咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是301-310 订阅
排序:
Protection Strategies for Dynamic VNF Placement and Service Chaining  30
Protection Strategies for Dynamic VNF Placement and Service ...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Askari, Leila Tamizi, Mohammadhassan Ayoub, Omran Tornatore, Massimo Politecn Milan Dept Elect Informat & Bioengn Milan Italy
Network Function Virtualization (NFV) provides a major shift in the provisioning of telecommunication services by decoupling network functions from dedicated hardware devices. Such decoupling enables operational expen... 详细信息
来源: 评论
Intrusion Detection System For IoT networks Using Neural networks With Extended Kalman Filter  30
Intrusion Detection System For IoT Networks Using Neural Net...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Kulkarni, Divya D. Rathore, Shruti Jaiswal, Raj K. BITS Pilani KK Birla Goa Campus Dept CSIS Sancoale Goa India
Although coined in 1999, Internet of Things (IoT) has been one of the most sought-after technologies since the 1980s. However, with its remarkable growth comes the need to protect it against highly sophisticated cyber... 详细信息
来源: 评论
MulTLoc: RF Hologram Tensor Filtering and Upscaling for Locating Multiple RFID Tags  30
MulTLoc: RF Hologram Tensor Filtering and Upscaling for Loca...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Wang, Xiangyu Zhang, Jian Mao, Shiwen Periaswamy, Senthilkumar C. G. Patton, Justin Auburn Univ Dept Elect & Comp Engn Auburn AL 36849 USA Auburn Univ RFID Lab Auburn AL USA
In this paper, we present MulTLoc, a deep learning based indoor localization system for localizing multiple ultra-high frequency(UHF) passive RFID tags with RF hologram tensor filtering and upscaling. The proposed sys... 详细信息
来源: 评论
How Optical Technologies Can Innovate Intra Data Center networks  30
How Optical Technologies Can Innovate Intra Data Center Netw...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Sato, Ken-ichi AIST Natl Inst Adv Ind Sci & Technol Platform Photon Res Ctr Tsukuba Ibaraki 3058568 Japan
This paper discusses how optical technologies can bring innovation to intra data center networks. The most promising technique is the electrical-packet/optical-circuit hybrid switching network. Its key advantage stems... 详细信息
来源: 评论
SCoIoT: Swarm-Computations for the Internet of Things  30
SCoIoT: Swarm-Computations for the Internet of Things
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Scherb, Christopher Buerklin, Pascal Tschudin, Christian Univ Basel Dept Math & Comp Sci Basel Switzerland
Nowadays, most network systems are based on fixed and reliable infrastructure, but with Internet of Things (IoT), smart home and smart city systems are used more and more in mobile scenarios and vehicles become connec... 详细信息
来源: 评论
Trust- and Rating- based Recommendations for On-line Social networks  30
Trust- and Rating- based Recommendations for On-line Social ...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Kobusinska, Anna Margaris, Dionisis Peikert, Jakub Poznan Univ Tech Fac Comp Poznan Poland Univ Athens Dept Informat & Telecommun Athens Greece
This paper analyzes the influence of incorporating trust rates between users, as well as objects' ratings into the recommendation algorithms for bipartite on-line social networks. Three types of approaches are int... 详细信息
来源: 评论
cTEx - A Configurable Topology Explorer for Wireless Ad-hoc networks  30
cTEx - A Configurable Topology Explorer for Wireless Ad-hoc ...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Kohlstruck, Christopher Gotzhein, Reinhard TU Kaiserslautern Networked Syst Grp Kaiserslautern Germany
High-quality information about the network status is essential for the discovery and operation of routes and clusters in wireless ad-hoc networks. This requires permanent observation and assessment of nodes, links, an... 详细信息
来源: 评论
ShadowDGA: Toward Evading DGA Detectors with GANs  30
ShadowDGA: Toward Evading DGA Detectors with GANs
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Zheng, Yu Yang, Chao Yang, Yanzhou Ren, Qixian Li, Yue Ma, Jianfeng Xidian Univ Sch Cyber Engn Xian Peoples R China
Domain generation algorithms (DGAs) are widely used in modern botnets to generate a large number of domain names through which bots can communicate with their command and control (C&C) servers. In recent years, ma... 详细信息
来源: 评论
DRLS: A Deep Reinforcement Learning Based Scheduler for Time-Triggered Ethernet  30
DRLS: A Deep Reinforcement Learning Based Scheduler for Time...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Zhong, Chunmeng Jia, Hongyu Wan, Hai Zhao, Xibin Tsinghua Univ Sch Software Beijing 100084 Peoples R China
Time-triggered (TT) communication has long been studied in various industrial domains. The most challenging task of TT communication is to find a feasible schedule table. Network changes are inevitable due to the topo... 详细信息
来源: 评论
Checking Network Security Policy Violations via Natural Language Questions  30
Checking Network Security Policy Violations via Natural Lang...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Shi, Pinyi Song, Yongwook Fei, Zongming Griffioen, James Univ Kentucky Lab Adv Networking Lexington KY 40506 USA
Network security policies provide high-level directives regarding acceptable and unacceptable use of the network. Organizations specify these high-level directives in policy documents written using human-readable natu... 详细信息
来源: 评论