咨询与建议

限定检索结果

文献类型

  • 96 篇 会议
  • 72 篇 期刊文献

馆藏范围

  • 168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 45 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 18 篇 电气工程
    • 13 篇 生物工程
    • 10 篇 网络空间安全
    • 8 篇 光学工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 机械工程
    • 6 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 航空宇航科学与技...
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 52 篇 理学
    • 32 篇 数学
    • 14 篇 生物学
    • 10 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 5 篇 系统科学
  • 32 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 9 篇 图书情报与档案管...
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
  • 3 篇 法学
    • 2 篇 社会学
  • 2 篇 军事学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 6 篇 wireless sensor ...
  • 4 篇 computer archite...
  • 4 篇 gyroscopes
  • 4 篇 wireless communi...
  • 4 篇 interference
  • 4 篇 computational mo...
  • 4 篇 mathematical mod...
  • 4 篇 sensors
  • 3 篇 support vector m...
  • 3 篇 deep learning
  • 3 篇 resource managem...
  • 3 篇 convolution
  • 3 篇 quality of servi...
  • 3 篇 processor schedu...
  • 3 篇 servers
  • 3 篇 switches
  • 3 篇 middleware
  • 3 篇 virtualization
  • 3 篇 accuracy
  • 3 篇 energy efficienc...

机构

  • 9 篇 state key labora...
  • 7 篇 computer enginee...
  • 7 篇 school of comput...
  • 6 篇 complex networks...
  • 6 篇 state key labora...
  • 6 篇 xidian universit...
  • 6 篇 department of co...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 state key labora...
  • 4 篇 college of compu...
  • 4 篇 department of ra...
  • 4 篇 school of softwa...
  • 4 篇 zhibian technolo...
  • 4 篇 shenzhen univers...
  • 4 篇 jiangsu high tec...
  • 3 篇 beijing laborato...
  • 3 篇 the ministry of ...
  • 3 篇 state key labora...

作者

  • 9 篇 qian xueming
  • 6 篇 zhu li
  • 5 篇 ilya grishin
  • 5 篇 rongqing zhang
  • 5 篇 grigoriy fokin
  • 4 篇 yang yi
  • 4 篇 vladimir sevidov
  • 4 篇 haqiq abdelkrim
  • 4 篇 wei yunchao
  • 4 篇 wang yaxiong
  • 4 篇 xiang cheng
  • 4 篇 leung victor c.m...
  • 4 篇 kim dong seong
  • 4 篇 zhang haijun
  • 4 篇 grishin ilya
  • 4 篇 fokin grigoriy
  • 3 篇 liu bo
  • 3 篇 gu rentao
  • 3 篇 wuxia jin
  • 3 篇 peng chunlei

语言

  • 156 篇 英文
  • 9 篇 其他
  • 3 篇 中文
检索条件"机构=Software Engineering and Networks Laboratory"
168 条 记 录,以下是81-90 订阅
排序:
LSTM-Based Channel Prediction for Secure Massive MIMO Communications Under Imperfect CSI
LSTM-Based Channel Prediction for Secure Massive MIMO Commun...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Tenghui Peng Rongqing Zhang Xiang Cheng Liuqing Yang School of Software Engineering Tongji University Shanghai China State Key Laboratory of Advanced Optical Communication Systems and Networks Peking University Beijing China Department of Electrical and Computer Engineering Colorado State University CO USA
In recent years, massive multiple-input multiple-output (MIMO) has been regarded as a promising technique in the fifth-generation (5G) communication systems. With the ability of focusing transmission beams on users, m... 详细信息
来源: 评论
Joint Scheduling, Computing, and Load Balancing for Time Sensitive Traffic in SDN-Enabled Space-Air-Ground Integrated 6 G networks: A Federated Reinforcement Learning Approach
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Sun, Haitong Zhang, Haijun Ma, Hui Leung, Victor C.M Hebei Key Laboratory of Space-Air-Ground Intelligent Communication Beijing100083 China University of Science and Technology Beijing Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services Beijing100083 China Shenzhen University Department of Computer Science and Software Engineering Shenzhen518061 China University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Low Earth Orbit (LEO) constellations and Unmanned Aerial Vehicle (UAV) networks enable wide coverage for the sixth generation (6G) mobile communication. However, it is a challenge to achieve high scheduling success ra... 详细信息
来源: 评论
Generating superpixels for high-resolution images with Decoupled Patch Calibration
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi'an Jiaotong University Xi'an710049 China School of Computer and Information Technology Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an710049 China The SMILES Laboratory Xi'an Jiaotong University Xi'an710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi'an Jiaotong University Xi'an710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
Superpixel segmentation has recently seen important progress benefiting from the advances in differentiable deep learning. However, the very high-resolution superpixel segmentation still remains challenging due to the... 详细信息
来源: 评论
Enhancing Device-Free Gesture Recognition Capability of Mobile Communication Signals
收藏 引用
IEEE Transactions on Communications 2025年
作者: Wu, Jingmiao He, Weijie Sun, Kai Huang, Wei Zhang, Haijun Leung, Victor C. M. Inner Mongolia University School of Electronic Information Engineering Inner Mongolia Key Laboratory of Intelligent Communication and Sensing and Signal Processing Hohhot010021 China University of Science and Technology at Beijing Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services Beijing100083 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Device-free gesture recognition using mobile communication signals is a convenient and efficient technology with broad application prospects in smart homes and human-computer interaction. It utilizes the effect of ges... 详细信息
来源: 评论
ReGO: Reference-Guided Outpainting for Scenery Image
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi’an Jiaotong University Xi'An710049 China Institute of Information Science Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi’an Jiaotong University Xi'An710049 China The SMILES Laboratory Xi’an Jiaotong University Xi'An710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi’an Jiaotong University Xi'An710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
We aim to tackle the challenging yet practical scenery image outpainting task in this work. Recently, generative adversarial learning has significantly advanced the image outpainting by producing semantic consistent c... 详细信息
来源: 评论
Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs
Trading off Charging and Sensing for Stochastic Events Monit...
收藏 引用
International Conference on Network Protocols
作者: Yu Sun Chi Lin Haipeng Dai Qiang Lin Lei Wang Guowei Wu School of Software Technology Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Dalian University of Science and Technology Dalian China Acoustics Science and Technology Laboratory Harbin Engineering University Harbin China
As an epoch-making technology, wireless power transfer incredibly achieves energy transmission wirelessly, enabling reliable energy supplement for wireless rechargeable sensor networks (WRSNs). Existing methods mainly... 详细信息
来源: 评论
A NOMA Power Allocation Strategy Based on Genetic Algorithm  8th
A NOMA Power Allocation Strategy Based on Genetic Algorithm
收藏 引用
8th International Conference on Communications, Signal Processing, and Systems, CSPS 2019
作者: Yin, Lu Chenggong, Wang Kai, Mao Kuanxin, Bao Haowei, Bian Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
The NOMA technology uses the power domain non-orthogonal multiplexing method to enable multiple users to occupy the entire frequency band simultaneously to transmit signals. In order to maximize the total transmission... 详细信息
来源: 评论
Graph-Based File Dispatching Protocol With D2D-Aided UAV-NOMA Communications in Large-Scale networks
Graph-Based File Dispatching Protocol With D2D-Aided UAV-NOM...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Baoji Wang Rongqing Zhang Chen Chen Xiang Cheng Liuqing Yan State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronics School of Electronics Engineering and Computer Science Peking University Beijing China school of Software Engineering Tongji University Shanghai China Department of Electrical & Computer Engineering Colorado State University CO USA
Unmanned aerial vehicle (UAV)-assisted communications are expected to become an important part of the next generation mobile communication systems, due to the high mobility of the UAVs. Non-orthogonal multiple access ...
来源: 评论
A NOMA Power Allocation Method Based on Greedy Algorithm  8th
A NOMA Power Allocation Method Based on Greedy Algorithm
收藏 引用
8th International Conference on Communications, Signal Processing, and Systems, CSPS 2019
作者: Lu, Yin Chen, Shuai Mao, Kai Bian, Haowei Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Nanjing University of Posts and Telecommunications Ministry of Education Nanjing210003 China Nanjing University of Posts and Telecommunications Nanjing210003 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
In the existing Non-Orthogonal Multiple Access power allocation algorithm, the iterative water-filling algorithm is a commonly used algorithm, which has good performance but high complexity. In order to reduce the com... 详细信息
来源: 评论
BiLock: User authentication via dental occlusion biometrics
收藏 引用
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2018年 第3期2卷 1-20页
作者: Zou, Yongpan Zhao, Meng Zhou, Zimu Lin, Jiawei Li, Mo Wu, Kaishun College of Computer Science and Software Engineering Shenzhen University China Computer Engineering and Networks Laboratory ETH Zurich Switzerland School of Computer Science and Engineering Nanyang Technological University Singapore
User authentication on smart devices is indispensable to keep data privacy and security. It is especially significant for emerging wearable devices such as smartwatches considering data sensitivity in them. However, c... 详细信息
来源: 评论