational mo...
  • 21 篇 routing
  • 21 篇 signal to noise ...
  • 21 篇 throughput
  • 21 篇 protocols
  • 20 篇 fiber lasers
  • 20 篇 telecommunicatio...
  • 19 篇 communication ne...
  • 17 篇 optimization
  • 17 篇 quantum cryptogr...
  • 16 篇 delays
  • 16 篇 computer network...
  • 15 篇 wireless sensor ...
  • 14 篇 simulation
  • 14 篇 traffic control

机构

  • 117 篇 state key labora...
  • 39 篇 state key labora...
  • 29 篇 science and tech...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 20 篇 peng cheng labor...
  • 20 篇 state key labora...
  • 15 篇 school of electr...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 12 篇 state key labora...
  • 12 篇 peking universit...
  • 12 篇 state key labora...
  • 11 篇 state key labora...
  • 11 篇 computer network...
  • 11 篇 computer network...
  • 10 篇 school of comput...
  • 10 篇 institute of qua...
  • 10 篇 science and tech...
  • 9 篇 state key labora...

作者

  • 47 篇 guo hong
  • 35 篇 reinhard german
  • 27 篇 zhigang zhang
  • 24 篇 xingjun wang
  • 22 篇 hong guo
  • 22 篇 zhang zhigang
  • 20 篇 chen zhangyuan
  • 19 篇 zhang yichen
  • 19 篇 zhiping zhou
  • 18 篇 german reinhard
  • 17 篇 wang xingjun
  • 17 篇 falko dressler
  • 17 篇 luo bin
  • 16 篇 dressler falko
  • 16 篇 yu song
  • 15 篇 cheng xiang
  • 14 篇 xiang cheng
  • 14 篇 aimin wang
  • 14 篇 zhou zhiping
  • 13 篇 wu guohua

语言

  • 1,070 篇 英文
  • 116 篇 其他
  • 62 篇 中文
检索条件"机构=Computer Science in Communication and Networks"
1248 条 记 录,以下是1001-1010 订阅
排序:
The breaking point between fast-and slow-light in a degenerate two-level atomic system
收藏 引用
Chinese Physics B 2010年 第6期19卷 325-329页
作者: 李路明 胡振燕 罗斌 郭弘 Department of Communication Jiangxi Electric Power Information and Communication Company CREAM Group State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum ElectronicsSchool of Electronics Engineering and Computer SciencePeking University
This paper investigates the breaking point between fast- and slow-light in a degenerate two-level atomic system, where fast-light can be converted to slow-light arbitrarily on a single transition line by adjusting the... 详细信息
来源: 评论
Three-Step Carrier Frequency Offset Estimation Algorithm for Burst-Mode communications
收藏 引用
电子学报(英文版) 2010年 第1期19卷 165-169页
作者: LUO Wu LIU An LIANG Qinglin State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronic Engineering and Computer Science Peking University Beijing 100871 China
A data-aided frequency offset estimation algorithm suited for burst-mode communications is described and analyzed. The proposed algorithm is based on a Pilot symbol assisted modulation (PSAM) frame structure, which co... 详细信息
来源: 评论
The wireless sensor network localization algorithm based on improved pattern genetic algorithm
收藏 引用
Journal of Computational Information Systems 2011年 第9期7卷 3031-3038页
作者: Huang, Haiping Cai, Qiwang Wang, Ruchuan She, Baoyang Ma, Yujing College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China
Localization is one of the important technical issues of wireless sensor networks. Based on the traditional genetic algorithm applied in node localization, this paper introduces pattern search algorithm for the select... 详细信息
来源: 评论
Advanced interference mitigation with frequency reuse schemes in the IEEE 802.16m uplink
Advanced interference mitigation with frequency reuse scheme...
收藏 引用
13th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2010
作者: Wamser, Florian Mittelstädt, David Staehle, Dirk Tran-Gia, Phuoc University of Würzburg Institute of Computer Science Department of Communication Networks Würzburg Germany
Fractional frequency reuse is one of the key interference mitigation schemes of the IEEE 802.16m draft standard. This paper proposes a resource allocation strategy for the uplink fractional frequency reuse in the vari... 详细信息
来源: 评论
Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping
Strong and affordable location privacy in VANETs: Identity d...
收藏 引用
2010 IEEE Vehicular Networking Conference, VNC 2010
作者: Eckhoff, David Sommer, Christoph Gansen, Tobias German, Reinhard Dressler, Falko Computer Networks and Communication Systems Dept. of Computer Science University of Erlangen Germany Audi Electronics Venture GmbH Gaimersheim Germany
Public acceptance, and thus the economical success of Vehicular Ad Hoc networks (VANETs), is highly dependent on the quality of deployed privacy mechanisms. Neither users nor operators should be able to track a given ... 详细信息
来源: 评论
An implementation and optimization for scalable DHT crawler
收藏 引用
science China(Information sciences) 2010年 第4期53卷 769-779页
作者: ZHOU Mo1*, ZHANG JianYu2 & DAI YaFei1 1The National Laboratory on Local Fiber-Optic communication networks and Advanced Optical communication Systems of Peking University, Beijing 100871, China 2Institute of computer science and Technology of Peking University, Beijing 100871, China 1. The National Laboratory on Local Fiber-Optic Communication Networks and Advanced Optical Communication Systems of Peking University Beijing 100871 China2. Institute of Computer Science and Technology of Peking University Beijing 100871 China
KAD is one of the largest scale DHT based on real applications. Measurements on KAD is a good approach for researching DHT. Many different active and passive measurements have been made on those systems, and crawlers ... 详细信息
来源: 评论
Greedy design of resilient multi-layer networks
Greedy design of resilient multi-layer networks
收藏 引用
6th Euro NF Conference on Next Generation Internet, NGI 2010
作者: Duelli, Michael Qin, Xiaohua Menth, Michael University of Würzburg Institute of Computer Science Department of Communication Networks Am Hubland 97074 Würzburg Germany
In this paper, we propose a deterministic greedy heuristic providing a construction layout for a cost-efficient multilayer network that is able to carry a given set of traffic demands with and without protection on di... 详细信息
来源: 评论
Scheduling complex automotive embedded real-time systems
Scheduling complex automotive embedded real-time systems
收藏 引用
2010 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2010
作者: Lauer, Christoph Hielscher, Kai-Steffen German, Reinhard Pollmer, Jens Department of Computer Science 7 Computer Networks and Communication Systems University of Erlangen-Nuremberg Germany Department of Safety Electronics Audi AG Ingolstadt Germany
The formal verification of task schedulability is getting more important in the automotive domain as more and more applications are integrated into domain specific controllers. Especially for safety critical applicati... 详细信息
来源: 评论
ColorCom2: A transparent co-located virtual machine communication mechanism
ColorCom2: A transparent co-located virtual machine communic...
收藏 引用
International Conference on Computational science and Engineering
作者: Zhang, Liang Bai, Yuebin Liu, Ming Xu, Hanwen School of Computer Science Beihang University Beijing 100191 China Science and Technology on Information Transmission Dissemination in Communication Networks Laboratory Shijiazhuang 050081 China
In a virtualized environment, all the resource are managed by a virtual machine monitor (VMM). Virtualization technology creates separate, isolated and secure running environments for operating systems, programs or ap... 详细信息
来源: 评论
SoftAccel: A software-only IP network application accelerator
SoftAccel: A software-only IP network application accelerato...
收藏 引用
2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010
作者: Zhang, Huiyong Bai, Yuebin Li, Zhi Peng, Huixing Liu, Xiaoxia Zhao, Likun Wu, Wei Luo, Lianhe School of Computer Science Beihang University Beijing 100191 China Science and Technology on Information Transmission Dissemination in Communication Networks Laboratory Shijiazhuang 050081 China
Internet technologies are making rapid progress, but achieving high performance of network application over the WAN remains a challenge. When branch office's workers access enterprise applications locating in data... 详细信息
来源: 评论