咨询与建议

限定检索结果

文献类型

  • 6,173 篇 会议
  • 5,479 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 11,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,110 篇 工学
    • 6,216 篇 计算机科学与技术...
    • 4,407 篇 信息与通信工程
    • 3,866 篇 电气工程
    • 2,103 篇 软件工程
    • 905 篇 电子科学与技术(可...
    • 478 篇 控制科学与工程
    • 457 篇 仪器科学与技术
    • 410 篇 交通运输工程
    • 240 篇 机械工程
    • 196 篇 网络空间安全
    • 193 篇 生物工程
    • 165 篇 动力工程及工程热...
    • 146 篇 光学工程
    • 93 篇 土木工程
    • 86 篇 航空宇航科学与技...
    • 70 篇 材料科学与工程(可...
    • 69 篇 安全科学与工程
  • 2,179 篇 理学
    • 976 篇 数学
    • 937 篇 物理学
    • 278 篇 生物学
    • 271 篇 统计学(可授理学、...
    • 146 篇 系统科学
    • 140 篇 化学
  • 1,158 篇 管理学
    • 933 篇 管理科学与工程(可...
    • 282 篇 工商管理
    • 270 篇 图书情报与档案管...
  • 182 篇 医学
    • 131 篇 临床医学
    • 81 篇 基础医学(可授医学...
  • 122 篇 法学
    • 83 篇 社会学
  • 90 篇 经济学
    • 90 篇 应用经济学
  • 42 篇 军事学
  • 35 篇 艺术学
  • 32 篇 文学
  • 29 篇 教育学
  • 19 篇 农学

主题

  • 341 篇 resource managem...
  • 302 篇 internet of thin...
  • 279 篇 optimization
  • 273 篇 wireless communi...
  • 265 篇 quality of servi...
  • 247 篇 servers
  • 239 篇 delays
  • 221 篇 computational mo...
  • 201 篇 task analysis
  • 193 篇 reinforcement le...
  • 188 篇 routing
  • 181 篇 cloud computing
  • 173 篇 wireless sensor ...
  • 170 篇 simulation
  • 169 篇 bandwidth
  • 149 篇 deep learning
  • 149 篇 resource allocat...
  • 142 篇 throughput
  • 137 篇 energy consumpti...
  • 134 篇 blockchain

机构

  • 4,935 篇 beijing univ pos...
  • 3,247 篇 state key labora...
  • 366 篇 beijing universi...
  • 294 篇 beijing univ pos...
  • 206 篇 information secu...
  • 184 篇 the state key la...
  • 142 篇 beijing univ pos...
  • 136 篇 bupt state key l...
  • 132 篇 state key lab of...
  • 123 篇 beijing univ pos...
  • 119 篇 beijing univ pos...
  • 116 篇 purple mt labs p...
  • 111 篇 state key labora...
  • 102 篇 beijing univ pos...
  • 102 篇 state key labora...
  • 92 篇 purple mountain ...
  • 90 篇 school of scienc...
  • 86 篇 beijing univ pos...
  • 79 篇 state key lab ne...
  • 71 篇 beijing univ pos...

作者

  • 337 篇 chen junliang
  • 301 篇 tian hui
  • 279 篇 wang jingyu
  • 268 篇 yang yang
  • 263 篇 yang fangchun
  • 260 篇 huang tao
  • 228 篇 peng mugen
  • 223 篇 qiu xuesong
  • 210 篇 xu changqiao
  • 198 篇 zhang ping
  • 192 篇 cheng bo
  • 181 篇 wang wendong
  • 174 篇 gao fei
  • 174 篇 qi qi
  • 172 篇 wang ying
  • 171 篇 gao zhipeng
  • 170 篇 yang yixian
  • 168 篇 feng lei
  • 153 篇 wen qiao-yan
  • 151 篇 zhang hua

语言

  • 10,724 篇 英文
  • 657 篇 其他
  • 260 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Switching and Networking Technology"
11657 条 记 录,以下是331-340 订阅
排序:
Carrier Phase-Based Localization Method for TDD Systems via Extended Kalman Filter  25
Carrier Phase-Based Localization Method for TDD Systems via ...
收藏 引用
25th IEEE Wireless Communications and networking Conference, WCNC 2024
作者: Peng, Zixiang Fan, Shaoshuai Tian, Hui Beijing University Of Posts And Telecommunications State Key Laboratory Of Networking And Switching Technology Beijing100876 China
In time-division duplex (TDD) systems, where uplink and downlink channels alternate during transmission process, the continuity of carrier phase measurements becomes challenging to maintain. This leads to periodic loc... 详细信息
来源: 评论
Anomaly Detection on Interleaved Log Data With Semantic Association Mining on Log-Entity Graph
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2025年 第2期51卷 581-594页
作者: Chu, Guojun Wang, Jingyu Qi, Qi Sun, Haifeng Zhuang, Zirui He, Bo Jing, Yuhan Zhang, Lei Liao, Jianxin Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100083 Peoples R China China Unicom Network Commun Co Ltd Beijing 100032 Peoples R China
Logs record crucial information about runtime status of software system, which can be utilized for anomaly detection and fault diagnosis. However, techniques struggle to perform effectively when dealing with interleav... 详细信息
来源: 评论
Access Optimization in 802.11ax WLAN for Load Balancing and Competition Avoidance of IPTV Traffic
收藏 引用
IEEE TRANSACTIONS ON BROADCASTING 2024年 第2期70卷 401-412页
作者: Shao, Sujie Zhang, Linlin Qi, Fei Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China China Telecom Res Inst Beijing 102209 Peoples R China
With the improvement of terminal intelligence and the enrichment of digital content, terminal density is showing an explosive growth trend, and the traffic carried by IPTV and other services is rapidly increasing. HDH... 详细信息
来源: 评论
Communication-Computing Built-in-Design in Next-Generation Radio Access Networks: Architecture and key Technologies
收藏 引用
IEEE NETWORK 2024年 第3期38卷 100-108页
作者: Guo, Fengxian Peng, Mugen Li, Nan Sun, Qi Li, Xiang Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China China Mobile Res Inst Beijing 100053 Peoples R China
The edge computing paradigm presents a promising solution for low-latency and high-throughput data processing, which is critical for future life-changing applications, such as autonomous driving and metaverse. Concurr... 详细信息
来源: 评论
Hybrid CRB Analysis for Location Sensing in UAV mmWave Systems Under Jittering Effects  16
Hybrid CRB Analysis for Location Sensing in UAV mmWave Syste...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Chen, Wenyun Liu, Chenxi Peng, Mugen Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China
Unmanned aerial vehicle (UAV) systems are vulnerable to the inevitable UAV jitter, the impacts of which on both communications and sensing become more detrimental in the high frequency millimeter wave (mmWave) band. W... 详细信息
来源: 评论
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
收藏 引用
IEEE ACCESS 2024年 12卷 186510-186519页
作者: Liu, Xu Liu, Yuewen Wei, Miaomiao Xu, Peng China Acad Ind Internet Beijing 100083 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Microservice architecture is a high-cohesion and low-coupling software architecture. Its core idea is to split the application into a set of microservices with a single function and independent deployment. Due to thei... 详细信息
来源: 评论
Intellicise communication system: model-driven semantic communications
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第1期29卷 2-12页
作者: Zhang Ping Xu Xiaodong Dong Chen Han Shujun Wang Bizhu State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China
As one of the critical technologies for the 6 th generation mobile communication system(6 G) mobile communication systems, artificial intelligence(AI) technology will provide complete automation for connecting the vir... 详细信息
来源: 评论
EACE: A document-level event argument extraction model with argument constraint enhancement
收藏 引用
INFORMATION PROCESSING & MANAGEMENT 2024年 第1期61卷
作者: Zhou, Ji Shuang, Kai Wang, Qiwei Yao, Xuyang Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China China Telecom Res Inst Beijing 102209 Peoples R China
There are two key challenges remaining for the document-level event argument extraction tasks: long-range dependency and same-role argument assignment. The existing methods could not effectively handle the above two c... 详细信息
来源: 评论
Queuing Analysis of Energy Harvesting-Aided NOMA-MEC Network
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR technology 2024年 第9期73卷 14068-14073页
作者: Meng, Yue Zhang, Zhi Huang, Yuzhen Zhang, Ping Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Acad Mil Sci PLA Beijing 100097 Peoples R China
Non-orthogonal multiple access (NOMA) and energy harvesting (EH) have emerged as promising technologies to improve the energy efficiency and capacity of mobile edge computing (MEC) network. In this network, the mobile... 详细信息
来源: 评论
DAmpADF: A framework for DNS amplification attack defense based on Bloom filters and NAmpKeeper
收藏 引用
COMPUTERS & SECURITY 2024年 139卷
作者: Dai, Yunwei Huang, Tao Wang, Shuo Southeast Univ Sch Cyber Sci & Engn Nanjing Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing Peoples R China
Domain Name System (DNS) amplification attacks exploit botnets and open recursive DNS servers to launch Distributed Denial of Service (DDoS) attacks. During an attack, the attacker leverages infected computers (bots) ... 详细信息
来源: 评论