咨询与建议

限定检索结果

文献类型

  • 91 篇 期刊文献
  • 38 篇 会议

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 36 篇 信息与通信工程
    • 36 篇 计算机科学与技术...
    • 25 篇 仪器科学与技术
    • 25 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 14 篇 软件工程
    • 10 篇 机械工程
    • 8 篇 光学工程
    • 7 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 交通运输工程
  • 24 篇 理学
    • 17 篇 物理学
    • 6 篇 数学
    • 2 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 统计学(可授理学、...
  • 20 篇 管理学
    • 20 篇 管理科学与工程(可...
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 9 篇 quantum
  • 5 篇 sharing
  • 4 篇 cryptography
  • 4 篇 threshold
  • 4 篇 secret
  • 2 篇 asn.1
  • 2 篇 single
  • 2 篇 xml
  • 2 篇 communication
  • 2 篇 模型
  • 2 篇 channel estimati...
  • 2 篇 load-balancing a...
  • 2 篇 state
  • 2 篇 signature
  • 2 篇 direct
  • 2 篇 system
  • 2 篇 authentication
  • 2 篇 heterogeneous cl...
  • 2 篇 移动代理
  • 2 篇 security

机构

  • 17 篇 北京邮电大学
  • 8 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 school of scienc...
  • 6 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 2 篇 南京邮电学院
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 information secu...
  • 2 篇 key laboratory o...
  • 2 篇 state key lab of...
  • 1 篇 china mobile inf...
  • 1 篇 NOT FOUND
  • 1 篇 statekeylaborato...
  • 1 篇 national mobile ...
  • 1 篇 opt.
  • 1 篇 state key labora...

作者

  • 13 篇 china
  • 9 篇 beijing
  • 8 篇 杨义先
  • 7 篇 beijing universi...
  • 4 篇 钮心忻
  • 3 篇 苏森
  • 3 篇 廖建新
  • 3 篇 3 school of scie...
  • 3 篇 马兆丰
  • 3 篇 王励成
  • 3 篇 beijing 100876
  • 2 篇 胡正名
  • 2 篇 3 state key labo...
  • 2 篇 王汝传
  • 2 篇 4 state key labo...
  • 2 篇 陈俊亮
  • 2 篇 yang yuguang1 2 ...
  • 2 篇 余重秀
  • 2 篇 苑金辉
  • 2 篇 桑新柱

语言

  • 106 篇 英文
  • 23 篇 中文
检索条件"作者=4 State Key Laboratory of Networking and Switching technology,beijing University of Posts and Tele-communications,beijing 100876,china"
129 条 记 录,以下是31-40 订阅
排序:
Novel resource allocation algorithms for multiuser downlink MIMO-OFDMA of FuTURE B3G systems
收藏 引用
Progress in Natural Science:Materials International 2009年 第9期19卷 1141-1146页
作者: Qiaoyun Sun, Hui Tian *, Shuang Wang, Kun Dong, Ping Zhang key laboratory of Universal Wireless Communication, Ministry of Education, Wireless technology Innovation Institute, beijing university of posts & telecommunications, beijing 100876, china key laboratory of Universal Wireless Communication Ministry of Education Wireless Technology Innovation Institute Beijing University of Posts & Telecommunications Beijing 100876 China
In this paper, subcarrier and power allocation problems for multiuser downlink MIMO-OFDMA of the FuTURE B3G TDD system are investigated. For the reciprocity of the TDD channel, the channel state information can be emp... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Conjugate adjoining problem in braid groups and new design of braid-based signatures
收藏 引用
Science china(Information Sciences) 2010年 第3期53卷 524-536页
作者: WANG LiCheng1,2, WANG LiHua2, CAO ZhenFu3, YANG YiXian1 & NIU XinXin1 Information Security Center, state key laboratory of networking and switching technology, beijing university of posts and telecommunications, beijing 100876, china 2National Institute of Information and communications technology, Tokyo 184-8795, Japan 3Trusted Digital technology laboratory, Shanghai Jiao Tong university, Shanghai 200240, china Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Institute of Information and communications technology Tokyo Japan Trusted Digital technology laboratory Shanghai Jiao Tong University Shanghai China
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure Beamforming Design for SWIPT in Cooperative D2D communications
收藏 引用
china communications 2017年 第1期14卷 20-33页
作者: Li Jiang Cheng Qin Xixi Zhang Hui Tian state key laboratory of networking and switching technology Beijing University of Posts and Telecommunicationsand Science and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryBeijing100876China
In device-to-device(D2D) communications, device terminal relaying makes it possible for devices in a network to function as transmission relays for each other to enhance the spectral efficiency. In this paper we consi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Method of IT Service Portfolio Selection Based on BDIM
A Method of IT Service Portfolio Selection Based on BDIM
收藏 引用
2011 3rd International Conference on Computer Research and Development(ICCRD 2011)
作者: Xu Wei state key laboratory of networking and switching beijing university of posts and telecommunications beijing china Zhan Zhiqiang state key laboratory of networking and switching beijing university of posts and telecommunications beijing china
This paper presents an approach to define the IT service portfolio so that the definition can bring the best interests to the IT Service provider and its *** the Service Strategy phase of the IT service life cycle def... 详细信息
来源: cnki会议 评论
Construction of nonbinary quantum cyclic codes by using graph method
收藏 引用
Science in china(Series F) 2005年 第6期48卷 693-702页
作者: LIU Tailin1,2,3, WEN Qiaoyan1 & LIU Zihui4 1. School of Science, beijing university of posts and telecommunications, beijing 100876, china 2. state key laboratory of Integrated Services Network, Xidian university, Xi’an 710071,china 3. Shandong Finance Institute, Jinan 250014, china 4. School of Mathematical Sciences, Peking university, beijing 100871, china School of Science Beijing University of Posts and Telecommunications Beijing China state key laboratory of Integrated Services Network Xidian University Xi’an China Shandong Finance Institute Jinan China School of Mathematical Sciences Peking University Beijing China
Using the graph method proposed by Schlingemann and Werner, this paper introduces a technique to construct nonbinary quantum cyclic codes and provides a specific example. We also construct the quantum codes [[8, 2, 4]... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Influence of magnetic current on the ground state entanglement in an isotropic transverse XY chain
收藏 引用
Progress in Natural Science:Materials International 2007年 第10期17卷 1147-1151页
作者: Liu Dan1,2 , Zhang Yong3 and Long Guilu1,2(1. key laboratory for Atomic and Molecular NanoSciences, and Department of Physics, Tsinghua university, beijing 100084, china 2. Center of Quantum Information Science and technology, Tsinghua National laboratory for information Science and technology, beijing 100084, china 3. Institute of Physics, School of Sciences, beijing university of posts and telecommunications, beijing 100876, china) key laboratory for Atomic and Molecular NanoSciences Department of Physics Tsinghua University Beijing 100084 China Center of Quantum Information Science and technology Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China Institute of Physics School of Sciences Beijing University of Posts and Telecommunications Beijing 100876 China
We study the ground state entanglement in a three-qubit XY chain under the influence of a magnetization current. It is found that the ground state changes from a W state to a disentangled state as the magnetic field v... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
PROTECTIVE CIRCUIT ROUTING ALGORITHM BASED ON MULTIPLE ANT COLONIES ALGORITHM
PROTECTIVE CIRCUIT ROUTING ALGORITHM BASED ON MULTIPLE ANT C...
收藏 引用
2009 IEEE International Conference on Communication technology and Applications(ICCTA2009)
作者: Ao Xiong Yongping Zhang Luoming Meng state key laboratory of networking and switching technology beijing university of posts and telecommunications beijing 100876 china
<正>Route protection for key circuits is the important method to improve the quality of service in transmission *** on analyzing the principle of protective circuit routing,this paper presents that single ant colony... 详细信息
来源: cnki会议 评论
Integrated VP-Based Control Strategies for ATM Survivable Networks
收藏 引用
The Journal of china Universities of posts and telecommunications 1996年 第2期3卷 14-21页
作者: Chen Shanzhi Cheng Shiduan and Chen Junliang(state key laboratory of switching technology and telecommunication Networksbeijing university of posts and telecommunications, beijing 100088, P. R. china) state key laboratory of switching technology and telecommunication Networks beijing university of posts and telecommunications Beijing 100088 P. R. China hs.ulaval.ca
Nowadays the self-healing techniques in ATM networks are highly considered. However, in mostof networks, the normal control and sell-healing control are separately considered. In this paper, intenttedATM VP-based cont... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A REVOCATION SCHEME FOR THE CLOUD COMPUTING ENVIRONMENT
A REVOCATION SCHEME FOR THE CLOUD COMPUTING ENVIRONMENT
收藏 引用
2011 IEEE International Conference on Cloud Computing and Intelligence Systems(CCIS2011)
作者: Xiaobiao Li,Qiaoyan Wen state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing,china
In order to meet the authentication requirement of the revoking frequently and dynamic network environment,a revocation scheme for the cloud computing environment is *** entering,leaving,revoking and authentication of... 详细信息
来源: cnki会议 评论
A New Backup-VP Priority Restoration Methodfor ATM Survival Networks
收藏 引用
The Journal of china Universities of posts and telecommunications 1995年 第2期2卷 6-12页
作者: Chen Shanzhi Cheng Shiduan and Chen Junliang(state key laboratory of switching technology of switching technology and telecommunication Networksbeijing university of posts and telecommunications, beijing 100088, P. R. china)
In this paper, we propose a new backup-VP priority restoration method for ATM survival net-works. in order to improve the survivability performance of higher priority VPs in case of multi-failure under the minim... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论