咨询与建议

限定检索结果

文献类型

  • 285 篇 会议
  • 234 篇 期刊文献

馆藏范围

  • 519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 382 篇 工学
    • 195 篇 计算机科学与技术...
    • 185 篇 信息与通信工程
    • 139 篇 软件工程
    • 77 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 41 篇 控制科学与工程
    • 37 篇 机械工程
    • 30 篇 光学工程
    • 25 篇 电气工程
    • 23 篇 动力工程及工程热...
    • 16 篇 网络空间安全
    • 13 篇 生物工程
    • 12 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 生物医学工程(可授...
  • 185 篇 理学
    • 103 篇 物理学
    • 78 篇 数学
    • 20 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 12 篇 系统科学
    • 7 篇 化学
  • 72 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 21 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 15 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 法学
  • 4 篇 农学
  • 4 篇 医学
  • 1 篇 文学

主题

  • 27 篇 quantum cryptogr...
  • 24 篇 wireless communi...
  • 22 篇 wireless sensor ...
  • 16 篇 quantum communic...
  • 12 篇 cognitive radio
  • 12 篇 network coding
  • 10 篇 quality of servi...
  • 10 篇 cloud computing
  • 10 篇 energy efficienc...
  • 9 篇 simulation
  • 9 篇 delays
  • 9 篇 optimization
  • 9 篇 mathematical mod...
  • 8 篇 routing
  • 8 篇 interference
  • 8 篇 feature extracti...
  • 8 篇 correlation
  • 7 篇 servers
  • 7 篇 security
  • 7 篇 quantum optics

机构

  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 54 篇 college of compu...
  • 44 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 42 篇 institute of qua...
  • 18 篇 national mobile ...
  • 16 篇 institute of sig...
  • 15 篇 key lab of broad...
  • 15 篇 institute of sig...
  • 13 篇 key lab of broad...
  • 10 篇 nanjing universi...
  • 10 篇 broadband wirele...
  • 10 篇 key lab of broad...
  • 10 篇 national laborat...
  • 9 篇 school of scienc...
  • 8 篇 education minist...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab. of broa...

作者

  • 29 篇 wang ruchuan
  • 29 篇 yang zhen
  • 21 篇 lei wang
  • 21 篇 qin wang
  • 18 篇 wang qin
  • 16 篇 jianxin chen
  • 15 篇 dong hu
  • 15 篇 baoyu zheng
  • 14 篇 yang geng
  • 13 篇 jingwu cui
  • 13 篇 lan zhou
  • 12 篇 kun wang
  • 12 篇 zhao shengmei
  • 12 篇 ruchuan wang
  • 12 篇 yu-bo sheng
  • 12 篇 zhixin sun
  • 11 篇 xiao fu
  • 11 篇 chun-hui zhang
  • 10 篇 wang lei
  • 10 篇 zhang dengyin

语言

  • 492 篇 英文
  • 20 篇 中文
  • 7 篇 其他
检索条件"机构=Key Lab of Broadband Wireless Communication and Sensor Network Tech"
519 条 记 录,以下是391-400 订阅
排序:
Low-cost VR system based on wireless accelerometer sensor
Low-cost VR system based on wireless accelerometer sensor
收藏 引用
6th China Conference of wireless sensor networks, CWSN 2012
作者: Jiang, Lingyun Wang, Ruchuan Qian, Wenxiang Lv, Yachao College of Computer Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China
Virtual reality(VR) games have been popular in recent years, developed in the form of the games by capturing the body's various physiological activities, including the surrounding environmental factors to achieve ... 详细信息
来源: 评论
The research of routing forwarding strategies in DTNs based on convergence point
The research of routing forwarding strategies in DTNs based ...
收藏 引用
6th China Conference of wireless sensor networks, CWSN 2012
作者: Wang, Luxuan Sun, Lijuan Xiao, Fu Ye, Xiaoguo Wang, Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China
DTN is developed as an emerging network technology which is mainly used in network with long waiting time, intermittent connectivity, and other extreme environments network. It has be favored in the military, transpor... 详细信息
来源: 评论
A robust object tracking algorithm based on SURF
A robust object tracking algorithm based on SURF
收藏 引用
International Conference on wireless communications and Signal Processing (WCSP)
作者: Dan Zhou Dong Hu Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications 210003 China
In this paper, we propose a robust object tracking algorithm based on SURF. First, we adopt a two-stage matching method to improve the accuracy of SURF matching points. Then a template update method is used to deal wi... 详细信息
来源: 评论
Server-Aided Verification Proxy Re-signature
Server-Aided Verification Proxy Re-signature
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and communications (TrustCom)
作者: Zhiwei Wang Wei Lv Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing Jiangsu Province P.R. China
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature ... 详细信息
来源: 评论
Virtual network embedding by node-splitting
Virtual network embedding by node-splitting
收藏 引用
2013 15th IEEE International Conference on communication technology
作者: Jiandong Huang Qian Wu Yu Liu Bing Wang Wennai Wang Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education College of Telecommunication & Information Engineering Nanjing University of Posts and Telecommunications
network virtualization,as a fundamental technology of Future Internet Architecture,has been used to overcome the ossification of the current *** paper focuses on virtual nodes splitting for aggregating the diverse phy... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on Security and Privacy in communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Mining Frequent Itemsets in Data Streams Based on Genetic Algorithm
Mining Frequent Itemsets in Data Streams Based on Genetic Al...
收藏 引用
2013 15th IEEE International Conference on communication technology
作者: Chong Han Lijuan Sun Jian Guo Xiaodong Chen College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education of Jiangsu Province
Stream data is a very common data type in big data and in many data streams applications,users tend to pay more attention to the mode information of the data *** mining frequent patterns in data streams is a significa... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of wireless sensor networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
Cooperative Spectrum Sensing with receiver diversity over fading reporting channels
收藏 引用
Journal of Information and Computational Science 2013年 第9期10卷 2765-2772页
作者: Yue, Wenjing Yang, Zhen Chen, Zhi Wang, Lei Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China National Mobile Communications Research Laboratory Southeast University Nanjing 210003 China
Cooperative Spectrum Sensing (CSS) is well known that, in the fading environment, it can effectively improve the spectrum sensing performance. However, a common problem in CSS requires that the communication links bet... 详细信息
来源: 评论
An improved cognitive radio spectrum sensing algorithm
收藏 引用
Telkomnika - Indonesian Journal of Electrical Engineering 2013年 第2期11卷 583-590页
作者: Zhang, Dengyin Li, Kuankuan Xiao, Li Key Lab of Broadband Wireless Communication and Sensor Network Technology China Nanjing University of Posts and Telecommunications Ministry of Education China School of Telecommunication Information Engineering China
To improve the cognitive radio user's detection performance and reduce the complexity, this paper composites the Fractal box dimension algorithm and the 3th-order cyclic-cumulate (TCC) algorithm and improves the T... 详细信息
来源: 评论