咨询与建议

限定检索结果

文献类型

  • 5,667 篇 会议
  • 35 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 5,709 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,353 篇 计算机科学与技术...
    • 1,742 篇 电气工程
    • 1,628 篇 信息与通信工程
    • 1,220 篇 软件工程
    • 650 篇 控制科学与工程
    • 353 篇 测绘科学与技术
    • 345 篇 动力工程及工程热...
    • 270 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 200 篇 仪器科学与技术
    • 117 篇 石油与天然气工程
    • 107 篇 化学工程与技术
    • 105 篇 安全科学与工程
    • 92 篇 生物工程
    • 81 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 74 篇 交通运输工程
    • 69 篇 生物医学工程(可授...
    • 57 篇 土木工程
    • 56 篇 建筑学
  • 797 篇 理学
    • 403 篇 数学
    • 165 篇 物理学
    • 135 篇 化学
    • 109 篇 生物学
    • 94 篇 系统科学
    • 94 篇 统计学(可授理学、...
  • 560 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 94 篇 医学
    • 84 篇 临床医学
  • 62 篇 法学
  • 58 篇 经济学
  • 39 篇 农学
  • 17 篇 教育学
  • 17 篇 军事学
  • 7 篇 文学
  • 3 篇 艺术学

主题

  • 1,056 篇 wireless sensor ...
  • 177 篇 sensor systems
  • 164 篇 sensor nodes
  • 157 篇 wireless sensor ...
  • 157 篇 distributed comp...
  • 152 篇 wireless communi...
  • 150 篇 sensors
  • 144 篇 monitoring
  • 143 篇 sensor networks
  • 126 篇 cloud computing
  • 117 篇 protocols
  • 116 篇 internet of thin...
  • 114 篇 routing
  • 108 篇 distributed comp...
  • 106 篇 energy efficienc...
  • 88 篇 energy consumpti...
  • 76 篇 optimization
  • 75 篇 sensor phenomena...
  • 75 篇 security
  • 75 篇 distributed data...

机构

  • 14 篇 shanghai jiao to...
  • 10 篇 nanjing univ sta...
  • 10 篇 tu wien distribu...
  • 9 篇 suny stony brook...
  • 9 篇 institute of com...
  • 7 篇 department of co...
  • 7 篇 missouri univ sc...
  • 7 篇 state key labora...
  • 7 篇 univ virginia de...
  • 6 篇 nanjing universi...
  • 6 篇 department of co...
  • 6 篇 automation and c...
  • 6 篇 ieee
  • 6 篇 shihezi universi...
  • 6 篇 carnegie mellon ...
  • 6 篇 imperial coll lo...
  • 6 篇 chinese academy ...
  • 5 篇 nanjing univ pos...
  • 5 篇 univ sci & techn...
  • 5 篇 hong kong polyte...

作者

  • 14 篇 wang wei
  • 13 篇 dustdar schahram
  • 11 篇 wu jie
  • 11 篇 cao jiannong
  • 10 篇 stankovic john a...
  • 10 篇 beigl michael
  • 10 篇 agrawal dharma p...
  • 9 篇 bar-noy amotz
  • 9 篇 voigt thiemo
  • 9 篇 wang cong
  • 9 篇 rothermel kurt
  • 8 篇 vassiliou vasos
  • 8 篇 rinner bernhard
  • 8 篇 kulau ulf
  • 8 篇 wolf lars
  • 8 篇 nikoletseas soti...
  • 8 篇 abdelzaher tarek
  • 8 篇 chen guihai
  • 8 篇 liu yunhao
  • 7 篇 roedig utz

语言

  • 5,403 篇 英文
  • 294 篇 其他
  • 13 篇 中文
  • 1 篇 俄文
检索条件"任意字段=5th IEEE International Conference on Distributed Computing in Sensor Systems"
5709 条 记 录,以下是4391-4400 订阅
排序:
Audited credential delegation: A sensible approach to grid authentication
Audited credential delegation: A sensible approach to grid a...
收藏 引用
ieee international conference on E-Science Workshops
作者: Bruce Beckles Ali N. Haidar Stefan Zasada P.V. Coveney University of Cambridge UK Centre of Computational Science University College London Belgium
If the authentication process in a computational grid environment is difficult for end-users, they will either be unable to use the system at all, or, in their attempts to circumvent the aspects of the authentication ... 详细信息
来源: 评论
A distributed k-Anycast Routing Protocol Based on Mobile Agents
A Distributed k-Anycast Routing Protocol Based on Mobile Age...
收藏 引用
international conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Xin Xu Yun-li Gu Jie Du Huan-yan Qian Institute of Computer & Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science & Technology Nanjing University of Science and Technology of PLA Nanjing China
k-Anycast is a communication paradigm that is proposed to deliver a packet to any threshold k members of a set of communication group hosts. Most k-Anycast routing protocols are centralized and they are not suitable f... 详细信息
来源: 评论
QoS Performances of ieee 802.11 EDCA and DCF: A Testbed Approach
QoS Performances of IEEE 802.11 EDCA and DCF: A Testbed Appr...
收藏 引用
international conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Saty Mukherjee Xiao-Hong Peng Qiang Gao School of Engineering & Applied Science Aston University Birmingham UK School of Electronic and Information Engineering Beihang University Beijing China
there has been considerable research into the performance of the enhanced ieee 802.11e standard in recent years. Majority of the performance analysis has been based on simulations and analytical models, with little te... 详细信息
来源: 评论
On-board stereo sensor for intersection driving assistance architecture and specification
On-board stereo sensor for intersection driving assistance a...
收藏 引用
ieee international conference on Intelligent Computer Communication and Processing (ICCP)
作者: Sergiu Nedevschi Marita Tiberiu Radu Danescu Florin Oniga Silviu Bota Computer Science Department Technical University of Cluj Napoca Romania
this paper presents the specifications and architecture for a stereovision sensor to be used in intersection assistance. the intersection problem imposes a wide field of view, reasonable accuracy for the typical inter... 详细信息
来源: 评论
Performance Tradeoffs Among Percolation-Based Broadcast Protocols in Wireless sensor Networks
Performance Tradeoffs Among Percolation-Based Broadcast Prot...
收藏 引用
international conference on distributed computing systems Workshop
作者: Vijay Raman Indranil Gupta Department of Electrical and Computer Engineering University of Illinois Urbana-Champaign Urbana IL USA Department of Computer Science University of Illinois Urbana-Champaign Urbana IL USA
Broadcast of information in wireless sensor networks is an important operation, e.g., for code updates, queries, membership information, etc. In this paper, we analyze and experimentally compare the performance of van... 详细信息
来源: 评论
Automatic Mobile Vehicle for Adaptive Real-Time Communication Relay
Automatic Mobile Vehicle for Adaptive Real-Time Communicatio...
收藏 引用
international conference on distributed computing systems Workshop
作者: Hai Hu Furong Wang Fan Zhang Weijia Jia Ge Tang Department of Electronics & Information Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science City University of Hong Kong Hong Kong China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University of China Wuhan China
For the currently popular WiFi networks, the problem of communication blind spots is more acute, since the access points (APs) are not placed according to a central plan. In this paper, we design an Cyber physical sys... 详细信息
来源: 评论
A graph based backward chaining method for Web service composition
A graph based backward chaining method for Web service compo...
收藏 引用
ieee international conference on Intelligent Computer Communication and Processing (ICCP)
作者: Viorica R. Chifu Ioan Salomie Agota Riger Valentin Radoi Department of Computer Science Technical University of Cluj Napoca Cluj-Napoca Romania
this paper proposes a new method for the automatic composition of semantic Web services. the proposed method consists in constructing a graph and then searching for a sub-graph of this graph, which will represent a ca... 详细信息
来源: 评论
Performance Analysis of Different Puncturing Schemes for Rate Compatible Block-Type LDPC
Performance Analysis of Different Puncturing Schemes for Rat...
收藏 引用
international conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Meng Zheng Zesong Fei Jingming Kuang Xiang Chen Wei Sun
the LDPC can provide multiple rates without employing more parity check matrices through the using of Rate Compatible strategy, in which the idea of puncturing is used to get codes at higher rates. this paper mainly f... 详细信息
来源: 评论
Collaborative defense as a pervasive service Architectural insights and validation methodologies of a trial deployment
Collaborative defense as a pervasive service Architectural i...
收藏 引用
international conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM)
作者: Eve M. Schooler Carl Livadas Joohwan Kim Prashant Gandhi Pablo R. Passera Jaideep Chandrashekar Steve Orrin Martin Koyabe Fadi El-Moussa Gogobada Daa Dabibi Corporate Technology Intel Corporation Santa Clara CA USA British Telecommunications Public Limited Company Centre for Information Security and Systems Research Ipswich UK
Network defense is an elusive art. the arsenal to defend our devices from attack is constantly lagging behind the latest methods used by attackers to break into them and subsequently into our networks. To counteract t... 详细信息
来源: 评论
Cognitive Radio Spectrum Sensing Based on Index Belief Degree Function
Cognitive Radio Spectrum Sensing Based on Index Belief Degre...
收藏 引用
international conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Meng-yun Liu Shi-yin Li Qiong Liu School of Information and Electrical Engineering CUMT Xuzhou Jiangsu China
Nowadays, cognitive radio technology is an intelligent spectrum sharing technology. In order to ensure the licensed users will not be interfered, cognitive(unlicensed) users must be able to detect the spectrum vacancy... 详细信息
来源: 评论