咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是431-440 订阅
排序:
A New Semantic Segmentation Diagram for Intelligent Transportation Based on Heterogeneous Knowledge Base
A New Semantic Segmentation Diagram for Intelligent Transpor...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Jingyuan Tang Jiaqi Zou Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China Department of Electronics and Electrical Engineering University College London London UK
Semantic segmentation is regarded as an important technology for future communication and sensing networks due to its promising ability to extract features of transmit data. It integrates the functionality of computer... 详细信息
来源: 评论
Enhancing stock market prediction with extended coupled Hidden Markov Model over multi-sourced data
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Xi Li, Yixuan Wang, Senzhang Fang, Binxing Yu, Philip S. Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong Institute of Electronic and Information Engineering UESTC Guangdong China Department of Computer Science University of Illinois ChicagoIL United States Institute for Data Science Tsinghua University Beijing China
Traditional stock market prediction methods commonly only utilize the historical trading data, ignoring the fact that stock market uctuations can be impacted by various other information sources such as stock related ... 详细信息
来源: 评论
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Sy...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Panyu Wu Zhenfu Cao Jiachen Shen Xiaolei Dong Yihao Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan
Since data outsourcing poses privacy concerns with data leakage, searchable symmetric encryption (SSE) has emerged as a powerful solution that enables clients to perform query operations on encrypted data while preser...
来源: 评论
RESTful web service composition: Extracting a process model from Linear Logic theorem proving
RESTful web service composition: Extracting a process model ...
收藏 引用
International Conference on Next Generation Web services Practices (NWeSP)
作者: Xia Zhao Enjie Liu Gordon J. Clapworthy Na Ye Yueming Lu Department of Computer Science and Technology University of Bedfordshire Luton UK School of Electronic and Information Engineering Xi'an Jiaotong University Xian China School of Information and Control Engineering Xi'an University of architecture and technology Xian China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
This paper introduces a two-stage Linear Logic based program synthesis approach to automatic RESTful web service composition. The Linear Logic theorem proof is applied at both resource and service invocation method le... 详细信息
来源: 评论
PA-GAN: Graph Attention Network for Preference-Aware Social Recommendation
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1848卷
作者: Liyang Hou Wenping Kong Yali Gao Yang Chen Xiaoyong Li Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China
Social recommendation has been recently proposed by incorporating trust relationship to alleviate data-sparsity and cold-start problems. However, most of existing works only focus on friends different contribution to ...
来源: 评论
Joint resource management for MC-NOMA: A deep reinforcement learning approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Shaoyang Lv, Tiejun Ni, Wei Beaulieu, Norman C. Guo, Y. Jay Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Sydney2122 Australia Beijing Key Laboratory for Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Global Big Data Technologies Centre University of Technology Sydney UltimoNSW2007 Australia
This paper presents a novel and effective deep reinforcement learning (DRL)-based approach to addressing joint resource management (JRM) in a practical multi-carrier non-orthogonal multiple access (MC-NOMA) system, wh... 详细信息
来源: 评论
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications
X-Prcaf : Xposed Based Protecting Cache File from Leaks in A...
收藏 引用
International Conference on trustworthy Systems and their Applications (TSA)
作者: Qi Tang Wen Zhang Xiaoyong Li Bin Wang Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing P.R. China Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing P.R. China School of Computer Science Beijing University of Posts and Telecommunications Beijing P.R. China
With the high frequent use of social applications on Android platform, the cache file privacy disclosure issues have become increasingly serious. To our best knowledge, there is no effective privacy protection solutio... 详细信息
来源: 评论
Review of Semi-Structured Document Information Extraction Techniques Based on Deep Learning
Review of Semi-Structured Document Information Extraction Te...
收藏 引用
Machine Learning, Cloud computing and Intelligent Mining (MLCCIM), International Conference on
作者: Yangchun Li Wei Jiang Shouyou Song Chinese Academy of Cybersapce Studies School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cybersapce Studies Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Chinese Academy of Cybersapce Studies Ministry of Education Beijing University of Posts and Telecommunications Beijing China
With the advent of global digital transformation, using an intelligent method based on deep learning to extract crucial information from semi-structured documents, as represented by various types of receipts and invoi...
来源: 评论
CPCED: a container escape detection system based on CNI plugin
CPCED: a container escape detection system based on CNI plug...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yu Hao Xu Zhang Dongbin Wang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications National Engineering Research Center for Mobile Internet Security Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service Beijing China
Container escape detection is a critical research topic in the field of cloud security. Among the challenges faced in modern cloud security, the issue of container escape poses a significant threat due to its direct i... 详细信息
来源: 评论
Discount rate hurts group buying? An empirical study from catering industry
Discount rate hurts group buying? An empirical study from ca...
收藏 引用
International Conference on services Systems and services Management, ICSSSM
作者: Rujin Zhang Xiangling Fu Jiayin Qi Sam Seongmin Jeon School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China School of Management Shanghai University of International Business and Economics Shanghai China School of Software Beijing University of Posts and Telecommunications Beijing China Business School Gachon University Seongnam
With the development of online group buying, more and more experts are beginning to focus on this emerging e-commerce model. Based on the data from ***, our study examined the impact of discount rate on the consumers&... 详细信息
来源: 评论