咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 188 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 40 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 108 篇 理学
    • 73 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 14 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 zhang xi
  • 13 篇 wang quan

语言

  • 485 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
518 条 记 录,以下是441-450 订阅
排序:
Low-Complexity Multiuser MIMO Downlink User Selection Based on Large-Scale Fading
Low-Complexity Multiuser MIMO Downlink User Selection Based ...
收藏 引用
IEEE Vehicular Technology Conference
作者: Haijing Liu Hui Gao Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications
We propose a low-complexity user selection scheme with zero-forcing precoding in multiuser MIMO downlink systems, where the base station (BS) is equipped with large-scale antenna arrays and the number of candidate-use... 详细信息
来源: 评论
Outage Analysis of MIMO Multiuser Broadcast Scheduling with MMSE Receiver
Outage Analysis of MIMO Multiuser Broadcast Scheduling with ...
收藏 引用
IEEE/CIC International Conference on Communications in China
作者: Rongsheng Li Hui Gao Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications
In future wireless communication systems, multiple-input multiple-output (MIMO) technique and multi-user scheduling may play a key role in enhancing link reliability and spectral efficiency. In addition, linear signal... 详细信息
来源: 评论
TOA Estimation Using Checking Window for IR-UWB Energy Detection Receivers
TOA Estimation Using Checking Window for IR-UWB Energy Detec...
收藏 引用
IEEE Vehicular Technology Conference
作者: Hong Cai Tiejun Lv Hui Gao Anzhong Hu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications
Precise ultra-wideband (UWB) ranging requires accurate estimation of time of arrival (TOA). In this paper, a novel TOA estimation approach using checking window is proposed for energy detection (ED) receivers in dense... 详细信息
来源: 评论
On using game theory to rate allocation in joint source-channel coding
On using game theory to rate allocation in joint source-chan...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Teng Li Yaoyao Guo Tiantian Ran Songlin Sun School of Information and Communication Engineering Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications
In Joint source-channel coding (JSCC), the source coding improves coding efficiency, while channel coding improves transmission reliability. Due to channel capacity is limited in video transmission, allocation bandwid... 详细信息
来源: 评论
Generalized likelihood ratio test multiple-symbol detection for MIMO-UWB: A semidefinite relaxation approach
Generalized likelihood ratio test multiple-symbol detection ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Chanfei Wang Tiejun Lv Hui Gao Anzhong Hu Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Singapore University of Technology and Design Singapore
In this paper, semidefinite relaxation (SDR) technology is exploited for the multiple-symbol detection (MSD) over the multiple-input multiple-output (MIMO) ultra-wideband (UWB) systems. The existing scheme generalized... 详细信息
来源: 评论
An optimized first path detector for UWB ranging using error characteristics
An optimized first path detector for UWB ranging using error...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Hong Cai Tiejun Lv Hui Gao Anzhong Hu Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Singapore University of Technology and Design Singapore
The key of time of arrival (TOA) estimation in ultra wideband (UWB) ranging is to detect the first path (FP). In this paper, we propose an optimized FP detector with the adaptive threshold in the absence of prior chan... 详细信息
来源: 评论
WORD distributed REPRESENTATION BASED TEXT CLUSTERING
WORD DISTRIBUTED REPRESENTATION BASED TEXT CLUSTERING
收藏 引用
2014 IEEE 3rd International Conference on Cloud computing and Intelligence Systems
作者: Shan Feng Ruifang Liu Qinlong Wang Ruisheng Shi School of Information and Communication Engineering BUPT Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service BUPT School of Humanities BUPT
The fast growth of Internet web documents has posed new challenges on how to efficiently and accurately manage and retrieve the textual collections,text clustering plays a significant *** document clustering is an uns... 详细信息
来源: 评论
Epdemic spreading model based overlapping community detection
Epdemic spreading model based overlapping community detectio...
收藏 引用
International Conference on Advances in Social Network Analysis and Mining, ASONAM
作者: Ying Wen Yuanhao Chen Xiaolong Deng International School Beijing University of Posts and Telecommunications China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
Community detection in inhomogeneous structured network is an attractive research problem that searches for methods to discover groups in which individuals are more densely interconnected with each other with higher p... 详细信息
来源: 评论
A method based on MD5 and time for preventing deception in electronic commerce
A method based on MD5 and time for preventing deception in e...
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Zhenggang Hu Yueming Lu School of Information and Communication Engineering Beijing University of Posts and Telecommunications China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
Aiming at reducing the risk of data being intercepted and preventing deceptions in the electronic commerce, this paper proposes a method based on MD5 and time which can effectively prevent the deception in data transm... 详细信息
来源: 评论
Detecting the run time attacks in the cloud with an evidence collection based approach
Detecting the run time attacks in the cloud with an evidence...
收藏 引用
IEEE International Conference on Cloud computing and Intelligence Systems (CCIS)
作者: Jie Lin Chuanyi Liu Zhichun Ning Binxing Fang School of Computer Science Beijing University of Posts and Telecommunications Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China
As the impacts of security threats are amplified and spread quickly in the cloud, especially with the attribute of large-scale virtualization. Most of researches focus on monitoring the network traffic. However, these... 详细信息
来源: 评论