咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是41-50 订阅
排序:
Hybrid LoRa Network Architecture: Automatic Switching between LoRaWAN and LoRa Mesh Network in Environments with Dynamic Obstacle Variations  33
Hybrid LoRa Network Architecture: Automatic Switching betwee...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Kim, Hyungsub Kim, Hayoung Baek, Somi Melenchuk, Ryan Soroka, Jaden Smith, Anthony Sangmyung Univ Software Engn Cheonan South Korea Soongsil Univ Sch Software Seoul South Korea Kyonggi Univ Comp Engn Suwon South Korea Purdue Univ Comp & Informat Technol W Lafayette IN 47907 USA
The LoRaWAN network is widely employed in agricultural Internet of Things (IoT) applications requiring long-range wireless communication and low-energy consumption. However, challenges arise in dynamic environments li... 详细信息
来源: 评论
FL-EVCS: Federated Learning based Anomaly Detection for EV Charging Ecosystem  33
FL-EVCS: Federated Learning based Anomaly Detection for EV C...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Purohit, Shaurya Govindarasu, Manimaran Iowa State Univ Dept Elect & Comp Engn Ames IA 50011 USA
The rapid expansion of electric vehicle (EV) technologies and their seamless integration into smart grids herald a significant transition toward sustainable energy practices, highlighting the need to bolster Electric ... 详细信息
来源: 评论
Unlocking Efficiency in B5G networks: The Need for Adaptive Service Function Chains  33
Unlocking Efficiency in B5G Networks: The Need for Adaptive ...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Abreu, David Perez Velasquez, Karima Curado, Marilia Monteiro, Edmundo Inst Pedro Nunes Lab Informat & Syst Coimbra Portugal Univ Coimbra Dept Informat Engn CISUC Coimbra Portugal
Service Function Chains allow the dynamic generation of basic virtual network services in order to build more complex services. They constitute the basis of the flexibility support for 5G and Beyond 5G networks. In or... 详细信息
来源: 评论
Beyond Wake Words: Advancing Smart Speaker Protection with Continuous Authentication and Local Profiles  33
Beyond Wake Words: Advancing Smart Speaker Protection with C...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Acosta, Luca Hernandez Reinhardt, Andreas Mueller, Tobias Reinhardt, Delphine Univ Gottingen Inst Comp Sci Comp Secur & Privacy CSP Gottingen Germany Tech Univ Clausthal Dept Informat Clausthal Zellerfeld Germany
Voice assistants, as provided by smart speakers, have become ubiquitous. Current authentication methods in these systems, however, rely on wake words, posing a risk due to the susceptibility to replay attacks. Additio... 详细信息
来源: 评论
Scaling Container Caching to Larger networks with Multi-Agent Reinforcement Learning  33
Scaling Container Caching to Larger Networks with Multi-Agen...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Chen, Austin Ishigaki, Genya San Jose State Univ Dept Comp Sci San Jose CA 95192 USA
The development of containers as a tool for scalable computing has led to the increased use of the serverless edge computing paradigm. In particular, containers enable fast deployment of services to edge networks, all... 详细信息
来源: 评论
Digital Twin Continuum: a Key Enabler for Pervasive Cyber-Physical Environments  33
Digital Twin Continuum: a Key Enabler for Pervasive Cyber-Ph...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Barbone, Antonello Burattini, Samuele Martinelli, Matteo Picone, Marco Ricci, Alessandro Virdis, Antonio Univ Modena & Reggio Emilia Modena Italy Univ Pisa Pisa Italy Univ Bologna Campus Cesena Cesena Italy
The rise of Digital Twin (DT) technology has revolutionized various sectors, offering simulation, monitoring, and optimization capabilities for complex systems. However, the rapid expansion of DT platforms, coupled wi... 详细信息
来源: 评论
CoWiL: Combating Cross-Technology Interference in LoRaWAN  33
CoWiL: Combating Cross-Technology Interference in LoRaWAN
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Shao, Chenglong Tsukamoto, Kazuya Mat, Yi-Wei Huat, Yingbo Wan, Xianpeng Kyushu Inst Technol Iizuka Fukuoka Japan Natl Taiwan Univ Sci & Technol Taipei Taiwan Univ Calif Riverside Riverside CA 92521 USA Hainan Univ Haikou Hainan Peoples R China
Long-range wide area network (LoRaWAN) has been newly designed to exploit the 2.4 GHz unlicensed band instead of the traditional sub-GHz bands. However, this makes LoRaWAN frequently suffer from wireless communication... 详细信息
来源: 评论
KESIC: Kerberos Extensions for Smart, IoT and CPS Devices  33
KESIC: Kerberos Extensions for Smart, IoT and CPS Devices
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Tarafder, Renascence Jakkamsetti, Sashidhar Tsudik, Gene Univ Calif Irvine Irvine CA 92717 USA Bosch Res Sunnyvale CA USA
Secure and efficient multi-user access mechanisms are increasingly important for the growing number of Internet of Things (IoT) devices being used today. Kerberos is a well-known and time-tried security authentication... 详细信息
来源: 评论
A Distortion Free Watermark Scheme for Relational Databases  33
A Distortion Free Watermark Scheme for Relational Databases
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Han, Jiang Peng, Xiaowei Xian, Hequn Yang, Dalin Univ Chinese Acad Sci Beijing Peoples R China Chinese Acad Sci Inst Software Trusted Comp & Informat Assurance Lab Beijing Peoples R China Cryptog & Cyberspace Secur Whampoa Acad Guangzhou Peoples R China Qingdao Univ Qingdao Peoples R China Washington Univ Sch Med St Louis MO USA
Database watermark is an effective solution to the piracy and data leakage problems. It is recognized as the final defense line in zero-trust architecture. Most of the traditional watermark schemes are based on carrie... 详细信息
来源: 评论
Web3.0 Literary Landscape: Deep Learning and Blockchain for Nobel Prize Predictions  33
Web3.0 Literary Landscape: Deep Learning and Blockchain for ...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Huang, Sida Tan, Jialuoyi Dong, Yuji Zhang, Jie Xian Jiaotong Liverpool Univ Sch Internet Things Suzhou Peoples R China Xian Jiaotong Liverpool Univ Sch Intelligent Finance & Business Suzhou Peoples R China Xian Jiaotong Liverpool Univ Sch Adv Technol Suzhou Peoples R China
This research introduces a cutting-edge Web3 literary analysis platform, harnessing the power of blockchain and deep learning technologies. By employing the immutable and transparent nature of blockchain, the platform... 详细信息
来源: 评论