咨询与建议

限定检索结果

文献类型

  • 5,067 篇 会议
  • 41 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,113 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,129 篇 工学
    • 3,182 篇 计算机科学与技术...
    • 1,609 篇 电气工程
    • 1,553 篇 信息与通信工程
    • 1,282 篇 软件工程
    • 555 篇 控制科学与工程
    • 344 篇 动力工程及工程热...
    • 264 篇 仪器科学与技术
    • 249 篇 电子科学与技术(可...
    • 201 篇 机械工程
    • 112 篇 测绘科学与技术
    • 111 篇 安全科学与工程
    • 106 篇 网络空间安全
    • 103 篇 石油与天然气工程
    • 93 篇 交通运输工程
    • 77 篇 生物工程
    • 76 篇 环境科学与工程(可...
    • 76 篇 生物医学工程(可授...
    • 71 篇 材料科学与工程(可...
    • 65 篇 化学工程与技术
  • 829 篇 理学
    • 443 篇 数学
    • 204 篇 物理学
    • 124 篇 化学
    • 123 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 98 篇 生物学
  • 572 篇 管理学
    • 440 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 64 篇 经济学
  • 52 篇 法学
  • 40 篇 农学
  • 25 篇 军事学
  • 14 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 620 篇 wireless sensor ...
  • 168 篇 sensor nodes
  • 140 篇 sensor systems
  • 137 篇 distributed comp...
  • 122 篇 wireless sensor ...
  • 95 篇 sensor networks
  • 93 篇 distributed powe...
  • 92 篇 internet of thin...
  • 87 篇 energy efficienc...
  • 85 篇 monitoring
  • 81 篇 cloud computing
  • 81 篇 distributed comp...
  • 72 篇 computer network...
  • 71 篇 sensors
  • 68 篇 protocols
  • 65 篇 routing
  • 63 篇 security
  • 59 篇 wireless communi...
  • 59 篇 real-time system...
  • 58 篇 computer archite...

机构

  • 12 篇 maharishi school...
  • 12 篇 jiangsu high tec...
  • 12 篇 ieee
  • 10 篇 college of elect...
  • 9 篇 chitkara univers...
  • 9 篇 chitkara univers...
  • 8 篇 karnataka bangal...
  • 8 篇 henan univ inst ...
  • 8 篇 payame noor univ...
  • 8 篇 wuhan univ sch c...
  • 7 篇 beijing univ pos...
  • 7 篇 tu wien distribu...
  • 6 篇 dalian univ tech...
  • 6 篇 college of techn...
  • 6 篇 shanghai jiao to...
  • 6 篇 centre for inter...
  • 6 篇 univ pittsburgh ...
  • 6 篇 indian sch mines...
  • 6 篇 centre for cyber...
  • 6 篇 chinese acad sci...

作者

  • 14 篇 han zhijie
  • 10 篇 dustdar schahram
  • 10 篇 china
  • 10 篇 zhang wei
  • 9 篇 barolli leonard
  • 8 篇 wang lei
  • 8 篇 liu xue
  • 7 篇 liu yang
  • 6 篇 stankovic john a...
  • 6 篇 xhafa fatos
  • 6 篇 zakaria a.
  • 6 篇 lin chi
  • 6 篇 li wei
  • 6 篇 abdelzaher tarek
  • 6 篇 mukherjee nandin...
  • 6 篇 li hui
  • 5 篇 sarigiannidis pa...
  • 5 篇 yang yang
  • 5 篇 shakaff a.y.m.
  • 5 篇 prasad ramjee

语言

  • 4,747 篇 英文
  • 359 篇 其他
  • 9 篇 中文
检索条件"任意字段=3rd IEEE International Conference on Distributed Computing in Sensor Systems"
5113 条 记 录,以下是1441-1450 订阅
排序:
A Method of Sleeping State Recognition Based on Pressure-Body Movement-Sleeping Model  3
A Method of Sleeping State Recognition Based on Pressure-Bod...
收藏 引用
3rd ieee international conference on Cloud computing and Big Data Analysis (ICCCBDA)
作者: Yan, Quya Xu, Chao Anhui Univ Sch Elect & Informat Engn Hefei Anhui Peoples R China Anhui Univ Anhui Engn Lab Agroecol Big Data Hefei Anhui Peoples R China Anhui Univ Minist Educ Key Lab Intelligent Comp & Signal Proc Hefei Anhui Peoples R China
Sleeping is essential to human health. Recognizing sleeping state accurately is an important prerequisite for analyzing sleeping quality effectively. As different states of sleeping staggered with each other, it is ne... 详细信息
来源: 评论
Performance Analysis of User Influence Algorithm under Big Data Processing Framework in Social Networks  3
Performance Analysis of User Influence Algorithm under Big D...
收藏 引用
3rd ieee international conference on Cloud computing and Big Data Analysis (ICCCBDA)
作者: Quan, Yong Zhang, Liang Jia, Yan Zhou, Bin Natl Univ Def Technol Coll Comp Changsha Hunan Peoples R China
Social influence plays an essential role in spreading information within online social networks, and can be modeled or measured by analyzing various social networking data, such as published content, users' attrib... 详细信息
来源: 评论
Data Loss Prevention Scheme Using ADCN with Effective Tour Strategy in Wireless sensor Network  3rd
Data Loss Prevention Scheme Using ADCN with Effective Tour S...
收藏 引用
3rd international conference on Intelligent computing and Applications (ICICA)
作者: Todkari, Sachin, V Deshpande, Vivek S. Bagwan, A. B. Kalinga Univ Naya Raipur Chhattisgarh India VIT Pune Maharashtra India
Wireless sensor network is spatially distributed sensors with limited resources such as energy and buffer. Data loss prevention is challenging task in wireless sensor network (WSN), and hence, reliable data disseminat... 详细信息
来源: 评论
Identification of distributed Malware  3
Identification of Distributed Malware
收藏 引用
3rd ieee international conference on Communication and Information systems (ICCIS)
作者: Jain, Darshil Khemani, Shreya Prasad, Gaurav Manipal Univ Jaipur Dept Comp & Commun Engn Jaipur Rajasthan India
Smartphones have evolved over the years from simple devices to communicate with each other to fully functional portable computers although with comparatively less computational power but inholding multiple application... 详细信息
来源: 评论
A Coverage Algorithm in Circular Area Based on Polar Coordinates for WSNs  4
A Coverage Algorithm in Circular Area Based on Polar Coordin...
收藏 引用
4th ieee international conference on Big Data Security on Cloud (BigDataSecurity) / 4th ieee international conference on High Performance and Smart computing (HPSC) / 3rd ieee international conference on Intelligent Data and Security (IDS)
作者: Li, Hui Du, Xiaoyu Han, Zhijie Henan Univ MinSheng Coll Kaifeng Henan Peoples R China Henan Univ Sch Comp & Informat Engn Kaifeng Henan Peoples R China Int Joint Res Lab Cooperat Vehicular Networks Hen Kaifeng Henan Peoples R China Henan Univ Inst Data & Knowledge Engn Kaifeng Henan Peoples R China Jiangsu High Technol Res Key Lab Wireless Sensor Nanjing Jiangsu Peoples R China
In this paper, we consider the problem of wireless sensors deployed in a circular area to achieve a desired degree of coverage. To this end, we propose a coverage algorithm based on polar coordinates to enhance the co... 详细信息
来源: 评论
Research on Information Security Technology Based on Blockchain  3
Research on Information Security Technology Based on Blockch...
收藏 引用
3rd ieee international conference on Cloud computing and Big Data Analysis (ICCCBDA)
作者: Liu, Liang Xu, Budong Shandong Normal Univ Jinan Shandong Peoples R China
Information security is the key to the development of modern Internet technology. The distributed mechanism, decentralized mechanism, password mechanism and scripted mechanism of the Blockchain present a completely ne... 详细信息
来源: 评论
The Hamiltonian of Data Center Network BCCC  4
The Hamiltonian of Data Center Network BCCC
收藏 引用
4th ieee international conference on Big Data Security on Cloud (BigDataSecurity) / 4th ieee international conference on High Performance and Smart computing (HPSC) / 3rd ieee international conference on Intelligent Data and Security (IDS)
作者: He, Xin Zhang, Qingfeng Han, Zhijie Henan Univ Sch Comp & Informat Engn Kaifeng Henan Peoples R China Jiangsu High Technol Res Key Lab Wireless Sensor Nanjing Jiangsu Peoples R China
With the development of cloud computing the topology properties of data center network are important to the computing resources. Recently a data center network structure - BCCC is proposed, which is recursively built ... 详细信息
来源: 评论
distributed Generations Planning in Network Based on Marginal Benefit  3
Distributed Generations Planning in Network Based on Margina...
收藏 引用
3rd ieee international conference on Integrated Circuits and Microsystems (ICICM)
作者: Yu, Xiang Peng, Minfang Zhu, Yicheng Hunan Univ Coll Elect & Informat Engn Changsha 410082 Hunan Peoples R China
With the emphasis on environmental protection and the development of power systems, distributed generation (DG) has developed rapidly. Intelligent search algorithms such as genetic algorithms are widely used in DGs ne... 详细信息
来源: 评论
AN Access Pattern Model Analysis for Online VoD multimedia Flow For BigData  4
AN Access Pattern Model Analysis for Online VoD multimedia F...
收藏 引用
4th ieee international conference on Big Data Security on Cloud (BigDataSecurity) / 4th ieee international conference on High Performance and Smart computing (HPSC) / 3rd ieee international conference on Intelligent Data and Security (IDS)
作者: Han, Zhijie Ma, Ji-Ao Zhao, Hui Henan Univ Inst Data & Knowledge Engn Kaifeng Henan Peoples R China Henan Univ Sch Sofeware Kaifeng Henan Peoples R China Jiangsu High Technol Res Key Lab Wireless Sensor Nanjing Jiangsu Peoples R China
The commonly agreed Zipf-like access pattern of Web work-loads is mainly based on Internet measurements when text-based content dominated the Web traffic. However, with dramatic increase of VoD media traffic on the In... 详细信息
来源: 评论
Human Motion Recognition by Three-view Kinect sensors in Virtual Basketball Training
Human Motion Recognition by Three-view Kinect Sensors in Vir...
收藏 引用
ieee Region 10 international conference TENCON
作者: Baoqi Yao Hui Gao Xin Su Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China
In recent years, human action recognition has received a considerable amount of research attention because of it's potential in a variety of applications, such as video surveillance, human-computer interaction, an... 详细信息
来源: 评论