咨询与建议

限定检索结果

文献类型

  • 198 篇 会议
  • 10 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 121 篇 工学
    • 81 篇 计算机科学与技术...
    • 80 篇 软件工程
    • 43 篇 信息与通信工程
    • 29 篇 电气工程
    • 18 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 建筑学
    • 4 篇 化学工程与技术
    • 3 篇 环境科学与工程(可...
    • 3 篇 安全科学与工程
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 城乡规划学
    • 2 篇 网络空间安全
  • 22 篇 理学
    • 7 篇 数学
    • 5 篇 系统科学
    • 3 篇 物理学
    • 3 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 15 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 5 篇 教育学
    • 5 篇 教育学
  • 5 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学

主题

  • 45 篇 middleware
  • 13 篇 protocols
  • 12 篇 application soft...
  • 10 篇 wireless sensor ...
  • 9 篇 quality of servi...
  • 9 篇 communication sy...
  • 8 篇 operating system...
  • 8 篇 communication sy...
  • 8 篇 computer archite...
  • 8 篇 software enginee...
  • 7 篇 real time system...
  • 7 篇 wireless communi...
  • 7 篇 bandwidth
  • 7 篇 monitoring
  • 7 篇 mobile communica...
  • 6 篇 sensor systems
  • 6 篇 computer science
  • 6 篇 communication sy...
  • 6 篇 computer network...
  • 6 篇 telecommunicatio...

机构

  • 3 篇 dept. of cs geor...
  • 2 篇 key laboratory o...
  • 2 篇 national laborat...
  • 2 篇 guangxi economic...
  • 2 篇 institute of pro...
  • 2 篇 department of el...
  • 2 篇 univ teknol petr...
  • 2 篇 tianjin institut...
  • 2 篇 university of ed...
  • 2 篇 swiss national s...
  • 2 篇 kyungpook natl u...
  • 2 篇 services computi...
  • 2 篇 cluster and grid...
  • 2 篇 school of softwa...
  • 1 篇 jaypee institute...
  • 1 篇 ist austria klos...
  • 1 篇 rechen- und komm...
  • 1 篇 zhejiang univ de...
  • 1 篇 ciraig - polytec...
  • 1 篇 wuhan university...

作者

  • 4 篇 yi pan
  • 2 篇 jianhua sun
  • 2 篇 peng shaolin
  • 2 篇 odagiri kazuya
  • 2 篇 sadaf alam
  • 2 篇 dean alexander g...
  • 2 篇 ann nowe
  • 2 篇 nah j. w.
  • 2 篇 hassan mohd fadz...
  • 2 篇 kim s. w.
  • 2 篇 nong xiao
  • 2 篇 hai jin
  • 2 篇 w. colitti
  • 2 篇 xiaoyao xie
  • 2 篇 guoqing li
  • 2 篇 yaegashi rihito
  • 2 篇 tadauchi masahar...
  • 2 篇 k. steenhaut
  • 2 篇 park j. t.
  • 2 篇 ibrahim najhan m...

语言

  • 209 篇 英文
  • 1 篇 其他
检索条件"任意字段=3rd International Conference on Communication System Software and Middleware and Workshop"
210 条 记 录,以下是111-120 订阅
排序:
How to use mobile communication in critical infrastructures: A dependability analysis
How to use mobile communication in critical infrastructures:...
收藏 引用
international conference on Computer Safety, Reliability, and Securitym, SAFECOMP 2015 and held 3rd international workshop on Assurance Cases for software-Intensive systems ASSURE 2015, workshop on Dependable Embedded and Cyber-Physical systems and systems-of-systems, DECSoS 2015, 2nd international workshop on the Integration of Safety and Security Engineering, ISSE 2015, workshop on Reliability and Security Aspects for Critical Infrastructure Protection, ReSA4CI 2015, and 4th internationalworkshop on NextGeneration of system Assurance Approaches for Safety-Critical systems SASSUR, 2015
作者: Wäfler, Jonas Heegaard, Poul E. Norwegian University of Science and Technology Trondheim7491 Norway
Critical infrastructures, like the future power grid, rely strongly on a reliable communication infrastructure. Mobile communication seems an attractive candidate, as the entry costs are low and, provided the coverage... 详细信息
来源: 评论
A High Performance Computational Framework for Dynamic Security Assessment under Uncertainty  3
A High Performance Computational Framework for Dynamic Secur...
收藏 引用
3rd IEEE international workshop on Electronic Power Grid (eGrid)
作者: Chen, Yousu Palmer, Bruce Sharma, Poorva Yuan, Yong Mathew, Bibi Huang, Zhenyu Pacific Northwest Natl Lab Elect Infrasture & Bldg Richland WA 99352 USA Pacific Northwest Natl Lab High Performance Comp Richland WA 99352 USA Pacific Northwest Natl Lab Data Architectures Richland WA 99352 USA Pacific Northwest Natl Lab Hydrol Richland WA 99352 USA
Dynamic security assessment (DSA) is a critical function to evaluate power grids' capability to survive the transition caused by a set of disturbances to an acceptable steady-state condition. Its computational bur... 详细信息
来源: 评论
Dependability arguments supported by fuzz-testing
Dependability arguments supported by fuzz-testing
收藏 引用
international conference on Computer Safety, Reliability, and Securitym, SAFECOMP 2015 and held 3rd international workshop on Assurance Cases for software-Intensive systems ASSURE 2015, workshop on Dependable Embedded and Cyber-Physical systems and systems-of-systems, DECSoS 2015, 2nd international workshop on the Integration of Safety and Security Engineering, ISSE 2015, workshop on Reliability and Security Aspects for Critical Infrastructure Protection, ReSA4CI 2015, and 4th internationalworkshop on NextGeneration of system Assurance Approaches for Safety-Critical systems SASSUR, 2015
作者: Becker, Uwe Systems Design Draeger Medical GmbH Moislinger Allee 53-55 Luebeck23542 Germany
Today’s situation in operating theaters is characterized by many different devices from various manufacturers. Missing standards for device intercommunication lead to the fact that inter-device communication in most ... 详细信息
来源: 评论
Using smartphones as continuous receivers in a visible light communication system  3
Using smartphones as continuous receivers in a visible light...
收藏 引用
3rd ACM workshop on Visible Light communication systems, VLCS 2016
作者: Schmid, Stefan Arquint, Linard Gross, Thomas R. Dept. of Computer Science ETH Zurich Switzerland
Visible Light communication (VLC) allows to reuse a lighting infrastructure for communication while its main purpose of illumination can be carried out at the same time. Light sources based on Light Emitting Diodes (L... 详细信息
来源: 评论
Smart middleware for mutual service-network awareness in evolving 3GPP networks network aware applications & application aware networks
Smart middleware for mutual service-network awareness in evo...
收藏 引用
international conference on communication systems software and middleware (COMSWARE)
作者: Sahin Albayrak Muslim Elkotob Ahmet C. Toker DAI Labor Technische Universitat Berlin Berlin Germany
We have designed a smart middleware and are working on implementing and deploying it as a landmark architectural piece run by nodes of the Future Internet. The middleware we propose aims as a main goal at making appli... 详细信息
来源: 评论
3rd international IFIP/GI conference on Trends in Distributed systems, USM 2000
收藏 引用
3rd international IFIP/GI conference on Trends in Distributed systems, USM 2000
The proceedings contain 40 papers. The special focus in this conference is on Electronic Auctions, Trading, Internet-Based Service Markets, Quality of Service and middleware Architectures. The topics include: Distribu...
来源: 评论
One click privacy for online social networks
One click privacy for online social networks
收藏 引用
international conference on Computer Safety, Reliability, and Security, SAFECOMP 2017 and 5th international workshop on Assurance Cases for software-Intensive systems, ASSURE 2017, 12th workshop on Dependable Embedded and Cyber-physical systems and systems-of systems, DECSoS 2017, 6th international workshop on Next Generation of system Assurance Approaches for Safety Critical systems, SASSUR 2017, 3rd international workshop on Technical and Legal Aspects of Data Privacy and Security, TELERISE 2017 and 2nd international workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Hehnle, Philipp Keilbach, Pascal Lee, Hyun-Jin Lejn, Sabrina Steidinger, Daniel Weinbrenner, Marina Langweg, Hanno Department of Computer Science HTWG Konstanz University of Applied Sciences Konstanz Germany Department of Information Security and Communication Technology Faculty of Information Technology and Electrical Engineering NTNU Norwegian University of Science and Technology Gjøvik Norway
We present an approach to reduce the complexity of adjusting privacy preferences for multiple online social networks. To achieve this, we quantify the effect on privacy for choices that users make, and simplify config... 详细信息
来源: 评论
A secure verifiable key agreement protocol for mobile conferencing
A secure verifiable key agreement protocol for mobile confer...
收藏 引用
international conference on communication systems software and middleware (COMSWARE)
作者: Mounita Saha Dipanwita RoyChowdhury Indranil Sengupta Dept. of CSE. IIT Kharagpur India Motorola India Research Labs
A growing application area in wireless communications is mobile teleconference. However, wireless communication are more susceptible to eavesdropping and unauthorized access than the wired communication. It is therefo... 详细信息
来源: 评论
A flexible channel access model for wireless network interface cards
A flexible channel access model for wireless network interfa...
收藏 引用
international conference on communication systems software and middleware (COMSWARE)
作者: Ryad Ben-El-Kezadri Farouk Kamoun CRISTAL ENSI Université de la Manouba Tunisia CRISTAL ENSI Université de la Manouba Mannouba Tunisia
Wireless network interface cards (WNIC) are currently moving from hardwired devices to autonomic software. This paper proposes a new rationale for the design of WNIC that i) takes into account the need to integrate an... 详细信息
来源: 评论
Spectrum-sensing based interference mitigation for WLAN devices
Spectrum-sensing based interference mitigation for WLAN devi...
收藏 引用
international conference on communication systems software and middleware (COMSWARE)
作者: Guoqing Li Srikathyayani Srikanteswara Christian Maciocco Communication Technology Laboratory Intel Corporation USA
The concept of spectrum sensing is, in the broad sense, the ability to detect and interpret other signals in the band and take appropriate actions by implementing adaptive techniques in the upper layers in addition to... 详细信息
来源: 评论