咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 76 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 30 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 17 篇 信息与通信工程
    • 5 篇 光学工程
    • 5 篇 控制科学与工程
    • 4 篇 电气工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 交通运输工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 14 篇 理学
    • 10 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 大气科学
    • 1 篇 生物学
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 1 篇 医学

主题

  • 6 篇 bandwidth
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 6 篇 computer network...
  • 5 篇 computer archite...
  • 5 篇 laboratories
  • 5 篇 humans
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 3 篇 public key crypt...
  • 3 篇 information anal...
  • 3 篇 proposals
  • 3 篇 application soft...
  • 3 篇 wdm networks
  • 3 篇 network topology
  • 3 篇 resource managem...
  • 3 篇 computer securit...
  • 3 篇 information secu...
  • 3 篇 multiprotocol la...
  • 3 篇 hardware

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 nanjing universi...
  • 4 篇 ericsson researc...
  • 4 篇 state key labora...
  • 4 篇 beijing laborato...
  • 4 篇 beijing key labo...
  • 4 篇 school of scienc...
  • 3 篇 beijing universi...
  • 3 篇 laboratory of co...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing universi...
  • 3 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 beijing key labo...
  • 2 篇 university of sã...
  • 2 篇 institute of com...
  • 2 篇 department of ma...
  • 2 篇 laboratory of co...
  • 2 篇 the beijing key ...

作者

  • 11 篇 yang yang
  • 6 篇 guo caili
  • 6 篇 huang haiping
  • 6 篇 chen mingzhe
  • 5 篇 zhu jie
  • 5 篇 nelson mimura go...
  • 4 篇 chen chen
  • 4 篇 wang yan
  • 4 篇 tereza cristina ...
  • 4 篇 wilson vicente r...
  • 3 篇 davide careglio
  • 3 篇 ruggiero wilson ...
  • 3 篇 zhu zhiyu
  • 3 篇 caili guo
  • 3 篇 regina melo silv...
  • 3 篇 rosangela de fat...
  • 3 篇 ines brosso
  • 3 篇 walter akio goya
  • 3 篇 josep solé-paret...
  • 3 篇 hu yu-pu

语言

  • 71 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Laboratory of Computer Networks and Architecture"
76 条 记 录,以下是11-20 订阅
排序:
Towards bandwidth optimization in fog computing using FACE framework  7
Towards bandwidth optimization in fog computing using FACE f...
收藏 引用
7th International Conference on Cloud Computing and Services Science, CLOSER 2017
作者: De Fátima Pereira Marquesone, Rosangela Da Silva, Érico Augusto Gonzalez, Nelson Mimura Langona, Karen Goya, Walter Akio Redígolo, Fernando Frota De Brito Carvalho, Tereza Cristina Melo Mangs, Jan-Erik Sefidcon, Azimeh Laboratory of Computer Networks and Architecture Escola Politecnica University of São Paulo Brazil Ericsson Research Sweden
The continuous growth of data created by Internet-connected devices has been posing a challenge for mobile operators. The increase in the network traffic has exceeded the network capacity to efficiently provide servic... 详细信息
来源: 评论
The CURUPIRA-2 block cipher for constrained platforms: Specification and benchmarking
The CURUPIRA-2 block cipher for constrained platforms: Speci...
收藏 引用
1st International Workshop on Privacy in Location-Based Applications, PiLBA 2008
作者: Simplicio Jr., Marcos Barreto, Paulo S. L. M. Carvalho, Tereza C. M. B. Margi, Cintia B. Naslund, Mats Laboratory of Computer Architecture and Networks PCS-EP University of São Paulo Brazil Ericsson Research-Stockholm Sweden
Privacy is a key concern in Location Based Applications (LBAs), especially due to their intensive use resource constrained devices in which general purpose ciphers are dificult to deploy. In this paper, we address thi... 详细信息
来源: 评论
Metadata in digital video repositories: An analysis on author-generated metadata
Metadata in digital video repositories: An analysis on autho...
收藏 引用
2010 International Conference on Information Society, i-Society 2010
作者: Dantas, Joana Socrates Silveira, Regina Melo Ruggiero, Wilson Vicente LARC-Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Escola Politécnica da Universidade São Paulo Brazil
The growth of digital content generation and its access by the general public have, for the past few years, promoted the importance of resources' metadata, and enhanced the debate on their generation and quality. ... 详细信息
来源: 评论
Cluster-Based Interference-Free MAC Protocol with Load Aware in Software Defined VANET
收藏 引用
China Communications 2020年 第12期17卷 217-234页
作者: Yangshui Gao Tao Luo Xinxin He Zhilong Zhang Beijing Laboratory of Advanced Information Networks Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and TelecommunicationsBeijing 100876China School of Mathematics and Computer Dali UniversityDali 671003China
In order to reduce the interference,a novel,cluster-based medium access control(MAC)protocol with load aware for VANETs is proposed in this ***,all vehicles on roads are grouped into stable clusters in the light of th... 详细信息
来源: 评论
Cryptanalysis of dragon scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第4期17卷 80-87页
作者: YUAN Feng HU Yu-pu WANG Yan OU Hai-wen Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Science Xi'an University of Architecture and Technology Xi'an 710055 China Key Laboratory of Information Security Beijing Electronic Science and Technology Institute Beijing 100070 China
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an ... 详细信息
来源: 评论
Joint Optimization of Latency and Energy Consumption for Mobile Edge Computing Based Proximity Detection in Road networks
收藏 引用
China Communications 2022年 第4期19卷 274-290页
作者: Tongyu Zhao Yaqiong Liu Guochu Shou Xinwei Yao School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Laboratory of Advanced Information Networks Beijing Key Laboratory of Network System Architecture and ConvergenceBeijing 100876China School of Computer Science and Technology Zhejiang University of TechnologyChina
In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refe... 详细信息
来源: 评论
Spectrum efficiency maximization with trajectory design in UAV-enabled mobile relaying
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第4期26卷 17-24页
作者: Sun Chuanzhi Hu Zhiqun Wen Xiangming Lu Zhaoming Qi Hang Beijing Laboratory of Advanced Information Networks Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and TelecommunicationsBeijing 100876China School of Computer and Information Engineering Hubei UniversityWuhan 430062China
With the advantages of low cost and high mobility,unmanned aerial vehicles(UAVs)have played an important role in wireless *** investigate a UAV-enabled mobile relaying system,where a UAV is used as a mobile relay to a... 详细信息
来源: 评论
Recommendation system based on user profile extracted from an IMS network with emphasis on social network and digital TV
Recommendation system based on user profile extracted from a...
收藏 引用
6th IFIP/ACM Latin America Networking Conference, LANC 2011
作者: Rosa, Renata Lopes Rodríguez, Demóstenes Zegarra De Sousa Jr., Vicente Angelo Bressan, Graça Laboratory of Computer Networks and Architecture Escola Politécnica University of São Paulo Brazil Federal University of Natal Natal RGN Brazil
This paper introduces new network architecture capable of providing a flexible and configurable Recommendation System in which network operator, subscribers and content providers could interact to each other by messag... 详细信息
来源: 评论
A process for text recognition of generic identification documents over cloud computing
A process for text recognition of generic identification doc...
收藏 引用
2016 International Conference on Image Processing, computer Vision, and Pattern Recognition, IPCV 2016
作者: Valiente, Rodolfo Sadaike, Marcelo T. Gutiérrez, José C. Soriano, Daniel F. Bressan, Graça Ruggiero, Wilson V. Laboratory of Computer Architecture and Networks Escola Politénica da Universidade de São Paulo São Paulo SP Brazil
- A process for accurate text recognition of generic identification documents (ID) over cloud computing is presented. It consists of two steps, first, a smartphone camera takes a picture of the ID, which is sent to a ... 详细信息
来源: 评论
Security analysis of projected C*- scheme
Security analysis of projected C*- scheme
收藏 引用
International Conference on Multimedia Information Networking and Security
作者: Yuan, Feng Hu, Yupu Wang, Yan Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China School of Science Xi'an University of Architecture and Technology Xi'an China
This paper investigates the security of the projected C*- cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weakne... 详细信息
来源: 评论