咨询与建议

限定检索结果

文献类型

  • 1,948 篇 会议
  • 128 册 图书
  • 7 篇 期刊文献

馆藏范围

  • 2,083 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,105 篇 工学
    • 708 篇 计算机科学与技术...
    • 534 篇 信息与通信工程
    • 417 篇 软件工程
    • 252 篇 电气工程
    • 186 篇 控制科学与工程
    • 101 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 64 篇 光学工程
    • 59 篇 机械工程
    • 57 篇 网络空间安全
    • 54 篇 交通运输工程
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 42 篇 仪器科学与技术
    • 40 篇 安全科学与工程
    • 27 篇 航空宇航科学与技...
    • 25 篇 建筑学
  • 333 篇 理学
    • 161 篇 数学
    • 83 篇 物理学
    • 83 篇 生物学
    • 64 篇 统计学(可授理学、...
    • 56 篇 系统科学
  • 268 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 54 篇 医学
    • 52 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 28 篇 公共卫生与预防医...
  • 41 篇 法学
    • 33 篇 社会学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 12 篇 教育学
  • 12 篇 农学
  • 7 篇 军事学
  • 6 篇 文学

主题

  • 213 篇 wireless communi...
  • 105 篇 wireless sensor ...
  • 91 篇 computer communi...
  • 74 篇 simulation
  • 72 篇 real-time system...
  • 59 篇 communication ne...
  • 53 篇 signal processin...
  • 52 篇 protocols
  • 51 篇 information syst...
  • 51 篇 deep learning
  • 50 篇 artificial intel...
  • 48 篇 neural networks
  • 48 篇 computational mo...
  • 47 篇 signal processin...
  • 47 篇 5g mobile commun...
  • 44 篇 mobile communica...
  • 44 篇 training
  • 43 篇 quality of servi...
  • 38 篇 bandwidth
  • 35 篇 internet of thin...

机构

  • 18 篇 department of ma...
  • 16 篇 department of el...
  • 13 篇 ocean college ji...
  • 11 篇 national mobile ...
  • 11 篇 de la salle univ...
  • 8 篇 de la salle univ...
  • 7 篇 state key labora...
  • 7 篇 school of commun...
  • 7 篇 southeast univ n...
  • 7 篇 international in...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 purple mountain ...
  • 6 篇 school of engine...
  • 6 篇 school of inform...
  • 6 篇 department of ma...

作者

  • 14 篇 ronnie concepcio...
  • 10 篇 concepcion ronni...
  • 8 篇 elmer p. dadios
  • 7 篇 argel a. bandala
  • 7 篇 kolesnikova kate...
  • 7 篇 ryan rhay p. vic...
  • 7 篇 dadios elmer p.
  • 6 篇 edwin sybingco
  • 6 篇 bernady o. apduh...
  • 6 篇 john anthony c. ...
  • 6 篇 maria irene falc...
  • 6 篇 chao wang
  • 6 篇 jorge gustavo ro...
  • 6 篇 martin schrepp
  • 6 篇 daineko yevgeniy...
  • 6 篇 osvaldo gervasi
  • 6 篇 bandala argel
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra

语言

  • 1,964 篇 英文
  • 107 篇 其他
  • 12 篇 中文
  • 1 篇 俄文
检索条件"任意字段=14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022"
2083 条 记 录,以下是1721-1730 订阅
排序:
Power control algorithm for cognitive radio systems
Power control algorithm for cognitive radio systems
收藏 引用
14th international conference on Computer and Information Technology, ICCIT 2011
作者: Rana, Md. Masud Department of Electronics and Communication Engineering Khulna University of Engineering and Technology Bangladesh
Cognitive radio (CR) is the enabling technology for dynamic spectrum access, which may potentially mitigate the radio spectrum scarcity problem encountered in many countries. this paper is concerned with power allocat... 详细信息
来源: 评论
A synopsis of self-healing functions in wireless networks
A synopsis of self-healing functions in wireless networks
收藏 引用
14th IEEE international Multitopic conference 2011, INMIC 2011
作者: Kamal, Kasma Azizan Ahsenali Chaudhry, Junaid Ali, Saqib Ahmad, Mudassar Ngadi, Md Asri Bin Hanan Abdullah, Abdul Department of CS and Communication Faculty of CS and IS Universiti Teknologi Malaysia Skudai 81310 Johor Malaysia Department of Computer Science Faculty of Sciences University of Agriculture Faisalabad Pakistan
In early 20th century when technology evolve, the performance of systems suffered from the problems of complexity, increasing cost of maintenance and software of hardware failure caused by unpredictable behavior and p... 详细信息
来源: 评论
Social Environments, Mixed communication and Goal-Oriented Control Application Using a Brain-Computer Interface
Social Environments, Mixed Communication and Goal-Oriented C...
收藏 引用
6th international conference on Universal Access in Human-Computer Interaction (UAHCI)/14th international conference on Human-Computer Interaction (HCI)
作者: Edlinger, Guenter Guger, Christoph G Tec Med Engn GmbH Herbersteinstr 60 A-8020 Graz Austria Guger Technol OG A-8020 Graz Austria
For this study a P300 BCI speller application framework served as a base to explore the operation for three different applications. Subjects exchanged messages in the networks of (i) Twitter (Twitter Inc.) and sociali... 详细信息
来源: 评论
Low-complexity wireless communication modeling for information flow control in sensor networks
Low-complexity wireless communication modeling for informati...
收藏 引用
作者: Van Foeken, E. Kwakkernaat, M.R.J.A.E. TNO Technical Sciences Den Haag Netherlands University of Amsterdam Amsterdam Netherlands TNO Technical Sciences Helmond Netherlands
the increasing demand for shared awareness in multi-platform sensor systems requires advanced wireless information sharing techniques. the analysis of these techniques requires information about communication resource... 详细信息
来源: 评论
A survey of vehicular-based cooperative traffic information systems
A survey of vehicular-based cooperative traffic information ...
收藏 引用
international conference on Intelligent Transportation
作者: Marcin Seredynski Pascal Bouvry Interdisciplinary Centre of Security Reliability and Trust University of Luxembourg Luxembourg Luxembourg Faculty of Sciences Technology and Communication University of Luxembourg Luxembourg
this paper summarises the research on cooperative traffic information systems based on vehicular ad hoc networks. Such systems are a promising concept for exchanging traffic information among vehicles. their applicati... 详细信息
来源: 评论
Intersection collision avoidance system using infrastructure communication
Intersection collision avoidance system using infrastructure...
收藏 引用
international conference on Intelligent Transportation
作者: Fadi Basma Yehia Tachwali Hazem H Refai University of Oklahoma Tulsa OK USA
Nearly one third of all documented vehicle collisions are reported at urban and rural intersections, and this number continues to rise in spite of technological innovations for vehicle safety. Most collision avoidance... 详细信息
来源: 评论
Survey of Trust Based communications in Social networks
Survey of Trust Based Communications in Social Networks
收藏 引用
international conference on Network-Based Information systems (NBIS)
作者: Pawat Chomphoosang Ping Zhang Arjan Durresi Leonard Barolli Department of Computer and Information Science Indiana University Purdue University Indianapolis Indianapolis IN USA Department of Information and Communication Engineering Fukuoka Institute of Technology Fukuoka Japan
Social networking is become important component of our daily lives. People use them to share important personal data. However, most users do not fully realize the security implications of using social networks. Furthe... 详细信息
来源: 评论
An Implementation and Evaluation of Zone-Based Routing Protocol for Mobile Ad-Hoc networks
An Implementation and Evaluation of Zone-Based Routing Proto...
收藏 引用
international conference on Network-Based Information systems (NBIS)
作者: Haruki Osanai Akio Koyama Leonard Barolli Department of Informatics Graduate School of Science and Engineering Yamagata University Yonezawa Japan Department of Information and Communication Engineering Fukuoka Institute of Technology Fukuoka Japan
In Mobile Ad-hoc networks (MANET), the nodes intercommunicate through single-hop and multi-hop paths in a peer-to-peer fashion. Intermediate nodes between two pairs of communication nodes act as routers. thus, the rou... 详细信息
来源: 评论
Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Network
Secure Clustering for Building Certificate Management Nodes ...
收藏 引用
international conference on Network-Based Information systems (NBIS)
作者: Iichiro Nishimura Tomoyuki Nagase Youjiro Takehana Yoshio Yoshioka Graduate School of Science and Technology Hirosaki University Hirosaki Aomori Japan
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. these networks are inherently vulnerable to security attacks from malicious users. th... 详细信息
来源: 评论
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc networks, Problems and Solutions
Authentication and Certificate Managements of Unauthorized I...
收藏 引用
international conference on Network-Based Information systems (NBIS)
作者: Norihito Yosaka Iichiro Nishimura Tomoyuki Nagase Graduate School of Science and Technology Hirosaki University Hirosaki Aomori Japan
the development of today's wireless technology with its sophisticated devices and applications has attracted many users and becoming more important in their daily life. Ad hoc networks have emerged from this techn... 详细信息
来源: 评论