咨询与建议

限定检索结果

文献类型

  • 5,067 篇 会议
  • 41 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,113 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,129 篇 工学
    • 3,182 篇 计算机科学与技术...
    • 1,609 篇 电气工程
    • 1,553 篇 信息与通信工程
    • 1,282 篇 软件工程
    • 555 篇 控制科学与工程
    • 344 篇 动力工程及工程热...
    • 264 篇 仪器科学与技术
    • 249 篇 电子科学与技术(可...
    • 201 篇 机械工程
    • 112 篇 测绘科学与技术
    • 111 篇 安全科学与工程
    • 106 篇 网络空间安全
    • 103 篇 石油与天然气工程
    • 93 篇 交通运输工程
    • 77 篇 生物工程
    • 76 篇 环境科学与工程(可...
    • 76 篇 生物医学工程(可授...
    • 71 篇 材料科学与工程(可...
    • 65 篇 化学工程与技术
  • 829 篇 理学
    • 443 篇 数学
    • 204 篇 物理学
    • 124 篇 化学
    • 123 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 98 篇 生物学
  • 572 篇 管理学
    • 440 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 64 篇 经济学
  • 52 篇 法学
  • 40 篇 农学
  • 25 篇 军事学
  • 14 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 620 篇 wireless sensor ...
  • 168 篇 sensor nodes
  • 140 篇 sensor systems
  • 138 篇 distributed comp...
  • 122 篇 wireless sensor ...
  • 98 篇 sensor networks
  • 93 篇 distributed powe...
  • 92 篇 internet of thin...
  • 85 篇 monitoring
  • 82 篇 cloud computing
  • 82 篇 distributed comp...
  • 81 篇 energy efficienc...
  • 74 篇 sensors
  • 72 篇 computer network...
  • 68 篇 protocols
  • 65 篇 routing
  • 63 篇 security
  • 59 篇 wireless communi...
  • 59 篇 real-time system...
  • 58 篇 computer archite...

机构

  • 12 篇 maharishi school...
  • 12 篇 jiangsu high tec...
  • 12 篇 ieee
  • 10 篇 college of elect...
  • 9 篇 chitkara univers...
  • 9 篇 chitkara univers...
  • 8 篇 karnataka bangal...
  • 8 篇 henan univ inst ...
  • 8 篇 payame noor univ...
  • 8 篇 wuhan univ sch c...
  • 7 篇 beijing univ pos...
  • 7 篇 tu wien distribu...
  • 6 篇 dalian univ tech...
  • 6 篇 college of techn...
  • 6 篇 shanghai jiao to...
  • 6 篇 centre for inter...
  • 6 篇 univ pittsburgh ...
  • 6 篇 indian sch mines...
  • 6 篇 centre for cyber...
  • 6 篇 chinese acad sci...

作者

  • 14 篇 han zhijie
  • 10 篇 dustdar schahram
  • 10 篇 china
  • 10 篇 zhang wei
  • 9 篇 barolli leonard
  • 8 篇 wang lei
  • 8 篇 liu xue
  • 7 篇 liu yang
  • 6 篇 stankovic john a...
  • 6 篇 xhafa fatos
  • 6 篇 zakaria a.
  • 6 篇 lin chi
  • 6 篇 li wei
  • 6 篇 abdelzaher tarek
  • 6 篇 mukherjee nandin...
  • 6 篇 li hui
  • 5 篇 sarigiannidis pa...
  • 5 篇 yang yang
  • 5 篇 shakaff a.y.m.
  • 5 篇 prasad ramjee

语言

  • 4,747 篇 英文
  • 359 篇 其他
  • 9 篇 中文
检索条件"任意字段=3rd IEEE International Conference on Distributed Computing in Sensor Systems"
5113 条 记 录,以下是4431-4440 订阅
排序:
Optimisation problems based on the maximal breach path measure for wireless sensor network coverage  1
收藏 引用
3rd international conference on distributed computing and Internet Technology, ICDCIT 2006
作者: Gupta, Anirvan Dutta Bishnu, Arijit Sengupta, Indranil Department of Computer Science and Engineering Indian Institute of Technology Kharagpur721302 India
Coverage is a central issue in the design of wireless sensor networks. There are many measures for coverage, based on what aspect of surveillance quality we wish to address. Designing a network that achieves desired s... 详细信息
来源: 评论
distributed job scheduling based on multiple constraints anycast routing
Distributed job scheduling based on multiple constraints any...
收藏 引用
3rd international conference on Broadband Communications Networks and systems
作者: Stevens, Tim De Leenheer, Marc De Turck, Filip Dhoedt, Bart Demeester, Piet Univ Ghent IMEC IBBT Dept Informat Technol Gaston Crommenlaan 8 Bus 201 B-9050 Ghent Belgium
As the popularity of resource-constrained devices such as hand-held computers increases, a new network service offloading complex processing tasks towards computational resources located in the access- or core network... 详细信息
来源: 评论
A privacy preserving mining algorithm on distributed dataset
收藏 引用
3rd international conference on Fuzzy systems and Knowledge Discovery
作者: Shen Hui-zhang Zhao Ji-di Yang Zhong-zhi Shanghai Jiao Tong Univ Aetna Sch Management Shanghai 200052 Peoples R China
The issue of maintaining privacy in data mining has attracted considerable attention over the last few years. The difficulty lies in the fact that the two metrics for evaluating privacy preserving data mining methods:... 详细信息
来源: 评论
An energy efficient 3-dimensional wireless sensor cover
An energy efficient 3-dimensional wireless sensor cover
收藏 引用
Consumer Communications and Networking conference, CCNC ieee
作者: M.K. Watfa S. Commuri Department of Electrical and Computer Engineering University of Oklahama USA
来源: 评论
GIST: Group-independent spanning tree for data aggregation in dense sensor networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Jia, Lujun Noubir, Guevara Rajaraman, Rajmohan Sundaram, Ravi Northeastern Univ Coll Comp & Informat Sci Boston MA 02115 USA
Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions of optimal, i.e. under different cost metrics). ... 详细信息
来源: 评论
Utilizing secure three hop links to agree pairwise keys in wireless sensor networks
收藏 引用
3rd international conference on Ubiquitous Intelligence and computing
作者: Wang, Gicheol Park, Dongsun Chonbuk Natl Univ CAIIT Jeonju 561756 South Korea Chonbu Natl Univ Div Elect & Informat Engn Jeonbuk 561756 South Korea
Because sensor networks consist of devices with weak physical security, they are likely to be compromised by an attacker. So, it is very important to establish a pairwise key securely between the communicating nodes. ... 详细信息
来源: 评论
Bottleneck around base station in wireless sensor network and its solution
Bottleneck around base station in wireless sensor network an...
收藏 引用
3rd Annual international conference on Mobile and Ubiquitous System - Networking and Services
作者: Padmanabh, Kumar Roy, Rajarshi Indian Inst Technol Kharagpur 721302 West Bengal India
The sensor nodes in a network are connected to the outer world via a base station. Base stations (BS) have some back up power and it is not suppose to fail due to shortage of battery power. The nodes which are away fr... 详细信息
来源: 评论
A group based reputation system for P2P networks
A group based reputation system for P2P networks
收藏 引用
3rd international conference on Autonomic and Trusted computing
作者: Tian, Huirong Zou, Shihong Wang, Wendong Cheng, Shiduan Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100088 Peoples R China
In large scale P2P networks, it is less likely that repeat interactions will occur between same peers for the asymmetric interests between them. So it is difficult to establish the direct trust relationship between pe... 详细信息
来源: 评论
Application-centric networking framework for wireless sensor nodes
Application-centric networking framework for wireless sensor...
收藏 引用
3rd Annual international conference on Mobile and Ubiquitous System - Networking and Services
作者: Choi, Sukwon Cha, Hojung Yonsei Univ Dept Comp Sci Seoul 120749 South Korea
Wireless sensor network technology has found diverse applications in numerous fields. As the networking technology is refined in many ways, the need for system modulation with effective performance becomes essential. ... 详细信息
来源: 评论
SenCar: An energy efficient data gathering mechanism for large scale multihop sensor networks
收藏 引用
2nd ieee international conference on distributed computing in sensor systems
作者: Ma, Ming Yang, Yuanyuan SUNY Stony Brook Dept Elect & Comp Engn Stony Brook NY 11794 USA
In this paper, we propose a new data gathering mechanism for large scale multihop sensor networks. A mobile data observer, called SenCar, which could be a mobile robot or a vehicle equipped with a powerful transceiver... 详细信息
来源: 评论