咨询与建议

限定检索结果

文献类型

  • 386 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 508 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 260 篇 工学
    • 179 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 49 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 107 篇 理学
    • 72 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 82 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 80 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 23 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 zuo xingquan
  • 13 篇 gao hui
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 486 篇 英文
  • 12 篇 其他
  • 11 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
508 条 记 录,以下是501-510 订阅
排序:
A new routing and connectivity availability metric of low duty cycle random sleep scheduled multi-hop wireless sensor networks
收藏 引用
Journal of China Universities of Posts and Telecommunications 2011年 第SUPPL.2期18卷 101-108页
作者: Zhang, Tian-Le Yuan, Yu-Yu Wu, Xu Luo, Zong-Wei Wang, Chun-Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China E-Business Technology Institute University of Hong Kong Hong Kong Hong Kong
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to... 详细信息
来源: 评论
Parameter selection in public key cryptosystem based on Chebyshev Polynomials over finite field
收藏 引用
Journal of Communications 2011年 第5期6卷 400-408页
作者: Li, Zhihui Cui, Yidong Jin, Yuehui Xu, Huimin Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Information and communication Engineering Beijing University of Posts and Telecommunications Beijing China
A recently proposed public key cryptosystem based on Chebyshev polynomials suggests a new approach to data encryption. But the security of the cryptosystem has not been investigated in depth, for lack of an appropriat... 详细信息
来源: 评论
Study on Hot Topics Identification and key Issues in on-Line News about Emergency Events
Study on Hot Topics Identification and Key Issues in on-Line...
收藏 引用
2011 International Conference on Advanced Intelligence and Awareness Internet(第二届高等智能和感知网络国际会议 AIAI 2011)
作者: Liping Chen Maoqiang Song School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing Unive
Concerning the system of hot topics detection about the emergency events, an overall technical framework is established to implement the system. Description and solution strategy about the key issues in the four compo... 详细信息
来源: 评论
RESTful web service composition: Extracting a process model from Linear Logic theorem proving
RESTful web service composition: Extracting a process model ...
收藏 引用
2011 7th International Conference on Next Generation Web services Practices, NWeSP 2011
作者: Zhao, Xia Liu, Enjie Clapworthy, Gordon J. Ye, Na Lu, Yueming Department of Computer Science and Technology University of Bedfordshire Luton United Kingdom School of Information and Control Engineering Xi'An University of Architecture and Technology Xi'an China School of Electronic and Information Engineering Xi'An Jiao Tong University Xi'an China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China
This paper introduces a two-stage Linear Logic based program synthesis approach to automatic RESTful web service composition. The Linear Logic theorem proof is applied at both resource and service invocation method le... 详细信息
来源: 评论
key Space of Cryptosystem Based on Chebyshev Polynomials over Finite Field
Key Space of Cryptosystem Based on Chebyshev Polynomials ove...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Zhihui Li Yidong Cui Yuehui Jin Huimin Xu Beijing University of Posts and Telecommunications Beijing Beijing CN Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications China School of Information and Communication Engineering Beijing University of Posts and Telecommunications China
A recently proposed public key cryptosystem based on Chebyshev polynomials suggests a new approach to data encryption. The sequence of Chebyshev polynomial is proved to be periodically, but its symmetry properties hav... 详细信息
来源: 评论
一种成本相关的云提供商高可靠性保证算法
一种成本相关的云提供商高可靠性保证算法
收藏 引用
第27次全国计算机安全学术交流会
作者: ZHONG Rui-ming 钟睿明 LIU Chuan-yi 刘川意 FANG Bin-xing 方滨兴 XIANG Fei 项菲 School of Computer Science Beijing University of Posts and TelecommunicationsBeijing100876China K 北京邮电大学计算机学院 北京100876 北京邮电大学可信分布式计算与服务教育部重点实验室 北京100876 Key Laboratory of Trustworthy Distributed Computing and Service of the Ministry of Education of Chin 北京邮电大学可信分布式计算与服务教育部重点实验室 北京100876 北京邮电大学软件学院 北京100876
文章提出了一种“富云”的数据容灾模型,即通过在云提供商之间相互进行数据备份和容灾,从而节省构建远程容灾中心的成本,并在此基础上设计了一种成本相关的云计算服务高可靠性保证算法CAHRPA,其根据数据恢复时间和容灾费用选择合适的容... 详细信息
来源: 评论
RESTful web service composition: Extracting a process model from Linear Logic theorem proving
RESTful web service composition: Extracting a process model ...
收藏 引用
International Conference on Next Generation Web services Practices (NWeSP)
作者: Xia Zhao Enjie Liu Gordon J. Clapworthy Na Ye Yueming Lu Department of Computer Science and Technology University of Bedfordshire Luton UK School of Electronic and Information Engineering Xi'an Jiaotong University Xian China School of Information and Control Engineering Xi'an University of architecture and technology Xian China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
This paper introduces a two-stage Linear Logic based program synthesis approach to automatic RESTful web service composition. The Linear Logic theorem proof is applied at both resource and service invocation method le... 详细信息
来源: 评论
Causal Structure Representation Learning of Unobserved Confounders in Latent Space for Recommendation
收藏 引用
ACM Transactions on Information Systems 1000年
作者: Hangtong Xu Yuanbo Xu Chaozhuo Li Fuzhen Zhuang MIC Lab College of Computer Science and Technology Jilin University China Key Laboratory of Trustworthy Distributed Computing and Service MoE) Beijing University of Posts and Telecommunications China Institute of Artificial Intelligence Beihang University and Zhongguancun Laboratory China
Inferring user preferences from users’ historical feedback is a valuable problem in recommender systems. Conventional approaches often rely on the assumption that user preferences in the feedback data are equivalent ... 详细信息
来源: 评论