咨询与建议

限定检索结果

文献类型

  • 56 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 42 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 25 篇 信息与通信工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 电气工程
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 15 篇 理学
    • 7 篇 数学
    • 4 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 天文学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学

主题

  • 11 篇 network coding
  • 5 篇 educational inst...
  • 4 篇 bandwidth
  • 3 篇 throughput
  • 3 篇 data mining
  • 3 篇 computational li...
  • 3 篇 media
  • 3 篇 multicast
  • 3 篇 real-time system...
  • 3 篇 entropy
  • 3 篇 protocols
  • 3 篇 virtualization
  • 3 篇 encoding
  • 2 篇 routing
  • 2 篇 self-supervised ...
  • 2 篇 java
  • 2 篇 twitter
  • 2 篇 vectors
  • 2 篇 servers
  • 2 篇 graph neural net...

机构

  • 5 篇 shenzhen key lab...
  • 4 篇 school of mathem...
  • 4 篇 shenzhen key lab...
  • 3 篇 shenzhen institu...
  • 3 篇 institute of big...
  • 3 篇 moe key lab of a...
  • 3 篇 institute of big...
  • 3 篇 shenzhen enginee...
  • 2 篇 national digital...
  • 2 篇 the shenzhen key...
  • 2 篇 huawei cloud com...
  • 2 篇 dept. of electro...
  • 2 篇 peking universit...
  • 2 篇 shenzhen key lab...
  • 2 篇 高可信软件技术教...
  • 2 篇 huawei noah's ar...
  • 2 篇 guangdong poya i...
  • 2 篇 peking universit...
  • 2 篇 shenzhen key lab...
  • 2 篇 shenzhen key lab...

作者

  • 19 篇 kai lei
  • 16 篇 li hui
  • 9 篇 hui li
  • 8 篇 huang lian'en
  • 7 篇 chen fuxing
  • 6 篇 lei kai
  • 4 篇 wang wei
  • 4 篇 kuai xu
  • 4 篇 liu weiyang
  • 3 篇 pei yulong
  • 3 篇 ying shen
  • 3 篇 jie yuan
  • 3 篇 hanxu hou
  • 3 篇 jincheng wu
  • 3 篇 kai zhang
  • 3 篇 pan kai
  • 3 篇 qian yu
  • 3 篇 yin wenpeng
  • 3 篇 zhu guangxi
  • 3 篇 zhu zhipu

语言

  • 72 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Shenzhen Key Lab of Cloud Computing Technology and Application"
81 条 记 录,以下是41-50 订阅
排序:
A Dynamic Self-adapting Algorithm of Redundancy Parameter in TCP-NC
A Dynamic Self-adapting Algorithm of Redundancy Parameter in...
收藏 引用
2012 IEEE 14th International Conference on Communication technology
作者: Xudong Fan Hui Li Kai Pan Shenzhen Key Lab for Cloud Computing Technology and Application PKU
We propose a method of dynamically adjusting redundancy parameter,which can be applied in "Network Coding Meets TCP".It can help solve the packet losses in the TCP layer and be part of the new protocol in th... 详细信息
来源: 评论
A dynamic cache partitioning mechanism under virtualization environment
A dynamic cache partitioning mechanism under virtualization ...
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in computing and Communications, TrustCom-2012
作者: Wang, Xiaolin Wen, Xiang Li, Yechen Luo, Yingwei Li, Xiaoming Wang, Zhenlin Dept. of Computer Science and Technology Peking University Beijing 100871 China Shenzhen Key Lab. for Cloud Computing Technology and Applications Peking University Shenzhen Graduate School Guangdong 518055 China Dept. of Computer Science Michigan Technological University Houghton MI 49931 United States
Cache sharing among multiple computing units on chip is common in today's multi-core processors, and a lot of research has focused on the effective management of shared cache. A software management method called p... 详细信息
来源: 评论
A General Co/Decoder of Network Coding in HDL
A General Co/Decoder of Network Coding in HDL
收藏 引用
Workshop on Network Coding, Theory and applications (NetCod)
作者: Minglong Zhang Hui Li Fuxing Chen Hanxu Hou Huiyao An Wei Wang Jiaqing Huang Shenzhen Key Laboratory of Cloud Computing Technology & Application Shenzhen Graduate School Peking University China Department of Electronic and Information Engineering Huazhong University of Science and Technology Wuhan China
This paper presents a practical and general coder and decoder of network coding (NC) with HDL (Hardware Description Language) logic for wire-speed nodes in multisource multicast networks. The NC coders apply random li... 详细信息
来源: 评论
A Trust-Based Recommendation Model Constructed from Improved Page Rank Algorithm in a P2P Social Network
A Trust-Based Recommendation Model Constructed from Improved...
收藏 引用
2014 International Conference on Computer,Network Security and Communication Engineering(CNSCE 2014)
作者: Kai LEI Da-zhou QIN Kun ZHANG Shenzhen Key Lab for Cloud Computing Technology & Applications (SPCCTA) School of Electronics and Computer Engineering Peking University
With the rise of social networking in the web2.0 era, the Internet gradually evolves to be community-based [1]. The process of obtaining information via the Internet reflects certain social characteristics. In order t... 详细信息
来源: 评论
MDPF: An NDN Probabilistic Forwarding Strategy based on Maximizing Deviation Method
MDPF: An NDN Probabilistic Forwarding Strategy based on Maxi...
收藏 引用
IEEE Global Communications Conference
作者: Kai Lei Jie Yuan Jiawei Wang Shenzhen Key Lab for Cloud Computing Technology and Applications (SPCCTA) School of Electronics and Computer Engineering Peking University
Forwarding strategy is the key feature of Named Data Networking (NDN) to realize dynamic, adaptive and intelligent forwarding, but work in this area is still at a very preliminary stage. In this paper, selecting which... 详细信息
来源: 评论
A Practical Approach for Automatically Constructing Concept Map in E-learning Environments
A Practical Approach for Automatically Constructing Concept ...
收藏 引用
2014 IEEE International Conference on Progress in Informatics and computing
作者: Na Yi Hui Li Shenzhen Eng. Lab. of Converged Networks Technology Shenzhen Key Lab. of Cloud Computing Tech. and App Peking University Shenzhen Graduate School
With the prevalence of web-based learning, the application of concept mapping, as a powerful diagnostic and instructional tool, has been widely exploited in both education and computer science. In recent years, severa... 详细信息
来源: 评论
IFS-RL: An intelligent forwarding strategy based on reinforcement learning in named-data networking
IFS-RL: An intelligent forwarding strategy based on reinforc...
收藏 引用
2018 ACM SIGCOMM Workshop on Network Meets AI and ML, NetAI 2018
作者: Zhang, Yi Xu, Kuai Bai, Bo Lei, Kai Shenzhen Key Lab for Cloud Computing Technology and Applications School of Electronic and Computer Engineering Peking University Shenzhen China School of Mathematical and Natural Sciences Arizona State University Arizona United States Future Network Theory Lab 2012 Labs Huawei Technologies Co. Ltd. Shatin N.T. Hong Kong
Named-Data Networking (NDN) is a new communication paradigm where network primitives are based on named-data rather than host identifiers. Compared with IP, NDN has a unique feature that forwarding plane enables each ... 详细信息
来源: 评论
A Secure Synchronized Reading System over Time-Critical Online Contests
A Secure Synchronized Reading System over Time-Critical Onli...
收藏 引用
IEEE International Conference on Communications
作者: Wei Wang Peng Xu Hui Li Laurence Tianruo Yang Key Lab of Cloud Computing Technology Peking University Shenzhen China Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Embedded and Pervasive Computing Lab Huazhong University of Science and Technology Wuhan China
The time-critical online contest environment calls for an elegant and precise management system to start a contest online. The management system should simultaneously follow three rules of security that are confidenti... 详细信息
来源: 评论
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs
Threshold-Based Secure and Privacy-Preserving Message Verifi...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Wei Gao Mingzhong Wang Liehuang Zhu Xiaoping Zhang Language Information Processing and Cloud Computing Application Beijing Institute of Technology National Key Lab of Vehicular Transmission China North Vehicle Research Institute
Messages spreading inside vehicular ad hoc networks (VANETs) generally need to achieve the property of verifiability and content integrity, while preserving user privacy. Otherwise, VANETs will either fall into chaos,... 详细信息
来源: 评论
Coding-Driven Scheduling for Frame-based Multicast Switches
Coding-Driven Scheduling for Frame-based Multicast Switches
收藏 引用
2011 International Symposium on Network Coding(2011网络编码国际会议 NETCOD 2011)
作者: Li Yu Wei Wang Guangxi Zhu Hui Li Dept.of Electronic and Information Engineering Huazhong University of science and Technology Key Lab of Cloud Computing Technology Shenzhen Graduate school Peking University
The method of network coding has been proven a promising solution to fanin conflict problems (traffic flows conflicting at input ports) in multicast switches in previous work. However, this approach is inefficient whe... 详细信息
来源: 评论