咨询与建议

限定检索结果

文献类型

  • 5,067 篇 会议
  • 45 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,117 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,134 篇 工学
    • 3,184 篇 计算机科学与技术...
    • 1,613 篇 电气工程
    • 1,553 篇 信息与通信工程
    • 1,282 篇 软件工程
    • 556 篇 控制科学与工程
    • 345 篇 动力工程及工程热...
    • 265 篇 仪器科学与技术
    • 251 篇 电子科学与技术(可...
    • 201 篇 机械工程
    • 112 篇 测绘科学与技术
    • 111 篇 安全科学与工程
    • 106 篇 网络空间安全
    • 104 篇 石油与天然气工程
    • 93 篇 交通运输工程
    • 77 篇 环境科学与工程(可...
    • 77 篇 生物工程
    • 76 篇 生物医学工程(可授...
    • 74 篇 材料科学与工程(可...
    • 65 篇 化学工程与技术
  • 832 篇 理学
    • 442 篇 数学
    • 207 篇 物理学
    • 125 篇 化学
    • 123 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 99 篇 生物学
  • 574 篇 管理学
    • 442 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 64 篇 经济学
  • 52 篇 法学
  • 40 篇 农学
  • 25 篇 军事学
  • 14 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 620 篇 wireless sensor ...
  • 168 篇 sensor nodes
  • 140 篇 sensor systems
  • 138 篇 distributed comp...
  • 122 篇 wireless sensor ...
  • 95 篇 sensor networks
  • 93 篇 distributed powe...
  • 92 篇 internet of thin...
  • 87 篇 energy efficienc...
  • 85 篇 monitoring
  • 81 篇 cloud computing
  • 81 篇 distributed comp...
  • 72 篇 computer network...
  • 71 篇 sensors
  • 68 篇 protocols
  • 65 篇 routing
  • 63 篇 security
  • 59 篇 wireless communi...
  • 59 篇 real-time system...
  • 58 篇 computer archite...

机构

  • 12 篇 maharishi school...
  • 12 篇 jiangsu high tec...
  • 12 篇 ieee
  • 10 篇 college of elect...
  • 9 篇 chitkara univers...
  • 9 篇 chitkara univers...
  • 8 篇 karnataka bangal...
  • 8 篇 henan univ inst ...
  • 8 篇 payame noor univ...
  • 8 篇 wuhan univ sch c...
  • 7 篇 beijing univ pos...
  • 7 篇 tu wien distribu...
  • 6 篇 dalian univ tech...
  • 6 篇 college of techn...
  • 6 篇 shanghai jiao to...
  • 6 篇 centre for inter...
  • 6 篇 univ pittsburgh ...
  • 6 篇 indian sch mines...
  • 6 篇 centre for cyber...
  • 6 篇 chinese acad sci...

作者

  • 14 篇 han zhijie
  • 10 篇 dustdar schahram
  • 10 篇 china
  • 10 篇 zhang wei
  • 9 篇 barolli leonard
  • 8 篇 wang lei
  • 8 篇 liu xue
  • 7 篇 liu yang
  • 6 篇 stankovic john a...
  • 6 篇 xhafa fatos
  • 6 篇 zakaria a.
  • 6 篇 lin chi
  • 6 篇 li wei
  • 6 篇 abdelzaher tarek
  • 6 篇 mukherjee nandin...
  • 6 篇 li hui
  • 5 篇 sarigiannidis pa...
  • 5 篇 yang yang
  • 5 篇 shakaff a.y.m.
  • 5 篇 prasad ramjee

语言

  • 4,968 篇 英文
  • 142 篇 其他
  • 7 篇 中文
检索条件"任意字段=3rd IEEE International Conference on Distributed Computing in Sensor Systems"
5117 条 记 录,以下是4351-4360 订阅
排序:
Research on pairwise key establishment model and algorithm for sensor networks
收藏 引用
3rd international conference on Ubiquitous Intelligence and computing
作者: Wang, Lei Lin, Yaping Tan, Minsheng Shi, Chunyi Hunan Univ Coll Software Changsha 410082 Peoples R China Tsinghua Univ Dept Comp Sci & Tech Beijing 100084 Peoples R China
Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A new kind of pairwise k... 详细信息
来源: 评论
Locating compromised sensor nodes through incremental hashing authentication
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Zhang, Youtao Yang, Jun Jin, Lingling Li, Weijia Univ Pittsburgh Dept Comp Sci Pittsburgh PA 15260 USA Univ Calif Riverside Dept Comp Sci & Engn Riverside CA 92507 USA
While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a Compromised nOde Locating protocol for detecting ... 详细信息
来源: 评论
distributed model-free stochastic optimization in wireless sensor networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Yagan, Daniel Tham, Chen-Khong Natl Univ Singapore Dept Elect & Comp Engn Singapore 117548 Singapore
With the improvement in computer electronics in terms of processing, memory and communication capabilities, it has become possible to scatter tiny embedded devices such as sensor nodes to monitor physical phenomena wi... 详细信息
来源: 评论
SeeMote: In-situ visualization and logging device for wireless sensor networks
SeeMote: In-situ visualization and logging device for wirele...
收藏 引用
3rd international conference on Broadband Communications Networks and systems
作者: Selavo, Leo Zhou, Gang Stankovic, John A. Univ Virginia Dept Comp Sci Charlottesville VA 22904 USA
In this paper we address three challenges that are present when building and analyzing wireless sensor networks (WSN) as part of ubiquitous computing environment: the need for an in-situ user interface, a data logger,... 详细信息
来源: 评论
3rd international conference on distributed computing and Internet Technology, ICDCIT 2006
收藏 引用
3rd international conference on distributed computing and Internet Technology, ICDCIT 2006
The proceedings contain 40 papers. The special focus in this conference is on distributed computing and Internet Technology. The topics include: Ticket-based binding update protocol for mobile IPV6*;distributed node-b...
来源: 评论
Snapshot: A self-calibration protocol for camera sensor networks
Snapshot: A self-calibration protocol for camera sensor netw...
收藏 引用
3rd international conference on Broadband Communications Networks and systems
作者: Liu, Xiaotao Kulkarni, Purushottam Shenoy, Prashant Ganesan, Deepak Univ Massachusetts Dept Comp Sci Amherst MA 01003 USA
A camera sensor network is a wireless network of cameras designed for ad-hoe deployment. The camera sensors in such a network need to be properly calibrated by determining their location, orientation, and range. This ... 详细信息
来源: 评论
Cooperative public key authentication protocol in wireless sensor network
收藏 引用
3rd international conference on Ubiquitous Intelligence and computing
作者: Nyang, DaeHun Mohaisen, Abedelaziz Inha Univ Informat Secur Res Lab Informat Technol & Telecommun Grad Sch Inchon 402751 South Korea
Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC... 详细信息
来源: 评论
In-network outlier detection in wireless sensor networks
In-network outlier detection in wireless sensor networks
收藏 引用
26th ieee Internationa26th ieee international conference on distributed computing systems, ICDCS 2006
作者: Branch, Joel Szymanski, Boleslaw Giannella, Chris Wolff, Ran Kargupta, Hillol Computer Science Rensselaer Polytechnic Institute 110 8th Street Troy NY 12180 Computer Science and Electrical Engineering University of Maryland Baltimore County 1000 Hilltop Circle Baltimore MD 21250
To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an algorithm that (1) is flexible with respect to the outlier definition, (2) works in-network with a communication load... 详细信息
来源: 评论
Enabling self-managing applications using model-based online control strategies
Enabling self-managing applications using model-based online...
收藏 引用
3rd international conference on Autonomic computing, ICAC 2006
作者: Bhat, Viraj Parashar, Manish Liu, Hua Khandekar, Mohit Kandasamy, Nagarajan Abdelwahed, Sherif TASSL Department of Electrical and Computer Engineering Rutgers University Piscataway NJ 08854 Xerox Innovation Group Mailstop 128-30E 800 Phillips Rd. Webster NY 14580 Electrical and Computer Engineering Department Drexel University Philadelphia PA 19104 Institute for Software Integrated Systems 2015 Terrace Place Nashville TN 37235
The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (distributed computing Environment) systems imply that an application must be able to detect and adapt to changes in its state, its requirements,... 详细信息
来源: 评论
Secure group communication in wireless sensor networks
Secure group communication in wireless sensor networks
收藏 引用
1st international Symposium on Wireless Pervasive computing
作者: Ghosh, Subhas K. Patro, Ranjeet K. Raina, Manik Thejaswi, Chandrasekhara Ganapathy, Viswanath Honeywell Technol Solut Lab 151-1 DoraisanipalyaBannerghatta Rd Bangalore 560076 Karnataka India
In this paper we address the issues of forming secure multicast group within wireless sensor networks. We describe a protocol that establishes a secure multicast group, and distributes a group key by mutually authenti... 详细信息
来源: 评论