咨询与建议

限定检索结果

文献类型

  • 5,068 篇 会议
  • 45 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,118 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,135 篇 工学
    • 3,185 篇 计算机科学与技术...
    • 1,613 篇 电气工程
    • 1,553 篇 信息与通信工程
    • 1,283 篇 软件工程
    • 557 篇 控制科学与工程
    • 346 篇 动力工程及工程热...
    • 266 篇 仪器科学与技术
    • 251 篇 电子科学与技术(可...
    • 202 篇 机械工程
    • 112 篇 测绘科学与技术
    • 111 篇 安全科学与工程
    • 106 篇 网络空间安全
    • 105 篇 石油与天然气工程
    • 93 篇 交通运输工程
    • 77 篇 环境科学与工程(可...
    • 77 篇 生物工程
    • 76 篇 生物医学工程(可授...
    • 74 篇 材料科学与工程(可...
    • 66 篇 化学工程与技术
  • 833 篇 理学
    • 442 篇 数学
    • 208 篇 物理学
    • 126 篇 化学
    • 123 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 99 篇 生物学
  • 574 篇 管理学
    • 442 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 64 篇 经济学
  • 52 篇 法学
  • 40 篇 农学
  • 25 篇 军事学
  • 14 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 620 篇 wireless sensor ...
  • 168 篇 sensor nodes
  • 140 篇 sensor systems
  • 138 篇 distributed comp...
  • 122 篇 wireless sensor ...
  • 95 篇 sensor networks
  • 93 篇 distributed powe...
  • 92 篇 internet of thin...
  • 87 篇 energy efficienc...
  • 85 篇 monitoring
  • 81 篇 cloud computing
  • 81 篇 distributed comp...
  • 72 篇 computer network...
  • 71 篇 sensors
  • 68 篇 protocols
  • 65 篇 routing
  • 63 篇 security
  • 59 篇 wireless communi...
  • 59 篇 real-time system...
  • 58 篇 computer archite...

机构

  • 12 篇 maharishi school...
  • 12 篇 jiangsu high tec...
  • 12 篇 ieee
  • 10 篇 college of elect...
  • 9 篇 chitkara univers...
  • 9 篇 chitkara univers...
  • 8 篇 karnataka bangal...
  • 8 篇 henan univ inst ...
  • 8 篇 payame noor univ...
  • 8 篇 wuhan univ sch c...
  • 7 篇 beijing univ pos...
  • 7 篇 tu wien distribu...
  • 6 篇 dalian univ tech...
  • 6 篇 college of techn...
  • 6 篇 shanghai jiao to...
  • 6 篇 centre for inter...
  • 6 篇 univ pittsburgh ...
  • 6 篇 indian sch mines...
  • 6 篇 centre for cyber...
  • 6 篇 chinese acad sci...

作者

  • 14 篇 han zhijie
  • 10 篇 dustdar schahram
  • 10 篇 china
  • 10 篇 zhang wei
  • 9 篇 barolli leonard
  • 8 篇 wang lei
  • 8 篇 liu xue
  • 7 篇 liu yang
  • 6 篇 stankovic john a...
  • 6 篇 xhafa fatos
  • 6 篇 zakaria a.
  • 6 篇 lin chi
  • 6 篇 li wei
  • 6 篇 abdelzaher tarek
  • 6 篇 mukherjee nandin...
  • 6 篇 li hui
  • 5 篇 sarigiannidis pa...
  • 5 篇 yang yang
  • 5 篇 shakaff a.y.m.
  • 5 篇 prasad ramjee

语言

  • 4,969 篇 英文
  • 142 篇 其他
  • 7 篇 中文
检索条件"任意字段=3rd IEEE International Conference on Distributed Computing in Sensor Systems"
5118 条 记 录,以下是4541-4550 订阅
排序:
3rd Acs/ieee international conference on Computer System and Application: 2005 Proceeding
3rd Acs/IEEE International Conference on Computer System and...
收藏 引用
3rd ACS/ieee international conference on Computer systems and Applications, 2005
The proceedings contain 163 papers. The topics discussed include: a dynamic resource scheduling scheme for CDMA2000 systems;maximum lifetime broadcasting in wireless networks;consistent graph layout for weighted graph... 详细信息
来源: 评论
A metamodel approach to context information
A metamodel approach to context information
收藏 引用
3rd ieee international conference on Pervasive computing and Communications
作者: Fuchs, F Hochstatter, I Krause, M Berger, M Univ Munich Mobile & Distributed Syst Grp Inst Informat D-80538 Munich Germany
In order to enable a common understanding of context information we introduce a modeling concept that embraces four abstraction layers from meta-metamodel and metamodel to model and instance layer Being compliant to O... 详细信息
来源: 评论
Efficient Partition of State Space for Parallel Reachability Analysis
Efficient Partition of State Space for Parallel Reachability...
收藏 引用
3rd ieee/ACS international conference on Computer systems and Applications (AICCSA-05)
作者: Bourahla, Mustapha Benmohamed, Mohamed Univ Biskra Dept Comp Sci Biskra 07000 Algeria
As the model-checking (which is based on reachability analysis) becomes increasingly used in the industry, there is a big need for efficient new methods to deal with the large real-size designs. This paper presents a ... 详细信息
来源: 评论
Update Propagation Based on Tree Structure in Peer-to-Peer Networks
Update Propagation Based on Tree Structure in Peer-to-Peer N...
收藏 引用
3rd ieee/ACS international conference on Computer systems and Applications (AICCSA-05)
作者: Hara, Takahiro Nakadori, Minoru Uchida, Wataru Maeda, Kazuhiko Nishio, Shojiro Osaka Univ Dept Multimedia Eng Grad Sch Informat Sci & Technol Suita Osaka 565 Japan
Recently, there has been increasing interest in research of data sharing in peer-to-peer networks. In this paper, we propose a new update propagation strategy that achieves not only load balancing but also delay reduc... 详细信息
来源: 评论
Wireless ad-hoc control networks
Wireless ad-hoc control networks
收藏 引用
3rd ieee international conference on Industrial Informatics (INDIN)
作者: Bu, SR Naghdy, F Univ Wollongong Sch Elect Comp & Telecommun Engn Wollongong NSW 2522 Australia
A new concept called Wireless ad-hoc Control Networks (WACNets), designed for distributed and remote monitoring and control is suggested in this work. Such systems represent the next stage in the evolution of distribu... 详细信息
来源: 评论
Proceedings of the 3rd international Workshop on Middleware for Pervasive and Ad-Hoc computing, MPAC'05, Held at the ACM/IFIP/USENIX international Middleware conference
Proceedings of the 3rd International Workshop on Middleware ...
收藏 引用
3rd international Workshop on Middleware for Pervasive and Ad-Hoc computing, MPAC'05, Held at the ACM/IFIP/USENIX international Middleware conference
The proceedings contain 18 papers. The topics discussed include: quality-constrained routing in publish/subscribe systems;an aspect-oriented ambient intelligence middleware platform;managing the follow-me semantics to...
来源: 评论
Proactive Control of distributed Denial of Service Attacks with Source Router Preferential Dropping
Proactive Control of Distributed Denial of Service Attacks w...
收藏 引用
3rd ieee/ACS international conference on Computer systems and Applications (AICCSA-05)
作者: Fan, Yinghong Hassanein, Hossam Martin, Patrick Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
A distributed Denial of Service (DDoS) attack is an explicit attempt to interrupt an online service by generating a high volume of malicious traffic. These attacks consume all available network resources, thus renderi... 详细信息
来源: 评论
Selection and navigation of mobile sensor nodes using a sensor network
Selection and navigation of mobile sensor nodes using a sens...
收藏 引用
3rd ieee international conference on Pervasive computing and Communications
作者: Verma, A Sawant, H Tan, JD Michigan Technol Univ Dept Elect & Comp Engn Houghton MI 49931 USA
Hybrid sensor networks comprise of mobile and static sensor nodes setup for the purpose of collaboratively performing tasks like sensing a phenomenon or monitoring a region. In this paper we present a novel approach f... 详细信息
来源: 评论
3rd international ieee Northeast Workshop on Circuits and System conference, NEWCAS 2005
3rd International IEEE Northeast Workshop on Circuits and Sy...
收藏 引用
3rd international ieee Northeast Workshop on Circuits and systems conference, NEWCAS 2005
The proceedings contain 101 papers. The topics discussed include: state assignment for low-leakage finite state machines;a low-voltage low-noise CMOS instrumentation amplifier for portable medical monitoring systems;i... 详细信息
来源: 评论
Probability based dynamic load-balancing tree algorithm for wireless sensor networks
收藏 引用
3rd international conference on Computer Networks and Mobile computing (ICCNMC 2005)
作者: Yan, TX Bi, YZ Sun, LM Zhu, HS Chinese Acad Sci Inst Software Beijing 100080 Peoples R China
Load balance can reduce hot spots, maintain network connectivity and prolong lifetime of wireless sensor networks. In large scale and randomly deployed wireless sensor networks, the energy consumption is sharply uneve... 详细信息
来源: 评论