咨询与建议

限定检索结果

文献类型

  • 100 篇 期刊文献
  • 38 篇 会议

馆藏范围

  • 138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 127 篇 工学
    • 40 篇 信息与通信工程
    • 40 篇 计算机科学与技术...
    • 27 篇 仪器科学与技术
    • 27 篇 电子科学与技术(可...
    • 19 篇 网络空间安全
    • 15 篇 软件工程
    • 10 篇 机械工程
    • 9 篇 光学工程
    • 7 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 交通运输工程
  • 24 篇 理学
    • 17 篇 物理学
    • 6 篇 数学
    • 2 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 统计学(可授理学、...
  • 22 篇 管理学
    • 22 篇 管理科学与工程(可...
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 医学
    • 1 篇 中西医结合
    • 1 篇 中药学(可授医学、...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 9 篇 quantum
  • 5 篇 sharing
  • 4 篇 cryptography
  • 4 篇 threshold
  • 4 篇 secret
  • 2 篇 asn.1
  • 2 篇 single
  • 2 篇 xml
  • 2 篇 communication
  • 2 篇 模型
  • 2 篇 channel estimati...
  • 2 篇 qos
  • 2 篇 load-balancing a...
  • 2 篇 state
  • 2 篇 signature
  • 2 篇 direct
  • 2 篇 system
  • 2 篇 authentication
  • 2 篇 heterogeneous cl...
  • 2 篇 移动代理

机构

  • 20 篇 北京邮电大学
  • 8 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 school of scienc...
  • 6 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 2 篇 南京邮电学院
  • 2 篇 重庆邮电大学
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 information secu...
  • 2 篇 key laboratory o...
  • 2 篇 state key lab of...
  • 1 篇 china mobile inf...
  • 1 篇 NOT FOUND
  • 1 篇 山东省计算中心山...
  • 1 篇 statekeylaborato...
  • 1 篇 national mobile ...

作者

  • 13 篇 china
  • 9 篇 beijing
  • 8 篇 杨义先
  • 7 篇 beijing universi...
  • 4 篇 钮心忻
  • 3 篇 苏森
  • 3 篇 廖建新
  • 3 篇 3 school of scie...
  • 3 篇 马兆丰
  • 3 篇 王励成
  • 3 篇 beijing 100876
  • 2 篇 胡正名
  • 2 篇 3 state key labo...
  • 2 篇 王汝传
  • 2 篇 4 state key labo...
  • 2 篇 陈俊亮
  • 2 篇 yang yuguang1 2 ...
  • 2 篇 余重秀
  • 2 篇 苑金辉
  • 2 篇 桑新柱

语言

  • 107 篇 英文
  • 31 篇 中文
检索条件"作者=2.State Key Laboratory of Networking and Switching Technology,Beijing {2. of posts and telecommunications,Beijing 100876,china"
138 条 记 录,以下是21-30 订阅
排序:
Influence of magnetic current on the ground state entanglement in an isotropic transverse XY chain
收藏 引用
Progress in Natural Science:Materials International 2007年 第10期17卷 1147-1151页
作者: Liu Dan1,2., Zhang Yong3 and Long Guilu1,2.1. key laboratory for Atomic and Molecular NanoSciences, and Department of Physics, Tsinghua University, {2. 100084, china 2. Center of Quantum Information Science and technology, Tsinghua National laboratory for information Science and technology, {2. 100084, china 3. Institute of Physics, School of Sciences, {2. University of posts and telecommunications, {12., china) key laboratory for Atomic and Molecular NanoSciences Department of Physics Tsinghua University Beijing 100084 China Center of Quantum Information Science and technology Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China Institute of Physics School of Sciences Beijing University of Posts and Telecommunications Beijing 100876 China
We study the ground state entanglement in a three-qubit XY chain under the influence of a magnetization current. It is found that the ground state changes from a W state to a disentangled state as the magnetic field v... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Robust multiuser MIMO scheduling algorithms with imperfect CSI
收藏 引用
Science china(Information Sciences) 2012年 第4期55卷 815-826页
作者: MAO JunLing 1,3,GAO JinChun 1,3,LIU YuanAn 1,3,XIE Gang 2.3 & ZHANG Jian 1,3 1 School of Electronic Engineering,beijing University of posts and {2.,beijing 100876,china 2.School of Information and Communication Engineering,beijing University of posts and {2.,beijing 100876,china 3 key Lab of Universal Wireless Communications,Ministry of Education,beijing University of posts and {2.,beijing 100876,china School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China key Lab of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Robust multiuser multiple-input-multiple-output (MIMO) scheduling algorithms are proposed in this *** imperfect channel state information (CSI),traditional scheduling algorithms for the multiuser MIMO system based on ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Enhancing Reliability via Checkpointing in Cloud Computing Systems
收藏 引用
china Communications 2017年 第7期14卷 108-117页
作者: Ao Zhou Qibo Sun Jinglin Li state key {2. of networking and switching technology Beijing University of Posts and Telecommunications
Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cross layer scheduling for real-time traffic in multiuser MIMO-OFDMA systems
收藏 引用
The Journal of china Universities of posts and {2. 2009年 第3期16卷 24-29页
作者: SUN Qiao-yun,TIAN Hui,DONG Kun,ZHANG Ping key laboratory of Universal Wireless Communications,Ministry of Education,{2. University of posts and telecommunications,beijing 100876,china key laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China
A novel cross layer scheduling algorithm is proposed for real-time (RT) traffic in multiuser downlink multiple-input multiple-output orthogonal frequency division multiple access (MIMO-OFDMA) wireless systems. The... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Research on Cryptographic Schemes
收藏 引用
ZTE Communications 2007年 第4期5卷 1-5页
作者: Zheng Shihui (Information Security Center of state key {2. of networking and switching technology, beijing University of posts and telecommunications, beijing 100876, china)
Cryptography is an important technology for information security. It mainly includes symmetric and asymmetric cryptographic algorithms and protocols. For the symmetric cryptographic algorithms, it is easy to deduce de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Construction of nonbinary quantum cyclic codes by using graph method
收藏 引用
Science in china(Series F) 2005年 第6期48卷 693-702页
作者: LIU Tailin1,2.3, WEN Qiaoyan1 & LIU Zihui4 1. School of Science, beijing University of posts and {2., beijing 100876, china 2. state key laboratory of Integrated Services Network, Xidian University, Xi’an 710071,china 3. Shandong Finance Institute, Jinan 2.0014, china 4. School of Mathematical Sciences, Peking University, beijing 100871, china School of Science Beijing University of Posts and Telecommunications Beijing China state key {2. of Integrated Services Network Xidian University Xi’an China Shandong Finance Institute Jinan China School of Mathematical Sciences Peking University Beijing China
Using the graph method proposed by Schlingemann and Werner, this paper introduces a technique to construct nonbinary quantum cyclic codes and provides a specific example. We also construct the quantum codes [[8, 2. 4]... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Conjugate adjoining problem in braid groups and new design of braid-based signatures
收藏 引用
Science china(Information Sciences) 2010年 第3期53卷 524-536页
作者: WANG LiCheng1,2. WANG LiHua2. CAO ZhenFu3, YANG YiXian1 & NIU XinXin1 Information Security Center, state key {2. of networking and switching technology, beijing University of posts and telecommunications, beijing 100876, china 2.ational Institute of Information and Communications technology, Tokyo 184-8795, Japan 3Trusted Digital technology {2., Shanghai Jiao Tong University, Shanghai 2.02.0, china Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Institute of Information and Communications technology Tokyo Japan Trusted Digital technology laboratory Shanghai Jiao Tong University Shanghai China
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Robust L2.L∞ control for uncertain singular systems with time-varying delay
收藏 引用
Progress in Natural Science:Materials International 2008年 第8期18卷 1015-1021页
作者: Lin Lia,*, Yingmin Jiaa, Junping Dub, Shiying Yuan c a The Seventh Research Division, beijing University, beijing 100083, {2. b beijing key laboratory of Intelligent telecommunications Software and Multimedia, beijing University of posts and telecommunications, beijing 100876, {2. c School of Electrical Engineering and Automation, Henan Polytechnic University, Jiaozuo 454000, {2. The Seventh Research Division Beijing University Beijing 100083 China beijing key {2. of Intelligent telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 China
We study the problem of L2.L1 control for a class of uncertain singular systems with time-delay and norm-bounded parameter uncertainties in this paper. A new delay-dependent robust stability criterion is obtained in t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Resource Allocation and User Association for HTTP Adaptive Streaming in Heterogeneous Cellular Networks with Small Cells
收藏 引用
china Communications 2016年 第9期13卷 1-11页
作者: Jiang Liu state key {2. of networking and switching technology Beijing University of Post and TelecommunicationsBeijing 100876China Department of Systems and Computer Engineering Carleton UniversityOttawaONCanada beijing Advanced Innovation Center for Future Internet technology Beijing 100124China
Video streaming,especially hypertext transfer protocol based(HTTP) adaptive streaming(HAS) of video,has been expected to be a dominant application over mobile networks in the near future,which brings huge challenge fo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Research on Audio Information Hiding technology
收藏 引用
ZTE Communications 2007年 第4期5卷 6-9页
作者: Yuan Kaiguo Yang Yu Yang Yixian (state key {2. of networking and switching technology, beijing University of posts and telecommunications, beijing 100876, china)
Audio information hiding technology is an important branch of stenography. This article introduces the basic concepts, principles, characteristics and the typical models of the audio information hiding. It then classi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论