咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是231-240 订阅
排序:
Applying Harary Graph Structures to the Overlay Network Kademlia  30
Applying Harary Graph Structures to the Overlay Network Kade...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Heck, Henner Wacker, Arno Univ Bundeswehr Munchen Privacy & Compliance Munich Germany
Connectivity is an important property of fully distributed networks. The greater the number of node-disjoint connections between two nodes, the greater the effort an attacker has to make to reliably disconnect them. I... 详细信息
来源: 评论
Beartooth Relay Protocol: Supporting Real-Time Application Streams with Dynamically Allocated Data Reservations over LoRa  30
Beartooth Relay Protocol: Supporting Real-Time Application S...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Mekiker, Batuhan Wittie, Mike P. Jones, Jefferson Monaghan, Michael Montana State Univ Bozeman MT 59717 USA Beartooth Radio Inc Bozeman MT USA
Convenient solutions that cater to different types of applications always gather more users. LoRa, one of the solutions in the IoT space is quite flexible at the physical layer, but link layer LoRa protocols lack simi... 详细信息
来源: 评论
Automatic Recognition of Identification Schemes for IoT Identifiers based on A Hybrid DNN Model  30
Automatic Recognition of Identification Schemes for IoT Iden...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Li, Xiaotao You, Shujuan Chen, Wai China Mobile Res Inst Beijing Peoples R China
In Internet of Things (IoT), a unique identifier is essential for each object to serve as its digital identity and helps users to obtain the detailed information about this object. However, there are multiple encoding... 详细信息
来源: 评论
Federated Authorization for Managed Data Sharing: Experiences from the ImPACT Project  30
Federated Authorization for Managed Data Sharing: Experience...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Chase, Jeffrey S. Baldin, Ilya Duke Univ Comp Sci Durham NC 27708 USA RENCI UNC Chapel Hill Chapel Hill NC USA
This paper presents the rationale and design of the trust plane for ImPACT, a federated platform for managed sharing of restricted data. Key elements of the architecture include Web-based notaries for credential estab... 详细信息
来源: 评论
Super-Cloudlet: Rethinking Edge Computing in the Era of Open Optical networks  30
Super-Cloudlet: Rethinking Edge Computing in the Era of Open...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Mirkhanzadeh, Behzad Zhang, Tianliang Razo-Razo, Miguel Tacca, Marco Fumagalli, Andrea UT Dallas Open Networking Adv Res OpNeAR Lab Richardson TX 75080 USA
Edge computing is an attractive architecture to efficiently provide compute resources to many applications that demand specific QoS requirements. The edge compute resources are in close geographical proximity to where... 详细信息
来源: 评论
Budget-Constrained Reinforcement of SCADA for Cascade Mitigation  30
Budget-Constrained Reinforcement of SCADA for Cascade Mitiga...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Farhadi, Vajiheh Vennelaganti, Sai Gopal He, Ting Chaudhuri, Nilanjan Ray La Porta, Thomas Penn State Univ University Pk PA 16802 USA
We study the impact of coupling between the communication and the power networks as it affects a SCADA-based preventive control system. Today power grids use power lines to carry control information between components... 详细信息
来源: 评论
On Data-centric Forwarding in Mobile Ad-hoc networks: Baseline Design and Simulation Analysis  30
On Data-centric Forwarding in Mobile Ad-hoc Networks: Baseli...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Rahman, Md Ashiqur Zhang, Beichuan Univ Arizona Tucson AZ 85721 USA
IP networking deals with end-to-end communication where the network layer routing protocols maintain the reachability from one address to another. However, challenging environments, such as mobile ad-hoc networks or M... 详细信息
来源: 评论
Extension Algorithms for Path Exposure in Energy Harvesting Wireless Sensor networks  30
Extension Algorithms for Path Exposure in Energy Harvesting ...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Basabaa, Abdulsalam Elmallah, Ehab S. Univ Alberta Dept Comp Sci Edmonton AB T6G 2E8 Canada
Our work in this paper concerns a wireless sensor network (WSN) problem, called the path exposure with communication range uncertainty (EXPO-RU) problem. Nodes in the network are assumed to rely on energy harvesting f... 详细信息
来源: 评论
Semantic Identifiers and DNS Names for IoT  30
Semantic Identifiers and DNS Names for IoT
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Fernandez, Simon Amoretti, Michele Restori, Fabrizio Korczynski, Maciej Duda, Andrzej Univ Grenoble Alpes LIG Grenoble INP CNRS F-38000 Grenoble France Univ Parma Dept Engn & Architecture Parma Italy
In this paper, we propose a scheme for representing semantic metadata of IoT devices in compact identifiers and DNS names to enable simple discovery and search with standard DNS servers. Our scheme defines a binary id... 详细信息
来源: 评论
Performance Characterization of Post-Quantum Digital Certificates  30
Performance Characterization of Post-Quantum Digital Certifi...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Raavi, Manohar Chandramouli, Pranav Wuthier, Simeon Zhou, Xiaobo Chang, Sang-Yoon Univ Colorado Dept Comp Sci Colorado Springs CO 80918 USA
Public Key Infrastructure (PKI) generates and distributes digital certificates to provide the root of trust for securing digital networking systems. To continue securing digital networking in the quantum era, PKI shou... 详细信息
来源: 评论