咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是71-80 订阅
排序:
Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2016年 第2期23卷 56-65,96页
作者: Kang Kai Wang Cong Luo Tao School of Software Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts Telecommunications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts Telecommunications
Vehicular Ad-hoc networks(VANETs) are kinds of mobile Ad-hoc networks(MANETs), which consist of mobile vehicles with on-board units(OBUs) and roadside units(RSUs). With the rapid development of computation and... 详细信息
来源: 评论
A new routing and connectivity availability metric of low duty cycle random sleep scheduled multi-hop wireless sensor networks
收藏 引用
Journal of China Universities of Posts and Telecommunications 2011年 第SUPPL.2期18卷 101-108页
作者: Zhang, Tian-Le Yuan, Yu-Yu Wu, Xu Luo, Zong-Wei Wang, Chun-Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China E-Business Technology Institute University of Hong Kong Hong Kong Hong Kong
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to... 详细信息
来源: 评论
PAUP: a pre-awareness insider threat detection method based on user psychoanalysis  9
PAUP: a pre-awareness insider threat detection method based ...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, ISAEECE 2024
作者: Kong, Weiyu Li, Xiaoyong Yuan, Kaiguo Song, Yiyang Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Xitucheng Street Haidian District Beijing100876 China
Internal personnel within an organization often have privileged access to critical systems and sensitive information. They are familiar with the internal network structure, business processes, and security measures, w... 详细信息
来源: 评论
Word activation forces-based language modeling and smoothing
Word activation forces-based language modeling and smoothing
收藏 引用
2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
作者: Qin, Min Liu, Gang Li, Baoxiang Lu, Yueming School of Information and Communication Engineering BUPT Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT China
N-gram language models are useful for modeling the local dependencies of word occurrences but not for capturing global word dependencies. When the window size n is limited, the n-gram is weak in terms of capturing lon... 详细信息
来源: 评论
A Non-Statistical Reinstatement Algorithm for Orientation Field of Incomplete Fingerprint
收藏 引用
电子学报(英文版) 2012年 第3期21卷 477-480页
作者: JING Xiaojun ZHANG Bo LIU Xinjing WANG Dong School of Infornation and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University o.f Posts and Telecommunications Beijing 100876 China
Fingerprint orientation is the key informa- tion in fingerprint enhancement and matching. Accord- ing to the problem of incomplete fingerprint orientation, a novel algorithm of fingerprint orientation reinstatement is... 详细信息
来源: 评论
IDEATE: Detecting AI-Generated Text using Internal and External Factual Structures  30
IDEATE: Detecting AI-Generated Text using Internal and Exter...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Wang, Quan Zhang, Licheng Guo, Zikang Mao, Zhendong MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China University of Science and Technology of China Hefei China
The effective detection of AI-generated text is a vital principle to ensure responsible use of large language models (LLMs). Previous studies mainly focused on discovering and utilizing internal evidences contained in... 详细信息
来源: 评论
REINFORCEMENT LEARNING BASED TIME-DOMAIN MUTUAL INTERFERENCE AVOIDANCE FOR AUTOMOTIVE RADAR
REINFORCEMENT LEARNING BASED TIME-DOMAIN MUTUAL INTERFERENCE...
收藏 引用
IET International Radar Conference 2023, IRC 2023
作者: Xiao, He Wang, Jianping Li, Runlong He, Yuan Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Faculty of EEMCS Delft University of Technology Delft Netherlands
Due to the extensive usage of automotive radars on vehicles, mutual interference among radars on the road is becoming considerable. To address this, we propose a time domain strategy based on deep reinforcement learni... 详细信息
来源: 评论
Exact analysis of transmit/receive zero-forcing based Mimo AF two-way relaying when relay has two antennas
Exact analysis of transmit/receive zero-forcing based Mimo A...
收藏 引用
International Conference on Cyberspace Technology, CCT 2013
作者: Li, Rongsheng Lv, Tiejun Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China
In this paper, the performance of joint transmit/receive zero-forcing (ZF) is analyzed for multiple-input multiple-out (IV11MO) amplify-and-forward (AT) two-way relay network when the relay has two antennas. The perfo... 详细信息
来源: 评论
Research and Implementation of Trusted Data Collection Technology in Network Community  6
Research and Implementation of Trusted Data Collection Techn...
收藏 引用
6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2018
作者: Wu, Xu Duan, Sishu Xie, Xiaqing Key Laboratory of Trustworthy Distributed Computing and Service BUPT China School of Cyberspace Security BUPT China Beijing University of Posts and Telecommunications Library China
This paper attempts to research and implement the data collection technology and trusted mechanism in network communities, and explore how to improve the reliability and credibility of the data collection process from... 详细信息
来源: 评论
A decomposition based multiobjective evolutionary algorithm for dynamic overlapping community detection  13th
A decomposition based multiobjective evolutionary algorithm ...
收藏 引用
13th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2018
作者: Wan, Xing Zuo, Xingquan Song, Feng School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Dynamic and overlapping are common features of community structures of many real world complex networks. There are few studies on detecting dynamic overlapping communities, but those studies consider only single optim... 详细信息
来源: 评论