咨询与建议

限定检索结果

文献类型

  • 6,190 篇 会议
  • 5,502 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 11,697 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,206 篇 工学
    • 6,245 篇 计算机科学与技术...
    • 4,428 篇 信息与通信工程
    • 3,896 篇 电气工程
    • 2,148 篇 软件工程
    • 913 篇 电子科学与技术(可...
    • 491 篇 控制科学与工程
    • 464 篇 仪器科学与技术
    • 414 篇 交通运输工程
    • 243 篇 机械工程
    • 211 篇 网络空间安全
    • 193 篇 生物工程
    • 186 篇 光学工程
    • 179 篇 动力工程及工程热...
    • 93 篇 土木工程
    • 89 篇 航空宇航科学与技...
    • 72 篇 安全科学与工程
    • 71 篇 材料科学与工程(可...
  • 2,193 篇 理学
    • 981 篇 数学
    • 947 篇 物理学
    • 278 篇 生物学
    • 271 篇 统计学(可授理学、...
    • 147 篇 化学
    • 146 篇 系统科学
  • 1,183 篇 管理学
    • 956 篇 管理科学与工程(可...
    • 282 篇 工商管理
    • 271 篇 图书情报与档案管...
  • 189 篇 医学
    • 133 篇 临床医学
    • 82 篇 基础医学(可授医学...
  • 124 篇 法学
    • 83 篇 社会学
  • 90 篇 经济学
    • 90 篇 应用经济学
  • 42 篇 军事学
  • 35 篇 艺术学
  • 32 篇 文学
  • 29 篇 教育学
  • 20 篇 农学

主题

  • 342 篇 resource managem...
  • 303 篇 internet of thin...
  • 279 篇 optimization
  • 274 篇 wireless communi...
  • 269 篇 quality of servi...
  • 241 篇 delays
  • 240 篇 servers
  • 225 篇 computational mo...
  • 201 篇 task analysis
  • 194 篇 reinforcement le...
  • 188 篇 routing
  • 184 篇 wireless sensor ...
  • 180 篇 cloud computing
  • 171 篇 simulation
  • 168 篇 bandwidth
  • 152 篇 energy consumpti...
  • 149 篇 deep learning
  • 149 篇 resource allocat...
  • 143 篇 throughput
  • 134 篇 mobile edge comp...

机构

  • 4,936 篇 beijing univ pos...
  • 3,246 篇 state key labora...
  • 379 篇 beijing universi...
  • 294 篇 beijing univ pos...
  • 204 篇 information secu...
  • 185 篇 the state key la...
  • 142 篇 beijing univ pos...
  • 136 篇 bupt state key l...
  • 134 篇 state key lab of...
  • 123 篇 beijing univ pos...
  • 120 篇 beijing univ pos...
  • 116 篇 purple mt labs p...
  • 111 篇 state key labora...
  • 102 篇 beijing univ pos...
  • 101 篇 state key labora...
  • 92 篇 purple mountain ...
  • 89 篇 school of scienc...
  • 86 篇 beijing univ pos...
  • 79 篇 state key lab ne...
  • 71 篇 beijing univ pos...

作者

  • 337 篇 chen junliang
  • 303 篇 tian hui
  • 279 篇 wang jingyu
  • 268 篇 yang yang
  • 263 篇 yang fangchun
  • 262 篇 huang tao
  • 231 篇 peng mugen
  • 212 篇 qiu xuesong
  • 210 篇 xu changqiao
  • 200 篇 zhang ping
  • 194 篇 cheng bo
  • 182 篇 wang wendong
  • 175 篇 qi qi
  • 172 篇 gao fei
  • 168 篇 feng lei
  • 168 篇 gao zhipeng
  • 168 篇 yang yixian
  • 159 篇 wang ying
  • 152 篇 wen qiao-yan
  • 151 篇 zhang hua

语言

  • 10,630 篇 英文
  • 807 篇 其他
  • 261 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Switching and Networking Technology"
11697 条 记 录,以下是751-760 订阅
排序:
Triple Extraction of Knowledge Graphs with DGWPN  23
Triple Extraction of Knowledge Graphs with DGWPN
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Song, Yipei Lin, Rongheng Zou, Hua Beijing University of Posts and Telecommunications State Key Lab of Networking and Switching Technology Beijing100876 China
Information extraction aims to provide required high-quality RDF triples for knowledge graph which is the basis of knowledge construction. The current two mainstream methods include a joint model concentrates on using... 详细信息
来源: 评论
Resource allocation and cost optimization in relay-assisted mobile edge computing
收藏 引用
COMPUTING 2025年 第5期107卷 1-25页
作者: Zhan, Huifang Wu, Guilu Li, Zhengquan Nie, Gaofeng Jiangnan Univ Sch Internet Things Engn Wuxi Peoples R China Beijing Univ Posts & Telecommun State key Lab Networking & Switching Technol Beijing Peoples R China Hainan Univ Sch Informat & Commun Engn Hainan Peoples R China
Motivated by the limited computing and storage resources of smart devices (SDs), existing resource management schemes under the traditional mobile edge computing (MEC) system couldn't fully utilize the network res... 详细信息
来源: 评论
QoS-Aware Service Composition Method Based on Double Channel Action Network Reinforcement Learning  14th
QoS-Aware Service Composition Method Based on Double Channel...
收藏 引用
14th International Conference on Computer Engineering and Networks, CENet 2024
作者: Guo, Yanpeng Song, Chunxiao Huang, Ruoyan Yang, Yang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China The 54th Research Institute of CETC Hebei Shijiazhuang China
Currently, the problem of Quality-of-service in service composition has emerged as a critical research topic in the fields of cloud computing and service computing. Aggregating multiple existing services based on QoS ... 详细信息
来源: 评论
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning
收藏 引用
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS 2023年 第1期12卷 136-136页
作者: Liu, Lei He, Haoran Qi, Fei Zhao, Yikun Xie, Weiliang Zhou, Fanqin Feng, Lei China Telecom Corp Ltd Beijing Res Inst Beijing 102209 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Aerial base stations (AeBSs), as crucial components of air-ground integrated networks, are widely employed in cloud computing, disaster relief, and various applications. How to quickly and efficiently deploy multi-AeB... 详细信息
来源: 评论
Explain-Analyze-Generate: A Sequential Multi-Agent Collaboration Method for Complex Reasoning  31
Explain-Analyze-Generate: A Sequential Multi-Agent Collabora...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Gu, Wenyuan Han, Jiale Wang, Haowen Li, Xiang Cheng, Bo State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Hong Kong University of Science and Technology Hong Kong School of Computer Science and Technology Anhui University China
Exploring effective collaboration among multiple large language models (LLMs) represents an active research direction, with multiagent debate (MAD) emerging as a popular approach. MAD involves LLMs independently gener... 详细信息
来源: 评论
Network Intrusion Detection System Based on Domain Adaptation for Industrial Control System  5
Network Intrusion Detection System Based on Domain Adaptatio...
收藏 引用
5th International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2023
作者: Zhang, Jiahui Yu, Le Zhang, Feng State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China China Mobile Communications Corporation Beijing100053 China
Industrial control systems play a crucial role in society, and ensuring the security of industrial control systems has become an important and challenging task. Intrusion detection is an important defense mechanism fo... 详细信息
来源: 评论
Two-Step Amplitude Barycenter Calibrations for OTFS Signals: A High-Resolution Sensing Waveform Design
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR technology 2024年 第12期73卷 18923-18936页
作者: Liu, Xiqing Gong, Jialong Yang, Yiran Wang, Dong Peng, Mugen Beijing Univ Posts & Telecommun Sch Informat & Commun Engn State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China China Telecom Res Inst Res Ctr 6G Beijing 100035 Peoples R China
Sensing is considered a native capability of the sixth-generation (6G) mobile communication systems, inspiring a variety of research endeavors with regard to integrated sensing and communication (ISAC) waveforms. The ... 详细信息
来源: 评论
Genuine Einstein-Podolsky-Rosen steering of generalized three-qubit states via unsharp measurements
收藏 引用
Chinese Physics B 2023年 第4期32卷 215-225页
作者: 陈玉玉 郭奋卓 魏士慧 温巧燕 School of Science Beijing University of Posts and TelecommunicationsBeijing 100876China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China CETC Cyberspace Security Technology Co. Ltd.Beijing 100041China
We aim to explore all possible scenarios of(1→2)(where one wing is untrusted and the others two wings are trusted)and(2→1)(where two wings are untrusted,and one wing is trusted)genuine tripartite Einstein-Podolsky-R... 详细信息
来源: 评论
Energy Consumption Minimization for NOMA-Based Secure UAV-MEC Network
收藏 引用
China Communications 2025年 第3期22卷 202-216页
作者: Zhang Hao Huang Yuzhen Zhang Zhi Lu Xingbo School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China The Academy of Military Sciences of PLA Beijing 100091China
Applying non-orthogonal multiple access(NOMA)to the mobile edge computing(MEC)network supported by unmanned aerial vehicles(UAVs)can improve spectral efficiency and achieve massive user access on the basis of solving ... 详细信息
来源: 评论
A Trusted Edge Resource Allocation Framework for Internet of Vehicles
收藏 引用
Computers, Materials & Continua 2023年 第11期77卷 2629-2644页
作者: Yuxuan Zhong Siya Xu Boxian Liao Jizhao Lu Huiping Meng Zhili Wang Xingyu Chen Qinghan Li State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing100876China State Grid Henan Information&Telecommunication Company Zhengzhou450018China School of Information Studies Syracuse UniversitySyracuse13244USA
With the continuous progress of information technique,assisted driving technology has become an effective technique to avoid traffic *** to the complex road conditions and the threat of vehicle information being attac... 详细信息
来源: 评论