咨询与建议

限定检索结果

文献类型

  • 5,067 篇 会议
  • 45 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,117 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,134 篇 工学
    • 3,184 篇 计算机科学与技术...
    • 1,613 篇 电气工程
    • 1,553 篇 信息与通信工程
    • 1,282 篇 软件工程
    • 556 篇 控制科学与工程
    • 345 篇 动力工程及工程热...
    • 265 篇 仪器科学与技术
    • 251 篇 电子科学与技术(可...
    • 201 篇 机械工程
    • 112 篇 测绘科学与技术
    • 111 篇 安全科学与工程
    • 106 篇 网络空间安全
    • 104 篇 石油与天然气工程
    • 93 篇 交通运输工程
    • 77 篇 环境科学与工程(可...
    • 77 篇 生物工程
    • 76 篇 生物医学工程(可授...
    • 74 篇 材料科学与工程(可...
    • 65 篇 化学工程与技术
  • 832 篇 理学
    • 442 篇 数学
    • 207 篇 物理学
    • 125 篇 化学
    • 123 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 99 篇 生物学
  • 574 篇 管理学
    • 442 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 64 篇 经济学
  • 52 篇 法学
  • 40 篇 农学
  • 25 篇 军事学
  • 14 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 620 篇 wireless sensor ...
  • 168 篇 sensor nodes
  • 140 篇 sensor systems
  • 138 篇 distributed comp...
  • 122 篇 wireless sensor ...
  • 95 篇 sensor networks
  • 93 篇 distributed powe...
  • 92 篇 internet of thin...
  • 87 篇 energy efficienc...
  • 85 篇 monitoring
  • 81 篇 cloud computing
  • 81 篇 distributed comp...
  • 72 篇 computer network...
  • 71 篇 sensors
  • 68 篇 protocols
  • 65 篇 routing
  • 63 篇 security
  • 59 篇 wireless communi...
  • 59 篇 real-time system...
  • 58 篇 computer archite...

机构

  • 12 篇 maharishi school...
  • 12 篇 jiangsu high tec...
  • 12 篇 ieee
  • 10 篇 college of elect...
  • 9 篇 chitkara univers...
  • 9 篇 chitkara univers...
  • 8 篇 karnataka bangal...
  • 8 篇 henan univ inst ...
  • 8 篇 payame noor univ...
  • 8 篇 wuhan univ sch c...
  • 7 篇 beijing univ pos...
  • 7 篇 tu wien distribu...
  • 6 篇 dalian univ tech...
  • 6 篇 college of techn...
  • 6 篇 shanghai jiao to...
  • 6 篇 centre for inter...
  • 6 篇 univ pittsburgh ...
  • 6 篇 indian sch mines...
  • 6 篇 centre for cyber...
  • 6 篇 chinese acad sci...

作者

  • 14 篇 han zhijie
  • 10 篇 dustdar schahram
  • 10 篇 china
  • 10 篇 zhang wei
  • 9 篇 barolli leonard
  • 8 篇 wang lei
  • 8 篇 liu xue
  • 7 篇 liu yang
  • 6 篇 stankovic john a...
  • 6 篇 xhafa fatos
  • 6 篇 zakaria a.
  • 6 篇 lin chi
  • 6 篇 li wei
  • 6 篇 abdelzaher tarek
  • 6 篇 mukherjee nandin...
  • 6 篇 li hui
  • 5 篇 sarigiannidis pa...
  • 5 篇 yang yang
  • 5 篇 shakaff a.y.m.
  • 5 篇 prasad ramjee

语言

  • 4,968 篇 英文
  • 142 篇 其他
  • 7 篇 中文
检索条件"任意字段=3rd IEEE International Conference on Distributed Computing in Sensor Systems"
5117 条 记 录,以下是4371-4380 订阅
排序:
Y-Threads: Supporting concurrency in wireless sensor networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Nitta, Christopher Pandey, Raju Ramin, Yann Univ Calif Davis Dept Comp Sci Davis CA 95616 USA
Resource constrained systems often are programmed using an event-based model. Many applications do not lend themselves well to an event-based approach, but preemptive multithreading pre-allocates resources that cannot... 详细信息
来源: 评论
Learning sensor data characteristics in unknown environments.
Learning sensor data characteristics in unknown environments...
收藏 引用
3rd Annual international conference on Mobile and Ubiquitous System - Networking and Services
作者: Bokareva, Tatiana Bulusu, Nirupama Jha, Sanjay Univ New South Wales Kensington NSW 2033 Australia Portland State Univ Portland OR 97207 USA
Ad hoc Wireless sensor Networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations [3]. As we begin to deploy sensor networks in real world applic... 详细信息
来源: 评论
Securing sensor networks using a novel multi-channel architecture
Securing sensor networks using a novel multi-channel archite...
收藏 引用
3rd international conference on Broadband Communications Networks and systems
作者: Gui, Chao Gupta, Ashima Mohapatra, Prasant Univ Calif Davis Dept Comp Sci Davis CA 95616 USA
In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secret keys[5], [6], [10], authenticate all co... 详细信息
来源: 评论
distributed user access control in sensor networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Wang, Haodong Li, Qun Coll William & Mary Dept Comp Sci Williamsburg VA 23187 USA
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide u... 详细信息
来源: 评论
Energy-aware Improved Directed Diffusion algorithm for area event monitoring in wireless sensor network  3rd
收藏 引用
3rd international conference on distributed computing and Internet Technology
作者: Guo, Bin Li, Zhe Li, Dan Northeastern Univ Inst Telecommun & Informat Syst Coll Informat Sci & Engn Shenyang 110004 Peoples R China
In this paper, we devise and evaluate an Energy-aware Improved Directed Diffusion (EIDD) algorithm for area event monitoring in wireless sensor network. Through Diffusion of different type interest, a gathering node i... 详细信息
来源: 评论
COTA: A robust multi-hop localization scheme in wireless sensor networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Wei, Yawen Yu, Zhen Guan, Yong Iowa State Univ Dept Elect & Comp Engn Ames IA 50011 USA
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a robust multi-hop localization scheme, na... 详细信息
来源: 评论
MobiRoute:: Routing towards a mobile sink for improving lifetime in sensor networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Luo, Jun Panchard, Jacques Piorkowski, Michal Grossglauser, Matthias Hubaux, Jean-Pierre Ecole Polytech Fed Lausanne Sch Comp & Commun Sci CH-1015 Lausanne Switzerland
Improving network lifetime is a fundamental challenge of wireless sensor networks. One possible solution consists in making use of mobile sinks. Whereas theoretical analysis shows that this approach does indeed benefi... 详细信息
来源: 评论
Opportunistic packet scheduling over ieee 802.11 WLAN
收藏 引用
3rd international conference on Ubiquitous Intelligence and computing
作者: Kim, Sung Won Yeungnam Univ Sch Elect Engn & Comp Sci Gyeongsangbuk Do 712749 South Korea
This paper introduces an opportunistic packet scheduling method and medium access control (MAC) scheme for controlling the throughput in wireless local area networks (WLANs). The proposed method takes advantage of the... 详细信息
来源: 评论
A multipath routing algorithm for wireless sensor networks
收藏 引用
3rd international conference on Ubiquitous Intelligence and computing
作者: Shi, Jinglun Jinan Univ Dept Elect Engn Guangzhou Peoples R China Seoul Natl Univ Sch Comp Engn Seoul South Korea
Wireless sensor Network (WSN) is expected to have a significant impact on the efficiency of military and civil applications such as target field imaging, intrusion detection, weather monitoring. sensors with low cost,... 详细信息
来源: 评论
Agimone: Middleware support for seamless integration of sensor and IP networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Hackmann, Gregory Fok, Chien-Liang Roman, Gruia-Catalin Lu, Chenyang Washington Univ Dept Comp Sci & Engn St Louis MO 63130 USA
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like the Internet offer tremendous connecti... 详细信息
来源: 评论