咨询与建议

限定检索结果

文献类型

  • 3,288 篇 会议
  • 2,014 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,339 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,160 篇 工学
    • 1,981 篇 计算机科学与技术...
    • 1,527 篇 软件工程
    • 954 篇 信息与通信工程
    • 497 篇 电气工程
    • 470 篇 电子科学与技术(可...
    • 398 篇 控制科学与工程
    • 276 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 189 篇 光学工程
    • 172 篇 机械工程
    • 168 篇 仪器科学与技术
    • 150 篇 动力工程及工程热...
    • 121 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 86 篇 网络空间安全
    • 83 篇 安全科学与工程
  • 1,653 篇 理学
    • 824 篇 数学
    • 557 篇 物理学
    • 319 篇 生物学
    • 250 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 132 篇 化学
  • 727 篇 管理学
    • 485 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 239 篇 工商管理
  • 243 篇 医学
    • 194 篇 临床医学
    • 166 篇 基础医学(可授医学...
    • 89 篇 药学(可授医学、理...
  • 122 篇 法学
    • 89 篇 社会学
  • 90 篇 经济学
    • 89 篇 应用经济学
  • 89 篇 教育学
  • 51 篇 农学
  • 21 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 158 篇 computer network...
  • 134 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 103 篇 protocols
  • 87 篇 wireless sensor ...
  • 86 篇 throughput
  • 83 篇 quality of servi...
  • 79 篇 wireless communi...
  • 77 篇 computer archite...
  • 77 篇 internet
  • 71 篇 routing
  • 71 篇 computational mo...
  • 70 篇 accuracy
  • 69 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 64 篇 machine learning
  • 63 篇 optimization
  • 63 篇 costs

机构

  • 153 篇 national and kap...
  • 153 篇 centro brasileir...
  • 152 篇 istanbul technic...
  • 150 篇 universidad iber...
  • 150 篇 university of sp...
  • 150 篇 yerevan physics ...
  • 148 篇 brunel universit...
  • 148 篇 academy of scien...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 144 篇 university of de...
  • 142 篇 rwth aachen univ...
  • 142 篇 department of ph...
  • 141 篇 università di to...
  • 140 篇 imperial college...
  • 138 篇 infn sezione di ...
  • 136 篇 zhejiang univers...
  • 133 篇 department of ph...
  • 132 篇 università di ca...
  • 132 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 110 篇 e. migliore
  • 110 篇 p. avery
  • 110 篇 l. silvestris

语言

  • 5,107 篇 英文
  • 139 篇 其他
  • 85 篇 中文
  • 9 篇 日文
检索条件"机构=Department of Computer Network Engineering"
5339 条 记 录,以下是1-10 订阅
排序:
Secure beamforming and deployment design for rate-splitting multiple access-based UAV communications
收藏 引用
Science China(Information Sciences) 2025年 第1期68卷 342-356页
作者: Bing WANG Xiaofeng TAO Shujun HAN Huici WU Kai YANG Zhu HAN National Engineering Research Center of Mobile Network Technologies Beijing University of Posts and Telecommunications Peng Cheng Laboratory Department of Electrical and Computer Engineering University of Houston
Rate-splitting multiple access(RSMA) has recently gained attention as a potential robust multiple access(MA)scheme for upcoming wireless networks. Given its ability to efficiently utilize wireless resources and design... 详细信息
来源: 评论
A Literature Review on Model Conversion, Inference, and Learning Strategies in EdgeML with TinyML Deployment
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 13-64页
作者: Muhammad Arif Muhammad Rashid Department of Computer Science and Artificial Intelligence Umm Al-Qura UniversityMakkah Al-Mukarama21955Saudi Arabia Department of Computer and Network Engineering Umm Al-Qura UniversityMakkah Al-Mukarama21955Saudi Arabia
Edge Machine Learning(EdgeML)and Tiny Machine Learning(TinyML)are fast-growing fields that bring machine learning to resource-constrained devices,allowing real-time data processing and decision-making at the network’... 详细信息
来源: 评论
Entropy-Bottleneck-Based Privacy Protection Mechanism for Semantic Communication
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2971-2988页
作者: Kaiyang Han Xiaoqiang Jia Yangfei Lin Tsutomu Yoshinaga Yalong Li Jiale Wu School of Information Engineering Inner Mongolia University of TechnologyHohhot010051China Department of Computer and Network Engineering University of Electro-CommunicationsChofuTokyo1828585Japan
With the rapid development of artificial intelligence and the Internet of Things,along with the growing demand for privacy-preserving transmission,the need for efficient and secure communication systems has become inc... 详细信息
来源: 评论
A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4573-4591页
作者: Aiguo Li Yunfei Jia Department of Network Engineering Xi’an University of Science and TechnologyXi’an710600China College of Computer Science and Technology Xi’an University of Science and TechnologyXi’an710600China
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t... 详细信息
来源: 评论
Predicting from a Different Perspective: A Re-ranking Model for Inductive Knowledge Graph Completion  21st
Predicting from a Different Perspective: A Re-ranking Mode...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Iwamoto, Yuki Kaneiwa, Ken Department of Computer Network Engineering Graduate School of Informatics and Engineering The University of Electro-Communications Tokyo Japan
Rule-induction models have demonstrated great power in the inductive setting of knowledge graph completion. In this setting, the models are tested on a knowledge graph entirely composed of unseen entities. These ... 详细信息
来源: 评论
Intrusion Detection in IoT and IIoT: Comparing Lightweight Machine Learning Techniques Using TON_IoT, WUSTL-IIOT-2021, and EdgeIIoTset Datasets
收藏 引用
IEEE Access 2025年 13卷 73468-73485页
作者: Ismail, Shereen Dandan, Salah Qushou, Ala'a University of Michigan Merit Network Inc MI48108 United States University of North Dakota School of Electrical Engineering and Computer Science ND58202 United States University of Jordan Department of Computer Engineering Amman Jordan
The security of Internet of Things (IoT) and Industrial Internet of Things (IIoT) systems has been significantly enhanced through the integration of effective intrusion detection systems (IDSs). Machine learning (ML) ... 详细信息
来源: 评论
A New Data-Free Backdoor Removal Method via Adversarial Self-Knowledge Distillation
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12267-12277页
作者: Li, Xuexiang Gao, Yafei Liu, Minglin Zhou, Xu Chen, Xianfu Wu, Celimuge Li, Jie Zhengzhou University School of Cyber Science and Engineering Zhengzhou450002 China Michigan Technological University Department of Computer Science HoughtonMI49931 United States Shenzhen CyberAray Network Technology Company Ltd Shenzhen518038 China Shanghai Advanced Research Institute Chinese Academy of Sciences Shanghai201204 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai200240 China
In the context of Internet of Things edge devices, pretrained models are often sourced directly from cloud computing platforms due to the unavailability of training data. This lack of access during the training phase ... 详细信息
来源: 评论
Coded Beam Training for RIS Assisted Wireless Communications
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第5期24卷 3854-3867页
作者: Chen, Yuhao Dai, Linglong Department of Electronic Engineering China Tsinghua University State Key laboratory of Space Network and Communications Beijing100084 China Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science CambridgeMA02139 United States
Reconfigurable intelligent surface (RIS) is considered as one of the key technologies for future 6G communications. To fully unleash the performance of RIS, accurate channel state information (CSI) is crucial. Beam tr... 详细信息
来源: 评论
AmplitudeArrow: On-the-Go AR Menu Selection Using Consecutive Simple Head Gestures and Amplitude Visualization
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第05期31卷 3408-3417页
作者: Tian, Yang Zhang, Youpeng Yan, Yukang Zhao, Shengdong Ma, Xiaojuan Shi, Yuanchun Guangxi University Department of Computer Science Guangxi Key Laboratory of Multimedia Communications and Network Technology China University of Rochester Department of Computer Science United States City University of Hong Kong School of Creative Media and the Department of Computer Science Hong Kong Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong Tsinghua University Department of Computer Science and Technology China
Heads-up computing aims to provide synergistic digital assistance that minimally interferes with users' on-the-go daily activities. Currently, the input modalities of heads-up computing are mainly voice and finger... 详细信息
来源: 评论
Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 639-671页
作者: Noveela Iftikhar Mujeeb Ur Rehman Mumtaz Ali Shah Mohammed J.F.Alenazi Jehad Ali Knowledge Unit of Systems and Technology University of Management and TechnologySialkot51310Pakistan Department of Computer Science University ofWahWah Cantt47010Pakistan Department of Computer Engineering College of Computer and Information Sciences(CCIS)King Saud UniversityRiyadh11451Saudi Arabia Department of AI Convergence Network Ajou UniversitySuwon16499Republic of Korea
Intrusion attempts against Internet of Things(IoT)devices have significantly increased in the last few *** devices are now easy targets for hackers because of their built-in security *** a Self-Organizing Map(SOM)hybr... 详细信息
来源: 评论