咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 14 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 91 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 35 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 25 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 电气工程
    • 9 篇 控制科学与工程
    • 8 篇 动力工程及工程热...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 生物工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
  • 29 篇 理学
    • 17 篇 数学
    • 6 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 3 篇 化学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 5 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学

主题

  • 5 篇 throughput
  • 5 篇 network topology
  • 5 篇 artificial intel...
  • 4 篇 systematics
  • 4 篇 resource managem...
  • 4 篇 protocols
  • 3 篇 bibliographies
  • 3 篇 wireless communi...
  • 3 篇 interference
  • 3 篇 diffusion proces...
  • 3 篇 computers
  • 3 篇 organizations
  • 3 篇 cloud computing
  • 3 篇 digital signal p...
  • 2 篇 power demand
  • 2 篇 internet of thin...
  • 2 篇 scalability
  • 2 篇 network topology...
  • 2 篇 matrix represent...
  • 2 篇 deep learning

机构

  • 4 篇 dept. of network...
  • 3 篇 waseda universit...
  • 3 篇 dept. of signal ...
  • 2 篇 school of softwa...
  • 2 篇 research institu...
  • 2 篇 computer science...
  • 2 篇 wireless intelli...
  • 2 篇 dept. of compute...
  • 2 篇 department of el...
  • 2 篇 dept. of comput....
  • 2 篇 hellenic aerospa...
  • 2 篇 dept. of comput....
  • 2 篇 institute for da...
  • 2 篇 king faisal univ...
  • 2 篇 dept. computer s...
  • 2 篇 computer enginee...
  • 2 篇 dept. of data co...
  • 2 篇 national univers...
  • 2 篇 dept. of compute...
  • 2 篇 dept. of compute...

作者

  • 5 篇 wang jian
  • 5 篇 hu erh-wen
  • 5 篇 su bogong
  • 4 篇 m m hafizur rahm...
  • 3 篇 hirasawa shigeic...
  • 3 篇 gonzalo mateos
  • 3 篇 nikumani choudhu...
  • 3 篇 yagi hideki
  • 3 篇 manzano joseph
  • 3 篇 moustafa m. nasr...
  • 3 篇 antonio g. marqu...
  • 3 篇 tan nguyen duy
  • 3 篇 santiago segarra
  • 2 篇 shoeibi afshin
  • 2 篇 rasoul shafipour
  • 2 篇 ercetin ozgur
  • 2 篇 yiu-ming cheung
  • 2 篇 xin liu
  • 2 篇 shuzhi sam ge
  • 2 篇 hidetomo sakaino

语言

  • 89 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Dept. of Data Communications and Computer Networks"
91 条 记 录,以下是41-50 订阅
排序:
A Review Paper for the Role of Cryptography in Network Security
A Review Paper for the Role of Cryptography in Network Secur...
收藏 引用
International Conference on Electrical, Control and Instrumentation Engineering (ICECIE)
作者: Jawaher Alshehri Almaha Alhamed Dept. of Computer Networks & Communications. King Faisal University CCSIT Al Hofuf Al Hassa Saudi Arabia
Protecting the security and privacy of data has become extremely important in this period, especially with the increase in new technologies and the adoption of government and private agencies in converting all procedu... 详细信息
来源: 评论
Performance Evaluation of Backoff Misbehaviour in IEEE 802.11ah Using Evolutionary Game Theory
Performance Evaluation of Backoff Misbehaviour in IEEE 802.1...
收藏 引用
IEEE Vehicular Technology Conference
作者: Jiun Terng Liew Fazirulhisyam Hashim Aduwati Sali M. Fadlee A. Rasid Kanapathippillai Cumanan Wireless and Photonic Networks Research Centre of Excellence (WiPNet) Dept. of Computer and Communications Systems Engineering Universiti Putra Malaysia
IEEE 802.11ah is a promising wireless standard proposed to support the emerging machine-to-machine (M2M) communications. To solve the bottleneck problem of contention-based protocol, 802.11ah limits the number of chan... 详细信息
来源: 评论
A Dual-Port, and Single-Element Planar Inverted-F Antenna for Current 4G/5G Portable Applications  21
A Dual-Port, and Single-Element Planar Inverted-F Antenna fo...
收藏 引用
21st International Multi-Conference on Systems, Signals and Devices, SSD 2024
作者: Alja'Afreh, Saqer S. Altakhaineh, Amjaad T. Al-Shamaileh, Mallak H. Matarneh, Aser M Daoud, Omar R. Al-Khawaldah I, Mohammad School of Engineering and Computing American International University Electrical and Computing Engineering Al-Jahra Kuwait Pioneers International Academy Data Science and Machine Learning Dept. Amman Jordan Al-Ahliyya Amman University Communications and Computer Engineering Amman Jordan
A first-hand, low-profile, two-port planar inverted-F antenna is proposed for current 4G/5G sub-3 GHz hand-portable multiple-input and multiple-output (MIMO) applications. The design features a profile of about 5 mm a... 详细信息
来源: 评论
De-pipeline a software-pipelined loop
De-pipeline a software-pipelined loop
收藏 引用
2003 IEEE International Conference on Accoustics, Speech, and Signal Processing
作者: Su, Bogong Wang, Jian Hu, Erh-Wen Manzano, Joseph Dept. of Computer Science William Paterson Univ. of New Jersey Wayne NJ 07470 United States Wireless Speech and Data Processing Nortel Networks Montreal Que. H3E 1H6 Canada
Software pipelining is a loop optimization technique that has been widely implemented in modern optimizing compilers. In order to fully utilize the instruction level parallelism of the recent VLIW DSP processors, DSP ... 详细信息
来源: 评论
Box-particle intensity filter
Box-particle intensity filter
收藏 引用
9th IET data Fusion and Target Tracking Conference: Algorithms and Applications, DF and TT 2012
作者: Schikora, M. Gning, A. Mihaylova, L. Cremers, D. Koch, W. Streit, R. Fraunhofer FKIE Dept. Sensor Data and Information Fusion Wachtberg Germany University of Lancaster School of Computing and Communications United Kingdom University College London Department of Computer Science United Kingdom Technical University of Munich Department of Computer Science Germany Metron Inc. Reston VA United States
This paper develops a novel approach for multi-target tracking, called box-particle intensity filter (box-iFilter). The approach is able to cope with unknown clutter, false alarms and estimates the unknown number of t... 详细信息
来源: 评论
Malware Detection Based on Machine Learning Methods, Analysis, and Tools
Malware Detection Based on Machine Learning Methods, Analysi...
收藏 引用
International Conference on communications and Networking, ComNet
作者: Almaha Almuqren Mounir Frikha Abdullah Albuali Mohammed Amin Almaiah dept. Department of Computer Networks and Communications King Faisal University Al Hofuf Saudi Arabia dept. Department of Computer Science King Abdullah the II IT School The University of Jordan Amman Jordan
Malware identification is essential for safeguarding digital systems from cyber attacks, and machine learning techniques are proving to be efficient in this field. This systematic literature re-view thoroughly analyze... 详细信息
来源: 评论
Loop optimization with tradeoff between cycle count and code size for DSP applications  12
Loop optimization with tradeoff between cycle count and code...
收藏 引用
12th European Signal Processing Conference, EUSIPCO 2004
作者: Su, Bogong Wang, Jian Rabipour, Rafi Hu, Erh-Wen Manzano, Joseph Dept. of Computer Science William Paterson University of New Jersey Wayne07470 United States Wireless Speech and Data Processing Nortel Networks 2351 Blvd. Alfred-Nobel St-LaurentQCH4S 2A9 Canada
Software pipelining is an effective technique to reduce cycle count by exploiting instruction level parallelism in loops. It has been implemented in most VLIW DSP compilers. However, software pipelining expands the co... 详细信息
来源: 评论
Optimum Source Resolvability Rate with Respect to f-Divergences Using the Smooth Rényi Entropy
Optimum Source Resolvability Rate with Respect to f-Divergen...
收藏 引用
IEEE International Symposium on Information Theory
作者: Ryo Nomura Hideki Yagi Center for Data Science Waseda University Tokyo Japan Dept. of Computer and Network Engineering The University of Electro-Communications Tokyo Japan
The source resolvability problem (or resolvability problem for short) is one of random number generation problems in information theory. In the literature, the optimum achievable rates in the resolvability problem hav...
来源: 评论
LIDS: Lightweight Dynamic Scheduling Technique for 6G-enabled Massive LoRa based IoT Systems
LIDS: Lightweight Dynamic Scheduling Technique for 6G-enable...
收藏 引用
IEEE Globecom Workshops
作者: Akshitha Kumbam Nikumani Choudhury Moustafa M. Nasralla Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India Dept. of Communications & Networks Engineering Prince Sultan University Riyadh Saudi Arabia
The sixth-generation (6G) wireless communication networks are envisioned to deliver improved Quality of Services (QoS) such as data-rate, latency, localization, etc., compared to 5G services. This demand will mainly a... 详细信息
来源: 评论
Interference Resolution Method for IEEE802.15.4-Based Wireless Sensor networks
Interference Resolution Method for IEEE802.15.4-Based Wirele...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Ji-Hoon Park Chan-Min Park Seungjin Lee Byung-Seo Kim ITO Business Division Nongshim Data System Seoul Korea Dept. of Computer and Information Communications Engineering Hongik University Sejongsi Korea
Because IEEE802.15.4-based wireless sensor networks (WSNs) and IEEE802.11-based wireless local area networks (WLANs) use same ISM frequency bands, they interferes each other. Based on the past researches, the interfer... 详细信息
来源: 评论