咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 63 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 26 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 8 篇 信息与通信工程
    • 6 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 建筑学
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
    • 1 篇 城乡规划学
  • 14 篇 理学
    • 8 篇 数学
    • 8 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
  • 11 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 2 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 5 篇 computer archite...
  • 4 篇 grid computing
  • 4 篇 real-time system...
  • 4 篇 costs
  • 4 篇 semantics
  • 3 篇 deep learning
  • 3 篇 laboratories
  • 3 篇 authentication
  • 3 篇 protocols
  • 3 篇 blockchains
  • 3 篇 streaming media
  • 3 篇 open source soft...
  • 2 篇 computer science
  • 2 篇 base stations
  • 2 篇 real time system...
  • 2 篇 ontologies
  • 2 篇 resource managem...
  • 2 篇 predictive model...
  • 2 篇 databases
  • 2 篇 consensus algori...

机构

  • 10 篇 school of inform...
  • 8 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 engineering rese...
  • 4 篇 travelsky techno...
  • 4 篇 national enginee...
  • 3 篇 department of el...
  • 3 篇 china academy of...
  • 3 篇 institute for ne...
  • 3 篇 school of networ...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 3 篇 key laboratory o...
  • 2 篇 distributed comp...
  • 2 篇 key laboratory o...
  • 2 篇 jin yinhu labora...
  • 2 篇 beijing universi...
  • 2 篇 network interfac...
  • 2 篇 ministry of educ...
  • 2 篇 national enginee...

作者

  • 10 篇 songlin sun
  • 5 篇 dongbin wang
  • 4 篇 jiaqi zou
  • 4 篇 wang dongbin
  • 3 篇 shaokang wang
  • 2 篇 zhang tao
  • 2 篇 yang bo
  • 2 篇 min luo
  • 2 篇 gao yibo
  • 2 篇 zhang chao
  • 2 篇 gao hui
  • 2 篇 li zhen
  • 2 篇 han jing
  • 2 篇 xu mingying
  • 2 篇 xu shouhuai
  • 2 篇 zou deqing
  • 2 篇 li yating
  • 2 篇 lu yueming
  • 2 篇 xu zhang
  • 2 篇 hui zhi

语言

  • 57 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"机构=Network Distributed Computing Laboratory"
63 条 记 录,以下是51-60 订阅
排序:
A Hybrid Routing Algorithm based on Destruction Resistance Cost and Reliability in Flying Ad-Hoc networks
A Hybrid Routing Algorithm based on Destruction Resistance C...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Kun Guo Dongbin Wang Hui Zhi Yibo Gao Tao Zhang Tiejun Lv Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Beijing University of Posts and Telecommunications Beijing China TravelSky Technology Limited Beijing China Cyberspace Security Research Center Peng Cheng Laboratory Beijing University of Posts and Telecommunications Beijing China China Academy of Launch Vehicle Technology Beijing China
Existing routing algorithms in Flying Ad-Hoc Net- works (FANETs) lack the optimization consideration of destruction resistance cost caused by routing recovery when some nodes fail suddenly. In this paper, we propose a... 详细信息
来源: 评论
Remote Healthcare Monitoring System for Aging Population Based on IoT and Big Data Analysis
Remote Healthcare Monitoring System for Aging Population Bas...
收藏 引用
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
作者: Qiang Liu Songlin Sun Liang Gong Zhongle Wu Mohamed Cheriet Michel Kadoch National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Academy of Broadcasting Planning NRTA China ETS University of Quebec Montreal Canada
As the population ages, this will put tremendous pressure on pensions and the medical system. Health insurance for the elderly poses a major challenge to the allocation of limited medical resources. The Internet of Th... 详细信息
来源: 评论
SemHARQ: Semantic-Aware HARQ for Multi-task Semantic Communications
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Jiangjing Wang, Fengyu Xu, Wenjun Gao, Hui Zhang, Ping The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China The Peng Cheng Laboratory Shenzhen518066 China The Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China
Intelligent task-oriented semantic communications (SemComs) have witnessed great progress with the development of deep learning (DL). In this paper, we propose a semantic-aware hybrid automatic repeat request (SemHARQ... 详细信息
来源: 评论
Rate Control for VVC Intra Coding with Simplified Cubic Rate-Distortion Model
Rate Control for VVC Intra Coding with Simplified Cubic Rate...
收藏 引用
IEEE Workshop on Multimedia Signal Processing
作者: Yizhao Wang Jiaqi Zhang Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing China
In this paper, we propose a simplified cubic polynomial R-D model with corresponding rate control methods for Versatile Video Coding (VVC) intra frame coding. First, we explore the rate-distortion (R-D) characteristic...
来源: 评论
Joint resource management for MC-NOMA: A deep reinforcement learning approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Shaoyang Lv, Tiejun Ni, Wei Beaulieu, Norman C. Guo, Y. Jay Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Sydney2122 Australia Beijing Key Laboratory for Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Global Big Data Technologies Centre University of Technology Sydney UltimoNSW2007 Australia
This paper presents a novel and effective deep reinforcement learning (DRL)-based approach to addressing joint resource management (JRM) in a practical multi-carrier non-orthogonal multiple access (MC-NOMA) system, wh... 详细信息
来源: 评论
An Event-Driven Service-Oriented Architecture for the Internet of Things
An Event-Driven Service-Oriented Architecture for the Intern...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Lina Lan Fei Li Bai Wang Lei Zhang Ruisheng Shi School of Network Education Beijing University of Posts and Telecommunications Beijing China Information Systems Institute Vienna University of Technology Vienna Austria Beijing University of Posts and Telecommunications Beijing Beijing CN School of Computer Beijing University of Posts and Telecommunications Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
IoT (Internet of Things) bridges the physical world and information space. IoT services are environment sensitive and event-driven. The new IoT service architecture should adapt to these features. This paper analyses ... 详细信息
来源: 评论
An Improved CTU-level Rate Control Algorithm Based on Temporal Domain Motion Intensity
An Improved CTU-level Rate Control Algorithm Based on Tempor...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Shaokang Wang Songlin Sun Jiaqi Zou Ruotong Wu Zhilei Ling Xingtong Liu School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China Department of Electronics and Electrical Engineering University College London London UK Business School Beijing Normal University Beijing China
Rate control (RC) plays a vital role in Versatile Video Coding (VVC) and video transmission. However, the RC algorithm in VVC remains the problem that the process of updating model parameters only considers the impact...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Intellicise Wireless networks From Semantic Communications: A Survey, Research Issues, and Challenges
收藏 引用
IEEE Communications Surveys and Tutorials 2024年 1-1页
作者: Zhang, Ping Xu, Wenjun Liu, Yiming Qin, Xiaoqi Niu, Kai Cui, Shuguang Shi, Guangming Qin, Zhijin Xu, Xiaodong Wang, Fengyu Meng, Yue Dong, Chen Dai, Jincheng Yang, Qianqian Sun, Yaping Gao, Dahua Gao, Hui Han, Shujun Song, Xiaodan State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing China Shenzhen China Peng Cheng Laboratory Shenzhen China Department of Electronic Engineering Tsinghua University Beijing China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Ministry of Education Key Laboratory of Universal Wireless Communications Beijing University of Posts and Telecommunications Beijing China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China School of Artificial Intelligence Xidian University Xi’an China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Guangzhou Institute of Technology Xidian University Guangzhou China
Information and communication technology (ICT) has been an essential part of modern society. However, the current communication systems are not sufficient to meet the demands of emerging applications. Intellicise (int... 详细信息
来源: 评论