咨询与建议

限定检索结果

文献类型

  • 73 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 29 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 22 篇 信息与通信工程
    • 7 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 生物工程
    • 5 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 2 篇 动力工程及工程热...
    • 2 篇 航空宇航科学与技...
    • 2 篇 农业工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
  • 21 篇 理学
    • 13 篇 数学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 大气科学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 农学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 6 篇 routing
  • 4 篇 conferences
  • 4 篇 roads
  • 4 篇 delays
  • 4 篇 wireless communi...
  • 4 篇 bandwidth
  • 4 篇 energy consumpti...
  • 4 篇 blockchain
  • 4 篇 vehicular ad hoc...
  • 4 篇 software
  • 4 篇 privacy
  • 3 篇 simulation
  • 3 篇 relays
  • 3 篇 data communicati...
  • 3 篇 wireless sensor ...
  • 3 篇 location awarene...
  • 3 篇 protocols
  • 3 篇 data collection
  • 2 篇 internet of thin...
  • 2 篇 scalability

机构

  • 22 篇 college of compu...
  • 17 篇 inner mongolia a...
  • 11 篇 inner mongolia k...
  • 9 篇 inner mongolia k...
  • 6 篇 inner mongolia k...
  • 4 篇 engineering rese...
  • 4 篇 inner mongolia u...
  • 3 篇 national mobile ...
  • 3 篇 state key labora...
  • 3 篇 inner mongolia k...
  • 3 篇 college of compu...
  • 2 篇 wireless network...
  • 2 篇 college of compu...
  • 2 篇 ordos dongsheng ...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia k...
  • 2 篇 inner mongolia k...
  • 2 篇 inner mongolia p...
  • 1 篇 inner mongolia a...

作者

  • 24 篇 xiangyu bai
  • 13 篇 bai xiangyu
  • 11 篇 baoqi huang
  • 8 篇 xu gang
  • 8 篇 kexin zhou
  • 8 篇 huang baoqi
  • 7 篇 gang xu
  • 6 篇 zhaoran wang
  • 6 篇 bo cui
  • 6 篇 wuyungerile li
  • 6 篇 cui bo
  • 6 篇 jia bing
  • 5 篇 wang zhaoran
  • 5 篇 bing jia
  • 4 篇 wenhan hou
  • 4 篇 hao lifei
  • 4 篇 zhou kexin
  • 3 篇 lei yao
  • 3 篇 winston k.g. sea...
  • 3 篇 qi zhihan

语言

  • 79 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Key of Wireless Networking and Mobile Computing College of Computer"
81 条 记 录,以下是71-80 订阅
排序:
A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market  2nd
A Posted Pricing Mechanism Based on Random Forests in Crowds...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Hao, Lifei Jia, Bing Zhang, Chuxuan College of Computer Science Inner Mongolia University Hohhot010021 China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China
With the rapid development of the Internet, the combination of outsourcing and Internet has produced an overturning mode for labor cooperation – crowdsourcing. Crowdsourcing outsource the work that used to be done by... 详细信息
来源: 评论
Differential Privacy Images Protection Based on Generative Adversarial Network
Differential Privacy Images Protection Based on Generative A...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Ren Yang Xuebin Ma Xiangyu Bai Xiangdong Su Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University Hohhot China School of computer science Inner Mongolia University Hohhot China
In recent years, as image data are widely used in data analysis tasks, the problem of privacy disclosure is becoming more and more serious. However, the privacy protection technology of image data is still immature. I... 详细信息
来源: 评论
Comparative Analysis of VANET Authentication Architecture and Scheme
Comparative Analysis of VANET Authentication Architecture an...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Yu Zhang Xiangyu Bai College of Computer Inner Mongolia University Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
Vehicle Ad Hoc Network (VANET) is a kind of vehicular self-organizing network. The communication mode of VANET mainly includes V2V, V2I and I2V. VANET has the unique characteristics of changeable network topology, fre... 详细信息
来源: 评论
A Review of UAV Ferry Algorithms in Delay Tolerant Network
A Review of UAV Ferry Algorithms in Delay Tolerant Network
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Bo Yang Xiangyu Bai Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science of Inner Mongolia University Hohhot China
The Delay Tolerant Network (DTN) is suitable for post-disaster environments where infrastructure is scarce. Search and rescue operations require network deployment in areas not covered by infrastructure. In the post-d... 详细信息
来源: 评论
Comparison of Location Privacy Protection Schemes in VANETs
Comparison of Location Privacy Protection Schemes in VANETs
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Yaqiong Ma Xiangyu Bai Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot China
Vehicular Ad-hoc Networks (VANETs) is a traditional mobile ad hoc network (MANET) used on traffic roads and it is a special mobile ad hoc network. As an intelligent transportation system, VANETs can solve driving safe... 详细信息
来源: 评论
Traffic Image Acquisition and Compression Technology in Vehicular Ad Hoc Network
Traffic Image Acquisition and Compression Technology in Vehi...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Fu Pang Xiangyu Bai College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University Hohhot China
With the frequent occurrence of traffic accidents, the timely acquisition of traffic images using Vehicular Ad Hoc Network (VANET) technology is of great significance for traffic rescue and evidence preservation. Howe... 详细信息
来源: 评论
Secrecy capacity bounds for visible light communications with signal-dependent noise
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Jin-Yuan Fu, Xian-Tao Wang, Jun-Bo Lin, Min Cheng, Julian Alouini, Mohamed-Slim Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210003 China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing211111 China School of Engineering The University of British Columbia KelownaBCV1V 1V7 Canada Computer Electrical and Mathematical Science and Engineering Division King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia
In physical-layer security, one of the most fundamental issues is the secrecy capacity. The objective of this paper is to determine the secrecy capacity for an indoor visible light communication system consisting of a... 详细信息
来源: 评论
MAC-AC: A Novel Distributed MAC Protocol for Accessing Channel in Vehicular Ad Hoc Networks
MAC-AC: A Novel Distributed MAC Protocol for Accessing Chann...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Baozhu Li Fen Hou Changyue Zhang Shaohua Li Shujuan Ji Shanzhi Chen School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network-based Intelligent Computing Jinan China Faculty of Science and Technology University of Macau Macau China Automotive Research Institute China National Heavy Duty Truck Group Co. Ltd Jinan China Shandong Key Laboratory of Wisdom Mine Information Technology Qingdao China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China State Key Lab of Wireless Mobile Communication Beijing China China Academy of Telecommunication Technology Beijing China
As a promising paradigm, VANET has been attracting more and more attention from the industry and academia recently. However, due to rapid movement of vehicles and highly dynamic topology, designing efficient MAC proto... 详细信息
来源: 评论
Enhancing Security and Scalability in Software Defined LTE Core Networks
Enhancing Security and Scalability in Software Defined LTE C...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Ruichun Gu Xiaolong Zhang Lei Yu Junxing Zhang College of Computer Science Inner Mongolia University of Science and Technology Baotou China College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
The rapid development of mobile networks has revolutionized the way of accessing the Internet. The exponential growth of mobile subscribers, devices and various applications frequently brings about excessive traffic i... 详细信息
来源: 评论
When full duplex wireless meets non-orthogonal multiple access: Opportunities and challenges
arXiv
收藏 引用
arXiv 2019年
作者: Chen, Xianhao Liu, Gang Ma, Zheng Zhang, Xi Fan, Pingzhi Chen, Shanzhi Richard Yu, F. Key Lab of Information Coding and Transmission Southwest Jiaotong University Chengdu610031 China National Mobile Communications Research Laboratory Southeast University Department of Information Science and Engineering KTH Royal Institute of Technology Stockholm Sweden Key Lab of Information Coding and Transmission Southwest Jiaotong University Chengdu610031 China Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A&M University College StationTX77843 United States State Key Laboratory of Wireless Mobile Communications China Academy of Telecommunication Technology Beijing100191 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China Department of Systems and Computer Engineering Carleton University OttawaON Canada
Non-orthogonal multiple access (NOMA) is a promising radio access technology for the 5G wireless systems. The core of NOMA is to support multiple users in the same resource block via power or code domain multiplexing,... 详细信息
来源: 评论