咨询与建议

限定检索结果

文献类型

  • 286 篇 会议
  • 89 篇 期刊文献

馆藏范围

  • 375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 125 篇 计算机科学与技术...
    • 88 篇 软件工程
    • 61 篇 信息与通信工程
    • 46 篇 电子科学与技术(可...
    • 21 篇 控制科学与工程
    • 21 篇 交通运输工程
    • 20 篇 生物工程
    • 19 篇 机械工程
    • 17 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 12 篇 电气工程
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
  • 90 篇 理学
    • 63 篇 数学
    • 21 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 7 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 22 篇 feature extracti...
  • 18 篇 semantics
  • 13 篇 security
  • 12 篇 optimization
  • 10 篇 task analysis
  • 10 篇 neural networks
  • 10 篇 cyberspace
  • 9 篇 conferences
  • 9 篇 real-time system...
  • 9 篇 data science
  • 9 篇 training
  • 8 篇 signal to noise ...
  • 8 篇 resource managem...
  • 8 篇 antennas
  • 8 篇 mimo
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 deep learning
  • 7 篇 simulation
  • 7 篇 mimo communicati...

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 36 篇 school of inform...
  • 30 篇 key laboratory o...
  • 21 篇 school of comput...
  • 18 篇 school of cybers...
  • 15 篇 beijing universi...
  • 13 篇 beijing universi...
  • 13 篇 key laboratory o...
  • 12 篇 ministry of educ...
  • 12 篇 school of softwa...
  • 10 篇 beijing universi...
  • 10 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 chinese academy ...
  • 8 篇 beijing digapis ...
  • 8 篇 school of cybers...
  • 8 篇 beijing universi...
  • 6 篇 key laboratory o...

作者

  • 44 篇 yueming lu
  • 36 篇 lu yueming
  • 28 篇 tiejun lv
  • 27 篇 xiaoyong li
  • 25 篇 hui gao
  • 24 篇 songlin sun
  • 24 篇 wu xu
  • 22 篇 xu wu
  • 21 篇 xiaojun jing
  • 17 篇 xiaqing xie
  • 16 篇 wu jingchen
  • 13 篇 zuo xingquan
  • 13 篇 lv tiejun
  • 13 篇 jingchen wu
  • 12 篇 hai huang
  • 12 篇 sun lijuan
  • 12 篇 binxing fang
  • 12 篇 xie xiaqing
  • 9 篇 qiao yaojun
  • 9 篇 fang binxing

语言

  • 359 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education"
375 条 记 录,以下是51-60 订阅
排序:
SSDAEE: Semi-Supervised Data-Augmented Event Extraction for Transfer Learning  8
SSDAEE: Semi-Supervised Data-Augmented Event Extraction for ...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Shen, Yueyue Song, Feifan Wu, Jingchen Wu, Xu School of Cyberspace Security Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Economics and Finance Changchun Finance College Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Jilin China School of Computer Science Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Although the general event extraction model has achieved good results in the standard data sets, there is a gap in the extraction results in low-resource environments. The general event extraction model still has room... 详细信息
来源: 评论
A new routing and connectivity availability metric of low duty cycle random sleep scheduled multi-hop wireless sensor networks
收藏 引用
Journal of China Universities of Posts and Telecommunications 2011年 第SUPPL.2期18卷 101-108页
作者: Zhang, Tian-Le Yuan, Yu-Yu Wu, Xu Luo, Zong-Wei Wang, Chun-Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China E-Business Technology Institute University of Hong Kong Hong Kong Hong Kong
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to... 详细信息
来源: 评论
An Unsupervised Graph Embedding Method Based on Dynamic Graph Attention Networks and Infomax for Link Prediction  8
An Unsupervised Graph Embedding Method Based on Dynamic Grap...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Lu, Jingzhu Song, Feifan Wu, Jingchen Wu, Xu School of Cyberspace Security Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Economics and Finance Changchun Finance College Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Jilin China School of Computer Science Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Due to the lack of labeled data in many real-world scenarios, Graph Neural Network models that require a large volume of labeled data are not effective, and research based on unsupervised learning frameworks has becom... 详细信息
来源: 评论
Word activation forces-based language modeling and smoothing
Word activation forces-based language modeling and smoothing
收藏 引用
2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
作者: Qin, Min Liu, Gang Li, Baoxiang Lu, Yueming School of Information and Communication Engineering BUPT Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT China
N-gram language models are useful for modeling the local dependencies of word occurrences but not for capturing global word dependencies. When the window size n is limited, the n-gram is weak in terms of capturing lon... 详细信息
来源: 评论
Noisy chaotic time series prediction based on wavelet echo state network
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第9期6卷 173-181页
作者: Yang, Fei Fang, Binxing Wang, Chunlu Zuo, Xingquan Zhong, Ruiming School of Computer Science Key Laboratory of Trustworthy Distributed Computing Beijing University of Post and Telecommunications Service of the Ministry of Education of China Beijing 100876 China Nanjing Panda Electronics Company limited Nanjing 210002 China
As a research focus of intelligence algorithm, the prediction of classic noiseless chaotic time series has a great development in recent years. However, the existing prediction models cannot get good performance for r... 详细信息
来源: 评论
Short-term traffic flow prediction based on echo state networks
收藏 引用
Advances in Information Sciences and service Sciences 2012年 第9期4卷 269-277页
作者: Yang, Fei Wang, Chunlu Zuo, Xingquan Zhong, Ruiming Xiang, Fei School of Computer Science Beijing University of Post and Telecommunications Key Lab of Trustworthy Distributed Computing and Service of the Ministry of Education of China Services Sciences and Intelligent Transportation Research Center 10086 China
The traffic flow is critical for the traffic control and traffic guidance. As the short-term traffic flow has the characteristics of highly nonlinear, complexity and chaos, the traditional neural networks can not tota... 详细信息
来源: 评论
A Non-Statistical Reinstatement Algorithm for Orientation Field of Incomplete Fingerprint
收藏 引用
电子学报(英文版) 2012年 第3期21卷 477-480页
作者: JING Xiaojun ZHANG Bo LIU Xinjing WANG Dong School of Infornation and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University o.f Posts and Telecommunications Beijing 100876 China
Fingerprint orientation is the key informa- tion in fingerprint enhancement and matching. Accord- ing to the problem of incomplete fingerprint orientation, a novel algorithm of fingerprint orientation reinstatement is... 详细信息
来源: 评论
Automatic detection of breast nodule in the ultrasound images using CNN
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第2期26卷 9-16页
作者: Pang Hao Bu Yunyun Wang Cong Xiao Hui School of Software Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of EducationBeijing 100876China Department of Ultrasound Beijing Friendship HospitalCapital Medical University China Electronic Data Service Company Limited
Breast cancer is the most common cancer among women *** is widely used as a harmless test for early breast cancer *** ultrasound network(USNet) model is *** is an improved object detection model specifically for breas... 详细信息
来源: 评论
Exact analysis of transmit/receive zero-forcing based Mimo AF two-way relaying when relay has two antennas
Exact analysis of transmit/receive zero-forcing based Mimo A...
收藏 引用
International Conference on Cyberspace Technology, CCT 2013
作者: Li, Rongsheng Lv, Tiejun Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China
In this paper, the performance of joint transmit/receive zero-forcing (ZF) is analyzed for multiple-input multiple-out (IV11MO) amplify-and-forward (AT) two-way relay network when the relay has two antennas. The perfo... 详细信息
来源: 评论
A decomposition based multiobjective evolutionary algorithm for dynamic overlapping community detection  13th
A decomposition based multiobjective evolutionary algorithm ...
收藏 引用
13th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2018
作者: Wan, Xing Zuo, Xingquan Song, Feng School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Dynamic and overlapping are common features of community structures of many real world complex networks. There are few studies on detecting dynamic overlapping communities, but those studies consider only single optim... 详细信息
来源: 评论