咨询与建议

限定检索结果

文献类型

  • 3,265 篇 会议
  • 64 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 3,333 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,880 篇 工学
    • 2,106 篇 计算机科学与技术...
    • 1,162 篇 电气工程
    • 912 篇 软件工程
    • 893 篇 信息与通信工程
    • 351 篇 控制科学与工程
    • 201 篇 动力工程及工程热...
    • 194 篇 仪器科学与技术
    • 189 篇 机械工程
    • 158 篇 石油与天然气工程
    • 136 篇 电子科学与技术(可...
    • 108 篇 材料科学与工程(可...
    • 92 篇 测绘科学与技术
    • 75 篇 生物医学工程(可授...
    • 74 篇 生物工程
    • 41 篇 安全科学与工程
    • 39 篇 土木工程
    • 38 篇 化学工程与技术
    • 35 篇 交通运输工程
  • 532 篇 理学
    • 274 篇 数学
    • 125 篇 物理学
    • 86 篇 生物学
    • 71 篇 系统科学
    • 60 篇 统计学(可授理学、...
    • 46 篇 化学
  • 351 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 116 篇 医学
    • 97 篇 临床医学
    • 53 篇 基础医学(可授医学...
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 36 篇 法学
  • 31 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 1 篇 艺术学

主题

  • 363 篇 wireless sensor ...
  • 92 篇 sensor networks
  • 87 篇 distributed comp...
  • 84 篇 sensor nodes
  • 80 篇 sensors
  • 78 篇 distributed comp...
  • 69 篇 wireless sensor ...
  • 67 篇 sensor systems
  • 62 篇 distributed gene...
  • 57 篇 internet of thin...
  • 57 篇 distributed powe...
  • 48 篇 energy efficienc...
  • 46 篇 monitoring
  • 45 篇 cloud computing
  • 43 篇 robot sensing sy...
  • 42 篇 wireless communi...
  • 38 篇 routing
  • 37 篇 protocols
  • 34 篇 security
  • 33 篇 routing protocol...

机构

  • 7 篇 louisiana state ...
  • 6 篇 washington univ ...
  • 6 篇 northeastern uni...
  • 5 篇 georgia state un...
  • 5 篇 nanjing univ sta...
  • 5 篇 carleton univ de...
  • 5 篇 univ stuttgart i...
  • 4 篇 univ lancaster s...
  • 4 篇 hong kong polyte...
  • 4 篇 dalian univ tech...
  • 4 篇 fed inst sao pau...
  • 4 篇 department of co...
  • 4 篇 univ glasgow ben...
  • 4 篇 school of electr...
  • 4 篇 jiangsu high tec...
  • 4 篇 western michigan...
  • 4 篇 univ sao paulo s...
  • 4 篇 nanjing univ pos...
  • 4 篇 shanghai jiao to...
  • 4 篇 city univ hong k...

作者

  • 9 篇 lu chenyang
  • 8 篇 wang wei
  • 8 篇 barolli leonard
  • 7 篇 de grande robson...
  • 6 篇 wang lei
  • 6 篇 dahiya ravinder
  • 6 篇 stankovic john a...
  • 6 篇 dustdar schahram
  • 5 篇 bar-noy amotz
  • 5 篇 aghajan hamid
  • 5 篇 bhattacharjee mi...
  • 5 篇 xhafa fatos
  • 5 篇 dai haipeng
  • 5 篇 kermarrec anne-m...
  • 5 篇 song wen-zhan
  • 5 篇 takizawa makoto
  • 5 篇 chamberlain roge...
  • 5 篇 das sajal k.
  • 5 篇 rothermel kurt
  • 5 篇 durresi arjan

语言

  • 3,122 篇 英文
  • 149 篇 其他
  • 62 篇 中文
检索条件"任意字段=1st IEEE International Conference on Distributed Computing in Sensor Systems"
3333 条 记 录,以下是2911-2920 订阅
排序:
An on-demand bluetooth scatternet formation and routing protocol for wireless sensor networks
An on-demand bluetooth scatternet formation and routing prot...
收藏 引用
6th international conference on Software Engineering, Artificial Intelligence, Networking and Parallel/distributed computing and 1st ACIS international Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005
作者: Zhang, Xin Riley, George F. Department of ECE Georgia Institute of Technology Atlanta GA 30332-0250
Bluetooth is a promising short-range wireless communication technology with the characteristics of interference resilience and power efficiency which are required by wireless sensor networks. As an enhanced sensor nod... 详细信息
来源: 评论
A security framework with trust management for sensor networks
A security framework with trust management for sensor networ...
收藏 引用
Workshop of the 1st international conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
作者: Zhiying, Yao Daeyoung, Kim Insun, Lee Kiyoung, Kim Jongsoo, Jang Korea Republic of Korea Republic of
Wireless sensor networks are prone to security attacks, which are either common to conventional networks or unique for themselves due to the resource-constraint, susceptibility to physical capture, and wireless nature... 详细信息
来源: 评论
Landscape: A high performance distributed positioning scheme for outdoor sensor networks
Landscape: A high performance distributed positioning scheme...
收藏 引用
ieee international conference on Wireless and Mobile computing, Networking and Communications
作者: Zhang, LQ Cheng, Q Wang, YG Zeadally, S
In this work, we consider the sensor localization problem from a novel perspective by treating it as a functional dual of target tracking. In traditional tracking problems, static location-aware sensors track and pred... 详细信息
来源: 评论
A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load
收藏 引用
EUC 2005 Workshops: 2nd international Symposium on Ubiquitous Intelligence and Smart Worlds, UISW 2005, IFIP international Symposium on Network-Centric Ubiquitous systems, NCUS 2005, 1st international Workshop on Security in Ubiquitous computing systems, SecUbiq 2005, 1st international Workshop on RFID and Ubiquitous sensor Networks, USN 2005 and international Workshop on Trusted and Autonomic Ubiquitous and Embedded systems, TAUES 2005 held in conjunction with the IFIP international conference on Embedded and Ubiquitous computing, 2005
作者: Nguyen, Hoang Nam Morino, Hiroaki The National Institute of Information and Communication Technology 4-2-1 Nukui-kitamachi Koganei-cityTokyo184-8795 Japan Shibaura Institute of Technology 3-9-14 Shibaura Minato-ku Tokyo108-8548 Japan
Providing secure communications is a crucial task for the success of future ubiquitous mobile communication systems. Using public key infrastructure (PKI) is considered as a good solution to fulfill the task. However,... 详细信息
来源: 评论
Defending against sybil attacks in sensor networks
Defending against sybil attacks in sensor networks
收藏 引用
25th ieee international conference on distributed computing systems Workshops, ICDCS 2005
作者: Zhang, Qinghua Wang, Pan Reeves, Douglas S. Ning, Peng Cyber Defense Laboratory Computer Science Department North Carolina State University RaleighNC27695-8207 United States
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certificates are a way to prove identities. Ho... 详细信息
来源: 评论
Energy conservation stratedgy for sensor networks
Energy conservation stratedgy for sensor networks
收藏 引用
First ieee international conference on distributed computing in sensor systems, DCOSS 2005
作者: Lee, Hyo Jong Chonbuk National University Jeonju Jeonbuk Prov Korea Republic of
A simple but efficient power conserving algorithm for the sensor networks is presented in this paper. The goal is to predict sleep time for the sensor networks based on statistics of data transfer. The proposed sensor... 详细信息
来源: 评论
Applying mobile agent in distributed speech recognition using JADE
Applying mobile agent in distributed speech recognition usin...
收藏 引用
2005 1st international conference on Computers, Communications and Signal Processing with Special Track on Biomedical Engineering, CCSP 2005
作者: Saaim, Emrul Hamide Md Ahmad, Abdul Manan Alias, Mohamad Ashari Othman, Mohd Fauzi Speech Recognition Laboratory Faculty of Computer Science and Information Systems University of Technology Malaysia 81310 Skudai Johore Malaysia
This paper presents an application of mobile agent technology in distributed speech recognition over the internet. Mobile agent is one of a new paradigms for distributed application. With some advantages of using mobi... 详细信息
来源: 评论
Evaluation of fault-tolerant mobile agents in distributed systems
Evaluation of fault-tolerant mobile agents in distributed sy...
收藏 引用
1st ieee/IFIP international conference in Central Asia on Internet (ICI)
作者: Mohammadi, K. Hamidi, H. Iran Univ Sci & Technol Dept Elect Engn Tehran Iran
The secure execution of a mobile agent is a very important design issue in building a mobile agent system and many fault-tolerant schemes have been proposed so far. Mobile agents are no longer a theoretical issue sinc... 详细信息
来源: 评论
On interoperating incompatible atomic commit protocols in distributed databases
On interoperating incompatible atomic commit protocols in di...
收藏 引用
2005 1st international conference on Computers, Communications and Signal Processing with Special Track on Biomedical Engineering, CCSP 2005
作者: AI-Houmaily, Yousef J. Department of Computer and Information Programs Institute of Public Administration Riyadh 11141 Saudi Arabia
This paper proposes an adaptive participant's presumption protocol (Ap 3) that can be used to atomically commit Internet transactions. Ap3interoperates a one-phase commitprotocol, namely, implicit-yes vote, and tw... 详细信息
来源: 评论
Development of grid middleware CyberGRIP and its applications
Development of grid middleware CyberGRIP and its application...
收藏 引用
1st international conference on e-Science and Grid computing, e-Science 2005
作者: Miyazwa, Kimio Kadooka, Yoshimasa Yamashita, Tomonori Suzuki, Toshiyuki Tago, Yoshio Fujitsu Laboratories Ltd. 1-1 Kamikodanaka 4-Chome Nakahara-ku Kawasaki 211-8588 Japan Fujitsu Ltd. 1-1 Kamikodanaka 4-Chome Nakahara-ku Kawasaki 211-8588 Japan Fujitsu Ltd. 9-18 Shinyokohama 3-Chome Kouhoku-ku Yokohama 222-0033 Japan Graduate School of Natural Science and Technology Kanazawa University Kakuma-machi Kanazawa 920-1192 Japan
Recently, there have been demands for greater functional diversity and higher performance in the information technology infrastructure. As a result, the complexity and scale of product design in the product developmen... 详细信息
来源: 评论