咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 444 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是401-410 订阅
排序:
Epdemic spreading model based overlapping community detection
Epdemic spreading model based overlapping community detectio...
收藏 引用
International Conference on Advances in Social Network Analysis and Mining, ASONAM
作者: Ying Wen Yuanhao Chen Xiaolong Deng International School Beijing University of Posts and Telecommunications China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
Community detection in inhomogeneous structured network is an attractive research problem that searches for methods to discover groups in which individuals are more densely interconnected with each other with higher p... 详细信息
来源: 评论
Achievable sum rate analysis of ZF receivers in 3D MIMO with Rayleigh/log-normal fading channels
Achievable sum rate analysis of ZF receivers in 3D MIMO with...
收藏 引用
IEEE Globecom Workshops
作者: Fangqing Tan Hui Gao Tiejun Lv Jie Zeng Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
Three dimensions multiple-input multiple-output (3D MIMO) system is now gaining a growing interest among researchers in wireless communication, the reason can be attributed to its potential to enable a variety of stra... 详细信息
来源: 评论
A method based on MD5 and time for preventing deception in electronic commerce
A method based on MD5 and time for preventing deception in e...
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Zhenggang Hu Yueming Lu School of Information and Communication Engineering Beijing University of Posts and Telecommunications China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
Aiming at reducing the risk of data being intercepted and preventing deceptions in the electronic commerce, this paper proposes a method based on MD5 and time which can effectively prevent the deception in data transm... 详细信息
来源: 评论
Detecting the run time attacks in the cloud with an evidence collection based approach
Detecting the run time attacks in the cloud with an evidence...
收藏 引用
IEEE International Conference on Cloud computing and Intelligence Systems (CCIS)
作者: Jie Lin Chuanyi Liu Zhichun Ning Binxing Fang School of Computer Science Beijing University of Posts and Telecommunications Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China
As the impacts of security threats are amplified and spread quickly in the cloud, especially with the attribute of large-scale virtualization. Most of researches focus on monitoring the network traffic. However, these... 详细信息
来源: 评论
Low-Complexity User Scheduling in the Downlink Massive MU-MIMO System with Linear Precoding
Low-Complexity User Scheduling in the Downlink Massive MU-MI...
收藏 引用
IEEE/CIC International Conference on Communications in China
作者: Ou Bai Hui Gao Tiejun Lv Chau Yuen Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Singapore University of Technology and Design
In this paper, we investigate low-complexity user scheduling schemes for the downlink (DL) massive multiuser multiple-input multiple-output (MU-MIMO) system, where an M-antenna (M is very large) base station (BS) serv... 详细信息
来源: 评论
Multi-features based classification for automatic summarization
Multi-features based classification for automatic summarizat...
收藏 引用
International Conference on Multimedia, Communication and computing Application(MCCA 2014)
作者: H.Y.Li R.F.Liu W.R.Xu R.S.Shi School of Information and Communication Engineering Beijing University of Posts and Telecommunication Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service BUPT School of HumanitiesBUPT
That the summary of an article can be automatically generated is an important text processing *** technique can automatically extract the most useful information of the text and present that information,which makes it... 详细信息
来源: 评论
Bit allocation for quality scalability coding of H.264/SVC
Bit allocation for quality scalability coding of H.264/SVC
收藏 引用
IEEE Conference on Advanced Video and Signal Based Surveillance (AVSS)
作者: Wang Bo Li Teng Songlin Sun Xiaojun Jing Hai Huang School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
An efficient model-based bit allocation algorithm, in this paper, is proposed for quality scalability coding of H.264/scalable video coding (SVC). The conventional Rate-Distortion models are not available for quality ... 详细信息
来源: 评论
Beamforming for Secure Two-Way Relay Networks with Physical Layer Network Coding
Beamforming for Secure Two-Way Relay Networks with Physical ...
收藏 引用
IEEE Global Communications Conference
作者: Cong Zhang Hui Gao Tiejun Lv Yueming Lu Xin Su Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Tsinghua National Laboratory for Information Science and Technology Tsinghua University
We investigate the secrecy beamforming in two-way relay channels (TWRC) with physical layer network coding (PNC). The multi-antenna relay broadcasts the superimposed signal of two user messages with secrecy beamformin... 详细信息
来源: 评论
Sybil detection and analysis of micro-blog Sina
Sybil detection and analysis of micro-blog Sina
收藏 引用
2014 International Conference on Informatics, Networking and Intelligent computing(INIC 2014)
作者: R.F.Liu Y.J.Zhao R.S.Shi School of Information and Communication Engineering Beijing University of Posts and Telecommunication Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service School of HumanitiesBeijing University of Posts and Telecommunication
There are some Sybil accounts on Sina *** this paper,we comprehensively analyse their features,and the reasons for their *** believe there are three levels of Sybil accounts,original Sybil,improved Sybil,and advanced ... 详细信息
来源: 评论
Decision-feedback multiple symbol detection for differential space-time block coded UWB systems
收藏 引用
Science China(Information Sciences) 2013年 第4期56卷 50-59页
作者: LV TieJun WANG TaoTao GAO Hui Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications Department of Information Engineering The Chinese University of Hong Kong
The symbol-by-symbol differential detection scheme,originally employed to detect differential spacetime block coded(DSTBC) ultra-wideband(UWB) signal in previous work,su?ers from a performance degradation compared wit... 详细信息
来源: 评论