咨询与建议

限定检索结果

文献类型

  • 286 篇 会议
  • 234 篇 期刊文献

馆藏范围

  • 520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 383 篇 工学
    • 196 篇 计算机科学与技术...
    • 185 篇 信息与通信工程
    • 140 篇 软件工程
    • 78 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 41 篇 控制科学与工程
    • 37 篇 机械工程
    • 30 篇 光学工程
    • 25 篇 电气工程
    • 23 篇 动力工程及工程热...
    • 16 篇 网络空间安全
    • 13 篇 生物工程
    • 12 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 生物医学工程(可授...
  • 185 篇 理学
    • 103 篇 物理学
    • 78 篇 数学
    • 20 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 12 篇 系统科学
    • 7 篇 化学
  • 72 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 21 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 15 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 法学
  • 4 篇 农学
  • 4 篇 医学
  • 1 篇 文学

主题

  • 27 篇 quantum cryptogr...
  • 24 篇 wireless communi...
  • 22 篇 wireless sensor ...
  • 16 篇 quantum communic...
  • 12 篇 cognitive radio
  • 12 篇 network coding
  • 10 篇 quality of servi...
  • 10 篇 cloud computing
  • 10 篇 energy efficienc...
  • 9 篇 simulation
  • 9 篇 delays
  • 9 篇 optimization
  • 9 篇 mathematical mod...
  • 8 篇 routing
  • 8 篇 interference
  • 8 篇 feature extracti...
  • 8 篇 correlation
  • 7 篇 servers
  • 7 篇 security
  • 7 篇 quantum optics

机构

  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 54 篇 college of compu...
  • 44 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 42 篇 institute of qua...
  • 18 篇 national mobile ...
  • 16 篇 institute of sig...
  • 15 篇 key lab of broad...
  • 15 篇 institute of sig...
  • 13 篇 key lab of broad...
  • 10 篇 nanjing universi...
  • 10 篇 broadband wirele...
  • 10 篇 key lab of broad...
  • 10 篇 national laborat...
  • 9 篇 school of scienc...
  • 8 篇 education minist...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab. of broa...

作者

  • 29 篇 wang ruchuan
  • 29 篇 yang zhen
  • 21 篇 lei wang
  • 21 篇 qin wang
  • 18 篇 wang qin
  • 16 篇 jianxin chen
  • 15 篇 dong hu
  • 15 篇 baoyu zheng
  • 14 篇 yang geng
  • 13 篇 jingwu cui
  • 13 篇 lan zhou
  • 12 篇 kun wang
  • 12 篇 zhao shengmei
  • 12 篇 ruchuan wang
  • 12 篇 yu-bo sheng
  • 12 篇 zhixin sun
  • 11 篇 xiao fu
  • 11 篇 chun-hui zhang
  • 10 篇 wang lei
  • 10 篇 zhang dengyin

语言

  • 492 篇 英文
  • 20 篇 中文
  • 8 篇 其他
检索条件"机构=Key Lab of Broadband Wireless Communication and Sensor Network Tech"
520 条 记 录,以下是371-380 订阅
排序:
Sparse and low-rank matrices recovery from incomplete and noisy measurement
收藏 引用
Journal of Computational Information Systems 2013年 第19期9卷 7703-7710页
作者: Yang, Zhenzhen Yang, Zhen College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 China
The problem of recovering sparse and low-rank matrices from a given matrix captures many applications. However, this recovery problem is NP-hard and thus not tractable in general. Recently, it has been shown that this... 详细信息
来源: 评论
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
收藏 引用
Journal of Electronics(China) 2013年 第2期30卷 190-197页
作者: Chen Ping Ji Yimu Wang Ruchuan Huang Haiping Zhang Dan College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-... 详细信息
来源: 评论
ENERGY-SAVING SCHEDULING FOR LTE MULTICAST SERVICES
收藏 引用
Journal of Electronics(China) 2013年 第5期30卷 423-429页
作者: Deng Keke Wang bin Guo Hui Wang Wennai College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommuni-cations Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forwa... 详细信息
来源: 评论
A NEW APPROACH TO DVC COMBINED WITH ROI EXTRACTION AND RESIDUAL VIDEO CODING FOR MULTIMEDIA sensor networkS
收藏 引用
Journal of Electronics(China) 2013年 第1期30卷 17-24页
作者: Lin Zhaoxiao Sun Lijuan Xiao Fu Wang Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Jiangsu Province
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co... 详细信息
来源: 评论
Quantum key distribution with the single-photon-added coherent source
收藏 引用
Physical Review A 2014年 第6期90卷 062315-062315页
作者: Dong Wang Mo Li Feng Zhu Zhen-Qiang Yin Wei Chen Zheng-Fu Han Guang-Can Guo Qin Wang Key Laboratory of Quantum Information University of Science and Technology of China CAS Hefei Anhui 230026 China Synergetic Innovation Center of Quantum Information & Quantum Physics University of Science and Technology of China Hefei Anhui 230026 China Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China
In this paper, we present schemes on implementing the single-photon-added coherent source in quantum key distributions. We apply this source in either the standard BB84 protocol or the recently proposed measurement-de... 详细信息
来源: 评论
An authentication and encryption scheme of network management message based on device fingerprint
收藏 引用
Information technology Journal 2013年 第6期12卷 1206-1212页
作者: Zhang, Dengyin Xu, Jinlian Cheng, Chunling Xue, Qinghan Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China College of Computer Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China
With the continuous development of the converged network, the types of equipment increase and each has different device identification. The existing SNMPv3 program by using enginelD to identify equipment's legal s... 详细信息
来源: 评论
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE communication IN wireless MULTIMEDIA sensor networkS
收藏 引用
Journal of Electronics(China) 2013年 第1期30卷 9-16页
作者: Lin Qiaomin Wang Ruchuan Ye Ning Wang Zhongqin College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Department of Information Science Nanjing College for Population Management
A secure communication mechanism is necessary in the applications of wireless Multimedia sensor networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... 详细信息
来源: 评论
Appearance model based moving object matching across disjoint camera views
收藏 引用
2nd International Conference on Opto-Electronics Engineering and Materials Research, OEMR 2013
作者: Yu, Kong Shuai Hu, Dong Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology The key lab of image processing and image communications of Jiangsu Province Nanjing University of Posts and Telecom Nanjing 210003 China
A new object tracking scheme for multi-camera surveillance with non-overlapping views is proposed in this paper. Brightness transfer function (BTF) is used to establish relative appearance correspondence between diffe... 详细信息
来源: 评论
Clustering facilitated web services discovery model based on supervised term weighting and adaptive metric learning
收藏 引用
International Journal of Web Engineering and technology 2013年 第1期8卷 58-80页
作者: Chen, Lei Yang, Geng Zhu, Wei Zhang, Yingzhou Yang, Zhen College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China
With the explosive growth of web services, the research on how to rapidly find the desired services becomes increasingly important and challenging. In this paper, we focus on non-semantic web services discovery and pr... 详细信息
来源: 评论
A trust information search model based on simulated annealing in P2P network
收藏 引用
Information technology Journal 2013年 第15期12卷 3289-3293页
作者: Xu, He Huang, Han-Chen Wang, Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu Nanjing 210003 China Jiangsu High Technology Research Key Laboratory Wireless Sensor Networks Jiangsu Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing 210003 China Department of Leisure Management Yu Da University Miaoli 36143 Taiwan
Trust information search algorithm is one of the most important components of P2P trust model. Considering the large number of nodes and the wide range of information each node contains in P2P network, efficient searc... 详细信息
来源: 评论