咨询与建议

限定检索结果

文献类型

  • 2,225 篇 会议
  • 1,156 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 3,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,047 篇 工学
    • 1,084 篇 计算机科学与技术...
    • 838 篇 软件工程
    • 798 篇 信息与通信工程
    • 427 篇 电子科学与技术(可...
    • 403 篇 电气工程
    • 265 篇 控制科学与工程
    • 160 篇 仪器科学与技术
    • 154 篇 光学工程
    • 138 篇 动力工程及工程热...
    • 123 篇 生物工程
    • 114 篇 机械工程
    • 83 篇 生物医学工程(可授...
    • 63 篇 航空宇航科学与技...
    • 63 篇 网络空间安全
    • 56 篇 材料科学与工程(可...
    • 56 篇 交通运输工程
    • 53 篇 化学工程与技术
    • 38 篇 安全科学与工程
  • 965 篇 理学
    • 543 篇 数学
    • 272 篇 物理学
    • 176 篇 统计学(可授理学、...
    • 150 篇 生物学
    • 137 篇 系统科学
    • 60 篇 化学
  • 397 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 142 篇 工商管理
    • 117 篇 图书情报与档案管...
  • 87 篇 医学
    • 73 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 68 篇 法学
    • 45 篇 社会学
  • 34 篇 经济学
  • 19 篇 文学
  • 13 篇 军事学
  • 12 篇 农学
  • 7 篇 教育学
  • 6 篇 艺术学

主题

  • 120 篇 computer network...
  • 116 篇 bandwidth
  • 93 篇 quality of servi...
  • 92 篇 protocols
  • 84 篇 throughput
  • 83 篇 wireless sensor ...
  • 76 篇 wireless communi...
  • 71 篇 delay
  • 67 篇 wireless network...
  • 62 篇 telecommunicatio...
  • 61 篇 computational mo...
  • 60 篇 computer archite...
  • 60 篇 laboratories
  • 58 篇 computer science
  • 56 篇 intelligent netw...
  • 53 篇 interference
  • 52 篇 routing
  • 52 篇 traffic control
  • 52 篇 ip networks
  • 51 篇 resource managem...

机构

  • 72 篇 state key labora...
  • 63 篇 state key labora...
  • 35 篇 peng cheng labor...
  • 30 篇 computer enginee...
  • 29 篇 department of el...
  • 27 篇 state key labora...
  • 24 篇 state key labora...
  • 21 篇 frontiers scienc...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 20 篇 department of el...
  • 19 篇 state key labora...
  • 18 篇 department of el...
  • 16 篇 state key labora...
  • 15 篇 xidian universit...
  • 14 篇 state key labora...
  • 13 篇 ieee
  • 13 篇 center for ultra...
  • 13 篇 national key lab...
  • 13 篇 peking universit...

作者

  • 32 篇 fred wang
  • 31 篇 sarigiannidis pa...
  • 31 篇 han zhu
  • 25 篇 panagiotis sarig...
  • 25 篇 zhu han
  • 25 篇 leon m. tolbert
  • 25 篇 argyriou vasilei...
  • 24 篇 zhong-ping jiang
  • 24 篇 xingjun wang
  • 23 篇 wang xingjun
  • 22 篇 vasileios argyri...
  • 21 篇 lagkas thomas
  • 21 篇 marios m. polyca...
  • 20 篇 cheng xiang
  • 20 篇 hui li
  • 20 篇 xiang cheng
  • 19 篇 thomas lagkas
  • 19 篇 christos g. pana...
  • 19 篇 zhang haijun
  • 18 篇 al-dhahir naofal

语言

  • 3,173 篇 英文
  • 147 篇 其他
  • 85 篇 中文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Networks"
3405 条 记 录,以下是61-70 订阅
排序:
Fundamental Limits of Multiple-Access Integrated Sensing and Communication Systems
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4317-4341页
作者: Liu, Yao Li, Min Liu, An Ong, Lawrence Yener, Aylin Zhejiang University College of Information Science and Electronic Engineering Zhejiang Provincial Key Laboratory of Multi-Modal Communication Networks and Intelligent Information Processing Hangzhou310027 China University of Newcastle School of Engineering CallaghanNSW2308 Australia The Ohio State University Department of Electrical and Computer Engineering ColumbusOH43210 United States
A state-dependent discrete memoryless multiple access channel is considered to model an integrated sensing and communication system, where two transmitters wish to convey messages to a receiver while simultaneously es... 详细信息
来源: 评论
Machine learning based fileless malware traffic classification using image visualization
收藏 引用
Cybersecurity 2024年 第4期7卷 1-18页
作者: Fikirte Ayalke Demmese Ajaya Neupane Sajad Khorsandroo May Wang Kaushik Roy Yu Fu Department of Computer Science College of EngineeringNorth Carolina A&T State University1601 E Market StGreensboroNC 27411USA Palo Alto Networks Inc.3000 Tannery WaySanta ClaraCA 95054USA
In today's interconnected world,network traffic is replete with adversarial *** technology evolves,these attacks are also becoming increasingly sophisticated,making them even harder to ***,artificial intelli-gence... 详细信息
来源: 评论
Pravega: Performance impact analysis with Connection Pooling
Pravega: Performance impact analysis with Connection Pooling
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Ramesh, K.V. Raju, G.T. Visvesvaraya Technological University Airspan Networks Belagavi India SJC Institute of Technology Visvesvaraya Technological University Department of Computer Science and Engineering Belagavi India
In this paper we perform analysis on Pravega distributed streaming storage with and without connection pooling. When connection pooling is enabled, there will be a restriction of number of open connections for data tr... 详细信息
来源: 评论
Optimization of Cube Storage Warehouse Scheduling Using Genetic Algorithms  19
Optimization of Cube Storage Warehouse Scheduling Using Gene...
收藏 引用
19th IEEE International Conference on Automation Science and engineering, CASE 2023
作者: Ha, Won Yong Jiang, Zhong-Ping Tandon School of Engineering New York University The Control and Networks Lab Department of Electrical and Computer Engineering BrooklynNY11201 United States
In this paper, a new scheduling model is presented to speed up the logistics processing in an automatic cube storage warehouse. Automated guided vehicles (AGV) are used to move all items in the warehouse according to ... 详细信息
来源: 评论
Adaptive Defense Mechanisms Against Zero-Day Attacks in Wireless Sensor networks
Adaptive Defense Mechanisms Against Zero-Day Attacks in Wire...
收藏 引用
2024 International Conference on Distributed Systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Chaturvedi, Abhay Kukreti, Sanjeev Durga Bhavani, A. Nizampatnam, Venkata Naga Ravi Kiran Kaur, Davinder Natrayan, L. Gla University Department of Electronics & Communication Engineering Chaumuhan India Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Bms Institute of Technology and Management Department of Computer Science and Engineering Bengaluru India Expert Network Security Engineer Acxiom Llc Department of Computer Networks AustinTX United States Symbiosis Law School Department of Law Pune India Saveetha School of Engineering Simats Department of Mechanical Engineering Kuthambakkam India
Important fields including healthcare, environmental monitoring, and military operations are seeing a rise in the use of wireless sensor networks (WSNs). But they are susceptible to complex cyber dangers, especially z... 详细信息
来源: 评论
A Robust Speech Encryption Method Using Segmentation and Chaotic Keys for Enhanced Audio Security  3rd
A Robust Speech Encryption Method Using Segmentation and Ch...
收藏 引用
3rd International Conference on Advances in Computing Research, ACR 2025
作者: Abu-Faraj, Mua’ad Al-Hyari, Abeer Alqadi, Ziad Department of Computer Information Systems The University of Jordan Aqaba77110 Jordan Department of Electrical Engineering Al-Balqa Applied University As Salt19117 Jordan Department of Computers and Networks Engineering Al-Balqa Applied University Amman15008 Jordan
This paper presents an innovative method for safeguarding audio files. The proposed technique leverages an advanced primary key with a complex structure, offering a vast keyspace resistant to hacking. The private key ... 详细信息
来源: 评论
Distributed Throughput and Energy Efficient Resource Optimization When D2D and Massive MIMO Coexist
收藏 引用
Journal of Communications and Information networks 2022年 第3期7卷 278-295页
作者: Abi Abate Dejen Yihenew Wondie Anna Forster Sustainable Communication Networks Department Universitat BremenBremen 28195Germany School of Electrical and Computer Engineering Addis Ababa UniversityAddis Ababa 999047Ethiopia
Fifth generation(5G)cellular networks intend to overcome the challenging demands posed by dynamic service quality requirements,which are not achieved by single network *** future cellular networks require efficient re... 详细信息
来源: 评论
Development of an Interface for Digital Neuromorphic Hardware Based on an FPGA
Development of an Interface for Digital Neuromorphic Hardwar...
收藏 引用
UNIfied Conference of International Workshop on Defence Applications of Multi-Agent Systems, DAMAS 2023, International Conference on Maintenance engineering, IncoME-V 2023, International conference on the Efficiency and Performance engineering Network, TEPEN 2023
作者: Harmann, René Sohlbach, Lukas Perez-Peña, Fernando Schmidt, Karsten Department of Computer Science and Engineering Frankfurt University of Applied Sciences Nibelungenplatz 1 Frankfurt60318 Germany Department of Automation Electronics and Computer Architecture and Networks School of Engineering University of Cadiz Avda. de la Universidad 10 Puerto Real11519 Spain
Exploring and understanding the functioning of the human brain is one of the greatest challenges for current research. Neuromorphic engineering tries to address this challenge by abstracting biological mechanisms and ... 详细信息
来源: 评论
5G Smart Mobility Management Based Fuzzy Logic Controller Unit
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 4941-4953页
作者: Chafaa Hamrouni Slim Chaoui Taif University-Khurma Univ.College-Department of Computer Sciences Khurma2935Kingdom of Saudi Arabia College of Computer and Information Sciences Dep.of Computer Engineering and NetworksJouf UniversitySkakaK.S.A
In the paper,we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication *** management is considered as a main issue for all-IP mobile networks future *... 详细信息
来源: 评论
Hardware considerations of a DSP based wireless coded receiver under limited resources
Hardware considerations of a DSP based wireless coded receiv...
收藏 引用
2022 International Conference on Intelligent Technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Abdelkareem, A.E. College of Information Engineering Al-Nahrain University Department of Computer Networks Engineering Baghdad Iraq
Reliable wireless communication is enabled by adopting advanced Forward Error Correction (FEC) codes, such as Turbo codes. However, the Turbo decoder for real-time communication necessitates accommodating limited reso... 详细信息
来源: 评论