咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 108 篇 期刊文献

馆藏范围

  • 457 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 232 篇 工学
    • 158 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 安全科学与工程
    • 12 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 9 篇 beijing universi...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan
  • 12 篇 zuo xingquan

语言

  • 440 篇 英文
  • 9 篇 中文
  • 8 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
457 条 记 录,以下是371-380 订阅
排序:
SEMI-STRUCTURED DOCUMENT EXTRACTION BASED ON DOCUMENT ELEMENT BLOCK MODEL
SEMI-STRUCTURED DOCUMENT EXTRACTION BASED ON DOCUMENT ELEMEN...
收藏 引用
2016 4th IEEE International Conference on Cloud computing and Intelligence Systems(IEEE CCIS2016)
作者: Tao Lv Jiang Liu Fan Lu Peng Zhang Xinyan Wang Cong Wang School of Software Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Science and Technology of the People′s Republic of China Air Force General Hospital
A large number of documents related to its specific business are produced continually by enterprises and institutions in their daily work. To get useful information from these semi-structured documents we have propose... 详细信息
来源: 评论
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things
RBCP: A Reputation-based Blockchain Consensus Protocol for I...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Jiaze Shang Tianbo Lu Yingjie Cai Shuang Luo Zhaoxin Jin School of Computer Science (National Pilot Software Enginerring School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
The application of blockchain in the Internet of Things (IoT) solves the problem of centralization, enables data interaction of IoT nodes in untrusted environments. However, most of the blockchain consensus protocols ... 详细信息
来源: 评论
Integrated Beamforming and Resource Allocation in RIS-Assisted mmWave Networks based on Deep Reinforcement Learning
Integrated Beamforming and Resource Allocation in RIS-Assist...
收藏 引用
Annual IEEE Northeast Workshop on Circuits and Systems (NEWCAS)
作者: Di Chen Hui Gao Na Chen Ruohan Cao Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Graduate School of Science and Technology Nara Institute of Science and Technology Ikoma Japan
Reconfigurable intelligent surface (RIS) has gained wide attention recently as a promising solution to address the blockage issue in millimeter wave (mmWave) communication networks. In this paper, we consider a RIS-as...
来源: 评论
key Space of Cryptosystem Based on Chebyshev Polynomials over Finite Field
Key Space of Cryptosystem Based on Chebyshev Polynomials ove...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Zhihui Li Yidong Cui Yuehui Jin Huimin Xu Beijing University of Posts and Telecommunications Beijing Beijing CN Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications China School of Information and Communication Engineering Beijing University of Posts and Telecommunications China
A recently proposed public key cryptosystem based on Chebyshev polynomials suggests a new approach to data encryption. The sequence of Chebyshev polynomial is proved to be periodically, but its symmetry properties hav... 详细信息
来源: 评论
Design and implementation of network attacks detection module
Design and implementation of network attacks detection modul...
收藏 引用
Third International Conference on Cyberspace Technology (CCT 2015)
作者: Jiefu Gan Li Peng Hang Cheng Yueming Lu China Information Security Certification Center Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China 3Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China
Nowadays, network security not only is a technical issue, but also permeates our lives and work, and affects the socioeconomic and national security issues. This paper carried out in-depth research on the detection of... 详细信息
来源: 评论
Knowledge-Enabled Intent-Driven Network Configuration Generation for 5G Core Networks
Knowledge-Enabled Intent-Driven Network Configuration Genera...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Qiuying Li Jiajun Cai Ji’ang Xu Ruosi Liu Caixia Yuan Hui Gao Key Laboratory of Trustworthy Distributed Computing and Service MOE Beijing University of Posts and Telecommunications Beijing China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Huawei Technoligies Bantian Industrial Base Shenzhen China
Automating the configuration of 5G core networks (CNs) is crucial for meeting increasingly diverse and specialized application requirements. In this paper, we propose an intent-driven automation model for configuring ... 详细信息
来源: 评论
Enhancement for Versatile Video Coding in Vehicular Ad Hoc Network Scenarios
Enhancement for Versatile Video Coding in Vehicular Ad Hoc N...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Jiacheng Wu Jiaqi Zou Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications (BUPT) Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China
Vehicular Ad hoc Network (VANET) allows infor-mation exchange between vehicles. In VANET, video is the most recommended medium for transmitting information. However, the characteristics of VANET and the requirements o... 详细信息
来源: 评论
Not All Image Regions Matter: Masked Vector Quantization for Autoregressive Image Generation
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Mengqi Mao, Zhendong Wang, Quan Zhang, Yongdong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Institute of Artificial intelligence Hefei Comprehensive National Science Center Hefei China
Existing autoregressive models follow the two-stage generation paradigm that first learns a codebook in the latent space for image reconstruction and then completes the image generation autoregressively based on the l... 详细信息
来源: 评论
Generalizing knowledge graph embedding with universal orthogonal parameterization  24
Generalizing knowledge graph embedding with universal orthog...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Rui Li Chaozhuo Li Yanming Shen Zeyu Zhang Xu Chen Gaoling School of Artificial Intelligence Renmin University of China Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (MOE) Beijing University of Posts and Telecommunications China School of Computer Science and Technology Dalian University of Technology China
Recent advances in knowledge graph embedding (KGE) rely on Euclidean/hyperbolic orthogonal relation transformations to model intrinsic logical patterns and topological structures. However, existing approaches are conf...
来源: 评论
PMU-Leaker: Performance Monitor Unit-based Realization of Cache Side-Channel Attacks
PMU-Leaker: Performance Monitor Unit-based Realization of Ca...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chunlu Wang Chang Liu Rihui Sun Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education & Tsinghua University Beijing China Tsinghua University Beijing China Harbin Institute of Technology Harbin Heilongjiang China University of Maryland College Park Maryland USA
Performance Monitor Unit (PMU) is a special hardware module in processors that contains a set of counters to record various architectural and micro-architectural events. In this paper, we propose PMU-Leaker, a novel r... 详细信息
来源: 评论