咨询与建议

限定检索结果

文献类型

  • 57 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 77 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 31 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 16 篇 信息与通信工程
    • 8 篇 电气工程
    • 5 篇 动力工程及工程热...
    • 4 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 3 篇 航空宇航科学与技...
    • 3 篇 环境科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 水利工程
    • 2 篇 轻工技术与工程
    • 2 篇 生物工程
  • 17 篇 理学
    • 10 篇 数学
    • 4 篇 生物学
    • 4 篇 系统科学
    • 3 篇 大气科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 10 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 computer archite...
  • 6 篇 web services
  • 5 篇 computer network...
  • 4 篇 laboratories
  • 4 篇 quality of servi...
  • 3 篇 computer network...
  • 3 篇 knowledge manage...
  • 3 篇 intelligent netw...
  • 3 篇 computational mo...
  • 3 篇 protocols
  • 3 篇 hardware
  • 3 篇 equations
  • 3 篇 cryptography
  • 3 篇 availability
  • 3 篇 user interfaces
  • 2 篇 internet of thin...
  • 2 篇 computer science
  • 2 篇 indexes
  • 2 篇 application soft...
  • 2 篇 throughput

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 institute of com...
  • 5 篇 nanjing universi...
  • 4 篇 state key labora...
  • 3 篇 beijing universi...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing laborato...
  • 3 篇 beijing universi...
  • 3 篇 beijing key labo...
  • 2 篇 universidad de c...
  • 2 篇 division of nava...
  • 2 篇 department of co...
  • 2 篇 v. a. trapezniko...
  • 2 篇 danang architect...
  • 2 篇 institute for sy...
  • 2 篇 state key labora...
  • 2 篇 nanjing universi...
  • 2 篇 school of scienc...
  • 2 篇 institute of com...

作者

  • 8 篇 yang yang
  • 7 篇 schill alexander
  • 6 篇 huang haiping
  • 6 篇 alexander schill
  • 5 篇 zhu jie
  • 5 篇 guo caili
  • 5 篇 springer thomas
  • 5 篇 chen mingzhe
  • 4 篇 chen chen
  • 4 篇 thomas springer
  • 3 篇 li zengzhi
  • 3 篇 hu yu-pu
  • 3 篇 zengzhi li
  • 3 篇 jie zhu
  • 3 篇 haiping huang
  • 2 篇 gerald hubsch
  • 2 篇 zhu zhiyu
  • 2 篇 yingmeng gao
  • 2 篇 zeng-zhi li
  • 2 篇 caili guo

语言

  • 70 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"机构=Institute of Computer Architecture and Networks"
77 条 记 录,以下是61-70 订阅
排序:
Optical burst and packet switching: Node and network design, contention resolution and quality of service - Results from the study in COST 266  7
Optical burst and packet switching: Node and network design,...
收藏 引用
7th International Conference on Telecommunications, ConTEL 2003
作者: Bjørnstad, Steinar Nord, Martin Hjelme, Dag.R. Stol, Norvald Callegati, Franco Cerroni, Walter Raffaelli, Carla Zaffoni, Paolo Gauger, Christoph M. Develder, Chris Cheyns, Jan Van Breusegem, Erik Baert, Elise Colle, Didier Pickavet, Mario Demeester, Piet Lacković, Marko Careglio, Davide Junyent, Gabriel Klinkowski, Miroslaw Marciniak, Marian Kowalewski, Marian Internet Network Architecture Telenor R and D Oslo Norway Department of Physical Electronics NTNU/UNIK Trondheim Norway Department of Telematics NTNU/UNIK Trondheim Norway Research Center COM DTU Lyngby Denmark DEIS University of Bologna Bologna Italy University of Stuttgart Institute of Communication Networks and Computer Engineering Stuttgart Germany Ghent University IMEC Ghent Belgium Department of Telecommunications Faculty of Electrical Engineering and Computing Unska 3 Zagreb Croatia Universitat Politècnica de Catalunya Advanced Broadband Communications Labs. CatalunyaBarcelona Spain National Institute of Telecommunications Department of Transmission and Fiber Technology Warsaw Poland
Future network should be able to efficiently serve packet-based networks, such as the Internet. In this paper, based on results from COST 266, we explore characteristics of Optical Burst switching (OBS) and Optical Pa... 详细信息
来源: 评论
Enhanced Particle Swarm Optimization for Workflow Scheduling in Clouds
Enhanced Particle Swarm Optimization for Workflow Scheduling...
收藏 引用
Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)
作者: Chang Lu Dayu Feng Jie Zhu Haiping Huang Nanjing University of Posts & Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China
As a NP-hard problem, it is always baffling to figure out a scheduling strategy to arrange the interconnected tasks of a workflow on the infinite number of resources in the cloud environment so that the workflow can b... 详细信息
来源: 评论
A Horizontal Federated Learning Approach to IoT Malware Traffic Detection: An Empirical Evaluation with N-BaIoT Dataset  26
A Horizontal Federated Learning Approach to IoT Malware Traf...
收藏 引用
26th International Conference on Advanced Communications Technology, ICACT 2024
作者: Do, Phuc Hao Le, Tran Duc Vishnevsky, Vladimir Berezkin, Aleksandr Kirichek, Ruslan The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Saint-Petersburg Russia Danang Architecture University Da Nang Viet Nam University of Telecommunications Department of Communication Networks and Data Transmission at Bonch-Bruevich Saint-Petersburg State Russia University of Science and Technology The University of Danang Da Nang Viet Nam The University of Danang University of Science and Technology Information Technology Faculty Danang Viet Nam V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences Moscow Russia Institute of Control Sciences of Russian Academy of Sciences Russia Bonch Bruevich Saint Petersburg State University of Telecommunications Department of Programming Engineering and Computer Science Russia
The increasing prevalence of botnet attacks in IoT networks has led to the development of deep learning techniques for their detection. However, conventional centralized deep learning models pose challenges in simulta... 详细信息
来源: 评论
An Interdisciplinary Approach to Designing Adaptive Lighting Environments
An Interdisciplinary Approach to Designing Adaptive Lighting...
收藏 引用
International Conference on Intelligent Environments (IE)
作者: Remco Magielse Philip Ross Sunder Rao Tanir Ozcelebi Paola Jaramillo Oliver Amft Designing Quality in Interaction (DQI) Group Department of Industrial Design Intelligent Lighting Institute (ILI) Eindhoven University of Technology Eindhoven Netherlands System Architecture and Networks (SAN) Group Department of Mathematics and Computer Science Intelligent Lighting Institute (ILI) Eindhoven University of Technology Eindhoven Netherlands Signal Processing Systems (SPS) Group Department of Electrical Engineering Intelligent Lighting Institute (ILI) Eindhoven University of Technology Eindhoven Netherlands
Due to advancements in lighting technologies new opportunities for application emerge. In this paper an interdisciplinary study towards the development of adaptive lighting environments is presented. An implementation... 详细信息
来源: 评论
Radar Probing Optimization for Joint Beamforming and UAV Trajectory Design in UAV-Enabled Integrated Sensing and Communication
收藏 引用
IEEE Transactions on Communications 2024年
作者: Liu, Yaxi Mao, Wencan He, Boxin Huangfu, Wei Huang, Tianyao Zhang, Haijun Long, Keping University Of Science And Technology Beijing Beijing Advanced Innovation Center For Materials Genome Engineering Beijing Engineering And Technology Research Center For Convergence Networks And Ubiquitous Services School Of Computer And Communication Engineering Beijing100083 China University Of Science And Technology Shunde Innovation School Beijing China National Institute Of Informatics Information Systems Architecture Science Research Division Tokyo101-8430 Japan
Unmanned aerial vehicle (UAV)-enabled massive multiple-input-multiple-output (MIMO) integrated sensing and communication (ISAC) is an emerging platform to perform communication and sensing efficiently and flexibly. Ho... 详细信息
来源: 评论
Intelligent Techniques for Prediction of Drilling Rate for Percussive Drills in Topically Weathered Limestone
Intelligent Techniques for Prediction of Drilling Rate for P...
收藏 引用
International Conference on Geotechnical challenges in Mining, Tunneling and Underground structures, ICGMTU 2021
作者: Bhatawdekar, Ramesh Murlidhar Roy, Bishwajit Changtham, Saksarid Khandelwal, Manoj Armaghani, Danial Jahed Mohamad, Edy Tonnizam Pathak, Pranjal Mondal, Subhrojit Kumar, Radhikesh Md Dan, M.F. Department of Mining Engineering Indian Institute of Technology Kharagpur721302 India Faculty of Civil Engineering University Technology Malaysia Johor UTM Skudai81310 Malaysia Department of Computer and Science Engineering Bennett University Uttar Pradesh Greater Noida201310 India Siam City Concrete Company Limited Bang Sue Bangkok10800 Thailand School of Engineering Information Technology and Physical Sciences Federation University Ballarat Australia Department of Urban Planning Engineering Networks and Systems Institute of Architecture and Construction South Ural State University 76 Lenin Prospect Chelyabinsk454080 Russia NIT Patna800005 India Faculty of Civil and Built Environment University Tun Hussein Onn Malaysia Johor Batu Pahat86400 Malaysia
Physico-mechanical properties of rocks have a direct correlation with the drilling rate of percussive drill. The prediction of drilling rate is important for the deployment of drills during the planning stage. In trop... 详细信息
来源: 评论
Visible Light Positioning Based on a Single Luminaire: A Novel Visual Odometry Assisted Algorithm
Visible Light Positioning Based on a Single Luminaire: A Nov...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zhiyu Zhu Yang Yang Mingzhe Chen Caili Guo Yipeng Bai Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA Beijing Laboratory of Advanced Information Networks School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Visible light positioning (VLP) is a promising positioning technique, which, however, typically requires multiple luminaires to achieve accurate positioning. This paper proposes a novel visual odometry (VO) assisted v...
来源: 评论
Large Scale Model Enabled Semantic Communications Based on Robust Knowledge Distillation
Large Scale Model Enabled Semantic Communications Based on R...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Kuiyuan Ding Fangfang Liu Yang Yang Mingzhe Chen Caili Guo Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering and the Institute for Data Science and Computing University of Miami Coral Gables FL USA Beijing Laboratory of Advanced Information Networks School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Large scale artificial intelligence (AI) models possess excellent capabilities in semantic representation and understanding, making them particularly well-suited for semantic encoding and decoding. However, the substa... 详细信息
来源: 评论
One pathogen does not an epidemic make: A review of interacting contagions, diseases, beliefs, and stories
arXiv
收藏 引用
arXiv 2025年
作者: Hébert-Dufresne, Laurent Ahn, Yong-Yeol Allard, Antoine Crothers, Jessica W. Dodds, Peter Sheridan Galesic, Mirta Ghanbarnejad, Fakhteh Gravel, Dominique Hammond, Ross A. Lerman, Kristina Lovato, Juniper Openshaw, John J. Redner, S. Scarpino, Samuel V. St-Onge, Guillaume Tangherlini, Timothy R. Young, Jean-Gabriel Vermont Complex Systems Institute University of Vermont BurlingtonVT United States Translational Global Infectious Disease Research Center University of Vermont BurlingtonVT United States Department of Computer Science University of Vermont BurlingtonVT United States Center for Complex Networks and Systems Research Luddy School of Informatics Computing and Engineering Indiana University BloomingtonIN United States Département de physique de génie physique et d’optique Université Laval QuébecQC Canada Department of Pathology and Laboratory Medicine Robert Larner M.D. College of Medicine University of Vermont BurlingtonVT United States Santa Fe Institute Santa FeNM United States Complexity Science Hub Vienna Austria School of Technology and Architecture SRH University of Applied Sciences Heidelberg Leipzig Germany Département de biologie Université de Sherbrooke SherbrookeQC Canada Brown School Washington University in St. Louis St. LouisMO United States The Brookings Institution WashingtonDC United States Information Sciences Institute University of Southern California United States Division of Infectious Diseases and Geographic Medicine Stanford University StanfordCA United States Institute for Experiential AI Northeastern University BostonMA United States Laboratory for the Modeling of Biological and Socio-technical Systems Northeastern University BostonMA United States The Roux Institute Northeastern University PortlandME United States Department of Scandinavian School of Information University of California Berkeley BerkeleyCA United States Department of Mathematics & Statistics University of Vermont BurlingtonVT United States
From pathogens and computer viruses to genes and memes, contagion models have found widespread utility across the natural and social sciences. Despite their success and breadth of adoption, the approach and structure ... 详细信息
来源: 评论
Attack and improve of a group signature scheme based on Chinese remainder theorem
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology 2007年 第1期29卷 182-184页
作者: Wang, Feng-He Hu, Yu-Pu Wang, Chun-Xiao Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710071 China Dept. of Mathematics Taishan Collage Taian 271000 China Dept. of Math. and Phys. Shandong Institute of Architecture and Engineering Jinan 250014 China
An attack is mounted on a group signature ncncmc bnscd on Cliincso Remainder Theory (Chen-Scheme). It shows the Chen-Scheme is insecure: A colluding subset of group members can find the private key of other members an... 详细信息
来源: 评论