咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 188 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 40 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 108 篇 理学
    • 73 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 14 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 zhang xi
  • 13 篇 wang quan

语言

  • 485 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
518 条 记 录,以下是401-410 订阅
排序:
A method indoor multi-path IR-UWB location based on multi-task compressive sensing  4
A method indoor multi-path IR-UWB location based on multi-ta...
收藏 引用
4th International Conference on Ubiquitous Positioning, Indoor Navigation and Location-Based services, IEEE UPINLBS 2016
作者: Li, Xiaofei He, Di Jiang, Lingge Yu, Wensheng Chen, Xiaohua College of Mathematics and Computer WuYi University FuJian China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China National Mobile Communications Research Laboratory Southeast University Nanjing China Shanghai Key Laboratory of Navigation and Location Based Service Shanghai Jiao Tong University Shanghai China Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China School of Information and Engineering HuZhou University Zhejiang China
In the paper, the ultra-wideband (UWB) localization method based on multi-task compressive sensing (MT-CS) is proposed to solve the UWB localization accuracy performance problem. In the indoor multi-path NLOS environm... 详细信息
来源: 评论
Multi-features based classification for automatic summarization
Multi-features based classification for automatic summarizat...
收藏 引用
International Conference on Multimedia, Communication and computing Application, MCCA 2014
作者: Li, H.Y. Liu, R.F. Xu, W.R. Shi, R.S. School of Information and Communication Engineering Beijing University of Posts and Telecommunication Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service BUPT School of Humanities BUPT Beijing China
That the summary of an article can be automatically generated is an important text processing technique. The technique can automatically extract the most useful information of the text and present that information, wh... 详细信息
来源: 评论
Deep learning based primary user classification in Cognitive Radios
Deep learning based primary user classification in Cognitive...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Yuanhao Cui Xiao jun Jing Songlin Sun Xiaohan Wang Dongmei Cheng Hai Huang Key Laboratory of Trustworthy Distributed Computing and service (BUPT) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and service (BUPT) Beijing University of Posts and Telecommunications Beijing Beijing CN Key Laboratory of Trustworthy Distributed Computing and service (BUPT) School of Software and Microelectronics Beijing China
Deep Belief Networks (DBN) is a very powerful algorithm in deep learning. The DBN has been effectively applied in many areas of machine learning, such as computer vision (CV) and natural language processing (NLP). Wit... 详细信息
来源: 评论
Discount rate hurts group buying? An empirical study from catering industry
Discount rate hurts group buying? An empirical study from ca...
收藏 引用
International Conference on services Systems and services Management, ICSSSM
作者: Rujin Zhang Xiangling Fu Jiayin Qi Sam Seongmin Jeon School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China School of Management Shanghai University of International Business and Economics Shanghai China School of Software Beijing University of Posts and Telecommunications Beijing China Business School Gachon University Seongnam
With the development of online group buying, more and more experts are beginning to focus on this emerging e-commerce model. Based on the data from ***, our study examined the impact of discount rate on the consumers&... 详细信息
来源: 评论
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications
X-Prcaf : Xposed Based Protecting Cache File from Leaks in A...
收藏 引用
International Conference on trustworthy Systems and their Applications (TSA)
作者: Qi Tang Wen Zhang Xiaoyong Li Bin Wang Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing P.R. China Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing P.R. China School of Computer Science Beijing University of Posts and Telecommunications Beijing P.R. China
With the high frequent use of social applications on Android platform, the cache file privacy disclosure issues have become increasingly serious. To our best knowledge, there is no effective privacy protection solutio... 详细信息
来源: 评论
Multilayer Feed-forward Neural Network learning based Dynamic Chinese restaurant model for dynamic spectrum access in cognitive radio networks
Multilayer Feed-forward Neural Network learning based Dynami...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Jianlan Liu Xiao jun Jing Songlin Sun Xiaohan Wang Dongmei Cheng Hai Huang Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications Beijing Beijing CN
As an effective approach to improve spectrum efficiency, cognitive radio network make it possible for secondary users (SU) to share the spectrum with primary users (PU), on the condition that the primary users have pr... 详细信息
来源: 评论
Antenna calibration method for MMSE-based network MIMO system
Antenna calibration method for MMSE-based network MIMO syste...
收藏 引用
2015 IEEE/CIC International Conference on Communications in China - Workshops, CIC/ICCC 2015
作者: Liu, Qiang Su, Xin Zeng, Jie Liu, Lili Lv, Tiejun Tsinghua National Laboratory for Information Science and Technology Research Institute of Information Technology Tsinghua University Beijing China Key Laboratory of Trustworthy Distributed Computing and Service School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
In this paper, we propose a new channel reciprocity calibration method based on minimum mean square error (MMSE) in network multiple-input and multiple-output (MIMO) system. Network MIMO system can mitigate the inter-... 详细信息
来源: 评论
Secure beamforming and artificial noise design in interference networks with imperfect ECSI
Secure beamforming and artificial noise design in interferen...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Jian Zhou Ruohan Cao Hui Gao Cong Zhang Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
This paper investigates the joint robust beamforming and artificial noise design in two-user interference networks, where one of the two pairs is wiretapped by an external eavesdropper, and only imperfect eavesdropper... 详细信息
来源: 评论
Mining the relation between dorm arrangement and student performance
Mining the relation between dorm arrangement and student per...
收藏 引用
IEEE International Conference on Big Data
作者: Man Li Ruisheng Shi Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts & Telecommunications Beijing China
This paper discusses the relation between dorm arrangement and student performance. One of the unsupervised learning algorithms, k-means algorithm, is mainly used in the process of analysis. Students are clustered int... 详细信息
来源: 评论
Scheme to Improve Integrity Verification of Cloud Storage Based on Diffie-Hellman Algorithm
Scheme to Improve Integrity Verification of Cloud Storage Ba...
收藏 引用
第十届中国通信学会学术年会
作者: Li Jiaqi Liu Jianyi Zhang Ru National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunication Key Laboratory of Trustworthy Distributed Computing and Service
Focusing on current communication overspending in the integrity verification scheme based on the Merkel Tree,using the difficulty of factoring large integers,an integrity verification scheme based on Diffie-Hellman al... 详细信息
来源: 评论