咨询与建议

限定检索结果

文献类型

  • 391 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 183 篇 计算机科学与技术...
    • 137 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
  • 109 篇 理学
    • 74 篇 数学
    • 28 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 488 篇 英文
  • 15 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
513 条 记 录,以下是291-300 订阅
排序:
A multi-objective emergency resource scheduling method based on MOEA/D  2
A multi-objective emergency resource scheduling method based...
收藏 引用
2nd International Conference on Algorithms, computing and Artificial Intelligence, ACAI 2019
作者: Li, Yanrong Li, Xiaoyong Hou, Liyang Kong, Wenping Ma, Wenxue Key Laboratory of Trustworthy Distributed Computing and Servic Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Integrated Command and Dispatch Technology Beijing China
After unconventional events occur, rapid emergency response is often needed in order to reduce losses. When there are more than one disaster points and more than one supply points, how to coordinate the local dispatch... 详细信息
来源: 评论
A Multi-Objective Emergency Resource Scheduling Method Based on MOEA/D  19
A Multi-Objective Emergency Resource Scheduling Method Based...
收藏 引用
Proceedings of the 2019 2nd International Conference on Algorithms, computing and Artificial Intelligence
作者: Yanrong Li Xiaoyong Li Liyang Hou Wenping Kong Wenxue Ma Key Laboratory of Trustworthy Distributed Computing and Servic Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory For Integrated Command And Dispatch Technology Beijing China
After unconventional events occur, rapid emergency response is often needed in order to reduce losses. When there are more than one disaster points and more than one supply points, how to coordinate the local dispatch... 详细信息
来源: 评论
Auto-GAN: GAN-Based Self-Supervised Collaborative Learning for Robust Spatio-Temporal Trajectory Classification in IoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Jia, Jia Li, Linghui Li, Ximing Wang, Ning Cai, Binsi Zhang, Xu Qiu, Pengfei Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Research Institute of China Mobile Communications Corporation Beijing100032 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China China Academy of Information and Communications Technology Beijing China Nanjing University School of Electronic Science and Engineering Nanjing210023 China
With the rapid proliferation of crowd mobility data produced by ubiquitous mobile devices equipped with spatial positioning modules, deep neural networks (DNNs) have become widely applied in spatio-temporal trajectory... 详细信息
来源: 评论
Joint resource management for MC-NOMA: A deep reinforcement learning approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Shaoyang Lv, Tiejun Ni, Wei Beaulieu, Norman C. Guo, Y. Jay Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Sydney2122 Australia Beijing Key Laboratory for Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Global Big Data Technologies Centre University of Technology Sydney UltimoNSW2007 Australia
This paper presents a novel and effective deep reinforcement learning (DRL)-based approach to addressing joint resource management (JRM) in a practical multi-carrier non-orthogonal multiple access (MC-NOMA) system, wh... 详细信息
来源: 评论
A Hybrid Routing Algorithm based on Destruction Resistance Cost and Reliability in Flying Ad-Hoc Networks
A Hybrid Routing Algorithm based on Destruction Resistance C...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Kun Guo Dongbin Wang Hui Zhi Yibo Gao Tao Zhang Tiejun Lv Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Beijing University of Posts and Telecommunications Beijing China TravelSky Technology Limited Beijing China Cyberspace Security Research Center Peng Cheng Laboratory Beijing University of Posts and Telecommunications Beijing China China Academy of Launch Vehicle Technology Beijing China
Existing routing algorithms in Flying Ad-Hoc Net- works (FANETs) lack the optimization consideration of destruction resistance cost caused by routing recovery when some nodes fail suddenly. In this paper, we propose a... 详细信息
来源: 评论
AutoDE: Automated vulnerability discovery and exploitation  4
AutoDE: Automated vulnerability discovery and exploitation
收藏 引用
4th IEEE International Conference on Data Science in Cyberspace, DSC 2019
作者: Zhang, Yuntao Liu, Tong Wang, Zhongru Ruan, Qiang Fang, Binxing Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China Zhejiang Lab Hangzhou China Beijing DigApis Technology Co. Ltd Beijing China
Recently, automated testing for software vulnerability finding and exploitation has attracted more and more attention, due to the high scalability and efficiency. However, it is non-trivial and challenging since the e... 详细信息
来源: 评论
Threshold-Assisted Soft-Output Direct Detection FTN Algorithm for Bandwidth-Limited Systems
Threshold-Assisted Soft-Output Direct Detection FTN Algorith...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Shuangyue Liu Ji Zhou Mengqi Guo Xizi Tang Zhongliang Sun Han Cui Yueming Lu Yaojun Qiao State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing China Jinan University Guangzhou China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China
A threshold-assisted soft-output direct detection faster than Nyquist (SO-DD-FTN) is proposed to compensate bandwidth-limitation impairments in 56-Gb/s PAM-4 systems using 10G-class optics. Experimental results show t... 详细信息
来源: 评论
Sentence segmentation for classical Chinese based on LSTM with radical embedding
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第2期26卷 1-8页
作者: Han Xu Wang Hongsu Zhang Sanqian Fu Qunchao Liu Jun School of software Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT)Ministry of EducationBeijing 100876China The Key Laboratory of Rich-Media Knowledge Organization and Service of Digital Publishing Content Institute of Scientific and Technical Information of ChinaBeijing 100038China Insitute of Quantitative Social Science Harvard UniversityCambridgeMAUSA Department of statistics Harvard UniversityCambridgeMAUSA
A low-than character feature embedding called radical embedding is proposed,and applied on a long-short term memory(LSTM) model for sentence segmentation of pre-modern Chinese *** dataset includes over 150 classical C... 详细信息
来源: 评论
SWRR:The Link Scheduling Algorithm Based on Weighted Round-Robin
收藏 引用
Computers, Materials & Continua 2019年 第6期59卷 965-982页
作者: Tianbo Lu Ru Yan Chao Li Lihua Yin Hao Chen Xieyu Zou School of Software Engineering Beijing University of Posts and TelecommunicationsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(Beijing University of Posts and Telecommunications) Ministry of EducationBeijing100876China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Department Computer Science and Engineering The University of Texas at ArlingtonArlington76091USA
With the rapid development of the Internet,people pay more and more attention to the protection of *** second-generation onion routing system Tor is the most commonly used among anonymous communication systems,which c... 详细信息
来源: 评论
QPSK-Assisted MIMO Equalization for 800-Gb/s/λ DP-256QAM Systems
QPSK-Assisted MIMO Equalization for 800-Gb/s/λ DP-256QAM Sy...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Siqi Liu Shuangyue Liu Xizi Tang Mengqi Guo Yueming Lu Yaojun Qiao State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication EngineeringBeijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace SecurityBeijing University of Posts and Telecommunications Beijing China
A QPSK-assisted MIMO equalization is investigated to compensate bandwidth limitation for 800-Gb/s/λ DP-256QAM systems with only 25G-class optics. Compared with conventional MIMO equalization, the proposed equalizatio... 详细信息
来源: 评论