咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是81-90 订阅
排序:
Super-resolution Localization and Tracking in WiFi Sensing  33
Super-resolution Localization and Tracking in WiFi Sensing
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Wang, Jian Chuang, Jack Sempert, Sebastian Golmie, Nada NIST Wireless Networks Div Gaithersburg MD 20899 USA Tech Univ Ilmenau Inst Informat Technol Ilmenau Germany
Integrated sensing and communication (ISAC) systems have been investigated by the research and standardization communities in the recent past. Accurately localizing the target and tracking the target's movement ar... 详细信息
来源: 评论
Flow Correlator: A Flow Table Cache Management Strategy  33
Flow Correlator: A Flow Table Cache Management Strategy
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: McHale, Luke Gratz, Paul, V Sprintson, Alex Two Six Technol Arlington VA 22203 USA Texas A&M Univ Dept Elect & Comp Engn College Stn TX 77843 USA
Switching, routing, and security functions are the backbone of packet processing networks. Fast and efficient processing of packets requires maintaining the state information for many transient network connections. In... 详细信息
来源: 评论
Adversarial Attack Detection for Deep Learning Driving Maneuver Classifiers in Connected Autonomous Vehicles  33
Adversarial Attack Detection for Deep Learning Driving Maneu...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Sen, Tanmoy Shen, Haiying Univ Virginia Dept Comp Sci Charlottesville VA 22904 USA
Connected and autonomous vehicles (CAVs) will be equipped with onboard deep neural network (DNN) models for processing the data from different sensors and communication units in CAVs and on the roads. In the CAV scena... 详细信息
来源: 评论
LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks  33
LibGuard: Protecting Sensitive Data In Android Third-Party L...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: He, Fannv Wang, Jice Huang, Yuhang Peng, Xiancui Zhang, Yuqing Univ Chinese Acad Sci Natl Comp Network Intrus Protect Ctr Beijing Peoples R China Hainan Univ Sch Cyberspace Secur Haikou Peoples R China
Mobile app vendors/developers extensively integrate third-party libraries into mobile applications. While they enrich the functions of apps, third-party libraries also bring in security risks. It has been widely studi... 详细信息
来源: 评论
A Cost-Effective Long-Distance Industrial IoT System  33
A Cost-Effective Long-Distance Industrial IoT System
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Wang, Guoping Purdue Univ Ft Wayne Dept Elect & Comp Engn 2101 E Coliseum Blvd Ft Wayne IN 46805 USA
The Internet of Things (IoT) refers to a network of physical devices embedded with sensors, actuators, software, and other technologies that can connect and exchange data with other devices via the Internet. These dev... 详细信息
来源: 评论
Fake Base Station Detection and Blacklisting  33
Fake Base Station Detection and Blacklisting
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Purification, Sourav Wuthier, Simeon Kim, Jinoh Kim, Jonghyun Chang, Sang-Yoon Univ Colorado Colorado Springs Colorado Springs CO 80918 USA Texas A&M Univ Commerce Commerce TX 75428 USA Elect & Telecommun Res Inst Daejeon 34129 South Korea
A fake base station is a well-known security issue in mobile networking. The fake base station exploits the vulnerability in the broadcasting message announcing the base station's presence, which is called SIB1 in... 详细信息
来源: 评论
Impact of Latency and Bandwidth Limitations on the Safety Performance of Collaborative Perception  33
Impact of Latency and Bandwidth Limitations on the Safety Pe...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Shenkut, Dereje Kumar, B. V. K. Vijaya Carnegie Mellon Univ Elect & Comp Engn Pittsburgh PA 15213 USA
The use of vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) communications for the exchange of sensor data on roads is becoming an important strategy to improve the safety of both vehicles and other road users... 详细信息
来源: 评论
Enhancing Capacity of Optical Circuit Switching Clos Network in Data Center: Progress and Challenges  33
Enhancing Capacity of Optical Circuit Switching Clos Network...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Okil, Eiji Taka, Haruto Inoue, Takeru Kyoto Univ Kyoto Japan NTT Corp NTT Network Innovat Labs Tokyo Japan
Future data centers are anticipated to embrace cutting-edge circuit switching technologies, particularly optical switching, renowned for their heightened transmission capacity and energy efficiency. Optical circuit sw... 详细信息
来源: 评论
Explainability-Informed Targeted Malware Misclassification  33
Explainability-Informed Targeted Malware Misclassification
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Card, Quincy Aryal, Kshitiz Gupta, Maanak Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA
In recent years, there has been a surge in malware attacks across critical infrastructures, requiring further research and development of appropriate response and remediation strategies in malware detection and classi... 详细信息
来源: 评论
Lightweight Coordinated Sampling for Dynamic Flows under Budget Constraints  33
Lightweight Coordinated Sampling for Dynamic Flows under Bud...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Chen, Mingming La Porta, Thomas Jaeger, Trent Krishnamurthy, Srikanth Penn State Univ Comp Sci & Engn Dept University Pk PA 16802 USA Univ Calif Riverside Comp Sci & Engn Dept Riverside CA 92521 USA
As cyber-attacks on networks become more stealthy, monitoring techniques relying on low-rate packet sampling may prove insufficient to detect attacks. While various sampling methods have been proposed to address capac... 详细信息
来源: 评论