咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是271-280 订阅
排序:
Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks
收藏 引用
EUC 2005 Workshops: 2nd international Symposium on Ubiquitous Intelligence and Smart Worlds, UISW 2005, IFIP international Symposium on Network-Centric Ubiquitous systems, NCUS 2005, 1st international Workshop on security in Ubiquitous Computing systems, SecUbiq 2005, 1st international Workshop on RFID and Ubiquitous Sensor networks, USN 2005 and international Workshop on Trusted and Autonomic Ubiquitous and Embedded systems, TAUES 2005 held in conjunction with the IFIP international conference on Embedded and Ubiquitous Computing, 2005
作者: Baqer, M. Khan, A.I. Baig, Z.A. Monash University Australia
Graph Neuron (GN) is a network-centric algorithm which envisages a stable and structured network of tiny devices as the platform for parallel distributed pattern recognition. However, the unstructured and often dynami... 详细信息
来源: 评论
Cooperative spatial multiplexing in mobile ad hoc networks
Cooperative spatial multiplexing in mobile ad hoc networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Kim, Sang Wu Department of Electrical and Computer Engineering Iowa State University Ames IA 50011
We propose a new cooperative relaying technique for delivering high-rate data in mobile ad hoc networks. The proposed approach is to make each relay node to detect only a subset (called sub-stream) of the source data ... 详细信息
来源: 评论
distributed unique global ID assignment for sensor networks
Distributed unique global ID assignment for sensor networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Ould-Ahmed-Vall, El Moustapha Blough, Douglas M. Heck, Bonnie S. Riley, George F. School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA 30332-0250
A sensor network consists of a set of battery-powered nodes, which collaborate to perform sensing tasks in a given environment. It may contain one or more base stations to collect sensed data and possibly relay it to ... 详细信息
来源: 评论
Authenticated flooding in large-scale sensor networks
Authenticated flooding in large-scale sensor networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Son, Ju-Hyung Luo, Haiyun Seo, Seung-Woo School of Electrical Engineering and Computer Science Seoul National University Seoul 151-742 Korea Republic of Department of Computer Science University of Illinois at Urbana-Champaign Urbana IL 61801-2302 United States
Two asymmetric mechanisms are often employed in large-scale systems to achieve scalable and efficient authenticated broadcast. However, cryptographic asymmetry based on public-key schemes is computationally expensive,... 详细信息
来源: 评论
Local data protection for in-network processing in sensor networks
Local data protection for in-network processing in sensor ne...
收藏 引用
2nd IEEE international conference on Pervasive Services (ICPS 2005)
作者: Ouyang, Y Le, ZY Ford, J Makedon, F Dartmouth Coll Dept Comp Sci Hanover NH 03755 USA
Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network l... 详细信息
来源: 评论
A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks
A self-adaptive intrusion detection method for AODV-based mo...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Kurosawa, Satoshi Nakayama, Hidehisa Kato, Nei Jamalipour, Abbas Nomoto, Yoshiaki Graduate School of Information Sciences Tohoku University Aoba 6-3-09 Aoba-ku Sendai Miyagi 980-8579 Japan School of Electrical and Information Engineering University of Sydney Sydney NSW 2006 Australia
Mobile ad hoc networks (MANET) are usually formed without any major infrastructure. As a result, they are relatively vulnerable to malicious network attacks and therefore the security is a more significant issue than ... 详细信息
来源: 评论
Quantifying eavesdropping vulnerability in sensor networks  05
Quantifying eavesdropping vulnerability in sensor networks
收藏 引用
2nd international Workshop on Data Management for Sensor networks, DMSN 2005, Held in Conjunction with Very Large Data Bases
作者: Anand, Madhukar Ives, Zachary Lee, Insup Department of Computer and Information Science University of Pennsylvania United States
With respect to security, sensor networks have a number of considerations that separate them from traditional distributed systems. First, sensor devices are typically vulnerable to physical compromise. Second, they ha... 详细信息
来源: 评论
A fault localized scheme for false report filtering in sensor networks
A fault localized scheme for false report filtering in senso...
收藏 引用
2nd international conference on Pervasive Services, ICPS '05
作者: Zhou, Li Ravishankar, Chinya V. Department of Computer Science and Engineering University of California Riverside Riverside CA 92521 United States
Sensor networks frequently deploy many tiny and inexpensive devices over large regions to detect events of interest. It can be easy to compromise sensors, enabling attackers to use the keys and other information store... 详细信息
来源: 评论
Off-line micro-payment system for content sharing in P2P networks
收藏 引用
2nd international conference on distributed Computing and Internet Technology
作者: Dai, XL Grundy, J Univ S Pacific Dept Math & Comp Sci Suva Fiji Univ Auckland Dept Elect & Comp Engn Auckland 1 New Zealand Univ Auckland Dept Comp Sci Auckland 1 New Zealand
Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment pr... 详细信息
来源: 评论
Ubiquitous organizational information service framework for large scale intelligent environments
收藏 引用
EUC 2005 Workshops: 2nd international Symposium on Ubiquitous Intelligence and Smart Worlds, UISW 2005, IFIP international Symposium on Network-Centric Ubiquitous systems, NCUS 2005, 1st international Workshop on security in Ubiquitous Computing systems, SecUbiq 2005, 1st international Workshop on RFID and Ubiquitous Sensor networks, USN 2005 and international Workshop on Trusted and Autonomic Ubiquitous and Embedded systems, TAUES 2005 held in conjunction with the IFIP international conference on Embedded and Ubiquitous Computing, 2005
作者: Hwang, Kwang-Il Lee, Won-Hee Kim, Seok-Hwan Eom, Doo-Seop Hur, Kyeong Department of Electronics and Computer Engineering Korea University #1-5ga Anam-dong Sungbuk-gu Seoul Korea Republic of Department of Computer Education Gyeongin National University of Education Korea Republic of
In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect to the environment. The UOI framewor... 详细信息
来源: 评论