咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是131-140 订阅
排序:
Multilayer Feed-forward Neural Network learning based Dynamic Chinese restaurant model for dynamic spectrum access in cognitive radio networks
Multilayer Feed-forward Neural Network learning based Dynami...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Jianlan Liu Xiao jun Jing Songlin Sun Xiaohan Wang Dongmei Cheng Hai Huang Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications Beijing Beijing CN
As an effective approach to improve spectrum efficiency, cognitive radio network make it possible for secondary users (SU) to share the spectrum with primary users (PU), on the condition that the primary users have pr... 详细信息
来源: 评论
A novel scheme for downlink opportunistic interference alignment
A novel scheme for downlink opportunistic interference align...
收藏 引用
International Conference on Telecommunications (ICT)
作者: Haijing Liu Hui Gao Wei Long Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
In this paper we propose a downlink codebook-based opportunistic interference alignment (OIA) in a three-cell MIMO system. A codebook composed of multiple transmit vector sets is utilized to improve the multiuser sele... 详细信息
来源: 评论
An Improved Multi-objective Evolutionary Algorithm Based on Gaussian Distribution Estimation
An Improved Multi-objective Evolutionary Algorithm Based on ...
收藏 引用
作者: Li-yang HOU Xiao-yong LI Yan-rong LI Wen-ping KONG Hai-feng CHANG Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications
When an emergency occurs, how to specify a reasonable resource scheduling scheme significantly affects disaster relief efficiency. However, most actual existing schemes lack considering satisfaction of potential disas... 详细信息
来源: 评论
Joint source-relay selection and transmission mode selection in two-way relay networks
Joint source-relay selection and transmission mode selection...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Gaoli Bi Hui Gao Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
A joint source-relay selection and transmission mode selection scheme is proposed for two-way relay networks. The proposed scheme adaptively switches from one-way and two-way transmission mode according to the channel... 详细信息
来源: 评论
Secure beamforming and artificial noise design in interference networks with imperfect ECSI
Secure beamforming and artificial noise design in interferen...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Jian Zhou Ruohan Cao Hui Gao Cong Zhang Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
This paper investigates the joint robust beamforming and artificial noise design in two-user interference networks, where one of the two pairs is wiretapped by an external eavesdropper, and only imperfect eavesdropper... 详细信息
来源: 评论
A Neural Network and Bloom Filter-Based Name Search Method in Named Data Networking
A Neural Network and Bloom Filter-Based Name Search Method i...
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Yue Liu Xiaoyong Li Xiaotian Si Mengyang Zhang Kaiguo Yuan Pengcheng Li Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
In a new network architecture like NDN, designing an efficient name lookup method has always been a valuable challenge. The paper studies the name lookup technology based on the Bloom filter and BPNN neural network ma...
来源: 评论
An Intrusion Detection Method Based on Transformer-LSTM Model
An Intrusion Detection Method Based on Transformer-LSTM Mode...
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Zhipeng Zhang Xiaotian Si Linghui Li Yali Gao Xiaoyong Li Jie Yuan Guoqiang Xing Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
With the development of network technologies, network intrusion has become increasing complex which makes the intrusion detection challenging. Traditional intrusion detection algorithms detect intrusion traffic throug... 详细信息
来源: 评论
A multiobjective genetic algorithm based dynamic bus vehicle scheduling approach  1
收藏 引用
13th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2018
作者: Shi, Hongyi Wang, Chunlu Zuo, Xingquan Zhao, Xinchao School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Science Beijing University of Posts and Telecommunications Beijing China
Bus vehicle scheduling is very vital for bus companies to reduce operation cost and guarantee quality of service. Urban roads are easily blocked due to bad weather, such that it is significant to study the bus vehicle... 详细信息
来源: 评论
Joint Cache Placement and Beamforming Design for Scalable Videos in C-RAN
Joint Cache Placement and Beamforming Design for Scalable Vi...
收藏 引用
International Symposium on Wireless Communication Systems (ISWCS)
作者: Mingfeng Ma Tiejun Lv Xuewei Zhang Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
This paper investigates the joint optimization of layered caching and beamforming design for scalable videos delivered by Dynamic Adaptive Streaming over HTTP in the multicell cloud radio access network. To transmit d... 详细信息
来源: 评论
A cognitive radio relay selection scheme in two-tier femtocell networks
A cognitive radio relay selection scheme in two-tier femtoce...
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Xiaolong Zhao Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
The effective cross-tier interference (CTI) mitigation is a key technique for the macrocell and femtocell two-tier heterogeneous networks. In this paper, a cognitive radio relay selection (CRRS) scheme is proposed to ... 详细信息
来源: 评论