咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 15 篇 期刊文献

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 28 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 15 篇 信息与通信工程
    • 4 篇 光学工程
    • 4 篇 控制科学与工程
    • 3 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 水利工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 10 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 大气科学
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 6 篇 bandwidth
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 6 篇 computer network...
  • 5 篇 computer archite...
  • 5 篇 laboratories
  • 5 篇 humans
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 3 篇 public key crypt...
  • 3 篇 information anal...
  • 3 篇 proposals
  • 3 篇 application soft...
  • 3 篇 wdm networks
  • 3 篇 network topology
  • 3 篇 resource managem...
  • 3 篇 computer securit...
  • 3 篇 information secu...
  • 3 篇 multiprotocol la...
  • 3 篇 hardware

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 nanjing universi...
  • 4 篇 ericsson researc...
  • 4 篇 state key labora...
  • 4 篇 school of scienc...
  • 3 篇 laboratory of co...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing laborato...
  • 3 篇 beijing key labo...
  • 3 篇 key laboratory o...
  • 2 篇 beijing universi...
  • 2 篇 beijing universi...
  • 2 篇 key laboratory o...
  • 2 篇 beijing key labo...
  • 2 篇 university of sã...
  • 2 篇 institute of com...
  • 2 篇 department of ma...
  • 2 篇 laboratory of co...
  • 2 篇 the beijing key ...

作者

  • 9 篇 yang yang
  • 6 篇 huang haiping
  • 5 篇 zhu jie
  • 5 篇 nelson mimura go...
  • 4 篇 chen chen
  • 4 篇 wang yan
  • 4 篇 guo caili
  • 4 篇 tereza cristina ...
  • 4 篇 chen mingzhe
  • 4 篇 wilson vicente r...
  • 3 篇 davide careglio
  • 3 篇 ruggiero wilson ...
  • 3 篇 zhu zhiyu
  • 3 篇 caili guo
  • 3 篇 regina melo silv...
  • 3 篇 rosangela de fat...
  • 3 篇 ines brosso
  • 3 篇 walter akio goya
  • 3 篇 josep solé-paret...
  • 3 篇 hu yu-pu

语言

  • 70 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Laboratory of Computer Networks and Architecture"
73 条 记 录,以下是1-10 订阅
排序:
Path Optimization Method Under UAV Charging Scheduling Network  24th
Path Optimization Method Under UAV Charging Scheduling Netwo...
收藏 引用
24th International Conference on Algorithms and architectures for Parallel Processing, ICA3PP 2024
作者: Yang, Tingting Wang, Yiqian Zhu, Jie Chang, Shuyu Huang, Haiping Nanjing University of Posts and Telecommunications Nanjing210003 China State Key Laboratory Chinese of Computer Architecture Institute of Computing Technology Academy of Sciences Beijing100864 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210003 China
Unmanned Aerial Vehicles (UAVs) have emerged as integral components in logistics systems, where their potential for efficient delivery services is being explored. However, the limited battery capacity of UAVs poses a ... 详细信息
来源: 评论
Optimizing Self-training Sample Selection for Euphemism Detection in Special Scenarios  24th
Optimizing Self-training Sample Selection for Euphemism Dete...
收藏 引用
24th International Conference on Algorithms and architectures for Parallel Processing, ICA3PP 2024
作者: Zhang, Zhiwei Chang, Shuyu Huang, Haiping Wang, Rui Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210023 China Nanjing University of Posts and Telecommunications Nanjing210023 China State Key Laboratory Chinese of Computer Architecture Institute of Computing Technology Academy of Sciences Beijing100864 China
Euphemism, which is often used to disguise true intentions or soften the tone of speech, has garnered significant attention for its detection in recent years. Current approaches to euphemism detection struggle with un... 详细信息
来源: 评论
An effective meta-heuristics for trajectory planning problem in UAV-assisted vessel emission detection system
收藏 引用
Peer-to-Peer Networking and Applications 2025年 第4期18卷 1-21页
作者: Zhu, Jie Cui, Weizhi Huang, Haiping Zhu, Tao Sun, Yuzhong School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
With the development of the shipping industry, the pollution problem caused by vessel fuels is becoming increasingly severe. Due to the great mobility and on-demand service capability of Unmanned Aerial Vehicles (UAVs...
来源: 评论
Enhancing the Uplink of Cell-Free Massive MIMO Through Prioritized Sampling and Personalized Federated Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Mendoza, Charmae Franchesca Kaneko, Megumi Rupp, Markus Schwarz, Stefan Technische Universität Wien Institute of Telecommunications Sustainable Radio Access Networks Christian Doppler Laboratory Digital Twin Assisted AI Vienna1040 Austria National Institute of Informatics Information Systems Architecture Science Research Division Tokyo101-8430 Japan Department of Computer Science University of Tokyo Tokyo Japan Technische Universität Wien Institute of Telecommunications Vienna1040 Austria
Effective power control is key to solving the inter-user interference problem that degrades performance in cell-free massive multiple-input multiple-output (MIMO) systems. Motivated by its ability to operate online an... 详细信息
来源: 评论
Protection and restoration scheme for light-trail WDM ring networks
Protection and restoration scheme for light-trail WDM ring n...
收藏 引用
2005 Conference onOptical Network Design and Modelling: Towards the broadband-for-all era, ONDM 2005
作者: Gumaste, Ashwin Zheng, Si Qing Advanced Computer Networks and Architecture Laboratory University of Texas Dallas TX 75083
In this paper we propose a protection strategy for light-trail [1-4] networks for ring topologies. A light-trail is a multi-point lightpath, such that multiple users can take part in communication along the trail, thr... 详细信息
来源: 评论
Linear complexity of sequences produced by single cycle T-function
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第4期18卷 123-128页
作者: WANG Yan HU Yu-pu LI Shun-bo YANG Yang Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ... 详细信息
来源: 评论
On the nonlinearity of some T-functions
收藏 引用
Journal of Information and Computational Science 2011年 第11期8卷 2231-2237页
作者: Wang, Yan Hu, Yupu Li, Shunbo Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Single cycle T-functions are newly proposed components in stream cipher. In order to verify if such function is suitable for cipher design, the cryptographic properties of single cycle T-function are discussed. Nonlin... 详细信息
来源: 评论
Revisiting the security of the ALRED design and two of its variants: Marvin and lettersoup
Revisiting the security of the ALRED design and two of its v...
收藏 引用
作者: Simplicio Jr., Marcos A. Barreto, Paulo S.L.M. Laboratory of Computer Architecture and Networks Escola Politécnica University of São Paulo 04023-900 Brazil
The Alred construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secur... 详细信息
来源: 评论
A business model for video transmission services using dynamic adaptation streaming over HTTP  9
A business model for video transmission services using dynam...
收藏 引用
9th Advanced International Conference on Telecommunications, AICT 2013
作者: Rodríguez, Demóstenes Zegarra Rosa, Renata Lopes Bressan, Graça Laboratory of Computer Architecture and Networks Computer and Digital System Engineering Department University of São Paulo São Paulo Brazil
A business model for video transmission services is proposed that uses the Dynamic Adaptation Streaming over HTTP (DASH) mechanism using different versions of the same video. These video versions are encoded using dif... 详细信息
来源: 评论
Towards bandwidth optimization in fog computing using FACE framework  7
Towards bandwidth optimization in fog computing using FACE f...
收藏 引用
7th International Conference on Cloud Computing and Services Science, CLOSER 2017
作者: De Fátima Pereira Marquesone, Rosangela Da Silva, Érico Augusto Gonzalez, Nelson Mimura Langona, Karen Goya, Walter Akio Redígolo, Fernando Frota De Brito Carvalho, Tereza Cristina Melo Mangs, Jan-Erik Sefidcon, Azimeh Laboratory of Computer Networks and Architecture Escola Politecnica University of São Paulo Brazil Ericsson Research Sweden
The continuous growth of data created by Internet-connected devices has been posing a challenge for mobile operators. The increase in the network traffic has exceeded the network capacity to efficiently provide servic... 详细信息
来源: 评论