咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 444 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是51-60 订阅
排序:
An Effective Cloud Workflow Scheduling Approach Combining PSO and Idle Time Slot-Aware Rules
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第5期8卷 1079-1094页
作者: Yun Wang Xingquan Zuo the School of Computing Science Beijing University of Posts and TelecommunicationsBeijing 100876China the School of Information Engineering Nanchang Institute of TechnologyNanchang 330099China the Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing 100876China
Workflow scheduling is a key issue and remains a challenging problem in cloud *** with the large number of virtual machine(VM)types offered by cloud providers,cloud users need to choose the most appropriate VM type fo... 详细信息
来源: 评论
Compositional Concept-Based Neuron-Level Interpretability for Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Zeyu Huang, Hai Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Services Ministry of Education Beijing China
Deep reinforcement learning (DRL), through learning policies or values represented by neural networks, has successfully addressed many complex control problems. However, the neural networks introduced by DRL lack inte... 详细信息
来源: 评论
Communication Encryption Scheme of 5G Power Trading Private Network Based on Dynamic key  2
Communication Encryption Scheme of 5G Power Trading Private ...
收藏 引用
2nd Asia Conference on Electrical, Power and Computer Engineering, EPCE 2023
作者: Zhou, Rui Song, Yiyang Xu, Ying Harbin Institute of Technology Electrical Engineering and Automation School Harbin China Guangdong Power Exchange Center Information Data Department Guangzhou China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Security has been the primary concern for the 5G power trading private network, which involves a large amount of power trading information. The communication must be encrypted to prevent the leakage of important infor... 详细信息
来源: 评论
Blockchain Storage Method Based on Erasure Code  8
Blockchain Storage Method Based on Erasure Code
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Meng, Fanyao Li, Jin Gao, Jiaqi Liu, Junjie Ru, Junpeng Lu, Yueming School of Cyberspace Security Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications The State Key Laboratory of Information Photonics and Optical Communications Beijing China
Blockchain, as an emerging distributed database, effectively addresses the issue of centralized storage in IoT data, where storage capacity cannot match the explosive growth in devices and data scale, as well as the c... 详细信息
来源: 评论
RL-MSA: a Reinforcement Learning-based Multi-line bus Scheduling Approach
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yingzhuo Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China
Multiple Line Bus Scheduling Problem (MLBSP) is vital to save operational cost of bus company and guarantee service quality for passengers. Existing approaches typically generate a bus scheduling scheme in an offline ... 详细信息
来源: 评论
Multi-Agent Trust Evaluation Model based on Reinforcement Learning  8
Multi-Agent Trust Evaluation Model based on Reinforcement Le...
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Haoran, Jia Yuyu, Yuan Qiang, Han Pengqian, Zhao Ting, Guo Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
The establishment of trust between agents is an important part of Multi-agent Reinforcement Learning (MARL). Recent studies on multi-agents have paid more attention to the game relationship between agents, ignoring tr... 详细信息
来源: 评论
A Novel Evolutionary Neural Network-based Approach for Online Bus Scheduling
A Novel Evolutionary Neural Network-based Approach for Onlin...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Wenyang Tian Feiyang Wang Xingquan Zuo School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Bus scheduling is vital to ensure service quality and save operational costs. Current studies typically consider the problem as an optimization problem and solve it using exact or heuristic approaches. In this paper, ... 详细信息
来源: 评论
An Abnormal Behavior Detection Method Based on User Behavior Correlation Feature Sequence Modeling  9
An Abnormal Behavior Detection Method Based on User Behavior...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhou, Yuting Sun, Lijuan Wu, Jingchen Gao, Yutong Wu, Xu Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service China Beijing University of Posts and Telecommunications School of Cyberspace Security BUPT Beijing China Beihang University Intellectual Property Information Service Center BHU Beijing China Minzu University of China School of Information Engineering MUC Beijing China
The healthcare industry is one of the industries most affected by insider threats. At present, the mainstream abnormal behavior detection of internal threats has the problems of relatively single reference dimension o... 详细信息
来源: 评论
Graph Neural Network Based User Group Comments Interaction Behavior Prediction on Microblog Websites  6
Graph Neural Network Based User Group Comments Interaction B...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Chen, Yisen Wu, Xu Xie, Xiaqing Wu, Jingchen Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trustworthy Distributed Computing And Service Beijing China
The interactive behavior of comments within the user group on microblog website is bidirectional and dynamic, reflecting the level of familiarity among users. Predicting the future comment interaction behavior within ... 详细信息
来源: 评论
OptimizeLog: Log Anomaly Detection and Localization based on Optimized Log Parsing in distributed Systems
OptimizeLog: Log Anomaly Detection and Localization based on...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Yanjie Sun Yali Gao Xiaoyong Li Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Modern distributed systems generate interleaved logs when performing parallel operations, and these logs become an important basis for anomaly detection and localization. To achieve more robust and accurate log anomal...
来源: 评论