咨询与建议

限定检索结果

文献类型

  • 909 篇 会议
  • 16 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 929 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 451 篇 计算机科学与技术...
    • 285 篇 软件工程
    • 135 篇 信息与通信工程
    • 134 篇 控制科学与工程
    • 62 篇 电气工程
    • 54 篇 交通运输工程
    • 46 篇 安全科学与工程
    • 43 篇 生物工程
    • 32 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 27 篇 动力工程及工程热...
    • 27 篇 石油与天然气工程
    • 24 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 20 篇 仪器科学与技术
    • 18 篇 光学工程
  • 228 篇 理学
    • 139 篇 数学
    • 51 篇 生物学
    • 31 篇 物理学
    • 28 篇 系统科学
    • 28 篇 统计学(可授理学、...
    • 16 篇 化学
  • 161 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 82 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 30 篇 教育学
    • 30 篇 教育学
  • 29 篇 法学
    • 25 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 7 篇 农学
  • 4 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 36 篇 computer science
  • 26 篇 control systems
  • 21 篇 machine learning
  • 16 篇 artificial intel...
  • 13 篇 access control
  • 13 篇 reinforcement le...
  • 13 篇 computational mo...
  • 13 篇 real-time system...
  • 13 篇 costs
  • 12 篇 traffic control
  • 12 篇 bandwidth
  • 11 篇 deep learning
  • 11 篇 computer archite...
  • 11 篇 protocols
  • 10 篇 quality of servi...
  • 9 篇 automation
  • 9 篇 neural networks
  • 9 篇 hardware
  • 8 篇 mobile ad hoc ne...
  • 8 篇 computer communi...

机构

  • 7 篇 university polit...
  • 7 篇 faculty of autom...
  • 6 篇 national institu...
  • 6 篇 university polit...
  • 6 篇 computer science...
  • 5 篇 pazhou lab
  • 5 篇 chinese acad sci...
  • 4 篇 al-balqa applied...
  • 4 篇 faculty of autom...
  • 4 篇 university polit...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 guangdong univ t...
  • 3 篇 college of compu...
  • 3 篇 college of infor...
  • 3 篇 univ chinese aca...
  • 3 篇 univ jinan sch m...
  • 3 篇 department of gr...
  • 3 篇 department of co...
  • 3 篇 university polit...

作者

  • 7 篇 li hui
  • 5 篇 florea adina mag...
  • 5 篇 fagarasan ioana
  • 4 篇 adina magda flor...
  • 4 篇 min-chul lee
  • 4 篇 ghassan samara
  • 4 篇 myungjin cho
  • 4 篇 samara ghassan
  • 4 篇 mocanu stefan
  • 4 篇 liu derong
  • 4 篇 mustata alexandr...
  • 4 篇 hyun-woo kim
  • 4 篇 teng luyao
  • 4 篇 ştefan mocanu
  • 3 篇 bogdan-costel mo...
  • 3 篇 giorgian neculoi...
  • 3 篇 mihnea alexandru...
  • 3 篇 stamatescu grigo...
  • 3 篇 ding naikan
  • 3 篇 grigore stamates...

语言

  • 916 篇 英文
  • 11 篇 其他
  • 4 篇 中文
检索条件"任意字段=24th International Conference on Control Systems and Computer Science, CSCS 2023"
929 条 记 录,以下是861-870 订阅
排序:
A systemC-based modular design and verification framework for C-model reuse in a HW/SW-codesign design flow
A systemC-based modular design and verification framework fo...
收藏 引用
international conference on Distributed Computing systems Workshop
作者: O. Blaurock Department of Computer Science University of Hamburg Germany
Rising the level of abstraction in system modelling allows early verification of the system functionality, reducing the risk of long redesign cycles. Moving to a new flow introducing systemC as SDL allows the reuse of... 详细信息
来源: 评论
Providing statistical delay guarantees in wireless networks
Providing statistical delay guarantees in wireless networks
收藏 引用
international conference on Distributed Computing systems
作者: S. Wang R. Nathuji R. Bettati W. Zhao Department of Computer Science Texas A and M University College Station TX USA
We study the delay performance of policed traffic to provide real-time guarantees over wireless networks. A number of models have been presented in the literature to describe wireless (radio or optical) networks in te... 详细信息
来源: 评论
Bluetooth master/slave bridge scheduling with and without rendezvous points
Bluetooth master/slave bridge scheduling with and without re...
收藏 引用
international conference on Distributed Computing systems Workshop
作者: J. Misic V.B. Misic Department of Computer Science University of Manitoba Winnipeg MAN Canada
the impact of bridge scheduling on the performance of two Bluetooth piconets with a MS-type bridge is analyzed. We consider bridge scheduling both with and without the precomputed schedule of rendezvous points, and de... 详细信息
来源: 评论
Energy efficient data collection in distributed sensor environments
Energy efficient data collection in distributed sensor envir...
收藏 引用
international conference on Distributed Computing systems
作者: Q. Han Sharad Mehrotra Nalini Venkatasubramanian School of Information and Computer Science University of California Irvine CA USA
Sensors are typically deployed to gather data about the physical world and its artifacts for a variety of purposes that range from environment monitoring, control, to data analysis. Since sensors are resource constrai... 详细信息
来源: 评论
LISP: a link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM
LISP: a link-indexed statistical traffic prediction approach...
收藏 引用
international conference on Distributed Computing systems
作者: C. Hu J. Hou Department of Electrical and Computer Engineering University of Illinois Urbana-Champaign USA Department of Computer Science University of Illinois Urbana-Champaign USA
We present a novel and complementary mechanism, called link-indexed statistical traffic predictor (LISP) to improve IEEE 802.11 power saving mechanism (PSM). LISP employs a simple, light-weight traffic prediction mech... 详细信息
来源: 评论
An analysis for differentiated services in IEEE 802.11 and IEEE 802.11e wireless LANs
An analysis for differentiated services in IEEE 802.11 and I...
收藏 引用
international conference on Distributed Computing systems
作者: Y. Xiao Computer Science Division University of Memphis Memphis TN USA
We study backoff-based priority schemes for IEEE 802.11 and the emerging IEEE 802.11e standard by differentiating the minimum backoff window size, the backoff window-increasing factor, and the retransmission limit. An... 详细信息
来源: 评论
Analyzing the secure overlay services architecture under intelligent DDoS attacks
Analyzing the secure overlay services architecture under int...
收藏 引用
international conference on Distributed Computing systems
作者: D. Xuan Sriram Chellappan X. Wang S. Wang Department of Computer Information and Science Ohio State Uinversity Columbus OH USA Department of Computer Science Texas A and M University College Station TX USA
Distributed denial of service (DDoS) attacks are currently major threats to communication in the Internet. A secure overlay services (SOS) architecture has been proposed to provide reliable communication between clien... 详细信息
来源: 评论
Limitations of equation-based congestion control in mobile ad hoc networks
Limitations of equation-based congestion control in mobile a...
收藏 引用
international conference on Distributed Computing systems Workshop
作者: K. Chen K. Nahrstedt Computer Science Department University of Illinois Urbana-Champaign Urbana IL USA
Equation-based congestion control has been a promising alternative to TCP for real-time multimedia streaming over the Internet. However, its behavior remains unknown in the mobile ad hoc wireless network (MANET) domai... 详细信息
来源: 评论
A distributed approach to solving overlay mismatching problem
A distributed approach to solving overlay mismatching proble...
收藏 引用
international conference on Distributed Computing systems
作者: Y. Liu Z. Zhuang L. Xiao L.M. Ni Department of Computer Science & Engineering Michigan State University East Lansing MI USA Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
In unstructured peer-to-peer (P2P) systems, the mechanism of a peer randomly joining and leaving a P2P network causes topology mismatching between the P2P logical overlay network and the physical underlying network, c... 详细信息
来源: 评论
Price-based channel time allocation in wireless LANs
Price-based channel time allocation in wireless LANs
收藏 引用
international conference on Distributed Computing systems Workshop
作者: S.H. Shah K. Nahrstedt Department of Computer Science University of Illinois Urbana-Champaign USA
In access-point based wireless networks employing the IEEE 802.11 protocol in DCF mode, without bandwidth management and rate control, users pump data into the network as fast as it is generated. this results in a los... 详细信息
来源: 评论