咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是141-150 订阅
排序:
IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield Things  31
IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Int...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Liu, Dongxin Abdelzaher, Tarek Wang, Tianshi Hu, Yigong Li, Jinyang Liu, Shengzhong Caesar, Matthew Kalasapura, Deepti Bhattacharyya, Joydeep Srour, Nassy Wigness, Maggie Kim, Jae Wang, Guijun Kimberly, Greg Osipychev, Denis Yao, Shouchao Univ Illinois Dept Comp Sci Urbana IL 61801 USA DEVCOM Army Res Lab Adelphi MD 20783 USA Boeing Co Seattle WA 98124 USA George Mason Univ Dept Comp Sci Fairfax VA 22030 USA
Recent concepts in defense herald an increasing degree of automation of future military systems, with an emphasis on accelerating sensing-to-decision loops at the tactical edge, reducing their network communication fo... 详细信息
来源: 评论
Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis  31
Real-time Application Identification of RTC Media Streams vi...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Wu, Hua Zhu, Chengfei Cheng, Guang Hu, Xiaoyan Southeast Univ Sch Cyber Sci & Engn Nanjing Peoples R China Purple Mt Labs Network & Commun Secur Nanjing Peoples R China Southeast Univ Key Lab Comp Network & Informat Integrat Nanjing Peoples R China Jiangsu Prov Engn Res Ctr Secur Ubiquitous Networ Nanjing Peoples R China
The globalization of the economy and the increase in network bandwidth have contributed significantly to the development and popularity of real-time communication (RTC) social applications. RTC media streams, such as ... 详细信息
来源: 评论
R2P3: Renewal-Reward Process-Based Password Protection in Internet of Things  31
R<SUP>2</SUP>P<SUP>3</SUP>: Renewal-Reward Process-Based Pas...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Neumann, Thomas Welsh, Kyle Perez, Caden Sha, Kewei Wu, Yalong North Cent Coll Dept Comp Sci & Engn Naperville IL USA Univ Houston Dept Comp Sci Clear Lake TX USA
Given the eruption of Internet of Things (IoT) systems, it has become critical for connected devices to have persistent security. Password-based security measures provide an interface for users to effectively secure t... 详细信息
来源: 评论
Tracing Tor Hidden Service Through Protocol Characteristics  31
Tracing Tor Hidden Service Through Protocol Characteristics
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Qin, Yi Zheng, Tianming Wu, Yue Zou, Futai Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200240 Peoples R China
Tor is a relay-based communication network that provides users with anonymous access to the Internet. Tor hidden services protect the identities of the content publishers to achieve anonymity and anti-censorship. Howe... 详细信息
来源: 评论
Deep Reinforcement Learning Based Computation Offloading in SWIPT-assisted MEC networks  31
Deep Reinforcement Learning Based Computation Offloading in ...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Wan, Changwei Guo, Songtao Yang, Yuanyuan Chongqing Univ Coll Comp Sci Chongqing 400044 Peoples R China SUNY Stony Brook Dept Elect & Comp Engn Stony Brook NY 11794 USA
Computation offloading is an effective method to relieve user equipment (UE) from the limited battery capacity and computation resource in mobile edge computing (MEC) networks. However, it is challenging to obtain off... 详细信息
来源: 评论
Automatic Field Extraction of Extended TLV for Binary Protocol Reverse Engineering  31
Automatic Field Extraction of Extended TLV for Binary Protoc...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Huang, Zewen Wu, Kui Huang, Shengqiang Zhou, Yang Giagone, Ronnie Salvador Univ Victoria Dept Comp Sci Victoria BC Canada Huawei Technol Canada Co Ltd Burnaby BC Canada
Type Length Value (TLV) is one of the main structures commonly used in network protocols. A large number of proprietary protocols, whose specification is unknown to the public, run in the current Internet as well as d... 详细信息
来源: 评论
Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined Rules  31
Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on P...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: He, Fengjiao Yang, Wenchuan Cui, Baojiang Cui, Jia Beijing Univ Posts & Telecommun Natl Engn Lab Mobile Network Secur Beijing Peoples R China China Informat Technol Secur Evaluat Ctr Informat Dept Beijing Peoples R China
The fifth-generation mobile communication network (5G) is a significant infrastructure with the support of enhanced mobile broadband, ultra-reliable and low latency communication, and massive machine type communicatio... 详细信息
来源: 评论
Neural networks for DDoS Attack Detection using an Enhanced Urban IoT Dataset  31
Neural Networks for DDoS Attack Detection using an Enhanced ...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Hekmati, Arvin Grippo, Eugenio Krishnamachari, Bhaskar Univ Southern Calif Dept Comp Sci Los Angeles CA USA Univ Southern Calif Dept Elect & Comp Engn Los Angeles CA USA
We investigate the application of artificial intelligence to cybersecurity, to contribute to the safe and secure growth of the internet of things (IoT). Specifically, we train and evaluate different neural networks mo... 详细信息
来源: 评论
An Energy-Efficient Load Balancing Scheme in Heterogeneous Clusters by Linear Programming  31
An Energy-Efficient Load Balancing Scheme in Heterogeneous C...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Zhang, Yujian Li, Mingde Tong, Fei Southeast Univ Sch Cyber Sci & Engn Nanjing Peoples R China Southeast Univ Key Lab Comp Network & Informat Integrat Minist Educ Nanjing Peoples R China Purple Mt Labs Nanjing Peoples R China
The growing power consumption of heterogeneous clusters has attracted great interests from both academia and industry. Although there have been extensive studies on energy-efficient task scheduling algorithms to addre... 详细信息
来源: 评论
Multi-Controller Load Balancing Mechanism Based on Improved Genetic Algorithm  31
Multi-Controller Load Balancing Mechanism Based on Improved ...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Xu, Aixin Sun, Shimin Wang, Ze Wang, Xiaofan Han, Li Tiangong Univ Tianjin Key Lab Autonomous Intelligent Technol Sch Software Tianjin Peoples R China Tiangong Univ Sch Software Tianjin Peoples R China Tianjin Univ Technol Tianjin Sch Comp Sci & Engn Tianjin Peoples R China
To solve the load imbalance problem of controllers in Software Defined networks (SDN), we present a controller reselection mechanism based on non-cooperative game theory. Load balancing among controller clusters is ac... 详细信息
来源: 评论