咨询与建议

限定检索结果

文献类型

  • 413 篇 会议
  • 390 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 804 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 282 篇 计算机科学与技术...
    • 264 篇 信息与通信工程
    • 202 篇 软件工程
    • 125 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 46 篇 电气工程
    • 44 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 164 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 755 篇 英文
  • 35 篇 中文
  • 14 篇 其他
检索条件"机构=Key Lab of Broadband Wireless Communication and Sensor Network Technology"
804 条 记 录,以下是551-560 订阅
排序:
Lorentzian hard thresholding pursuit for compressed sensing in the presence of impulsive noise  4
Lorentzian hard thresholding pursuit for compressed sensing ...
收藏 引用
2014 4th IEEE International Conference on Information Science and technology, ICIST 2014
作者: Yun-Yun, Ji Zhen, Yang College of Communications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu Province210003 China Key Lab of 'Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing Jiangsu Province210003 China
The Lorentzian hard thresholding pursuit algorithm is proposed in this paper to achieve efficient reconstruction for compressed sensing in the presence of impulsive noise. In the Lorentzian hard thresholding pursuit a... 详细信息
来源: 评论
Poster: Secret key generation from CFR for OFDM TDD systems over fading channels  9
Poster: Secret key generation from CFR for OFDM TDD systems ...
收藏 引用
9th International Conference on communications and networking in China, CHINACOM 2014
作者: Peng, Yuexing Alexandropoulos, George C. Wang, Peng Li, Yonghui Ha, Dac-Binh Key Lab of Universal Wireless Communication Beijing University of Posts and Telecommunications Beijing China Broadband Wireless and Sensor Network Group Athens Information Technology Peania Greece Centre of Excellence in Telecommunications University of Sydney Sydney Australia Institute of Research and Development Duy Tan University Danang Viet Nam
One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key genera... 详细信息
来源: 评论
A trust computation model for node-disjoint multipath routing in multimedia sensor networks
收藏 引用
Energy Education Science and technology Part A: Energy Science and Research 2014年 第6期32卷 5735-5738页
作者: Ye, Qian Wu, Meng Wang, Yufei Nanjing University of Posts and Telecommunications College of Computer No.66 Xin Mofan Road Nanjing China Nanjing University of Posts and Telecommunications Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education College of Telecommunications and Information Engineering No.66 Xin Mofan Road Nanjing China China Electric Power Research Institute Research Institute of Information Technology and Communication No.8 Nan Rui Road Nanjing China
Security is an important factor which influences the application of the wireless multimedia sensor networks. And Multipath routing is an effective approach to transmit large multimedia dada in sensor networks. This pa... 详细信息
来源: 评论
A Coverage Control Algorithm Based on Probability Model for Three-Dimensional wireless sensor networks
A Coverage Control Algorithm Based on Probability Model for ...
收藏 引用
第11届分布式计算及其应用国际学术研讨会
作者: Junqing Zhang Ruchuan Wang Yisheng Qian Qianyi Wang College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education
The main study of traditional probability coverage problem in wireless sensor networks(WSNs) is aiming at twodimensional space, however, most practical applications of wireless sensor network is placed in a three-dime... 详细信息
来源: 评论
P2P traffic identification method based on an improvement incremental SVM learning algorithm
P2P traffic identification method based on an improvement in...
收藏 引用
International Symposium on wireless Personal Multimedia communications (WPMC)
作者: Jing Gong Wenjun Wang Pan Wang Zhixin Sun Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education (Nanjing University of Posts and Telecommunications Nanjing China
How to classify the data sets with vast information amount and large distribution fluctuation, which is always the research hotspot. This paper puts forward an improved SVM incremental learning algorithm by comparing ... 详细信息
来源: 评论
Practical quantum key distributions with single-photon-added coherent sources
Practical quantum key distributions with single-photon-added...
收藏 引用
第十六届全国量子光学学术报告会
作者: Dong Wang Zheng-Fu Han Guang-Can Guo Feng Zhu Qin Wang Key Lab of Quantum Information University of Science and Technology of ChinaCAS Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and TelecommunicationsMinistry of Education
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum ke... 详细信息
来源: 评论
Secure Efficient Routing Based on network Coding in the Delay Tolerant networks
Secure Efficient Routing Based on Network Coding in the Dela...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Jianmin Bao Shu Zhang Junjie Zhang Kun Wang Haifeng Hu Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Univ. of Posts and Telecommunications) Ministry of Education Nanjing University of Posts and Telecommunications
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance... 详细信息
来源: 评论
QoE-driven scheme for multimedia content dissemination in Device-to-Device communication
QoE-driven scheme for multimedia content dissemination in De...
收藏 引用
International wireless communications and Mobile Computing Conference, IWCMC
作者: Aiqing Zhang Liang Zhou Lei Wang Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications China National Mobile Communications Research Laboratory Southeast University
Device-to-Device (D2D) communication has been proposed to be a promising data offloading solution in the coming big data age, with multimedia dominating the digital contents. As quality of experience (QoE) is the majo... 详细信息
来源: 评论
Compressive wideband spectrum sensing in CRNS under primary user emulation attack  10
Compressive wideband spectrum sensing in CRNS under primary ...
收藏 引用
10th International Conference on wireless communications, networking and Mobile Computing, WiCOM 2014
作者: Cao, K.T. Shao, H.Q. National Mobile Communications Research Laboratory Southeast University Nanjing China Key Lab of Broadband Wireless Commun. and Sensor Network Technology of the State Education Ministry Nanjing University of Posts and Telecommunications Nanjing China College of Software Beihang University Beijing China
Spectrum sensing in a wideband regime for cognitive radio network (CRN) faces considerably technical challenge due to the constraints on ADCs, especially in the presence of primary user emulation attack (PUEA) where s... 详细信息
来源: 评论
Secure efficient routing based on network coding in the delay tolerant networks
Secure efficient routing based on network coding in the dela...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Jianmin Bao Shu Zhang Junjie Zhang Kun Wang Haifeng Hu Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Univ. of Posts and Telecommunications) Nanjing University of Posts and Telecommunications Nanjing Jiangsu Province China
The Delay/Disruption Tolerant network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmissi... 详细信息
来源: 评论