咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 188 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 40 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 108 篇 理学
    • 73 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 14 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 zhang xi
  • 13 篇 wang quan

语言

  • 485 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
518 条 记 录,以下是351-360 订阅
排序:
Joint Cache Placement and Beamforming Design for Scalable Videos in C-RAN
Joint Cache Placement and Beamforming Design for Scalable Vi...
收藏 引用
International Symposium on Wireless Communication Systems (ISWCS)
作者: Mingfeng Ma Tiejun Lv Xuewei Zhang Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
This paper investigates the joint optimization of layered caching and beamforming design for scalable videos delivered by Dynamic Adaptive Streaming over HTTP in the multicell cloud radio access network. To transmit d... 详细信息
来源: 评论
Joint Spectrum Sensing Based on Variance and Correlation Analysis
收藏 引用
China Communications 2017年 第10期14卷 219-227页
作者: Junsheng Mu Xiaojun Jing Hai Huang Ning Gao Laboratory of Biological Recognition and Information Application Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education 100876 China
In this paper, a novel detection criterion is proposed to decide whether primary user(PU) exists based on joint analysis of the variance and correlation for observation signal,considering a correlation within the obse... 详细信息
来源: 评论
Research on discrete emotion classification of Chinese online product reviews based on OCC model  3
Research on discrete emotion classification of Chinese onlin...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Liu, Lina Qi, Jiayin School of Economics and Management Key Laboratory of Trustworthy Distributed Computing and Service School of Ethnic Minority Education Beijing University of Posts and Telecommunication Beijing China School of Management Shanghai University of International Business and Economics Shanghai China
There are many rich and multi-dimensional discrete emotional information in online reviews. The research of discrete emotion analysis in English online reviews is relatively early and has made some achievements, but t... 详细信息
来源: 评论
Performance Analysis of Small Cell Networks Using Accurate Path Loss Model at 39 GHz
Performance Analysis of Small Cell Networks Using Accurate P...
收藏 引用
International Symposium on Wireless Communication Systems (ISWCS)
作者: Yangying Zhang Xiaojun Jing Hui Gao Bohan Li Jianxiao Xie Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
In this paper, we apply an accurate millimeter wave (mmWave) path loss model, obtained from outdoor measurement operated at 39 GHz in Qingdao, China, into the stochastic geometry analysis to investigate the system per... 详细信息
来源: 评论
A Particle Swarm Optimization based Feature Selection Method for Accident Severity Analysis
A Particle Swarm Optimization based Feature Selection Method...
收藏 引用
IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems
作者: Chenye Qiu Xingquan Zuo Fei Xiang School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Reducing accident severity is an effective mean to improve road safety level. Many researches have been done to identify the risky features which would influence the accident severity. Many risky features need to be c... 详细信息
来源: 评论
Transfer pretrained sentence encoder to sentiment classification  3
Transfer pretrained sentence encoder to sentiment classifica...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Bai, Man Han, Xu Jia, Haoran Wang, Cong Sun, Yawei School of Software Engineering Beijing University of Posts and Telecommunications Beijing100876 China International School Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing100876 China
Deep learning has been demonstrated to be very effective in many difficult tasks of computer vision(CV) and natural language processing(NLP). But this usually depends on a large number of available training samples to... 详细信息
来源: 评论
Theories of Social Media: Philosophical Foundations
收藏 引用
Engineering 2018年 第1期4卷 94-102页
作者: Jiayin Qi Emmanuel Monod Binxing Fang Shichang Deng School of Management Shanghai University of International Business and Economics Shanghai 201620 China Institute of Artificial Intelligence and Change Management Shanghai University of International Business and Economics Shanghai 200336 China Institute of Cyberspace Advanced Technology Guangzhou University Guangzhou 510006 China China Electronics Corporation Beijing 100082 China Key Laboratory of Trustworthy Distributed Computing and Service of Ministry of Education Belting University of Posts and Telecommunications Beijing 100876 China
Although many different views of social media coexist in the field of information systems (IS), such the- ories are usually not introduced in a consistent framework based on philosophical foundations, This paper int... 详细信息
来源: 评论
A Broker-guided Trust Calculation Model for Mobile Devices of D2D Communications
A Broker-guided Trust Calculation Model for Mobile Devices o...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Jie Yuan Xiaoyong Li Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing P.R. China
In Device-to-Device (D2D)communications, the communication environments are multifarious and it is difficult for devices to distinguish undependable services and get successful cooperation. In this paper, we originall... 详细信息
来源: 评论
R-TAR: A Resilient Traffic Anomaly Recognition Mechanism for Backbone Network  10
R-TAR: A Resilient Traffic Anomaly Recognition Mechanism for...
收藏 引用
10th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2018
作者: Li, Xueyu Zhang, Xu Wang, Dongbin School of Network Education Beijing University of Posts and Telecommunications Beijing100876 China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service School of CyberSpace Security Beijing University of Posts and Telecommunications Beijing100876 China
The development of backbone networks leads to an increase in heterogeneous anomalies and cyberspace situation complexity, and traditional traffic monitoring cannot meet multiple-point concurrency design and resilience... 详细信息
来源: 评论
Research and Implementation of Trusted Data Collection Technology in Network Community
收藏 引用
IOP Conference Series: Earth and Environmental Science 2019年 第1期234卷
作者: Xu Wu Sishu Duan Xiaqing Xie Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Library
This paper attempts to research and implement the data collection technology and trusted mechanism in network communities, and explore how to improve the reliability and credibility of the data collection process from...
来源: 评论