咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 13 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 45 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 36 篇 软件工程
    • 9 篇 电气工程
    • 8 篇 控制科学与工程
    • 7 篇 仪器科学与技术
    • 7 篇 交通运输工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 航空宇航科学与技...
    • 2 篇 农业工程
  • 26 篇 理学
    • 17 篇 数学
    • 6 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 物理学
    • 2 篇 化学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 18 篇 computer network...
  • 14 篇 mobile computing
  • 12 篇 privacy
  • 12 篇 wireless network...
  • 11 篇 mobile communica...
  • 10 篇 routing
  • 10 篇 throughput
  • 10 篇 bandwidth
  • 10 篇 differential pri...
  • 10 篇 protocols
  • 9 篇 next generation ...
  • 9 篇 intelligent netw...
  • 8 篇 computer archite...
  • 8 篇 mobile radio mob...
  • 8 篇 wireless communi...
  • 8 篇 quality of servi...
  • 8 篇 network coding
  • 8 篇 hardware
  • 8 篇 mimo
  • 7 篇 laboratories

机构

  • 22 篇 college of compu...
  • 19 篇 inner mongolia a...
  • 14 篇 national mobile ...
  • 14 篇 intel collaborat...
  • 11 篇 inner mongolia k...
  • 10 篇 inner mongolia k...
  • 9 篇 inner mongolia k...
  • 6 篇 inner mongolia k...
  • 5 篇 inner mongolia a...
  • 4 篇 engineering rese...
  • 4 篇 inner mongolia u...
  • 3 篇 department of co...
  • 3 篇 college of compu...
  • 3 篇 mobile computing...
  • 2 篇 wireless network...
  • 2 篇 college of compu...
  • 2 篇 state key labora...
  • 2 篇 national mobile ...
  • 2 篇 ordos dongsheng ...
  • 2 篇 networking techn...

作者

  • 29 篇 xiangyu bai
  • 19 篇 samuel pierre
  • 16 篇 xiaohu you
  • 16 篇 chuan zhang
  • 13 篇 s. pierre
  • 13 篇 bai xiangyu
  • 11 篇 baoqi huang
  • 10 篇 xuebin ma
  • 9 篇 shugong xu
  • 9 篇 bo cui
  • 8 篇 xu gang
  • 8 篇 huang baoqi
  • 7 篇 pierre samuel
  • 7 篇 kexin zhou
  • 7 篇 gang xu
  • 7 篇 cui bo
  • 7 篇 jia bing
  • 6 篇 yuanzhu chen
  • 6 篇 zhaoran wang
  • 6 篇 shunqing zhang

语言

  • 163 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Networking and Mobile Computing Laboratory"
166 条 记 录,以下是21-30 订阅
排序:
CLPSD: Detecting Ethereum Phishing Scams based on Curriculum Learning
CLPSD: Detecting Ethereum Phishing Scams based on Curriculum...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wenhan Hou Bo Cui Yongxin Chen Ru Li Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot China
Phishing scams have become one of the primary frauds on Ethereum, leading to substantial financial losses for users. Therefore, developing an effective phishing detection method for Ethereum holds significant importan...
来源: 评论
Differential Privacy Frequent Closed Itemset Mining over Data Stream
Differential Privacy Frequent Closed Itemset Mining over Dat...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Xuebin Ma Shengyi Guan Yanan Lang Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University Hohhot China
As the most common technique for mining and analyzing massive data, frequent itemset mining is widely used in various scenarios. However, when the data contains sensitive information, it will bring serious privacy lea... 详细信息
来源: 评论
Seed Node Selection Algorithm Based on Node Influence in Opportunistic Offloading  28
Seed Node Selection Algorithm Based on Node Influence in Opp...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Tang, Qi Hang, Ruijie Xu, Gang Zhang, Gaofeng Li, Shuai Huang, Baoqi College of Computer Science Inner Mongolia University Hohhot010021 China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China Ordos Dongsheng Manshi Middle School Ordos017000 China
As a kind of mobile traffic offloading technology, opportunistic triage downloads and distributes data through seed nodes. Therefore, how to efficiently and accurately select suitable seed nodes becomes a key problem ... 详细信息
来源: 评论
2-Hop Routing Strategy for Overlapping Communities based on Social Intimacy  25
2-Hop Routing Strategy for Overlapping Communities based on ...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Liu, Zhanguo Xu, Gang Cheng, Yuan Huang, Baoqi Bai, Xiangyu Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China Inner Mongolia University College of Computer Science Hohhot010021 China
In an opportunistic network with social attributes, the selection of relay nodes is mainly done according to community division. In the social opportunity network, community partition is the key to reducing data forwa... 详细信息
来源: 评论
GA-SVR Traffic Flow Prediction Based on Phase Space Reconstruction with Improved KNN Method  25
GA-SVR Traffic Flow Prediction Based on Phase Space Reconstr...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Li, Jia Xu, Gang Huang, Baoqi Bai, Xiangyu Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China College of Computer Science Inner Mongolia University Hohhot010021 China
Traffic flow prediction plays an important role in intelligent traffic management. In order to solve the problem that the prediction model has low accuracy in traffic flow prediction when the amount of data is small. ... 详细信息
来源: 评论
Short-Time Traffic Flow Prediction Based on K-means++ and LSTM  20
Short-Time Traffic Flow Prediction Based on K-means++ and LS...
收藏 引用
20th IEEE International Symposium on Parallel and Distributed Processing with Applications, 12th IEEE International Conference on Big Data and Cloud computing, 12th IEEE International Conference on Sustainable computing and Communications and 15th IEEE International Conference on Social computing and networking, ISPA/BDCloud/SocialCom/SustainCom 2022
作者: Li, Jia Xu, Gang Cheng, Yuan Huang, Baoqi Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China College of Computer Science Inner Mongolia University Hohhot010021 China
With the gradual increase in the number of vehicles owned by people, the problem of urban traffic congestion is becoming more and more serious. Timely and accurate traffic flow prediction helps travel vehicles to plan... 详细信息
来源: 评论
Investigation on Analog and Digital Modulations Recognition Using Machine Learning Algorithms
收藏 引用
World Journal of Engineering and Technology 2024年 第4期12卷 867-884页
作者: Jean Ndoumbe Ivan Basile Kabeina Gaelle Patricia Talotsing Soubiel-Noël Nkomo Biloo Laboratory of Computer Engineering Data Science and Artificial Intelligence National Higher Polytechnic School of Douala Douala Cameroon Mobile Computing and Networking Research Laboratory Department of Computer and Software Engineering Polytechnique Montreal Montreal Canada
In the field of radiocommunication, modulation type identification is one of the most important characteristics in signal processing. This study aims to implement a modulation recognition system on two approaches to m... 详细信息
来源: 评论
Progress and Challenges of Polymorphic Smart Networks
Progress and Challenges of Polymorphic Smart Networks
收藏 引用
Asia-Pacific Network Operations and Management Symposium (APNOMS)
作者: Peixin Liu Xiangyu Bai Zhaoran Wang Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Inner Mongolia University Hohhot China
The current Internet infrastructure and technology system faces major challenges in intelligent, diversified, personalized, highly robust, efficient and other aspects, and it is urgent to reform the network infrastruc...
来源: 评论
Review of Ecological Environment Monitoring Methods of Northern Wetland in Inner Mongolia Based on WSN
Review of Ecological Environment Monitoring Methods of North...
收藏 引用
IEEE International Conference on Communication and Information Systems (ICCIS)
作者: Wenyu Li Xiangyu Bai Kexin Zhou Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Inner Mongolia University Hohhot China
Wetland ecosystem is a special ecosystem, which refers to the area where water and land intersect, including swamps, rivers, lakes, estuaries, bays, etc. These areas usually have special biodiversity and ecological fu...
来源: 评论
An Overview of Intelligent Algorithm-Based Routing in Delay Tolerant Networks
An Overview of Intelligent Algorithm-Based Routing in Delay ...
收藏 引用
International Conference on Computers, Communications, and Systems (ICCCS)
作者: Lei Yao Xiangyu Bai Zhaoran Wang Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Inner Mongolia University Hohhot China
Delay tolerant network (DTN) is a new paradigm with the development of wireless technology and mobile Ad-hoc network (MANET). Unlike the stable end-to-end connection in the traditional network, the storage - carry - f...
来源: 评论