咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是171-180 订阅
排序:
Knowledge-Enabled Intent-Driven Network Configuration Generation for 5G Core Networks  24
Knowledge-Enabled Intent-Driven Network Configuration Genera...
收藏 引用
24th IEEE International Conference on Communication Technology, ICCT 2024
作者: Li, Qiuying Cai, Jiajun Xu, Ji'ang Liu, Ruosi Yuan, Caixia Gao, Hui Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Moe Beijing China Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing China Bantian Industrial Base Huawei Technoligies Shenzhen China
Automating the configuration of 5G core networks (CNs) is crucial for meeting increasingly diverse and specialized application requirements. In this paper, we propose an intent-driven automation model for configuring ... 详细信息
来源: 评论
Experimental Demonstration of 2D-Trellis Coded Modulation PAM8 for 50G PON Based on 10G-class O-Band DML  27
Experimental Demonstration of 2D-Trellis Coded Modulation PA...
收藏 引用
27th OptoElectronics and Communications Conference/International Conference on Photonics in Switching and computing, OECC/PSC 2022
作者: Cui, Han Liu, Shuangyue Lu, Yueming Qiao, Yaojun School of Information and Communication Engineering State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China School of Cyberspace Security Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing100876 China
We present the first experimental demonstration of using 2D-TCM-PAM8 for a 50Gb/s PON system based on 10G-class O-band DML. Compared to PAM6, the receiver sensitivity of 2D-TCM-PAM8 is improved by 1.1 dB over 20-km tr... 详细信息
来源: 评论
Chinese open relation extraction with pointer-generator networks  5
Chinese open relation extraction with pointer-generator netw...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Cheng, Ziheng Wu, Xu Xie, Xiaqing Wu, Jingchen Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to b... 详细信息
来源: 评论
Robust Text Clustering with Graph and Textual Adversarial Learning
Robust Text Clustering with Graph and Textual Adversarial Le...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yongming Liang Tian Tian Kaifu Jin Xiaoyu Yang Yuefei Lv Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ...
来源: 评论
Cross-Lingual Propaganda Detection
Cross-Lingual Propaganda Detection
收藏 引用
IEEE International Conference on Big Data
作者: Wenshan Zhang Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Propaganda information that aims at influencing people’s opinions is becoming more and more common around people, especially through social media. For the detection of propaganda content, researchers have conducted s... 详细信息
来源: 评论
Communication Encryption Scheme of 5G Power Trading Private Network Based on Dynamic key  2
Communication Encryption Scheme of 5G Power Trading Private ...
收藏 引用
2nd Asia Conference on Electrical, Power and Computer Engineering, EPCE 2023
作者: Zhou, Rui Song, Yiyang Xu, Ying Harbin Institute of Technology Electrical Engineering and Automation School Harbin China Guangdong Power Exchange Center Information Data Department Guangzhou China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Security has been the primary concern for the 5G power trading private network, which involves a large amount of power trading information. The communication must be encrypted to prevent the leakage of important infor... 详细信息
来源: 评论
Blockchain Storage Method Based on Erasure Code  8
Blockchain Storage Method Based on Erasure Code
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Meng, Fanyao Li, Jin Gao, Jiaqi Liu, Junjie Ru, Junpeng Lu, Yueming School of Cyberspace Security Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications The State Key Laboratory of Information Photonics and Optical Communications Beijing China
Blockchain, as an emerging distributed database, effectively addresses the issue of centralized storage in IoT data, where storage capacity cannot match the explosive growth in devices and data scale, as well as the c... 详细信息
来源: 评论
CoStock: A DeepFM Model for Stock Market Prediction with Attentional Embeddings
CoStock: A DeepFM Model for Stock Market Prediction with Att...
收藏 引用
IEEE International Conference on Big Data
作者: Jieyun Huang Xi Zhang Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Forecasting the stock market trend is a vital component of financial systems. Traditional methods mainly rely on quantitative trading data to make predictions. With the increasing volume of Web information, researcher... 详细信息
来源: 评论
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis
Modification Method for Internal Network Flow Anomaly Detect...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xinyu Zhang Junmei Ding Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a... 详细信息
来源: 评论
Mining the relation between dorm arrangement and student performance
Mining the relation between dorm arrangement and student per...
收藏 引用
IEEE International Conference on Big Data
作者: Man Li Ruisheng Shi Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts & Telecommunications Beijing China
This paper discusses the relation between dorm arrangement and student performance. One of the unsupervised learning algorithms, k-means algorithm, is mainly used in the process of analysis. Students are clustered int... 详细信息
来源: 评论