咨询与建议

限定检索结果

文献类型

  • 419 篇 会议
  • 396 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 816 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 582 篇 工学
    • 289 篇 计算机科学与技术...
    • 270 篇 信息与通信工程
    • 207 篇 软件工程
    • 132 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 68 篇 控制科学与工程
    • 59 篇 机械工程
    • 48 篇 电气工程
    • 44 篇 光学工程
    • 38 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 303 篇 理学
    • 165 篇 物理学
    • 121 篇 数学
    • 33 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 110 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 30 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 6 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 delays
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 14 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 servers
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 30 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 29 篇 lei wang
  • 22 篇 jianxin chen
  • 22 篇 mingkai chen
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 20 篇 yang geng
  • 19 篇 baoyu zheng
  • 18 篇 jingwu cui
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 zhixin sun
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 767 篇 英文
  • 35 篇 中文
  • 14 篇 其他
检索条件"机构=Key Lab. of Broadband Wireless Communication and Sensor Network Technology"
816 条 记 录,以下是581-590 订阅
排序:
Perfect Power Visualization-Performance Optimization with Java
Perfect Power Visualization-Performance Optimization with Ja...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Chenqi Bao Alexander Flueck Jianmin Bao Xuan Shen Computer of Engineering Illinois Institute of Technology (College of IOTNanjing University of Posts and Telecommunications)Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology (College of IOT Nanjing University of Posts and Telecommunications)Ministry of Education
Visualization is critical in power systems engineering since the gigantic amount of data generated by power systems is difficult,and at times impossible,to be analyzed numerically. Therefore,the need for powerful visu... 详细信息
来源: 评论
Low-power task scheduling algorithm for large-scale cloud data centers
收藏 引用
Journal of Systems Engineering and Electronics 2013年 第5期24卷 870-878页
作者: Xiaolong Xu Jiaxing Wu Geng Yang Ruchuan Wang College of Computer Nanjing University of Posts and Telecommunications State Key Laboratory for Novel Software Technology Nanjing University Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications
How to effectively reduce the energy consumption of large-scale data centers is a key issue in cloud computing. This paper presents a novel low-power task scheduling algorithm (L3SA) for large-scale cloud data cente... 详细信息
来源: 评论
Impact of MAC frame length on energy efficiency in 6LowPAN
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第4期20卷 67-72页
作者: CHEN Shou-ning YANG Long-xiang ZHAO Yu-juan LI Jing Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Mobile Communication Company Limited Nanjing Branch
To reach necessary end-to-end connectivity between the Internet and wireless sensor networks (WSNs), the Internet Engineering Task Force (IETF) IPv6 over low power wireless personal area network (6LowPAN) workin... 详细信息
来源: 评论
Secure P2P topology based on a multidimensional DHT space mapping
收藏 引用
Science China(Information Sciences) 2013年 第5期56卷 224-237页
作者: SUN ZhiXin LUO BingQing CHEN YaDang BU Kai Key Laboratory of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications) Ministry of Education State Key Laboratory for Novel Software Technology Nanjing University
Distributed search and routing algorithms based on the DHT(distributed hash table) protocol have attracted considerable attention in structured P2P(peer-to-peer) research as a result of favorable properties such as di... 详细信息
来源: 评论
Study on Object Transaction Based on networked RFID Systems
Study on Object Transaction Based on Networked RFID Systems
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Xuan Shen Chenqi Bao Jianmin Bao Huan Wang Department of Computer and Software Nanjing University of Posts and Telecommunications Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationCollege of IOT Nanjing University of Posts and Telecommunications Department of IOT Nanjing University of Posts and Telecommunications
Radio Frequency IDentification(RFID) is a novel technology of automated *** use of RFID,however,raises great concerns due to the serious security *** this paper,we at first propose a Secure Transaction Frame(STF) and ... 详细信息
来源: 评论
Poster: Secret key generation from CFR for OFDM TDD systems over fading channels
Poster: Secret key generation from CFR for OFDM TDD systems ...
收藏 引用
International Conference on communications and networking in China (CHINACOM)
作者: Yuexing Peng George C. Alexandropoulos Peng Wang Yonghui Li Dac-Binh Ha Key Lab of Universal Wireless Communication Beijing University of Posts and Telecommunications Beijing China Broadband Wireless and Sensor Network Group Athens Information Technology Peania Greece Centre of Excellence in Telecommunications University of Sydney Sydney Australia Institute of Research and Development Duy Tan University Danang Vietnam
One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key genera... 详细信息
来源: 评论
Sparse and low-rank matrices recovery from incomplete and noisy measurement
收藏 引用
Journal of Computational Information Systems 2013年 第19期9卷 7703-7710页
作者: Yang, Zhenzhen Yang, Zhen College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 China
The problem of recovering sparse and low-rank matrices from a given matrix captures many applications. However, this recovery problem is NP-hard and thus not tractable in general. Recently, it has been shown that this... 详细信息
来源: 评论
JOINT LLR-CRC ERROR MITIGATION FOR TWO-WAY ADAPTIVE DENOISE-AND-FORWARD network CODING
收藏 引用
Journal of Electronics(China) 2013年 第4期30卷 352-361页
作者: Cheng Yulun Yang Longxiang Jiangsu Key Lab of Wireless Communications Nanjing University of Posts and Telecommunications Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications
network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemen... 详细信息
来源: 评论
Efficient electronic entanglement concentration assisted by single mobile electrons
收藏 引用
Chinese Physics B 2013年 第11期22卷 178-182页
作者: 盛宇波 周澜 Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education College of Mathematics & Physics Nanjing University of Posts and Telecommunications
We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pai... 详细信息
来源: 评论
First-order-reflection MIMO channel model for 60 GHz NLOS indoor WLAN systems
First-order-reflection MIMO channel model for 60 GHz NLOS in...
收藏 引用
International Conference on communication Systems
作者: Lei Wang Jianxin Chen Xin Wei Jingwu Cui Baoyu Zheng National Mobile Comm. Research Laboratory Southeast University Nanjing China Ministry of Education Key Lab of Broadband Wireless Comm. and Sensor Network Technology (Nanjing University of Posts & Telecomm.) Nanjing China
wireless communications employing 60 GHz millimeter wave are quite attractive recently due to the huge clean unlicensed bandwidth (up to 7 GHz) in this frequency band. In this paper, aiming at increasing channel capac... 详细信息
来源: 评论