咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 11 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 36 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36 篇 工学
    • 30 篇 电子科学与技术(可...
    • 29 篇 信息与通信工程
    • 27 篇 仪器科学与技术
    • 2 篇 计算机科学与技术...
    • 2 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 36 篇 device-to-device
  • 5 篇 资源分配
  • 4 篇 communication
  • 3 篇 interference
  • 3 篇 resource
  • 3 篇 混合网络
  • 3 篇 blockchain
  • 2 篇 smart homes
  • 2 篇 功率控制
  • 2 篇 ddos attack
  • 2 篇 method
  • 2 篇 干扰抑制
  • 2 篇 heterogeneous
  • 2 篇 network
  • 2 篇 authentication
  • 2 篇 无线资源管理
  • 2 篇 full-duplex
  • 2 篇 multicast
  • 2 篇 多播通信
  • 2 篇 allocation

机构

  • 6 篇 北京邮电大学
  • 2 篇 合肥工业大学
  • 1 篇 australian insti...
  • 1 篇 school of commun...
  • 1 篇 college of scien...
  • 1 篇 school of commun...
  • 1 篇 department of si...
  • 1 篇 nokia research c...
  • 1 篇 sino-u.s. progra...
  • 1 篇 department of ma...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 lemania altdorf ...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 samsung r&d inst...
  • 1 篇 huawei technol. ...
  • 1 篇 武汉理工大学

作者

  • 2 篇 liang zhong
  • 2 篇 xueqian zheng
  • 2 篇 张陈香
  • 2 篇 yang cao
  • 1 篇 jian wang
  • 1 篇 gwanggil jeon
  • 1 篇 wenji feng
  • 1 篇 shahid bashir
  • 1 篇 imran khan
  • 1 篇 quang ngoc nguye...
  • 1 篇 ruxun xiang
  • 1 篇 bello musa yakub...
  • 1 篇 allafi omran
  • 1 篇 charles wang
  • 1 篇 xianwei zhou
  • 1 篇 jia liu
  • 1 篇 ju liu
  • 1 篇 刘沛
  • 1 篇 王宏宇
  • 1 篇 klaus doppler

语言

  • 21 篇 英文
  • 15 篇 中文
检索条件"主题词=device-to-device"
36 条 记 录,以下是11-20 订阅
排序:
Resource Allocation and Beamforming Algorithm Based on Interference Avoidance Approach for device-to-device Communication Underlaying LTE Cellular Network
收藏 引用
Communications and Network 2013年 第3期5卷 367-373页
作者: Huy-Dung Han Chenxi Zhu Dorin Viorel Akira Ito Fujitsu Laboratories of America Inc. Sunnyvale CA USA
In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
一种device-to-device移动社交网络中的热点文件预测方法
收藏 引用
小型微型计算机系统 2018年 第5期39卷 973-977页
作者: 张霄宏 侯海杰 任建吉 河南理工大学计算机学院 河南焦作454000
随着信息技术的蓬勃发展,移动社交网络越来越受到人们的关注,尤其是对移动社交网络中的热点分析.以基于device-to-device技术构建的移动社交网络为研究对象,从网络规模、文件分享特征以及用户影响力等方面入手,提出一种预测该类社交网... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
device-to-device通信的无线资源管理研究
收藏 引用
现代电信科技 2012年 第5期42卷 6-10页
作者: 荣涛 南京邮电大学通信与信息工程学院
在IMT-Advanced蜂窝网络中部署设备至设备(D2D:device-to-device)通信是当前无线领域内的一个研究热点,其主要的困难在于控制D2D与蜂窝系统间的干扰。D2D的无线资源管理机制和算法是实现系统间干扰协调的关键因素之一。文章从功率控制... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 同方期刊数据库 同方期刊数据库 评论
Mode Selection and Resource Allocation for deviceto-device Communications in 5G Cellular Networks
收藏 引用
China Communications 2016年 第6期13卷 32-47页
作者: Fan Jiang Benchao Wang Changyin Sun Yao Liu Rong Wang School of Communication and Information Engineering Xi'an University of Posts and Telecommunications Department of Computer Science and Engineering University of South Florida Shaanxi Radio Monitoring Station State Radio Regulatory of China
To meet the increasing demand of wireless broadband applications in future 5G cellular networks, device-to-device(D2D) communications serve as a candidate paradigm to improve spectrum efficiency. Considering the chall... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 393-399页
作者: Saeid Yazdanpanah Saman Shojae Chaeikar Alireza Jolfaei Department of Computer Engineering Khorramabad BranchIslamic Azad UniversityKhorramabadIran Australian Institute of Higher Education SydneyAustralia College of Science and Engineering Flinders UniversityAdelaideAustralia
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart hom... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Optimized Algorithm for D2D-MIMO 5G Wireless Networks
收藏 引用
Computers, Materials & Continua 2021年 第9期68卷 3029-3044页
作者: Shahid Bashir Imran Khan Fahd NAl-Wesabi Nadhem Nemri Ammar Zahary Quang Ngoc Nguyen Department of Business Studies Namal UniversityPakistan Department of Electrical Engineering University of Engineering and Technology PeshawarPakistan Department of Computer Science King Khalid UniversityMuhayel AseerKSA Faculty of Computer and IT Sana’a UniversitySana’aYemen Department of Communications and Computer Engineering Faculty of Science and Engineering Waseda University Shinjuku-kuTokyo169-0051Japan
The device-to-device(D2D)networking technology is extended to the conventional cellular network to boost the communication efficiency of the entire network,forming a heterogeneous 5G and beyond(B5G)communication netwo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient Video Transmission in D2D Assisted Mobile Cloud Networks
收藏 引用
China Communications 2016年 第8期13卷 74-83页
作者: Cheng Zhan Zhe Wen School of Computer and Information Science Southwest University
The increasing popularity of smart mobile devices and the rise of online services has increased the requirements for efficient dissemination of social video contents. In this paper,we study the problem of distributing... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
收藏 引用
China Communications 2022年 第8期19卷 198-213页
作者: Lei Meng Daochao Huang Jiahang An Xianwei Zhou Fuhong Lin School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC) Beijing 100029China Shunde Graduate School of University of Science and Technology Beijing Guangdong528399China
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture *** device-to-device continuous authentication protocol is one of the most... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications
收藏 引用
Computers, Materials & Continua 2019年 第2期58卷 505-516页
作者: Shanshan Yu Ju Liu Xiaoqing Zhang Shangbin Wu Shandong University Qingdao266237China. Samsung R&D Institute UK Staines-upon-ThamesTW184QEUK
Relay-assisted transmission could effectively enhance the performance of device-to-device(D2D)communications when D2D user equipments(UEs)are too far away from each other or the quality of D2D channel is not good enou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Measurement and analysis of content diffusion characteristics in opportunity environments with Spark
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2019年 第10期20卷 1404-1414页
作者: Xiao-hong ZHANG Kai QIAN Jian-ji REN Zong-pu JIA Tian-peng JIANG Quan ZHANG College of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454000China Beijing Anqi Zhilian Technology Co. Ltd.Beijing 100000China Department of Computer Science Wayne State UniversityDetroit 48202USA
Opportunity networks provide a chance to offload the tremendous cellular traffic generated by sharing popular content on mobile networks. Analyzing the content spread characteristics in real opportunity environments c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论