咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 76 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 30 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 17 篇 信息与通信工程
    • 5 篇 光学工程
    • 5 篇 控制科学与工程
    • 4 篇 电气工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 交通运输工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 14 篇 理学
    • 10 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 大气科学
    • 1 篇 生物学
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 1 篇 医学

主题

  • 6 篇 bandwidth
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 6 篇 computer network...
  • 5 篇 computer archite...
  • 5 篇 laboratories
  • 5 篇 humans
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 3 篇 public key crypt...
  • 3 篇 information anal...
  • 3 篇 proposals
  • 3 篇 application soft...
  • 3 篇 wdm networks
  • 3 篇 network topology
  • 3 篇 resource managem...
  • 3 篇 computer securit...
  • 3 篇 information secu...
  • 3 篇 multiprotocol la...
  • 3 篇 hardware

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 nanjing universi...
  • 4 篇 ericsson researc...
  • 4 篇 state key labora...
  • 4 篇 beijing laborato...
  • 4 篇 beijing key labo...
  • 4 篇 school of scienc...
  • 3 篇 beijing universi...
  • 3 篇 laboratory of co...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing universi...
  • 3 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 beijing key labo...
  • 2 篇 university of sã...
  • 2 篇 institute of com...
  • 2 篇 department of ma...
  • 2 篇 laboratory of co...
  • 2 篇 the beijing key ...

作者

  • 11 篇 yang yang
  • 6 篇 guo caili
  • 6 篇 huang haiping
  • 6 篇 chen mingzhe
  • 5 篇 zhu jie
  • 5 篇 nelson mimura go...
  • 4 篇 chen chen
  • 4 篇 wang yan
  • 4 篇 tereza cristina ...
  • 4 篇 wilson vicente r...
  • 3 篇 davide careglio
  • 3 篇 ruggiero wilson ...
  • 3 篇 zhu zhiyu
  • 3 篇 caili guo
  • 3 篇 regina melo silv...
  • 3 篇 rosangela de fat...
  • 3 篇 ines brosso
  • 3 篇 walter akio goya
  • 3 篇 josep solé-paret...
  • 3 篇 hu yu-pu

语言

  • 71 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Laboratory of Computer Networks and Architecture"
76 条 记 录,以下是41-50 订阅
排序:
On the nonlinearity of some T-functions
收藏 引用
Journal of Information and Computational Science 2011年 第11期8卷 2231-2237页
作者: Wang, Yan Hu, Yupu Li, Shunbo Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Single cycle T-functions are newly proposed components in stream cipher. In order to verify if such function is suitable for cipher design, the cryptographic properties of single cycle T-function are discussed. Nonlin... 详细信息
来源: 评论
Novel Differentiated Service Methodology Based on Constrained Allocation of Resources for Transparent WDM Backbone networks
Novel Differentiated Service Methodology Based on Constraine...
收藏 引用
Brazilian Symposium on computer networks and Distributed Systems (SBRC)
作者: Joana Sócrates-Dantas Regina Melo Silveira Davide Careglio José Roberto Amazonas Josep Solé-Pareta Wilson Vicente Ruggiero Laboratory of Computer Networks and Architecture (LARC) Laboratory of Communications and Signal (LCS) Escola Politécnica da Universidade de São Paulo (EPUSP) São Paulo Brazil Department of Computer Architecture (DAC) Technical University of Catalonia (UPC) Barcelona Spain
Current Internet traffic comprises diverse service requirements. Service providers differentiate connections characteristics according to demand's requirements and pricing policy. In this paper we propose a differ... 详细信息
来源: 评论
Improving QoS of web service composition by dynamic configuration
收藏 引用
Information Technology Journal 2010年 第3期9卷 422-429页
作者: Yang, Huaizhou Li, Zengzhi Institute of Computer Architecture and Networks Xi'an Jiaotong University Xi'an 710049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In order to achieve self-adaptation to run-time environment and self-management of Web service composition, an extended hierarchical Petri net is presented to reflect the feasible configuration scheme of composite ser... 详细信息
来源: 评论
Known User Continuous Authentication System for Consumer Application Software
Known User Continuous Authentication System for Consumer App...
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Ines Brosso Graca Bressan Wilson V. Ruggiero College of Computation and Informatics Mackenzie Presbyterian University Sao Paulo Brazil Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Polytechnic of São Paulo University Brazil
This paper presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users/consumers. The KUCAS system makes use of environment... 详细信息
来源: 评论
Extended GSPN modeling and reduction algorithms for rapid performance analysis of service composition system
Extended GSPN modeling and reduction algorithms for rapid pe...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Huaizhou Yang Zengzhi Li State Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing China Institute of Computer Architecture & Networks Xi''an Jiaotong University Xi'an China
A service composition system can be constructed via integration and collaboration of many component services. The system performance needs to be obtained rapidly for the purpose of dynamic and adaptive management. An ... 详细信息
来源: 评论
An Adaptive UAV Scheduling Process to Address Dynamic Mobile Network Demand Efficiently
An Adaptive UAV Scheduling Process to Address Dynamic Mobile...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Ruide Cao Jiao Ye Jin Zhang Qian You Chao Tang Yan Liu Yi Wang Institute of Future Networks DET of Heyuan School of Architecture and Urban Planning SZU Department of Computer Science and Engineering Peng Cheng Laboratory School of Design SUSTech
Benefiting from high flexibility and probability of line-of-sight, deploying unmanned aerial vehicles (UAV s) as aerial access points has emerged as a promising solution for ensuring reliable wireless connectivity in ... 详细信息
来源: 评论
An Efficient Pricing Based Protocol for Broadcasting in Wireless Ad hoc networks
An Efficient Pricing Based Protocol for Broadcasting in Wire...
收藏 引用
International Conference on Communication Systems Software and Middleware (COMSWARE)
作者: N.R. Suri Y. Narahari D. Manjunath Department of Computer Science and Automation Indian Institute of Science Bangalore India Networks Architecture Laboratory Electrical and Communications Engineering Indian Institute of Science Bangalore India
In many applications of wireless ad hoc networks, wireless nodes are owned by rational and intelligent users. In this paper, we call nodes selfish if they are owned by independent users and their only objective is to ... 详细信息
来源: 评论
Mean Shift Based Collaborative Localization with Dynamically Clustering for Wireless Sensor networks
Mean Shift Based Collaborative Localization with Dynamically...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Quan Zhou Xiaowei Li Yongjun Xu Institute of Computing Technology Key Laboratory of Computer System and Architecture Chinese Academy and Sciences Beijing China Institute of Computing Technology Laboratory of Sensor Networks Chinese Academy and Sciences Beijing China
Mean shift is a nonparametric method to estimate the density gradient, which iteratively computes the mean of observations and shifts to the centroid until reach a predefined end condition. This paper proposes a mean ... 详细信息
来源: 评论
Experimental investigation of multi-wavelength clock recovery based on a quantum-dot SOA at 40 Gb/s
Experimental investigation of multi-wavelength clock recover...
收藏 引用
Signal Processing in Photonic Communications, SPPCom 2010
作者: Spyropoulou, M. Bonk, R. Hillerkuss, D. Pleros, N. Vallaitis, T. Freude, W. Tomkos, I. Leuthold, J. Aristotle University of Thessaloniki Department of Informatics Computer Architecture and Communications Laboratory Thessaloniki 54142 Greece Institute of Photonics and Quantum Electronics Karlsruhe Institute of Technology Engesserstr. 5 76131 Karlsruhe Germany Athens Information Technology High speed networks and optical communications Markopoulou Av. 19002 Peania-Attica Greece
We study single and multi-wavelength clock recovery functionality based on a fabry-pérot filter followed by a quantum-dot SOA at 40 Gb/s and we demonstrate its performance for various pseudo-random binary sequenc... 详细信息
来源: 评论
Smallest Enclosing Circle Based Localization Approach for Wireless Sensor networks
Smallest Enclosing Circle Based Localization Approach for Wi...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Quan Zhou Xiaowei Li Yongjun Xu Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences Beijing China Laboratory of Sensor Networks Institute of Computing Technology Chinese Academy and Sciences Beijing China
A novel range-free localization approach, smallest enclosing Circle based Localization (SECL), has been proposed. This approach uses the center of smallest enclosing circle of neighboring anchor nodes to estimate the ... 详细信息
来源: 评论