咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是21-30 订阅
排序:
Decision-feedback multiple symbol detection for differential space-time block coded UWB systems
收藏 引用
Science China(Information Sciences) 2013年 第4期56卷 50-59页
作者: LV TieJun WANG TaoTao GAO Hui Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications Department of Information Engineering The Chinese University of Hong Kong
The symbol-by-symbol differential detection scheme,originally employed to detect differential spacetime block coded(DSTBC) ultra-wideband(UWB) signal in previous work,su?ers from a performance degradation compared wit... 详细信息
来源: 评论
Security model and key technologies for the Internet of things
收藏 引用
Journal of China Universities of Posts and Telecommunications 2011年 第SUPPL.2期18卷 109-112页
作者: Yang, Jin-Cui Fang, Bin-Xing Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China
This paper indicated the differences between Internet of things (IoT) and traditional information system by analyzing the linkage between communication, control, and computation, explained the necessary to put certain... 详细信息
来源: 评论
A multi-objective emergency resource scheduling method based on MOEA/D  2
A multi-objective emergency resource scheduling method based...
收藏 引用
2nd International Conference on Algorithms, computing and Artificial Intelligence, ACAI 2019
作者: Li, Yanrong Li, Xiaoyong Hou, Liyang Kong, Wenping Ma, Wenxue Key Laboratory of Trustworthy Distributed Computing and Servic Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Integrated Command and Dispatch Technology Beijing China
After unconventional events occur, rapid emergency response is often needed in order to reduce losses. When there are more than one disaster points and more than one supply points, how to coordinate the local dispatch... 详细信息
来源: 评论
Incomplete fingerprint recognition based on feature fusion and pattern entropy
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第3期20卷 121-128页
作者: ZHANG Jie JING Xiao-jun CHEN Na WANG Jian-li School of Information and Communication Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications
Considering the inherent characteristics of incomplete fingerprint: local feature loss and global information distortion, the recognition progress has been mainly restricted by two critical problems: how to precisel... 详细信息
来源: 评论
The Application of Robot Localization and Navigation Based on WSN in the Disaster Relief
The Application of Robot Localization and Navigation Based o...
收藏 引用
International Conference on trustworthy computing and services, ISCTCS 2012
作者: Cui, Xiaoyan Chen, Xiaoshuang Shi, Wei Zhang, Yi Key Laboratory of Trustworthy Distributed Computing and Service Automation School BUPT China
Disasters always disturb our normal life, and the loss is immeasurable. In this paper, we intend to find a new way to reduce the harm. We select the wireless sensor network to control the robot localization and naviga... 详细信息
来源: 评论
A Fusion Scheme of Region of Interest Extraction in Incomplete Fingerprint
收藏 引用
电子学报(英文版) 2012年 第4期21卷 663-666页
作者: JING Xiaojun ZHANG Bo ZHANG Jie ZHONG Mingliang School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
A fusion scheme is proposed for incomplete fingerprint to extract the Region of interest (ROI) centered at the reference point. Firstly, the orientation entropy is computed. Secondly, it is necessary for ROI extractio... 详细信息
来源: 评论
A User-Centric Approach to Activity Recognition and Guidance in Semantic Smart Home
收藏 引用
China Communications 2015年 第S2期12卷 103-113页
作者: LI Haitao GUO Kun LU Yueming LI Yonghua South China University of Technology Guangdong Power Grid Co. Ltd Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
Wireless smart home system is to facilitate people's lives and it trend to adopt a more intelligent way to provide services. It is very desirable in the recent SH market for the system to recognize users' beha... 详细信息
来源: 评论
Cooperative Spectrum Sensing Based on Centralized Double Threshold in MCN
收藏 引用
China Communications 2020年 第5期17卷 235-242页
作者: Hai Huang Junsheng Mu Xiaojun Jing School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing 100876China
Cooperative spectrum sensing appears popular currently due to its ability to solve the issue of hidden terminal and improve detection performance in Cognitive Radio Networks. Meanwhile, double threshold based energy d... 详细信息
来源: 评论
A deepfake video detection method based on multi-modal deep learning method  2
A deepfake video detection method based on multi-modal deep ...
收藏 引用
2nd International Conference on Electronics, Communications and Information Technology, CECIT 2021
作者: Zhang, Yutong Li, Xiaoyong Yuan, Jie Gao, Yali Li, Linghui Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Recently, most deepfake video classification tasks depend on frame-level features and try to train deep neural networks to characterize fake videos. Although this kind of methods can achieve good results, they also wa... 详细信息
来源: 评论
An IoT Device Recognition Method based on Convolutional Neural Network  3
An IoT Device Recognition Method based on Convolutional Neur...
收藏 引用
3rd International Conference on Neural Networks, Information and Communication Engineering, NNICE 2023
作者: Lu, Minghao Gao, Yali Li, Linghui Li, Xiaoyong Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Device recognition is the primary step toward a secure IoT system. However, the existing equipment recognition technology often faces the problems of unobvious data characteristics and insufficient training samples, r... 详细信息
来源: 评论