咨询与建议

限定检索结果

文献类型

  • 413 篇 会议
  • 389 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 803 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 571 篇 工学
    • 282 篇 计算机科学与技术...
    • 264 篇 信息与通信工程
    • 202 篇 软件工程
    • 125 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 45 篇 电气工程
    • 44 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 164 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 zhao shengmei

语言

  • 754 篇 英文
  • 35 篇 中文
  • 14 篇 其他
检索条件"机构=Key Lab of Broadband Wireless Communication and Sensor Network Technology"
803 条 记 录,以下是671-680 订阅
排序:
A node similarity based trust transmission method
收藏 引用
2nd World Congress on Computer Science and Information Engineering, CSIE 2011
作者: Wang, Haiyan Wang, Ying Yue, Xiwen College of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 Jiangsu China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing 210003 Jiangsu China
A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ... 详细信息
来源: 评论
A trusted network remediation scheme based on the stability of access terminals
收藏 引用
2nd World Congress on Computer Science and Information Engineering, CSIE 2011
作者: Wang, Haiyan Xu, Mingming College of Computer Nanjing University of Posts and Telecommunications 210003 Nanjing Jiangsu China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks 210003 Nanjing Jiangsu China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province 210003 Nanjing Jiangsu China
To improve the effectiveness of control and remediation of failure access terminals in trusted network, a novel remediation scheme is proposed in this paper. Based on the introduction of a definition of stability of a... 详细信息
来源: 评论
An improved multiplicative exponent weighting vertical handoff algorithm for WLAN/WCDMA heterogeneous wireless networks
收藏 引用
Engineering Sciences 2012年 第1期10卷 86-90页
作者: Liu Shengmei Pan Su Mi Zhengkun Meng Qingmin Xu Minghai Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China
An improved MEW ( muhiplicative exponent weighting) algorithm, SLE-MEW is proposed for vertical handoff decision in heterogeneous wireless networks. It introduces the SINR( signal to interference plus noise ratio)... 详细信息
来源: 评论
A new side information estimate based Distributed Video Coding algorithm for wireless multimedia sensor networks
收藏 引用
International Journal of Advancements in Computing technology 2012年 第1期4卷 320-326页
作者: Xiao, Fu Liu, Jinkai Sun, Lijuan Wang, Ruchuan Nanjing University of Posts and Telecommunications China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education China
Video compression can reduce the amount of data information for wireless multimedia sensor networks(WMSNs). Compared with the traditional video coding algorithms, big gap existed in coding performance for Distributed ... 详细信息
来源: 评论
Research on vertical handoff decision based on PROMETHEE algorithm for heterogeneous wireless networks
收藏 引用
International Journal of Advancements in Computing technology 2012年 第17期4卷 334-342页
作者: Shengmei, Liu su, Pan Zhengkun, Mi Broadband wireless communication and sensor network technology key lab. of ministry of education Nanjing University of Posts and Telecommunications Nanjing 210003 China
The PROMETHEE (Preference Ranking Organization METHod for Enrichment Evaluation) algorithm is applied in the vertical handoff decision technology for heterogeneous wireless networks and researched on its performance. ... 详细信息
来源: 评论
Optimal power allocation and relay selection for cognitive two-way AF relaying network
Optimal power allocation and relay selection for cognitive t...
收藏 引用
IET International Conference on Information Science and Control Engineering 2012 (ICISCE 2012)
作者: Ronghua Luo Zhen Yang Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications China
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In th... 详细信息
来源: 评论
A load-balanced data aggregation scheduling for duty-cycled wireless sensor networks
A load-balanced data aggregation scheduling for duty-cycled ...
收藏 引用
2012 4th IEEE International Conference on Cloud Computing technology and Science, CloudCom 2012
作者: Chen, Zhengyu Yang, Geng Chen, Lei Xu, Jian Wang, Haiyong Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts AndTelecommunications Nanjing 210046 China College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210046 China School of Information Technology Jinling Institute of Technology Nanjing 211169 China
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle wireless sensor networks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an... 详细信息
来源: 评论
A trustworthy network architecture based on strengthen TNC
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第17期6卷 343-349页
作者: Yin, Ansheng Zhang, Shunyi Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education China Institute of Information and Network Technology Nanjing University of Posts and Telecommunication China
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic proper... 详细信息
来源: 评论
A sliding fractal autoregressive integrated moving average model based on time compensation: SFARIMA
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第19期4卷 11-17页
作者: Yin, An-sheng Zhang, Shun-yi Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education China Institute of Information and Network Technology Nanjing University of Posts and Telecommunication China
The traditional Poisson model in the modern data networks have been ineffective and cannot reflect the real flow trend. However, since Hosking discovers the network traffic self-similarity, self-similar models have co... 详细信息
来源: 评论
WSSecTool: A web service security analysis tool based on program slicing
WSSecTool: A web service security analysis tool based on pro...
收藏 引用
2012 IEEE 8th World Congress on Services, SERVICES 2012
作者: Fu, Wei Zhang, Yingzhou Zhu, Xianting Qian, Junyan College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China Dept. of Computer Science and Technology Guilin Univ. of Electronic Technology Guilin 541004 China
With the development of web service, more and more attention has been drawn to web service in recent years. However, the damage caused by service security problems is becoming more and more serious nowadays. This pape... 详细信息
来源: 评论