咨询与建议

限定检索结果

文献类型

  • 122 篇 会议
  • 53 篇 期刊文献

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 130 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 54 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 动力工程及工程热...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 5 篇 交通运输工程
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物工程
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 土木工程
    • 3 篇 航空宇航科学与技...
  • 69 篇 理学
    • 53 篇 数学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 5 篇 生物学
  • 41 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 7 篇 wireless sensor ...
  • 7 篇 cryptography
  • 5 篇 privacy
  • 4 篇 public key crypt...
  • 4 篇 security
  • 3 篇 security of data
  • 3 篇 educational inst...
  • 3 篇 authentication
  • 3 篇 semantics
  • 3 篇 feature extracti...
  • 3 篇 network security
  • 3 篇 peer to peer net...
  • 3 篇 malware
  • 3 篇 accuracy
  • 3 篇 adaptation model...
  • 2 篇 support vector m...
  • 2 篇 outsourcing
  • 2 篇 filtering
  • 2 篇 network protocol...
  • 2 篇 boolean function...

机构

  • 15 篇 college of compu...
  • 10 篇 jiangsu high tec...
  • 8 篇 key lab. of broa...
  • 7 篇 school of cyber ...
  • 7 篇 beijing key lab....
  • 7 篇 guangxi collabor...
  • 6 篇 jiangsu high tec...
  • 6 篇 key lab. of netw...
  • 5 篇 key lab. of comp...
  • 5 篇 shanghai key lab...
  • 4 篇 ministry of edu....
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab. of broa...
  • 4 篇 key lab. of broa...
  • 4 篇 jiangsu high tec...
  • 4 篇 key lab. of comp...
  • 3 篇 department of co...
  • 3 篇 key lab. of comp...

作者

  • 11 篇 wang ruchuan
  • 9 篇 li hui
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 6 篇 chen chen
  • 6 篇 xu li
  • 5 篇 li wei
  • 4 篇 fan kai
  • 4 篇 ma wenping
  • 4 篇 ye xiaoguo
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 zhang xue-jun
  • 4 篇 yang geng
  • 4 篇 zhang min-ling
  • 3 篇 chen zhong
  • 3 篇 yang bo
  • 3 篇 zhou li-hua
  • 3 篇 weidong zhou
  • 3 篇 liu jun

语言

  • 151 篇 英文
  • 22 篇 中文
  • 2 篇 其他
检索条件"机构=GD Key Lab. of Computer Network"
175 条 记 录,以下是1-10 订阅
排序:
DRL-Based Optimization for AoI and Energy Consumption in C-V2X Enabled IoV
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2025年
作者: Zhang, Zheng Wu, Qiong Fan, Pingyi Cheng, Nan Chen, Wen Letaief, Khaled B. Jiangnan University School of Internet of Things Engineering Wuxi214122 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering State Key laboratory of Space Network and Communications Tsinghua University Beijing100084 China Xidian University State Key Lab. of ISN School of Telecom-munications Engineering Xi'an710071 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Department of Electrical and Computer Engineer-ing Hong Kong
To address communication latency issues, the Third Generation Partnership Project (3GPP) has defined Cellular-Vehicle to Everything (C-V2X) technology, which includes Vehicle-to-Vehicle (V2V) communication for direct ... 详细信息
来源: 评论
PPO-Based Vehicle Control for Ramp Merging Scheme Assisted by Enhanced C-V2X
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Qiong Ji, Maoxin Fan, Pingyi Wang, Kezhi Cheng, Nan Chen, Wen Letaief, Khaled B. The School of Internet of Things Engineering Jiangnan University Wuxi214122 China The Department of Electronic Engineering State Key laboratory of Space Network and Communications Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China The Department of Computer Science Brunel University Middlesex LondonUB8 3PH United Kingdom The State Key Lab. of ISN School of Telecommunications Engineering Xidian University Xi’an710071 China The Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China Hong Kong
On-ramp merging presents a critical challenge in autonomous driving, as vehicles from merging lanes need to dynamically adjust their positions and speeds while monitoring traffic on the main road to prevent collisions... 详细信息
来源: 评论
A genetic algorithm for multiple mobile data collectors' path planning in WSNs
A genetic algorithm for multiple mobile data collectors' pat...
收藏 引用
2012 International Conference on Information Technology and Software Engineering, ITSE 2012
作者: Shen, Zhuowei Cao, Min Key Lab. of Computer Network and Information Integration School of Computer and Engineering Southeast University Nanjing China
In mobile data collector (MDC)-based wireless sensor networks, we need to design paths for MDCs for better data collection. In this paper, we use predictable mobility pattern and apply a heuristic algorithm to design ... 详细信息
来源: 评论
The CMVAI-file: An efficient approximation-based high-dimensional index structure
The CMVAI-file: An efficient approximation-based high-dimens...
收藏 引用
International Conference on Multimedia Information networking and Security
作者: Ye, Lihong Hua, Yuan Communication and Computer Network Key Lab. of Guangdong South China University of Technology Guangzhou China
Similarity-Search based index structure is an important topic in many application areas, such as content-based multimedia information retrieval, data mining, cluster analysis, etc. In order to improve query performanc... 详细信息
来源: 评论
A link analysis for passive UHF RFID system in LOS indoor environment
A link analysis for passive UHF RFID system in LOS indoor en...
收藏 引用
2008 International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2008
作者: Hong, Gang Wang Chang, Xing Petitioner Chang, Hua Zhu Ministry of Education Key Lab. Computer Network and Information Security Xidian University Xi'an China
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an... 详细信息
来源: 评论
A query-aware location privacy protection approach in LBS for road networks
A query-aware location privacy protection approach in LBS fo...
收藏 引用
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013
作者: Li, Wei Jiang, Jiangtao Li, Yunchun Li, GuoJun School of Computer Science and Technology Key Lab. of Beijing Network Technology Beihang University Beijing China
Mobile users often request services from Location Based Service (LBS) provider when traveling along roads. In order to acquire better service, they have to provide their exact location information, which may result in... 详细信息
来源: 评论
Query-aware anonymization in location-based service
Query-aware anonymization in location-based service
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Li, Wei Li, Guangye Liu, Chunlei Key Lab. of Beijing Network Technology School of Computer Science and Technology Beihang University Beijing China
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly consider the two typical attack models: query sampling attack and query homogeneity attack. Th... 详细信息
来源: 评论
Building a resource overlay for distributed monitoring
Building a resource overlay for distributed monitoring
收藏 引用
1st International Conference on Information Science and Engineering, ICISE2009
作者: Li, Wei Fan, Ruiting Zhang, Long School of Computer Science and Technology Key Lab. of Beijing Network Technology Beihang University Beijing China
To address the problems of resource sharing and utilization in the distributed environment, the paper aims to establish a resource overlay for the distributed system monitoring. The resource overlay can construct a lo... 详细信息
来源: 评论
A multi-factor integrated fault diagnosis method for distributed applications
A multi-factor integrated fault diagnosis method for distrib...
收藏 引用
2nd International Conference on Information Science and Engineering, ICISE2010
作者: Li, Wei Li, Guangye Yin, Yin Key Lab. of Beijing Network Technology School of Computer Science and Technology Beihang University Beijing China
Fault management is a key research part in the field of distributed applications management. Fault Management based on active probing is divided into two phases: fault detection and fault diagnosis, considering probe ... 详细信息
来源: 评论
RETRACTED ARTICLE: A method to device flow hash algorithm based traffic character
RETRACTED ARTICLE: A method to device flow hash algorithm ba...
收藏 引用
2008 11th IEEE International Conference on Communication Technology, ICCT 2008
作者: Cheng, Guang Gong, Jian College of Computer Science and Engineering Southeast University Key Lab. of the Computer Network Technology Jiangsu Province Nanjing 210096 China
Flow sampling algorithms and data streaming algorithms have widely adopted the hashing algorithms to detect flow information at the high-speed links for the applications of the flow distribution, the number of flow, t... 详细信息
来源: 评论