咨询与建议

限定检索结果

文献类型

  • 92 篇 会议
  • 49 篇 期刊文献

馆藏范围

  • 141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 53 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 电子科学与技术(可...
    • 17 篇 电气工程
    • 12 篇 控制科学与工程
    • 8 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 光学工程
    • 6 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 农业工程
  • 41 篇 理学
    • 21 篇 数学
    • 14 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 5 篇 系统科学
    • 2 篇 大气科学
  • 18 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 法学
  • 1 篇 教育学

主题

  • 6 篇 interference
  • 5 篇 simulation
  • 5 篇 wireless sensor ...
  • 4 篇 security of data
  • 4 篇 protocols
  • 4 篇 synchronization
  • 3 篇 blind source sep...
  • 3 篇 deep learning
  • 3 篇 relays
  • 3 篇 wireless communi...
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 channel estimati...
  • 3 篇 satellites
  • 2 篇 jamming
  • 2 篇 virtual time dif...
  • 2 篇 reinforcement le...
  • 2 篇 compressed sensi...

机构

  • 8 篇 science and tech...
  • 6 篇 national mobile ...
  • 6 篇 purple mountain ...
  • 5 篇 state key labora...
  • 5 篇 institute of cyb...
  • 5 篇 frontiers scienc...
  • 5 篇 college of infor...
  • 4 篇 southeast univer...
  • 4 篇 state key labora...
  • 3 篇 state key lab of...
  • 3 篇 yangtze delta re...
  • 3 篇 science and tech...
  • 3 篇 school of teleco...
  • 3 篇 school of inform...
  • 3 篇 peng cheng labor...
  • 3 篇 moe frontiers sc...
  • 3 篇 science and tech...
  • 3 篇 center for flexi...
  • 3 篇 guangdong key la...
  • 3 篇 state key lab of...

作者

  • 7 篇 xiaoniu yang
  • 5 篇 yuan wu
  • 4 篇 li ping qian
  • 4 篇 zhao zhijin
  • 4 篇 yang wu
  • 4 篇 mingqing li
  • 3 篇 wei-bing lu
  • 3 篇 lei shen
  • 3 篇 jun-lin zhan
  • 3 篇 shen lei
  • 3 篇 ai bo
  • 3 篇 li ping
  • 3 篇 qianru wang
  • 3 篇 hao chen
  • 3 篇 ziyang cheng
  • 3 篇 zhen-guo liu
  • 3 篇 lu wei-bing
  • 3 篇 li ming
  • 3 篇 zishu he
  • 3 篇 chen ze-hui

语言

  • 128 篇 英文
  • 7 篇 其他
  • 6 篇 中文
检索条件"机构=State Key Lab. of Information Control and Security Technology in Communication"
141 条 记 录,以下是101-110 订阅
排序:
Corrigendum to “Fast and scalab.e lock methods for video coding on many-core architecture” [J. Vis. Commun. 25 (7) (2014) 1758–1762]
收藏 引用
Journal of Visual communication and Image Representation 2015年 26卷 350-350页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROSCIENCE 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
RE-AODV: Improved AODV routing protocol for repairing efficiency
收藏 引用
Journal of Networks 2013年 第11期8卷 2467-2472页
作者: Li, Xu Feng, Qijing Li, Shijie Ding, Haiyang School of Electronic and Information Engineering State Key Lab. of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China College of Information Engineering Beijing Institute of Graphic Communication National Beijing 102600 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China
Mobile Ad Hoc Network (MANET) is a self-organized, quickly configurable network, which does not have fixed infrastructure. Mobility is one of the most characteristic in MANET, but it may cause the failure of a valid l... 详细信息
来源: 评论
Energy-efficient contact probing in opportunistic mobile networks
Energy-efficient contact probing in opportunistic mobile net...
收藏 引用
2013 IEEE 2013 22nd International Conference on Computer communication and Networks, ICCCN 2013
作者: Zhou, Huan Zheng, Huanyang Wu, Jie Chen, Jiming State Key Lab. of Industrial Control Technology Zhejiang University Hangzhou 310027 China Department of Computer and Information Sciences Temple University United States
In Opportunistic Mobile Networks (OppNets), data is opportunistically exchanged between nodes who encounter each other. In order to enable such data exchanges, nodes in the network have to probe their environment cont... 详细信息
来源: 评论
False data attacks judgment based on consistency loop model in wireless sensor networks
False data attacks judgment based on consistency loop model ...
收藏 引用
4th International Conference on Advances in Swarm Intelligence, ICSI 2013
作者: Li, Ping Sun, Limin Yang, Wu Fang, Qing Xie, Jinyang Ma, Kui Computer and Communication Engineering Institute Changsha University of Science and Technology Hunan 410114 China State Key Lab. of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Wuxi Internet of Things Industry Research Institute Jiangsu 214000 China
Wireless sensor networks are usually deployed in complex environments;an attacker can easily inject false data by capturing nodes, causing serious consequences. The main work of this paper is as follows. Firstly, the ... 详细信息
来源: 评论
An study of indoor localization algorithm based on imperfect signal coverage in wireless networks
An study of indoor localization algorithm based on imperfect...
收藏 引用
4th International Conference on Advances in Swarm Intelligence, ICSI 2013
作者: Li, Ping Sun, Limin Fang, Qing Xie, Jinyang Yang, Wu Ma, Kui Computer and Communication Engineering Institute Changsha University of Science and Technology Hunan 410114 China State Key Lab. of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Wuxi Internet of Things Industry Research Institute Jiangsu 214000 China
Existing localization algorithms didn't consider the important factor of the antenna measuring angles. And most wireless indoor localization algorithms require a site survey process which is time-consuming and lab...
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on security and Privacy in communication Networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Direct multi-hop time synchronization with constructive interference
Direct multi-hop time synchronization with constructive inte...
收藏 引用
11th ACM/IEEE Conference on information Processing in Sensing Networks, IPSN'12
作者: Wang, Yin Pan, Gaofeng Huang, Zhiyu MOE Key Lab. for Information System Security School of Software TNLIST China Science and Technology on Communication Information Security Control Laboratory China Institute of Software Chinese Academy of Sciences China
Multi-hop time synchronization in wireless sensor networks (WSNs) is often time-consuming and error-prone due to random time-stamp delays for MAC layer access and unstable clocks of intermediate nodes. Constructive in... 详细信息
来源: 评论
A resource distribution algorithm based on node factors of transmission for ad hoc network
A resource distribution algorithm based on node factors of t...
收藏 引用
2012 2nd International Conference on Business Computing and Global Informatization, BCGIN 2012
作者: Xu, Xiaofeng Wei, Guohua Science and Technology on Communication Information Security Control Lab. JiaXing China China Electronic Technology Group Corporation No. 36 Institute JiaXing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign... 详细信息
来源: 评论
Energy-efficient Contact Probing in Opportunistic Mobile Networks
Energy-efficient Contact Probing in Opportunistic Mobile Net...
收藏 引用
International Conference on Computer communications and Networks
作者: Huan Zhou Huanyang Zheng Jie Wu Jiming Chen State Key Lab. of Industrial Control Technology Zhejiang University Hangzhou China Department of Computer and Information Sciences Temple University USA
In Opportunistic Mobile Networks (OppNets), data is opportunistically exchanged between nodes who encounter each other. In order to enable such data exchanges, nodes in the network have to probe their environment cont... 详细信息
来源: 评论