咨询与建议

限定检索结果

文献类型

  • 418 篇 会议
  • 391 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 577 篇 工学
    • 288 篇 计算机科学与技术...
    • 268 篇 信息与通信工程
    • 206 篇 软件工程
    • 131 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 68 篇 控制科学与工程
    • 58 篇 机械工程
    • 48 篇 电气工程
    • 42 篇 光学工程
    • 38 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 301 篇 理学
    • 163 篇 物理学
    • 121 篇 数学
    • 33 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 110 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 30 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 6 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 31 篇 wireless sensor ...
  • 31 篇 quantum cryptogr...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 delays
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 14 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 servers
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 institute of qua...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 31 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 30 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 15 篇 key lab of broad...
  • 14 篇 national laborat...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...
  • 13 篇 college of mathe...

作者

  • 37 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 29 篇 lei wang
  • 22 篇 jianxin chen
  • 22 篇 mingkai chen
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 20 篇 yang geng
  • 19 篇 baoyu zheng
  • 19 篇 周澜
  • 18 篇 jingwu cui
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 赵生妹
  • 17 篇 盛宇波
  • 17 篇 chun-hui zhang
  • 17 篇 sun zhixin
  • 17 篇 zhixin sun

语言

  • 765 篇 英文
  • 35 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Broadband Wireless Communication and Sensor Network Technology"
810 条 记 录,以下是391-400 订阅
排序:
An improved apriori algorithm with prejudging and screening
An improved apriori algorithm with prejudging and screening
收藏 引用
International Conference on Computer, communication and Computational Sciences, ICCCCS 2016
作者: Zhao, Xuejian Li, Dongjun Yuan, Yuan Sun, Zhixin Chen, Yong Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Posts & Telecommunications Planning and Designing Institute Co. LTD Nanjing China Nanjing Longyuan Microelectronic Co. LTD Nanjing China
Association rule analysis, as one of the significant means of data mining, plays an important role in discovering the implicit knowledge in massive transaction data. Aiming at the inherent defects of the classic Aprio... 详细信息
来源: 评论
Server-Aided Verification Proxy Re-signature
Server-Aided Verification Proxy Re-signature
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and communications (TrustCom)
作者: Zhiwei Wang Wei Lv Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing Jiangsu Province P.R. China
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature ... 详细信息
来源: 评论
Influence of oceanic turbulence on propagation of Airy vortex beam carrying orbital angular momentum
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Xinguang Yang, Zhen Zhao, Shengmei Nanjing210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education NUPT Nanjing210003 China
With Rytov approximation theory, we derive the analytic expression of de- tection probability of Airy vortex beam carrying orbital angular momentum (OAM) through an anisotropic weak oceanic turbulence. We investigate ... 详细信息
来源: 评论
Deep Learning Empowered Real-Time Haptic communications for IoT
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zhang, Xuguang Chen, Mingkai Nanjing University of Posts and Telecommunications School of Communications and Information Engineering Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing210003 China
The advancement of the Internet of Things (IoT) has enabled a variety of innovative consumer electronics applications. In particular, multi-modal applications integrating audio, video, and haptic interactions have eme... 详细信息
来源: 评论
The Proof is in the Pudding: Decision-Oriented Machine-Type wireless Video Transmission
The Proof is in the Pudding: Decision-Oriented Machine-Type ...
收藏 引用
2024 IEEE Global communications Conference, GLOBECOM 2024
作者: Song, Jie Gao, Yun Wu, Dan Zhou, Liang Qian, Yi Nanjing University of Posts and Telecommunications Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China Army Engineering University of Pla Institute of Communications Engineering Nanjing China University of Nebraska-Lincoln Department of Electrical and Computer Engineering Lincoln United States
With the rise of the Internet of Everything, machine-type wireless video applications like intelligent surveillance are increasingly becoming mainstream network services. However, the massive transmission of video str... 详细信息
来源: 评论
Service Migration Algorithm Based on Markov Decision Process with Multiple QoS Attributes
Research Square
收藏 引用
Research Square 2021年
作者: Ma, Anhua Pan, Su Tao, Shuai Zhou, Weiwei Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China
With the rapid development of mobile internet cloud computing, the traditional network structure becomes non-suitable for advanced network traffic requirements. A service migration decision algorithm is proposed in th... 详细信息
来源: 评论
Interference suppression algorithms for D2D communication underlaying cellular networks
收藏 引用
Journal of Computational Information Systems 2015年 第18期11卷 6705-6717页
作者: Huan, Cheng Liu, Chen Fu, Youhua The Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China
In this paper, we investigate the interference scenario where Device-to-Device (D2D) users and the cellular user share the same spectrum resource, and propose two novel interference suppression algorithms for D2D comm... 详细信息
来源: 评论
Decentralized Waveform Design for MIMO Cognitive Radio under Interference Temperature Constraint
Decentralized Waveform Design for MIMO Cognitive Radio under...
收藏 引用
International Conference on networking and Distributed Computing (ICNDC)
作者: Fei Wei Pengrui Xia Zhen Yang Feng Tian Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing Jiangsu China
This paper addresses the information rate maximization problem under interference temperature constraint for a multiple-in multiple-out cognitive radio (MIMO-CR) network in which each CR user is equipped with multiple... 详细信息
来源: 评论
Mining Frequent Itemsets in Data Streams Based on Genetic Algorithm
Mining Frequent Itemsets in Data Streams Based on Genetic Al...
收藏 引用
2013 15th IEEE International Conference on communication technology
作者: Chong Han Lijuan Sun Jian Guo Xiaodong Chen College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education of Jiangsu Province
Stream data is a very common data type in big data and in many data streams applications,users tend to pay more attention to the mode information of the data *** mining frequent patterns in data streams is a significa... 详细信息
来源: 评论
Sparse and low-rank matrices recovery from incomplete and noisy measurement
收藏 引用
Journal of Computational Information Systems 2013年 第19期9卷 7703-7710页
作者: Yang, Zhenzhen Yang, Zhen College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 China
The problem of recovering sparse and low-rank matrices from a given matrix captures many applications. However, this recovery problem is NP-hard and thus not tractable in general. Recently, it has been shown that this... 详细信息
来源: 评论