咨询与建议

限定检索结果

文献类型

  • 1,236 篇 会议
  • 70 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 421 篇 计算机科学与技术...
    • 288 篇 信息与通信工程
    • 234 篇 软件工程
    • 196 篇 电气工程
    • 91 篇 控制科学与工程
    • 55 篇 电子科学与技术(可...
    • 55 篇 交通运输工程
    • 29 篇 安全科学与工程
    • 26 篇 航空宇航科学与技...
    • 23 篇 机械工程
    • 23 篇 生物工程
    • 20 篇 动力工程及工程热...
    • 19 篇 生物医学工程(可授...
    • 16 篇 船舶与海洋工程
    • 13 篇 仪器科学与技术
    • 13 篇 网络空间安全
    • 10 篇 光学工程
  • 150 篇 理学
    • 59 篇 数学
    • 58 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 116 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 28 篇 医学
    • 27 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 17 篇 公共卫生与预防医...
  • 27 篇 教育学
    • 27 篇 教育学
  • 13 篇 法学
    • 11 篇 社会学
  • 7 篇 经济学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 107 篇 wireless communi...
  • 87 篇 real-time system...
  • 78 篇 wireless sensor ...
  • 58 篇 mobile communica...
  • 55 篇 computer communi...
  • 55 篇 communication sy...
  • 54 篇 protocols
  • 43 篇 wireless network...
  • 42 篇 artificial intel...
  • 41 篇 quality of servi...
  • 41 篇 accuracy
  • 41 篇 sensors
  • 34 篇 resource managem...
  • 34 篇 5g mobile commun...
  • 34 篇 5g mobile commun...
  • 33 篇 ip networks
  • 32 篇 routing
  • 32 篇 monitoring
  • 32 篇 security
  • 31 篇 reliability

机构

  • 5 篇 department of co...
  • 5 篇 lekha wireless s...
  • 5 篇 university of sy...
  • 4 篇 university of wa...
  • 4 篇 huazhong univers...
  • 4 篇 singapore manage...
  • 4 篇 graduate school ...
  • 4 篇 department of el...
  • 4 篇 university of kh...
  • 4 篇 ozyegin univ dep...
  • 4 篇 department of co...
  • 4 篇 department of in...
  • 3 篇 inria
  • 3 篇 school of engine...
  • 3 篇 iwate prefectura...
  • 3 篇 department of el...
  • 3 篇 department of el...
  • 3 篇 tallinn universi...
  • 3 篇 dalian universit...
  • 3 篇 nice sophia anti...

作者

  • 8 篇 sandip chakrabor...
  • 6 篇 leonard barolli
  • 5 篇 animesh dutta
  • 5 篇 bohara vivek ash...
  • 5 篇 srivastava anand
  • 5 篇 makoto ikeda
  • 4 篇 suchetana chakra...
  • 4 篇 witold pedrycz
  • 4 篇 shinji sakamoto
  • 4 篇 weisheng hu
  • 4 篇 h. higaki
  • 4 篇 uysal murat
  • 4 篇 tao tang
  • 3 篇 lei wang
  • 3 篇 panayiotis zaphi...
  • 3 篇 amrita namtirtha
  • 3 篇 m. takizawa
  • 3 篇 simbeck katharin...
  • 3 篇 chao wang
  • 3 篇 mykola beshley

语言

  • 1,264 篇 英文
  • 46 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"任意字段=17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025"
1312 条 记 录,以下是91-100 订阅
排序:
Ranking-based Diversified Influence Maximization for Dynamic Social networks
Ranking-based Diversified Influence Maximization for Dynamic...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Sunil Kumar Meena Shashank Sheshar Singh Kuldeep Singh Department of Computer Science University of Delhi New Delhi New Delhi India Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala India
Influence maximization (IM) is the task of selecting the most influential nodes in the network. IM achieves the goal of spreading information, influencing behaviour, or promoting sales of products. Existing studies in... 详细信息
来源: 评论
Towards Generating a Robust, Scalable and Dynamic Provenance Graph for Attack Investigation over Distributed Microservice Architecture
Towards Generating a Robust, Scalable and Dynamic Provenance...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Utkalika Satpathy Harsh Borse Sandip Chakraborty Department of Computer Science and Engineering IIT Kharagpur India
In recent years, detecting sophisticated attacks in distributed microservice environments has become increasingly challenging, mainly due to containerization, which adds another dimension of complexity for collecting ... 详细信息
来源: 评论
mmWave Based User Identification using Gait Signatures
mmWave Based User Identification using Gait Signatures
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Deepraj Das Soumik Mandal Ashutosh Golande Argha Sen Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
In this work, we present milliGait , a user identification using gait patterns captured by millimeter wave (mmWave) radar technology. milliGait takes into account the unique movement signatures of individuals to enabl... 详细信息
来源: 评论
A Joint PSS Detection and Frequency Offset Estimation Algorithm for 5G NR communication
A Joint PSS Detection and Frequency Offset Estimation Algori...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Srinivasan Kannan Sandeep Joshi Amrith Aathmaram Gayathri Srinidhi Rohit Pandey Department of Electrical & Electronics Engineering Birla Institute of Technology & Science Pilani Pilani 333031 India Hughes Systique and Bharti School of Telecommunication Technology & Management IIT Delhi Delhi India
In this work, we propose a novel and robust algorithm for the combined detection of primary synchronization signal (PSS) and frequency offset correction for a fifth-generation (5G) new radio (NR) communication system.... 详细信息
来源: 评论
Learning-Based Sensing Mode Selection for ISAC in Intelligent Transportation systems
Learning-Based Sensing Mode Selection for ISAC in Intelligen...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Roshan S. Sam Abhinaba Dey Sreenath Ramanath Lekha Wireless Solutions Bangalore India
Intelligent Transportation systems (ITS) encompass a broad range of technologies and strategies that aim to provide innovative services relating to different modes of transport and traffic management and enable users ... 详细信息
来源: 评论
Identification of Phishing Mechanism of the Mastermind of Anomaly Community in the Social networks
Identification of Phishing Mechanism of the Mastermind of An...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Sarjita Soo Nilanjana Saha Amrita Namtirtha Animesh Dutta NIT Durgapur CSE JIS Kalyani CSE
Social media grows daily and raises malicious activity like spamming, phishing, cyberbullying, cyberstalking, etc. Anomaly community formation and phishing techniques are some of the most attractive among cyber frauds... 详细信息
来源: 评论
Leveraging Edge-cloud for Compute Efficient and Safer Autonomous Navigation
Leveraging Edge-cloud for Compute Efficient and Safer Autono...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Prashanth P S Hrushikesh S Amrit Kumar Yuvraj Chowdary Makkena Praveen Tammana IIT Hyderabad
Vision-based autonomous navigation in controlled environments like warehouses and agricultural fields, etc has allowed reducing the reliance on humans to do tedious jobs by employing autonomous vehicles. However, thes... 详细信息
来源: 评论
Optimal Tree-Based Mechanisms for Differentially Private Approximate CDFs
Optimal Tree-Based Mechanisms for Differentially Private App...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: V. Arvind Rameshwar Anshoo Tandon Abhay Sharma IUDX Program Unit IISc Bengaluru India
this paper considers the ε-differentially private (DP) release of an approximate cumulative distribution function (CDF) of the samples in a dataset. We assume that the true (approximate) CDF is obtained after lumping... 详细信息
来源: 评论
XDATE: eXplainable Deep belief network-based Auto-encoder with exTended Garson Algorithm
XDATE: eXplainable Deep belief network-based Auto-encoder wi...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Satyam Kumar Vadlamani Ravi IDRBT Hyderabad India
Deep neural networks (DNNs) have recently delivered impressive results across various tasks, yet understanding how they make decisions remains challenging. Feature importance has appeared as a key technique for interp... 详细信息
来源: 评论
Quantum Convolutional Neural networks based Human Activity Recognition using CSI
Quantum Convolutional Neural Networks based Human Activity R...
收藏 引用
international communication systems and networks and Workshops, comsnets
作者: Syed Mohammed Danish Sudhir Kumar Department of Electrical Engineering Indian Institute of Technology Patna India
Human Activity Recognition (HAR) plays an important role in smart environments and Internet of things (IoT) applications, where accurate real-time monitoring can enhance automation and interaction. While Classical Con... 详细信息
来源: 评论