咨询与建议

限定检索结果

文献类型

  • 1,412 篇 会议
  • 21 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 931 篇 工学
    • 600 篇 计算机科学与技术...
    • 430 篇 信息与通信工程
    • 313 篇 软件工程
    • 303 篇 电气工程
    • 113 篇 控制科学与工程
    • 103 篇 测绘科学与技术
    • 71 篇 仪器科学与技术
    • 69 篇 机械工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 动力工程及工程热...
    • 29 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 17 篇 化学工程与技术
    • 16 篇 光学工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 建筑学
    • 14 篇 农业工程
    • 13 篇 土木工程
    • 13 篇 环境科学与工程(可...
  • 203 篇 理学
    • 114 篇 数学
    • 57 篇 物理学
    • 37 篇 统计学(可授理学、...
    • 31 篇 生物学
    • 22 篇 化学
    • 16 篇 系统科学
  • 117 篇 管理学
    • 72 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 36 篇 医学
    • 32 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 14 篇 农学
  • 9 篇 经济学
  • 4 篇 法学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 351 篇 wireless sensor ...
  • 85 篇 neural networks
  • 75 篇 sensor networks
  • 64 篇 monitoring
  • 61 篇 wireless communi...
  • 52 篇 sensor nodes
  • 48 篇 computer network...
  • 47 篇 sensor systems
  • 45 篇 information proc...
  • 43 篇 energy consumpti...
  • 43 篇 sensor phenomena...
  • 40 篇 signal processin...
  • 36 篇 routing
  • 36 篇 protocols
  • 36 篇 energy efficienc...
  • 30 篇 intelligent sens...
  • 29 篇 costs
  • 27 篇 artificial neura...
  • 27 篇 sensors
  • 26 篇 robustness

机构

  • 10 篇 pengcheng labora...
  • 10 篇 shenzhen interna...
  • 10 篇 risc-v internati...
  • 6 篇 school of inform...
  • 5 篇 national enginee...
  • 4 篇 department of el...
  • 3 篇 university of sc...
  • 3 篇 school of comput...
  • 3 篇 college of infor...
  • 3 篇 department of co...
  • 3 篇 australian insti...
  • 3 篇 department of el...
  • 3 篇 wearable computi...
  • 3 篇 national univers...
  • 3 篇 univ windsor sch...
  • 3 篇 univ melbourne d...
  • 3 篇 school of engine...
  • 3 篇 autonomous syste...
  • 3 篇 university of ne...
  • 3 篇 department of el...

作者

  • 10 篇 xinlei chen
  • 4 篇 pubudu n. pathir...
  • 4 篇 el-marakby randa
  • 4 篇 wendong xiao
  • 4 篇 tong xinglin
  • 4 篇 jiannong cao
  • 3 篇 loke seng wai
  • 3 篇 yan zhuo
  • 3 篇 soman k. p.
  • 3 篇 vinayakumar r.
  • 3 篇 stuart kininmont...
  • 3 篇 vetterli m
  • 3 篇 chen-khong tham
  • 3 篇 poornachandran p...
  • 3 篇 xuzhe wang
  • 3 篇 zhang xinman
  • 3 篇 gianluigi ferrar...
  • 3 篇 kininmonth stuar...
  • 3 篇 krishnaswamy sho...
  • 3 篇 tham chen-khong

语言

  • 1,411 篇 英文
  • 23 篇 中文
  • 13 篇 其他
  • 3 篇 土耳其文
检索条件"任意字段=3rd International Symposium on Information Processing in Sensor Networks"
1449 条 记 录,以下是441-450 订阅
排序:
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless sensor networks  3rd
Cryptanalysis and Improvement of ECC - Based Security Enhanc...
收藏 引用
3rd international symposium on Security in Computing and Communications (SSCC)
作者: Maurya, Anup Kumar Sastry, V. N. Udgata, Siba Kumar Inst Dev & Res Banking Technol Hyderabad Andhra Pradesh India Univ Hyderabad Hyderabad 500134 Andhra Pradesh India
User authentication and secret session key exchange between a user and a sensor node are important security requirements of wireless sensor networks for retrieving the important, confidential and real time information... 详细信息
来源: 评论
Energy Aware Diffusion in Wireless sensor networks  3
Energy Aware Diffusion in Wireless Sensor Networks
收藏 引用
3rd international Conference on Image information processing (ICIIP)
作者: Kishtwal, Ashok Gupta, Abhishek Baddi Univ Emerging Sci & Technol Dept Comp Sci & Engn Solan Himachal Prades India Jaypee Univ Infonnat Technol Solan Himachal Prades India
Wireless sensor Network is a network of hundreds or thousands of sensor Nodes. These Nodes communicate with each other with short range radio signals. These nodes are small in size and have very limited battery power.... 详细信息
来源: 评论
Comparison of Energy Efficient Data Collection Techniques in Wireless sensor Network  3
Comparison of Energy Efficient Data Collection Techniques in...
收藏 引用
3rd international Conference on Recent Trends in Computing (ICRTC)
作者: Rohankar, Rupali Katti, C. P. Kumar, Sushil Jawaharlal Nehru Univ Delhi India
Application of wireless devices is increasing day-by-day in all areas of human life throughout the world. Most of these devices are based on tiny sensors that collect information from surrounding environment automatic... 详细信息
来源: 评论
On the Security of Wireless sensor networks via Compressive Sensing  3rd
On the Security of Wireless Sensor Networks via Compressive ...
收藏 引用
3rd international Conference on Communications, Signal processing, and Systems (CSPS)
作者: Wu, Ji Liang, Qilian Zhang, Baoju Wu, Xiaorong Univ Texas Arlington Elect Engn Arlington TX 76019 USA Tianjin Normal Univ Coll Phys & Elect Informat Tianjin 300387 Peoples R China
Due to energy limitation of sensor nodes, the conventional security algorithms with high computation complexity are not suitable for wireless sensor networks (WSNs). We propose a compressive sensing-based encryption f... 详细信息
来源: 评论
Proceedings of 2015 3rd international Conference on Image information processing, ICIIP 2015
Proceedings of 2015 3rd International Conference on Image In...
收藏 引用
3rd international Conference on Image information processing, ICIIP 2015
The proceedings contain 105 papers. The topics discussed include: image enhancement using combined ICA and PCA based filtering in HSV domain;a new hand gesture recognition scheme for similarity measurement in a vision...
来源: 评论
Secure Cluster Based Routing Scheme (SCBRS) for Wireless sensor networks  3rd
Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sen...
收藏 引用
3rd international symposium on Security in Computing and Communications (SSCC)
作者: Roy, Sohini Indian Inst Engn Sci & Technol IIEST Shibpur Howrah India
Wireless sensor network consists of micro electromechanical sensor nodes which are operated by battery power. sensor network has emerged as an important supplement to the modern wireless communication systems due to i... 详细信息
来源: 评论
Design of robust, protograph based LDPC codes for rate-adaptation via probabilistic shaping
Design of robust, protograph based LDPC codes for rate-adapt...
收藏 引用
international symposium on Turbo Codes and Related Topics
作者: Fabian Steiner Patrick Schulte Fachgebiet Methoden der Signalverarbeitung Technical University of Munich Institute for Communications Engineering Technical University of Munich
In this work, the design of robust, protograph-based low-density parity-check (LDPC) codes for rate-adaptive communication via probabilistic shaping is considered. Recently, probabilistic amplitude shaping (PAS) by B&... 详细信息
来源: 评论
An Approach Toward the Optimization of Witness Based Node Clone Attack  3
An Approach Toward the Optimization of Witness Based Node Cl...
收藏 引用
3rd international Conference on Image information processing (ICIIP)
作者: Mishra, Balmukund Singh, Yashwant PIET Dept CSE Panipat Smalkha Haryana India Jaypee Univ Informat Technol Dept CSE & IT Solan HP India
In this paper we have analyzed the distributed node clone detection techniques in wireless sensor networks. Although there are many protocols in literature proposed for node clone detection, but we have discussed some... 详细信息
来源: 评论
On Optimality of Myopic Policy in Multi-channel Opportunistic Access
On Optimality of Myopic Policy in Multi-channel Opportunisti...
收藏 引用
Ad-Hoc and sensor networks symposium
作者: Kehao Wang Lin Chen Jihong Yu Key Lab of Fiber Optic Sensing Tech. & Information Processing Wuhan University of Technology Universite de Paris-Sud
We consider the channel access problem arising in opportunistic scheduling over fading channels, cognitive radio networks, and server scheduling. The multi-channel communication system consists of N channels. Each cha... 详细信息
来源: 评论
Radio Resource Allocation for D2D-Enabled Massive Machine Communication in the 5G Era
Radio Resource Allocation for D2D-Enabled Massive Machine Co...
收藏 引用
IEEE international symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Huitao Yang Boon-Chong Seet Syed Faraz Hasan Peter Han Joo Chong Min Young Chung Department of Electrical and Electronic Engineering Auckland University of Technology Auckland New Zealand School of Engineering & Advanced Technology Massey University Palmerston North New Zealand School of Information and Communication Engineering Sungkyunkwan University Suwon Republic of Korea
Device-to-Device (D2D) and Massive Machine Communication (MMC) are believed to be the cornerstones of future 5th generation (5G) cellular technologies. As a method to increase spectrum utilization, extend cellular cov... 详细信息
来源: 评论