咨询与建议

限定检索结果

文献类型

  • 14,153 篇 会议
  • 11,085 篇 期刊文献
  • 138 册 图书

馆藏范围

  • 25,376 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,128 篇 工学
    • 10,040 篇 计算机科学与技术...
    • 8,152 篇 软件工程
    • 4,547 篇 信息与通信工程
    • 2,371 篇 电子科学与技术(可...
    • 2,306 篇 控制科学与工程
    • 2,125 篇 电气工程
    • 1,645 篇 生物工程
    • 1,330 篇 光学工程
    • 1,229 篇 机械工程
    • 1,042 篇 仪器科学与技术
    • 908 篇 生物医学工程(可授...
    • 834 篇 化学工程与技术
    • 811 篇 动力工程及工程热...
    • 631 篇 网络空间安全
    • 583 篇 材料科学与工程(可...
    • 574 篇 交通运输工程
    • 507 篇 安全科学与工程
  • 9,175 篇 理学
    • 4,175 篇 数学
    • 3,502 篇 物理学
    • 1,846 篇 生物学
    • 1,449 篇 统计学(可授理学、...
    • 940 篇 化学
    • 754 篇 系统科学
  • 3,892 篇 管理学
    • 2,583 篇 管理科学与工程(可...
    • 1,455 篇 图书情报与档案管...
    • 955 篇 工商管理
  • 996 篇 医学
    • 768 篇 临床医学
    • 680 篇 基础医学(可授医学...
    • 435 篇 公共卫生与预防医...
  • 614 篇 法学
    • 508 篇 社会学
  • 336 篇 经济学
  • 220 篇 农学
  • 153 篇 教育学
  • 109 篇 文学
  • 93 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 525 篇 deep learning
  • 511 篇 feature extracti...
  • 407 篇 accuracy
  • 382 篇 internet of thin...
  • 343 篇 training
  • 323 篇 computational mo...
  • 302 篇 optimization
  • 293 篇 simulation
  • 288 篇 computer science
  • 275 篇 semantics
  • 258 篇 wireless communi...
  • 227 篇 real-time system...
  • 222 篇 machine learning
  • 198 篇 reinforcement le...
  • 192 篇 support vector m...
  • 184 篇 image segmentati...
  • 179 篇 object detection
  • 169 篇 computer archite...
  • 167 篇 neural networks
  • 163 篇 educational inst...

机构

  • 1,103 篇 cavendish labora...
  • 1,039 篇 department of ph...
  • 1,019 篇 school of comput...
  • 999 篇 physikalisches i...
  • 976 篇 oliver lodge lab...
  • 798 篇 university of ch...
  • 619 篇 fakultät physik ...
  • 566 篇 school of physic...
  • 554 篇 iccub universita...
  • 544 篇 horia hulubei na...
  • 541 篇 school of physic...
  • 528 篇 department of ph...
  • 526 篇 imperial college...
  • 518 篇 h.h. wills physi...
  • 518 篇 stfc rutherford ...
  • 515 篇 nikhef national ...
  • 508 篇 physik-institut ...
  • 501 篇 henryk niewodnic...
  • 501 篇 school of physic...
  • 501 篇 school of physic...

作者

  • 296 篇 barter w.
  • 268 篇 a. gomes
  • 265 篇 beiter a.
  • 254 篇 bellee v.
  • 252 篇 blake t.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 248 篇 brundu d.
  • 248 篇 bowcock t.j.v.
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 246 篇 s. chen
  • 245 篇 g. spigo
  • 242 篇 f. siegert
  • 232 篇 betancourt c.
  • 230 篇 borsato m.
  • 227 篇 amato s.
  • 223 篇 y. tayalati

语言

  • 21,464 篇 英文
  • 3,333 篇 其他
  • 595 篇 中文
  • 8 篇 法文
  • 6 篇 德文
  • 5 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=School of Computer and Communication Engineering of University of Science and Technology Beijing"
25376 条 记 录,以下是491-500 订阅
排序:
Exploiting Parametrized Deep Q-Networks into Emergency Caching: A Joint Coding Design and User Allocation
Exploiting Parametrized Deep Q-Networks into Emergency Cachi...
收藏 引用
2024 IEEE Global communications Conference, GLOBECOM 2024
作者: Tian, Bingxin Wang, Li Xu, Lianming Chang, Zheng Fei, Aiguo Beijing University of Posts and Telecommunications School of Electronic Engineering Beijing100876 China Beijing University of Posts and Telecommunications School of Computer Science Beijing100876 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
With bandwidth constraints in emergency communications, device-to-device (D2D)-based coded caching emerges as a solution for efficiently transmitting high-bandwidth-demanding services. In this article, we investigate ... 详细信息
来源: 评论
WBZUC:novel white-box ZUC-128 stream cipher
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第2期30卷 96-106页
作者: Yang Yatao Zhang Ruoqing Dong hui Ma Yingjie Zhang Xiaowei Department of Electronic and Communication Engineering Beijing Electronic Science and Technology InstituteBeijing 100070China School of Telecommunication Engineering Xidian UniversityXi'an 710071China Hong Kong Applied Science and Technology Research Institute Hong Kong 999077China
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code *** stream cipher is a main dataflow encryption approach in mobile ***,rese... 详细信息
来源: 评论
A self-driving solution for resource-constrained autonomous vehicles in parked areas
收藏 引用
High-Confidence Computing 2024年 第1期4卷 32-42页
作者: Jin Qian Liang Zhang Qiwei Huang Xinyi Liu Xiaoshuang Xing Xuehan Li College of Information Engineering Taizhou UniversityTaizhou 225300China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of EducationBeijing 100039China School of Computer Science and Engineering Changshu Institute of TechnologyChangshu 215500China The School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China
Autonomous vehicles in industrial parks can provide intelligent,efficient,and environmentally friendly transportation services,making them crucial tools for solving internal transportation *** the characteristics of i... 详细信息
来源: 评论
A Few-shot Classification Algorithm Based on Two-stream Frequency-Domain Information Networks  9
A Few-shot Classification Algorithm Based on Two-stream Freq...
收藏 引用
9th International Conference on Systems and Informatics, ICSAI 2023
作者: Hu, Siquan Jia, Jun Shi, Zhiguo Zhao, Jun University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Beijing Big Data Center Beijing100101 China
In the domain of few-shot learning, where the scarcity of training data poses a significant challenge, this paper introduces an innovative approach. We present a few-shot classification algorithm that utilizes the Two... 详细信息
来源: 评论
GNSS/IμUWB-Based Train Integrity Monitoring Using Fuzzy Reasoning  4
GNSS/IμUWB-Based Train Integrity Monitoring Using Fuzzy Rea...
收藏 引用
4th IEEE International Conference on Power, Electronics and computer Applications, ICPECA 2024
作者: Zhong, Tianyu Liu, Jiang Cai, Baigen Wang, Jian School of Electronic and Information Engineering Beijing Jiaotong University Beijing China School of Computer Science and Technology Beijing Jiaotong University Beijing China
Integrity of a train is a significant characteristic parameter towards a railway train control system in order to guarantee the railway operational safety. The decoupling event between a locomotive and a carriage or t... 详细信息
来源: 评论
Exploring the possibilities of integration of cyber-psychology for human behaviour in a smart city
收藏 引用
International Journal of Information and communication technology 2024年 第2期25卷 150-167页
作者: Wen, Liping Ting, Zhou Zheng, Huang Alfred Daniel, J. Antonidoss, A. Department of Psychology University of Chinese Academy of Sciences Beijing100101 China Institute of Psychology Chinese Academy of Sciences Beijing100101 China Department of Medical Psychology School of Health Humanities Peking University Beijing100191 China Department of Computer Science & Engineering SNS College of Technology India Department of Computer Science and Engineering Hindustan Institute of Technology and Science India
The smart city idea differs between cities and nations. In all meanings and characteristics of a smart city, public involvement is the only thing that remains common. Therefore, it is a very significant field to study... 详细信息
来源: 评论
Multi-Function Radar Signal Sequence Prediction Via Trend Filtering and Similarity Comparison
收藏 引用
IEEE Transactions on Aerospace and Electronic Systems 2025年 第3期61卷 7022-7041页
作者: Feng, Kangan Yu, Xianxiang Wang, Mou Huang, Yu Zhang, Lidong Yi, Wei Kong, Lingjiang University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China University of Electronic Science and Technology of China Shenzhen Institute for Advanced Study Shenzhen518038 China Air Force Academy Beijing100085 China
Multi-function radar signal sequence prediction can provide a profound understanding of radar intentions, thereby playing a pivotal role in radar signal analysis. However, traditional methods are impeded by noise and ... 详细信息
来源: 评论
Deep Reinforcement Learning Based Spectrum Prediction for Bursty Bands
收藏 引用
China communications 2023年 第7期20卷 241-257页
作者: Tao Peng Chao Yang Peiliang Zuo Xinyue Wang Rongrong Qian Wenbo Wang Key Laboratory of Universal Wireless Communication Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China Department of Electronics and Communication Engineering Beijing Institute of Electronic Science and TechnologyBeijing 100070China School of Artificial Intelligence Beijing University of Posts and TelecommunicationsBeijing 100876China
Spectrum prediction plays an important role for the secondary user(SU)to utilize the shared spectrum ***,currently utilized prediction methods are not well applied to spectrum with high burstiness,as parameters of pre... 详细信息
来源: 评论
Towards Integrated communication and Localization in Emergency UAV Systems: A Joint Trajectory and Resource Allocation Design
Towards Integrated Communication and Localization in Emergen...
收藏 引用
2024 IEEE Global communications Conference, GLOBECOM 2024
作者: Tian, Zeyu Wang, Li Xu, Lianming Chang, Zheng Fei, Aiguo Beijing University of Posts and Telecommunications School of Electronic Engineering Beijing100876 China Beijing University of Posts and Telecommunications School of Computer Science Beijing100876 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
In this paper, we present a communication and localization co-design (CLCD) scheme tailored for unmanned aerial vehicle (UAV) assisted emergency networks, with the goal of enhancing rescue operation efficiency and net... 详细信息
来源: 评论
Enhanced Data Mining Algorithms for Sybil Attack Prevention in Truth Discovery  24
Enhanced Data Mining Algorithms for Sybil Attack Prevention ...
收藏 引用
3rd International Conference on Algorithms, Data Mining, and Information technology, ADMIT 2024
作者: Shao, Yanjing Zhao, Wei Liu, Jianghua Xu, Lei Xu, Chungen School of Mathematics and Statistics Nanjing University of Science and Technology China National Key Laboratory of Security Communication China School of Computer Science and Engineering Nanjing University of Science and Technology China
In crowdsourcing systems, where substantial amounts of data from various contributors are aggregated to discern reliable information, privacy concerns are often managed through differential privacy techniques. However... 详细信息
来源: 评论