咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 48 篇 期刊文献

馆藏范围

  • 112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 53 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 28 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 11 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 交通运输工程
    • 2 篇 建筑学
    • 2 篇 船舶与海洋工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 环境科学与工程(可...
  • 37 篇 理学
    • 24 篇 数学
    • 8 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 海洋科学
  • 22 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 法学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 4 篇 gyroscopes
  • 4 篇 wireless sensor ...
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 wireless communi...
  • 3 篇 servers
  • 3 篇 switches
  • 3 篇 computational mo...
  • 3 篇 middleware
  • 3 篇 virtualization
  • 3 篇 mathematical mod...
  • 3 篇 energy efficienc...
  • 2 篇 complex networks
  • 2 篇 access control
  • 2 篇 support vector m...
  • 2 篇 base stations
  • 2 篇 relays
  • 2 篇 sensitivity
  • 2 篇 image segmentati...
  • 2 篇 image edge detec...

机构

  • 7 篇 computer enginee...
  • 7 篇 school of comput...
  • 6 篇 department of co...
  • 5 篇 school of softwa...
  • 5 篇 state key labora...
  • 4 篇 college of compu...
  • 4 篇 complex networks...
  • 4 篇 state key labora...
  • 4 篇 xidian universit...
  • 4 篇 school of softwa...
  • 3 篇 state key labora...
  • 3 篇 school of softwa...
  • 3 篇 state key labora...
  • 3 篇 peng cheng labor...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 shenzhen univers...
  • 3 篇 jiangsu high tec...
  • 3 篇 shanghai key lab...
  • 2 篇 school of mathem...

作者

  • 4 篇 haqiq abdelkrim
  • 4 篇 xiang cheng
  • 4 篇 leung victor c.m...
  • 4 篇 rongqing zhang
  • 4 篇 kim dong seong
  • 3 篇 peng chunlei
  • 3 篇 liuqing yang
  • 3 篇 li zhengbin
  • 3 篇 leung victor c.m
  • 3 篇 liu decheng
  • 3 篇 he jing
  • 3 篇 chen yanjun
  • 3 篇 zhou tong
  • 3 篇 wang nannan
  • 3 篇 zhang haijun
  • 3 篇 cao yuwen
  • 2 篇 niyato dusit
  • 2 篇 li peng
  • 2 篇 liu bo
  • 2 篇 yuwen cao

语言

  • 106 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"机构=Laboratory for Software Engineering and Computer Networks"
112 条 记 录,以下是51-60 订阅
排序:
Granger-Causality Mining in Atmospheric Visibility Based on Deep Learning  9th
Granger-Causality Mining in Atmospheric Visibility Based on ...
收藏 引用
9th International Conference on Frontier Computing, FC 2019
作者: Liu, Bo He, Xi Li, Jianqiang Qu, Guangzhi Lang, Jianlei Gu, Rentao Faculty of Information Technology School of Software Engineering Beijing University of Technology Beijing100124 China Computer Science and Engineering Department Oakland University RochesterMI48309 United States Key Laboratory of Beijing on Regional Air Pollution Control College of Environmental and Energy Engineering Beijing University of Technology Beijing100124 China Beijing Laboratory of Advanced Information Networks School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China
Causal relationship mining of multi-dimensional meteorological time series data can reveal the potential connection between visibility and other influencing factors, and it is meaningful in terms of environmental mana... 详细信息
来源: 评论
A NOMA Power Allocation Strategy Based on Genetic Algorithm  8th
A NOMA Power Allocation Strategy Based on Genetic Algorithm
收藏 引用
8th International Conference on Communications, Signal Processing, and Systems, CSPS 2019
作者: Yin, Lu Chenggong, Wang Kai, Mao Kuanxin, Bao Haowei, Bian Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
The NOMA technology uses the power domain non-orthogonal multiplexing method to enable multiple users to occupy the entire frequency band simultaneously to transmit signals. In order to maximize the total transmission... 详细信息
来源: 评论
Generating superpixels for high-resolution images with Decoupled Patch Calibration
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi'an Jiaotong University Xi'an710049 China School of Computer and Information Technology Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an710049 China The SMILES Laboratory Xi'an Jiaotong University Xi'an710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi'an Jiaotong University Xi'an710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
Superpixel segmentation has recently seen important progress benefiting from the advances in differentiable deep learning. However, the very high-resolution superpixel segmentation still remains challenging due to the... 详细信息
来源: 评论
Graph-Based File Dispatching Protocol With D2D-Aided UAV-NOMA Communications in Large-Scale networks
Graph-Based File Dispatching Protocol With D2D-Aided UAV-NOM...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Baoji Wang Rongqing Zhang Chen Chen Xiang Cheng Liuqing Yan State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronics School of Electronics Engineering and Computer Science Peking University Beijing China school of Software Engineering Tongji University Shanghai China Department of Electrical & Computer Engineering Colorado State University CO USA
Unmanned aerial vehicle (UAV)-assisted communications are expected to become an important part of the next generation mobile communication systems, due to the high mobility of the UAVs. Non-orthogonal multiple access ...
来源: 评论
LSTM-Based Channel Prediction for Secure Massive MIMO Communications Under Imperfect CSI
LSTM-Based Channel Prediction for Secure Massive MIMO Commun...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Tenghui Peng Rongqing Zhang Xiang Cheng Liuqing Yang School of Software Engineering Tongji University Shanghai China State Key Laboratory of Advanced Optical Communication Systems and Networks Peking University Beijing China Department of Electrical and Computer Engineering Colorado State University CO USA
In recent years, massive multiple-input multiple-output (MIMO) has been regarded as a promising technique in the fifth-generation (5G) communication systems. With the ability of focusing transmission beams on users, m... 详细信息
来源: 评论
A NOMA Power Allocation Method Based on Greedy Algorithm  8th
A NOMA Power Allocation Method Based on Greedy Algorithm
收藏 引用
8th International Conference on Communications, Signal Processing, and Systems, CSPS 2019
作者: Lu, Yin Chen, Shuai Mao, Kai Bian, Haowei Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Nanjing University of Posts and Telecommunications Ministry of Education Nanjing210003 China Nanjing University of Posts and Telecommunications Nanjing210003 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
In the existing Non-Orthogonal Multiple Access power allocation algorithm, the iterative water-filling algorithm is a commonly used algorithm, which has good performance but high complexity. In order to reduce the com... 详细信息
来源: 评论
ReGO: Reference-Guided Outpainting for Scenery Image
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi’an Jiaotong University Xi'An710049 China Institute of Information Science Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi’an Jiaotong University Xi'An710049 China The SMILES Laboratory Xi’an Jiaotong University Xi'An710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi’an Jiaotong University Xi'An710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
We aim to tackle the challenging yet practical scenery image outpainting task in this work. Recently, generative adversarial learning has significantly advanced the image outpainting by producing semantic consistent c... 详细信息
来源: 评论
BiLock: User authentication via dental occlusion biometrics
收藏 引用
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2018年 第3期2卷 1-20页
作者: Zou, Yongpan Zhao, Meng Zhou, Zimu Lin, Jiawei Li, Mo Wu, Kaishun College of Computer Science and Software Engineering Shenzhen University China Computer Engineering and Networks Laboratory ETH Zurich Switzerland School of Computer Science and Engineering Nanyang Technological University Singapore
User authentication on smart devices is indispensable to keep data privacy and security. It is especially significant for emerging wearable devices such as smartwatches considering data sensitivity in them. However, c... 详细信息
来源: 评论
CellTradeMap: Delineating Trade Areas for Urban Commercial Districts with Cellular networks
CellTradeMap: Delineating Trade Areas for Urban Commercial D...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yi Zhao Zimu Zhou Xu Wang Tongtong Liu Yunhao Liu Zheng Yang School of Software and BNRist Tsinghua University Computer Engineering and Networks Laboratory ETH Zurich Department of Computer Science and Engineering Michigan State University
Understanding customer mobility patterns to commercial districts is crucial for urban planning, facility management, and business strategies. Trade areas are a widely applied measure to quantity where the visitors are... 详细信息
来源: 评论
Fuzzy Association Rule Mining Algorithm Based on Load Classifier  6th
Fuzzy Association Rule Mining Algorithm Based on Load Classi...
收藏 引用
6th International Conference on Data Science, ICDS 2019
作者: Chen, Jing Zheng, Hui Li, Peng Zhang, Zhenjiang Li, Huawei Liu, Wei School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks NanjingJiangsu Province210003 China Baotou Teachers’ College of Inner Mongolia University of Science and Technology BaotouInner Mongolia014030 China School of Software Engineering Beijing Jiaotong University Beijing100044 China Institute of Computing Technology Chinese Academy of Science Beijing100044 China
In this paper, the fuzzy association algorithm based on Load Classifier is proposed to study the fuzzy association rules of numerical data flow. A method of dynamic partitioning of data blocks by load classifier for d... 详细信息
来源: 评论