咨询与建议

限定检索结果

文献类型

  • 5,067 篇 会议
  • 41 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,113 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,129 篇 工学
    • 3,182 篇 计算机科学与技术...
    • 1,609 篇 电气工程
    • 1,553 篇 信息与通信工程
    • 1,282 篇 软件工程
    • 555 篇 控制科学与工程
    • 344 篇 动力工程及工程热...
    • 264 篇 仪器科学与技术
    • 249 篇 电子科学与技术(可...
    • 201 篇 机械工程
    • 112 篇 测绘科学与技术
    • 111 篇 安全科学与工程
    • 106 篇 网络空间安全
    • 103 篇 石油与天然气工程
    • 93 篇 交通运输工程
    • 77 篇 生物工程
    • 76 篇 环境科学与工程(可...
    • 76 篇 生物医学工程(可授...
    • 71 篇 材料科学与工程(可...
    • 65 篇 化学工程与技术
  • 829 篇 理学
    • 443 篇 数学
    • 204 篇 物理学
    • 124 篇 化学
    • 123 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 98 篇 生物学
  • 572 篇 管理学
    • 440 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 64 篇 经济学
  • 52 篇 法学
  • 40 篇 农学
  • 25 篇 军事学
  • 14 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 620 篇 wireless sensor ...
  • 168 篇 sensor nodes
  • 140 篇 sensor systems
  • 137 篇 distributed comp...
  • 122 篇 wireless sensor ...
  • 95 篇 sensor networks
  • 93 篇 distributed powe...
  • 92 篇 internet of thin...
  • 87 篇 energy efficienc...
  • 85 篇 monitoring
  • 81 篇 cloud computing
  • 81 篇 distributed comp...
  • 72 篇 computer network...
  • 71 篇 sensors
  • 68 篇 protocols
  • 65 篇 routing
  • 63 篇 security
  • 59 篇 wireless communi...
  • 59 篇 real-time system...
  • 58 篇 computer archite...

机构

  • 12 篇 maharishi school...
  • 12 篇 jiangsu high tec...
  • 12 篇 ieee
  • 10 篇 college of elect...
  • 9 篇 chitkara univers...
  • 9 篇 chitkara univers...
  • 8 篇 karnataka bangal...
  • 8 篇 henan univ inst ...
  • 8 篇 payame noor univ...
  • 8 篇 wuhan univ sch c...
  • 7 篇 beijing univ pos...
  • 7 篇 tu wien distribu...
  • 6 篇 dalian univ tech...
  • 6 篇 college of techn...
  • 6 篇 shanghai jiao to...
  • 6 篇 centre for inter...
  • 6 篇 univ pittsburgh ...
  • 6 篇 indian sch mines...
  • 6 篇 centre for cyber...
  • 6 篇 chinese acad sci...

作者

  • 14 篇 han zhijie
  • 10 篇 dustdar schahram
  • 10 篇 china
  • 10 篇 zhang wei
  • 9 篇 barolli leonard
  • 8 篇 wang lei
  • 8 篇 liu xue
  • 7 篇 liu yang
  • 6 篇 stankovic john a...
  • 6 篇 xhafa fatos
  • 6 篇 zakaria a.
  • 6 篇 lin chi
  • 6 篇 li wei
  • 6 篇 abdelzaher tarek
  • 6 篇 mukherjee nandin...
  • 6 篇 li hui
  • 5 篇 sarigiannidis pa...
  • 5 篇 yang yang
  • 5 篇 shakaff a.y.m.
  • 5 篇 prasad ramjee

语言

  • 4,747 篇 英文
  • 359 篇 其他
  • 9 篇 中文
检索条件"任意字段=3rd IEEE International Conference on Distributed Computing in Sensor Systems"
5113 条 记 录,以下是1151-1160 订阅
排序:
A software trigger based synchronization for multipurpose distributed acquisition systems
A software trigger based synchronization for multipurpose di...
收藏 引用
2020 international conference on Innovation and Intelligence for Informatics, computing and Technologies, 3ICT 2020
作者: Jetti, Harsha Vardana Salicone, Simona Politecnico di Milano Dipartimento di Energia Milano Italy Milano Italy
Synchronization is one of the key aspects and a requirement for modern day technologies. It's a requirement for almost every sector including power, health, retail, navigation, banking. Synchronization is also imp... 详细信息
来源: 评论
A framework based on genetic algorithms for distributed constraint optimization problems  3
A framework based on genetic algorithms for distributed cons...
收藏 引用
3rd international conference on Electron Device and Mechanical Engineering, ICEDME 2020
作者: Liu, Lizhen Chongqing University College of Computer Science Chongqing China
Local search algorithms are widely applied in solving large-scale distributed Constraint Optimization Problems(DCOPs). In local search algorithms, each agent makes its decision based on values of its neighbours. Thus,... 详细信息
来源: 评论
Towards Reliable IoT: Fog-Based AI sensor Validation  3
Towards Reliable IoT: Fog-Based AI Sensor Validation
收藏 引用
3rd ieee international conference on Cloud and Fog computing Technologies and Applications (ieee Cloud Summit)
作者: Russell, Luke Goubran, Rafik Kwamena, Felix Carleton Univ Syst & Comp Engn Ottawa ON Canada
Trust, reliability, and validation of data collected in distributed edge sensor systems is an increasingly relevant issue. Though the obvious solution of deploying redundant identical systems can provide validation, r... 详细信息
来源: 评论
A Study on the Application of One Dimension Convolutional Neural Network for Classification of Gestures from Surface Electromyography Data
A Study on the Application of One Dimension Convolutional Ne...
收藏 引用
ieee distributed computing, VLSI, Electrical Circuits and Robotics (DISCOVER)
作者: Praahas Amin Airani Mohammad Khan Mangalore University Mangalore India
Myoelectric control systems are gaining popularity with the availability of commercial, low-cost, surface electromyography sensors. These systems can be used for gesture recognition which finds application in human-ma... 详细信息
来源: 评论
A New Optimal Control with Adjustable Gains for Nonlinear systems
A New Optimal Control with Adjustable Gains for Nonlinear Sy...
收藏 引用
3rd international conference on Intelligent Autonomous systems (ICoIAS)
作者: Do Xuan Phu Vietnamese German Univ Dept Mechatron & Sensor Syst Technol Binh Duong Vietnam
In this study, a new optimal control law associated with the sliding mode control is developed on the basis of the Bolza-Meyer criterion. The salient characteristics of the controller proposed in this work is to have ... 详细信息
来源: 评论
A Support Tool for Rapid Deployment of Large Scale distributed Sensing systems  2020
A Support Tool for Rapid Deployment of Large Scale Distribut...
收藏 引用
3rd international conference on Electronics, Communications and Control Engineering, ICECC 2020
作者: Truong, Tuyen Phong College of Engineering Technology Can Tho University Can Tho City Viet Nam
distributed sensing systems are spatially distributed autonomous sensing devices for environmental observation purposes in large areas. In recent years, the innovation of embedded sensing devices and wireless communic... 详细信息
来源: 评论
Artificial neural network model of an ieee 5 bus system under transient conditions  3
Artificial neural network model of an IEEE 5 bus system unde...
收藏 引用
3rd international conference on Smart systems and Inventive Technology, ICSSIT 2020
作者: Mohan, Archana Vidya, M.S. College of Engineering Trivandrum Department of Electrical and Electronics Engineering Trivandrum India
The distributed nature with increased complexity of modern power system is creating a new wave of exploration in the field of power system operations and management. Stability is said to be the most considering factor... 详细信息
来源: 评论
3rd Workshop on Education for High Performance computing (EduHiPC - 2021)
3rd Workshop on Education for High Performance Computing (Ed...
收藏 引用
ieee international conference on High Performance computing Workshops (HiPCW)
作者: Sheikh Ghafoor Sushil K. Prasad
High Performance computing (HPC) and, in general, Parallel and distributed computing (PDC) is ubiquitous. Every computing device, from a smartphone to a supercomputer, relies on parallel processing. Compute clusters o... 详细信息
来源: 评论
Tightly-coupled Vision-Gyro-Wheel Odometry for Ground Vehicle with Online Extrinsic Calibration  3
Tightly-coupled Vision-Gyro-Wheel Odometry for Ground Vehicl...
收藏 引用
3rd international conference on Intelligent Autonomous systems (ICoIAS)
作者: He, Yixuan Chai, Zheng Liu, Xiao Li, Zhaohui Luo, Haiyong Zhao, Fang Beijing Univ Posts & Telecommun Sch Software Beijing Peoples R China Megvii Co R SLAM Beijing Peoples R China Chinese Acad Sci Inst Comp Technol Beijing Peoples R China
In the absence of GPS or other sensors that provide absolute pose, it is relatively difficult to estimate the accurate pose of the ground vehicles continuously. Estimation method combining visual measurement and inert... 详细信息
来源: 评论
Evaluation of Classification algorithms for distributed Denial of Service Attack Detection  3
Evaluation of Classification algorithms for Distributed Deni...
收藏 引用
3rd ieee international conference on Artificial Intelligence and Knowledge Engineering AIKE 2020
作者: Gohil, Maulik Kumar, Sathish Cleveland State Univ Elect Engn & Comp Sci Dept Cleveland OH 44115 USA
distributed Denial of Service (DDoS) attacks aims exhausting the target network with malicious traffic, which is a threat to the availability of the service. Many detection systems, specifically Intrusion Detection Sy... 详细信息
来源: 评论