咨询与建议

限定检索结果

文献类型

  • 5,062 篇 会议
  • 45 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,129 篇 工学
    • 3,187 篇 计算机科学与技术...
    • 1,609 篇 电气工程
    • 1,562 篇 信息与通信工程
    • 1,288 篇 软件工程
    • 564 篇 控制科学与工程
    • 344 篇 动力工程及工程热...
    • 262 篇 仪器科学与技术
    • 248 篇 电子科学与技术(可...
    • 201 篇 机械工程
    • 116 篇 石油与天然气工程
    • 116 篇 网络空间安全
    • 111 篇 测绘科学与技术
    • 109 篇 安全科学与工程
    • 91 篇 交通运输工程
    • 77 篇 生物工程
    • 76 篇 环境科学与工程(可...
    • 75 篇 生物医学工程(可授...
    • 74 篇 材料科学与工程(可...
    • 64 篇 化学工程与技术
  • 834 篇 理学
    • 448 篇 数学
    • 204 篇 物理学
    • 123 篇 化学
    • 123 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 99 篇 生物学
  • 581 篇 管理学
    • 438 篇 管理科学与工程(可...
    • 209 篇 图书情报与档案管...
    • 169 篇 工商管理
  • 113 篇 医学
    • 82 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 63 篇 经济学
  • 52 篇 法学
  • 40 篇 农学
  • 25 篇 军事学
  • 14 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 620 篇 wireless sensor ...
  • 166 篇 sensor nodes
  • 140 篇 sensor systems
  • 137 篇 distributed comp...
  • 123 篇 wireless sensor ...
  • 95 篇 sensor networks
  • 93 篇 distributed powe...
  • 92 篇 internet of thin...
  • 88 篇 energy efficienc...
  • 85 篇 monitoring
  • 81 篇 cloud computing
  • 81 篇 distributed comp...
  • 72 篇 sensors
  • 72 篇 computer network...
  • 68 篇 protocols
  • 65 篇 routing
  • 63 篇 security
  • 59 篇 wireless communi...
  • 59 篇 real-time system...
  • 58 篇 computer archite...

机构

  • 12 篇 maharishi school...
  • 12 篇 jiangsu high tec...
  • 12 篇 ieee
  • 10 篇 college of elect...
  • 9 篇 chitkara univers...
  • 9 篇 chitkara univers...
  • 8 篇 karnataka bangal...
  • 8 篇 henan univ inst ...
  • 8 篇 payame noor univ...
  • 8 篇 wuhan univ sch c...
  • 7 篇 beijing univ pos...
  • 7 篇 tu wien distribu...
  • 6 篇 dalian univ tech...
  • 6 篇 college of techn...
  • 6 篇 shanghai jiao to...
  • 6 篇 centre for inter...
  • 6 篇 univ pittsburgh ...
  • 6 篇 indian sch mines...
  • 6 篇 centre for cyber...
  • 6 篇 chinese acad sci...

作者

  • 14 篇 han zhijie
  • 10 篇 dustdar schahram
  • 10 篇 china
  • 10 篇 zhang wei
  • 9 篇 barolli leonard
  • 8 篇 wang lei
  • 8 篇 liu xue
  • 7 篇 liu yang
  • 6 篇 stankovic john a...
  • 6 篇 xhafa fatos
  • 6 篇 zakaria a.
  • 6 篇 lin chi
  • 6 篇 li wei
  • 6 篇 abdelzaher tarek
  • 6 篇 mukherjee nandin...
  • 6 篇 li hui
  • 5 篇 sarigiannidis pa...
  • 5 篇 yang yang
  • 5 篇 shakaff a.y.m.
  • 5 篇 prasad ramjee

语言

  • 5,016 篇 英文
  • 89 篇 其他
  • 7 篇 中文
检索条件"任意字段=3rd IEEE International Conference on Distributed Computing in Sensor Systems"
5112 条 记 录,以下是151-160 订阅
排序:
Leveraging redundancy in sampling-interpolation applications for sensor networks
收藏 引用
3rd ieee international conference on distributed computing in sensor systems
作者: Liaskovits, Periklis Schurgers, Curt Univ Calif San Diego Dept Elect & Comp Engn La Jolla CA 92093 USA
An important class of sensor network applications alms at estimating the spatiotemporal behavior of a physical phenomenon, such as temperature variations over an area of interest. These networks thereby essentially ac... 详细信息
来源: 评论
An Opportunistic Routing Protocol for Underground Wireless sensor Networks
An Opportunistic Routing Protocol for Underground Wireless S...
收藏 引用
3rd international Workshop on e-Activity (IWEA2009)/10th ACIS international conference on Software Engineering Artificial Intelligence, Networking and Parallel/distributed computing
作者: Joe, Inwhee Kim, Dongik Hanyang Univ Dept Elect & Comp Engn Seoul 133791 South Korea
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is dif... 详细信息
来源: 评论
DELTA 2 - A distributed COMPUTER.
DELTA 2 - A DISTRIBUTED COMPUTER.
收藏 引用
Proceedings - 3rd international conference on distributed computing systems.
作者: Stern, Max
来源: 评论
Secure and Efficient Authenticated Key Exchange Mechanism for Wireless sensor Networks and Internet of Things using Bloom Filter  3
Secure and Efficient Authenticated Key Exchange Mechanism fo...
收藏 引用
3rd ieee international conference on Collaboration and Internet computing (CIC)
作者: Maurya, Anup Kumar Sastry, V. N. Inst Dev & Res Banking Technol Ctr Mobile Banking Hyderabad Andhra Prades India Univ Hyderabad Artificial Intelligence Lab Sch Comp & Informat Sci Hyderabad Andhra Prades India
For security sensitive Internet of Things (IoT) and Wireless sensor Networks(WSNs), an efficient authenticated key exchange (AKE) mechanism improves the quality of services and reduces the possibility of security atta... 详细信息
来源: 评论
A distributed Energy Balance Clustering Protocol for Heterogeneous Wireless sensor Networks
A Distributed Energy Balance Clustering Protocol for Heterog...
收藏 引用
3rd international conference on Wireless Communications, Networking and Mobile computing (WiCOM 2007)
作者: Duan, Changmin Fan, Hong Hubei Inst Nationalities Dept Comp Sci Enshi 445000 Hubei Peoples R China Huazhong Univ Sci & Technol Coll Comp Wuhan 430074 Peoples R China
sensor networks have a wide range of potential, practical and useful applications. However, there are issues that need to be addressed for efficient operation of sensor network systems in real applications. To extend ... 详细信息
来源: 评论
EXPERIMENT IN distributed PROGRAM DESIGN, USING CONTROL ENRICHMENT.
EXPERIMENT IN DISTRIBUTED PROGRAM DESIGN, USING CONTROL ENRI...
收藏 引用
Proceedings - 3rd international conference on distributed computing systems.
作者: Shapiro, Marc
来源: 评论
REPORT ON PROCESS MANAGEMENT IN A GUEST distributed SYSTEM.
REPORT ON PROCESS MANAGEMENT IN A GUEST DISTRIBUTED SYSTEM.
收藏 引用
Proceedings - 3rd international conference on distributed computing systems.
作者: Gertner, Ilya
来源: 评论
Efficient distributed single-phase protocol for total and causal ordering of group operations
Efficient distributed single-phase protocol for total and ca...
收藏 引用
Proceedings of the 1996 3rd international conference on High Performance computing, HiPC
作者: Sun, Chengzheng Maheshwari, Piyush Griffith Univ Brisbane
The total and causal ordering of group operations in distributed systems is at the core of solutions to many problems in distributed computing. Existing approaches are based on either a centralized coordinator to assi... 详细信息
来源: 评论
RealID: Building A Secure Anonymous Yet Transparent Immutable ID Service  3
RealID: Building A Secure Anonymous Yet Transparent Immutabl...
收藏 引用
ieee 3rd international conference on Big Data Security on Cloud (BigDataSecurity) / 3rd ieee international conference on High Performance and Smart computing (HPSC) / 2nd ieee international conference on Intelligent Data and Security (IDS)
作者: Zhu, Yixuan Chen, Zhixiong Mercy Coll Dobbs Ferry NY 10522 USA
This paper is to describe a novel approach of building a secure and anonymous yet transparent and immutable identification management system. A consortium block chain with delegated proof of stack (DPOS) is used to bu... 详细信息
来源: 评论
Complexity Controlled Side Information Creation for distributed Scalable Video Coding  3
Complexity Controlled Side Information Creation for Distribu...
收藏 引用
3rd international conference on Recent Advances in Signal Processing, Telecommunications and computing (ieee SigTelCom)
作者: Quang Hoang Van Le Dao Thi Hue Vien Dinh Du Vu Nguyen Hong Xiem HoangVan Hanoi Univ Ind Hanoi Vietnam VNU Univ Engn & Technol Hanoi Vietnam Radio Elect Assoc Vietnam Ho Chi Minh City Vietnam
distributed scalable video coding (DSVC) has recently been gaining many attentions due to its benefits in terms of computational complexity, error resilience and scalability, which are important for emerging video app... 详细信息
来源: 评论