咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是91-100 订阅
排序:
Automatic detection of breast nodule in the ultrasound images using CNN
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第2期26卷 9-16页
作者: Pang Hao Bu Yunyun Wang Cong Xiao Hui School of Software Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of EducationBeijing 100876China Department of Ultrasound Beijing Friendship HospitalCapital Medical University China Electronic Data Service Company Limited
Breast cancer is the most common cancer among women *** is widely used as a harmless test for early breast cancer *** ultrasound network(USNet) model is *** is an improved object detection model specifically for breas... 详细信息
来源: 评论
A recommend system for modelling large-scale advertising
A recommend system for modelling large-scale advertising
收藏 引用
International Conference on Cyberspace Technology, CCT 2014
作者: Ma, Jing Lu, Yueming School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing China
In a large-scale network environment, the Internet has produced an amount of digital information such as social media, e-commercial comments, online shopping records and advertising click logs. So, recommend systems n... 详细信息
来源: 评论
Chinese Open Relation Extraction with Pointer-Generator Networks
Chinese Open Relation Extraction with Pointer-Generator Netw...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Ziheng Cheng Xu Wu Xiaqing Xie Jingchen Wu Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to b...
来源: 评论
Real-time Event Detection and Tracking in Microblog via Text Chain and Sentiment time series
Real-time Event Detection and Tracking in Microblog via Text...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Bingxu Piao Xu Wu Jingchen Wu Xiaqing Xie Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education
Microblog becomes one of the most popular media for sharing first-hand information. As more close to real event, detecting and tracking event in microblogs is a research hotspot. To alleviate feature sparsity problem,...
来源: 评论
A tensor-based sub-mode coordinate algorithm for stock prediction  3
A tensor-based sub-mode coordinate algorithm for stock predi...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Huang, Jieyun Zhang, Yunjia Zhang, Jialai Zhang, Xi Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Electronic Information Sichuan University Chengdu China
The investment on the stock market is prone to be affected by the Internet. For the purpose of improving the prediction accuracy, we propose a multi-task stock prediction model that not only considers the stock correl... 详细信息
来源: 评论
A method based on MD5 and time for preventing deception in electronic commerce
A method based on MD5 and time for preventing deception in e...
收藏 引用
International Conference on Cyberspace Technology, CCT 2014
作者: Hu, Zhenggang Lu, Yueming School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing China
Aiming at reducing the risk of data being intercepted and preventing deceptions in the electronic commerce, this paper proposes a method based on MD5 and time which can effectively prevent the deception in data transm... 详细信息
来源: 评论
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
收藏 引用
Computers, Materials & Continua 2021年 第8期68卷 2579-2595页
作者: Jinxin Zuo Yueming Lu Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing100876China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing100876China University of Bedfordshire Institute for Research in Applicable Computing(IRAC)LutonUK
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... 详细信息
来源: 评论
Multiple Vandermonde Decomposition Based Channel Estimation for Mm Wave MIMO High-Mobility Communication in 5G and Beyond
收藏 引用
China Communications 2023年 第4期20卷 12-25页
作者: Zhao Yi Xiaojun Jing School of Electronics and Information Hunan First Normal UniversityChangsha 410205China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China
Millimeter wave(mmWave)massive massive multiple input multiple output(MIMO)technique has been regarded as the viable solution for vehicular communications in 5G and *** achieve the substantial increase in date rates,i... 详细信息
来源: 评论
Human motion recognition by three-view kinect sensors in virtual basketball training
Human motion recognition by three-view kinect sensors in vir...
收藏 引用
2020 IEEE Region 10 Conference, TENCON 2020
作者: Yao, Baoqi Gao, Hui Su, Xin Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service China Tsinghua University Beijing National Research Center for Information Science and Technology Beijing China
In recent years, human action recognition has received a considerable amount of research attention because of it's potential in a variety of applications, such as video surveillance, human-computer interaction, an... 详细信息
来源: 评论
Neural Network Based Target User Recognition Model for Network Community  6
Neural Network Based Target User Recognition Model for Netwo...
收藏 引用
6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2018
作者: Wu, Xu Dai, Yulun Xie, Xiaqing Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security BUPT China Beijing University of Posts and Telecommunications Library Beijing100876 China
For multi-dimensional feature of user data in network community, available methods mainly use Rank scoring algorithm or user classification algorithm for target user recognition. However, Rank method has a low perform... 详细信息
来源: 评论