咨询与建议

限定检索结果

文献类型

  • 479 篇 会议
  • 415 篇 期刊文献

馆藏范围

  • 894 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 577 篇 工学
    • 318 篇 计算机科学与技术...
    • 254 篇 软件工程
    • 223 篇 信息与通信工程
    • 138 篇 电子科学与技术(可...
    • 113 篇 电气工程
    • 57 篇 仪器科学与技术
    • 55 篇 控制科学与工程
    • 50 篇 机械工程
    • 48 篇 光学工程
    • 43 篇 生物工程
    • 30 篇 网络空间安全
    • 28 篇 动力工程及工程热...
    • 25 篇 航空宇航科学与技...
    • 23 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 18 篇 交通运输工程
    • 17 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 建筑学
  • 324 篇 理学
    • 158 篇 数学
    • 119 篇 物理学
    • 51 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 111 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 43 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 18 篇 医学
    • 16 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 11 篇 经济学
  • 8 篇 法学
  • 7 篇 农学
  • 6 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 simulation
  • 21 篇 wireless communi...
  • 21 篇 satellites
  • 20 篇 bandwidth
  • 18 篇 semantics
  • 16 篇 optimization
  • 16 篇 wireless sensor ...
  • 16 篇 feature extracti...
  • 15 篇 deep learning
  • 14 篇 quality of servi...
  • 13 篇 delays
  • 13 篇 throughput
  • 13 篇 resource managem...
  • 13 篇 interference
  • 12 篇 network topology
  • 12 篇 protocols
  • 12 篇 quantum cryptogr...
  • 12 篇 heuristic algori...
  • 11 篇 downlink
  • 11 篇 mimo

机构

  • 27 篇 science and tech...
  • 20 篇 school of inform...
  • 18 篇 academy for netw...
  • 18 篇 institute of qua...
  • 17 篇 national mobile ...
  • 13 篇 hubei key labora...
  • 13 篇 key lab of broad...
  • 12 篇 school of comput...
  • 12 篇 beijing key labo...
  • 12 篇 school of comput...
  • 12 篇 institute of inf...
  • 10 篇 key laboratory o...
  • 10 篇 state key labora...
  • 10 篇 school of scienc...
  • 10 篇 personal communi...
  • 9 篇 peng cheng labor...
  • 9 篇 national enginee...
  • 9 篇 southeast univer...
  • 9 篇 jiangsu high tec...
  • 9 篇 department of co...

作者

  • 20 篇 zhao yao
  • 18 篇 du bo
  • 14 篇 ling qiu
  • 13 篇 wang bin
  • 13 篇 lizhe liu
  • 12 篇 liu lizhe
  • 12 篇 wang dongdong
  • 12 篇 dongdong wang
  • 11 篇 bin wang
  • 11 篇 yu-bo sheng
  • 11 篇 lan zhou
  • 10 篇 niyato dusit
  • 10 篇 tao dacheng
  • 10 篇 chenhua sun
  • 10 篇 wei chen
  • 10 篇 sun chenhua
  • 9 篇 li yang
  • 9 篇 wan liangtian
  • 9 篇 jinkang zhu
  • 9 篇 sun lu

语言

  • 838 篇 英文
  • 33 篇 其他
  • 22 篇 中文
检索条件"机构=Science and Technology on Communication Network Laboratory"
894 条 记 录,以下是131-140 订阅
排序:
Multi-layer network embedding on scc-based network with motif
收藏 引用
Digital communications and networks 2024年 第3期10卷 546-556页
作者: Lu Sun Xiaona Li Mingyue Zhang Liangtian Wan Yun Lin Xianpeng Wang Gang Xu Department of Communication Engineering Institute of Information Science TechnologyDalian Maritime UniversityDalian116026China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province DUT School of Software Technology&DUT-RU International School of Information Science and EngineeringDalian University of TechnologyDalian 116620China College of Information and Communication Engineering Harbin Engineering UniversityHarbin 150001China School of Information and Communication Engineering Hainan UniversityHaikou 570228China State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast UniversityNanjing 210096China
Interconnection of all things challenges the traditional communication methods,and Semantic communication and Computing(SCC)will become new *** is a challenging task to accurately detect,extract,and represent semantic... 详细信息
来源: 评论
Multi-level virtual desktop security enhancement technology based on Docker and X server  18
Multi-level virtual desktop security enhancement technology ...
收藏 引用
2018 the International Conference on Geoinformatics and Data Analysis, ICGDA 2018 and 2018 the International Conference on Software and Services Engineering, ICSSE 2018
作者: Luan, Guangqiang Bai, Yuebin Yu, Chao Zhang, Xudong Wang, Rui Huo, Longshe School of Computer Science and Engineering Beihang University China Science and Technology on Communication Networks Laboratory Shijiazhuang China China Unicom Network Technology Research Institute Beijing China
With the development of virtualization technology, desktop virtualization is becoming more and more mature. Desktop virtualization can effectively isolate the use of users and the management of the system, but in the ... 详细信息
来源: 评论
Hierarchical Clustering Routing Algorithm for Wireless Sensor networks  3
Hierarchical Clustering Routing Algorithm for Wireless Senso...
收藏 引用
3rd IEEE International Conference on Information technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Chen, Ni Wen, Rong Ma, Shuying Wang, Ping Chengdu Technological University School of Network and Communication Engineering Chengdu China University of Electronic Science and Technology of China National Key Laboratory of Science and Technology on Communications Chengdu China
Aiming at the problem that the uneven node distribution and the limited energy of nodes in wireless sensor networks, a clustering routing algorithm for wireless sensor networks based on hierarchical clustering is prop... 详细信息
来源: 评论
A novel scheme of control wavelength channel in optical burst switching system
A novel scheme of control wavelength channel in optical burs...
收藏 引用
Information Optics and Photonics technology
作者: Qiu, Qi Zhu, Can Key Laboratory of Broadband Optical Fiber Transmission and Communication Network Ministry of Education University of Electronic and Science Technology of China Chengdu 610054
The classical scheme of OBS (Optical Burst Switching) optical wavelength channels uses ITU-T's DWDM (Dense Wavelength Divided Multiplex) standard wavelength at 1550nm band. BHPs (Burst Header Packet) over control ... 详细信息
来源: 评论
Design and Implementation of Cyber Space Threat Detection System Based on User Behavioral Logs  3
Design and Implementation of Cyber Space Threat Detection Sy...
收藏 引用
3rd International Conference on Electronic Information Engineering and Computer communication, EIECC 2023
作者: Wang, Wenhao Li, Hao Nie, Peng College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Science and Technology on Communication Networks Laboratory Shijiazhuang China College of Cyber Science Nankai University Tianjin China
In contemporary society, the role of networks in daily work and business activities is increasingly prominent. The enterprise intranet, serving as a crucial bridge for maintaining work stability, asset security, and b... 详细信息
来源: 评论
Fire Detection Method Based on Improved Fruit Fly Optimization-Based SVM
收藏 引用
Computers, Materials & Continua 2020年 第1期62卷 199-216页
作者: Fangming Bi Xuanyi Fu Wei Chen Weidong Fang Xuzhi Miao Biruk Assefa College of Computer Science and Technology China University of Mining and TechnologyXuzhou221116China College of Computer Science and Technology Mine Digitization Engineering Research Center of the Ministry of EducationChina University of Mining and TechnologyXuzhou221116China College of Computer Science and Technology Xi’an University of Science and TechnologyXi’an710054China Key Laboratory of Wireless Sensor Network&Communication Shanghai Institute of Micro-System and Information TechnologyChinese Academy of SciencesShanghai201899China Infromation Communication Technology Department Wollo UniversityDessie EthiopiaP.o Box 1145Ethiopia
Aiming at the defects of the traditional fire detection methods,which are caused by false positives and false negatives in large space buildings,a fire identification detection method based on video images is *** algo... 详细信息
来源: 评论
A Deep Exploration of BitLocker Encryption and Security Analysis  20
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Tan, Cheng Zhang, Lijun Bao, Liang Science and Technology on Communication Security Laboratory Chengdu China Security Ministry of Public Security Key Lab of Information Network Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论
A newrail-to-rail opamp with bulk-driven input stage and interleaved class-AB ouput stage  12
A newrail-to-rail opamp with bulk-driven input stage and int...
收藏 引用
2014 12th IEEE International Conference on Solid-State and Integrated Circuit technology, ICSICT 2014
作者: Ma, Jianping Chen, Yuan Tong, Tian Key Laboratory of Wireless Sensor Network and Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Science Shanghai200050 China
This paper introduces a fully differential rail-to-rail input/output CMOS operational amplifier consisting of a bulk-driven input stage and an interleaved class-AB output stage. The input stage features a partial posi... 详细信息
来源: 评论
A Non-Terrestrial network Congestion Control Scheme Based on the SAC Method
A Non-Terrestrial Network Congestion Control Scheme Based on...
收藏 引用
2024 International Symposium on networks, Computers and communications, ISNCC 2024
作者: Xie, Wenxuan Zhu, Lidong Song, Yanjun Wang, Huilin University of Electronic Science and Technology of China National Key Laboratory of Wireless Communication Chengdu China The 54th Research Institute of Cetc Scientific and Technical on Communication Network Laboratory Shijiazhuang China
Satellite Internet technology is currently booming. Due to the high cost of satellites and the limited number of orbits, a satellite must cover a large area and serve more users than before. Given that the random acce... 详细信息
来源: 评论
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor network
收藏 引用
Computers, Materials & Continua 2019年 第8期61卷 583-599页
作者: Weidong Fang Wuxiong Zhang QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa Key Laboratory of Wireless Sensor Network&Communication Shanghai Institute of Micro-system and Information TechnologyChinese Academy of SciencesShanghai201899China Shanghai Research Center for Wireless Communication Shanghai201210China College of Physics and Electronic Information Engineering Qinghai University for NationalitiesXining810007China School of Computer Science and Technology China University of Mining and TechnologyXuzhou221116China Infromation Communication Technology Department Wollo UniversityDessie EthiopiaEthiopia
As an Industrial Wireless Sensor network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more ***,the data aggregation protocols mainly focus o... 详细信息
来源: 评论