咨询与建议

限定检索结果

文献类型

  • 5,667 篇 会议
  • 35 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 5,709 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,353 篇 计算机科学与技术...
    • 1,742 篇 电气工程
    • 1,628 篇 信息与通信工程
    • 1,220 篇 软件工程
    • 650 篇 控制科学与工程
    • 353 篇 测绘科学与技术
    • 345 篇 动力工程及工程热...
    • 270 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 200 篇 仪器科学与技术
    • 117 篇 石油与天然气工程
    • 107 篇 化学工程与技术
    • 105 篇 安全科学与工程
    • 92 篇 生物工程
    • 81 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 74 篇 交通运输工程
    • 69 篇 生物医学工程(可授...
    • 57 篇 土木工程
    • 56 篇 建筑学
  • 797 篇 理学
    • 403 篇 数学
    • 165 篇 物理学
    • 135 篇 化学
    • 109 篇 生物学
    • 94 篇 系统科学
    • 94 篇 统计学(可授理学、...
  • 560 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 94 篇 医学
    • 84 篇 临床医学
  • 62 篇 法学
  • 58 篇 经济学
  • 39 篇 农学
  • 17 篇 教育学
  • 17 篇 军事学
  • 7 篇 文学
  • 3 篇 艺术学

主题

  • 1,056 篇 wireless sensor ...
  • 177 篇 sensor systems
  • 164 篇 sensor nodes
  • 158 篇 wireless sensor ...
  • 156 篇 distributed comp...
  • 154 篇 sensors
  • 152 篇 wireless communi...
  • 146 篇 sensor networks
  • 144 篇 monitoring
  • 131 篇 cloud computing
  • 117 篇 protocols
  • 116 篇 internet of thin...
  • 114 篇 routing
  • 110 篇 distributed comp...
  • 108 篇 energy efficienc...
  • 88 篇 energy consumpti...
  • 81 篇 distributed data...
  • 77 篇 security
  • 76 篇 optimization
  • 75 篇 sensor phenomena...

机构

  • 14 篇 shanghai jiao to...
  • 10 篇 nanjing univ sta...
  • 10 篇 tu wien distribu...
  • 9 篇 suny stony brook...
  • 9 篇 institute of com...
  • 7 篇 department of co...
  • 7 篇 missouri univ sc...
  • 7 篇 state key labora...
  • 7 篇 univ virginia de...
  • 6 篇 nanjing universi...
  • 6 篇 department of co...
  • 6 篇 automation and c...
  • 6 篇 ieee
  • 6 篇 shihezi universi...
  • 6 篇 carnegie mellon ...
  • 6 篇 imperial coll lo...
  • 6 篇 chinese academy ...
  • 5 篇 nanjing univ pos...
  • 5 篇 univ sci & techn...
  • 5 篇 hong kong polyte...

作者

  • 14 篇 wang wei
  • 13 篇 dustdar schahram
  • 11 篇 wu jie
  • 11 篇 cao jiannong
  • 10 篇 stankovic john a...
  • 10 篇 beigl michael
  • 10 篇 rothermel kurt
  • 10 篇 agrawal dharma p...
  • 9 篇 bar-noy amotz
  • 9 篇 voigt thiemo
  • 9 篇 wang cong
  • 9 篇 nikoletseas soti...
  • 8 篇 vassiliou vasos
  • 8 篇 rinner bernhard
  • 8 篇 kulau ulf
  • 8 篇 wolf lars
  • 8 篇 abdelzaher tarek
  • 8 篇 liu yunhao
  • 7 篇 roedig utz
  • 7 篇 sigg stephan

语言

  • 5,403 篇 英文
  • 294 篇 其他
  • 13 篇 中文
  • 1 篇 俄文
检索条件"任意字段=5th IEEE International Conference on Distributed Computing in Sensor Systems"
5709 条 记 录,以下是4441-4450 订阅
排序:
A Framework for Confronting Key-swapping Collusion Attack on Random Pairwise Key Pre-distribution Schemes for distributed sensor Networks
A Framework for Confronting Key-swapping Collusion Attack on...
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Dai, Tran thanh Agbinya, Johnson I. Univ Technol Sydney Sydney NSW 2007 Australia
Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach to pairwise key agreement problem in distributed sensor networks. However, their practical applicability is threatened... 详细信息
来源: 评论
HybridS: A Scheme for Secure distributed Data Storage in WSNs
HybridS: A Scheme for Secure Distributed Data Storage in WSN...
收藏 引用
5th international conference on Embedded and Ubiquitous computing
作者: Ren, Wei Ren, Yi Zhang, Hui Zhongnan Univ Econ & Law Dept Comp Sci Wuhan Peoples R China Politecn Torino Dept Elect Turin Italy Univ Agder UIA Dept Info & Comm Tech Kristiansand Norway
In unattended Wireless sensor Networks (WSNs), data is stored locally or at designated nodes upon sensing, and users can access it on demand. this paradigm can improve energy efficiency by making use of the upcoming c... 详细信息
来源: 评论
sensor Node Localization Using Uncontrolled Events
Sensor Node Localization Using Uncontrolled Events
收藏 引用
28th international conference on distributed computing systems
作者: Zhong, Ziguo Wang, Dan He, Tian Univ Minnesota Dept Comp Sci & Engn Minneapolis MN 55455 USA
Many event-driven localization methods have been as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately controlled events in existing approaches, we pr... 详细信息
来源: 评论
Moving Multiple Sinks through Wireless sensor Networks for Lifetime Maximization
Moving Multiple Sinks Through Wireless Sensor Networks for L...
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Basagni, S. Carosi, A. Petrioli, C. Phillips, C. A. Northeastern Univ ECE Dept Boston MA 02115 USA Univ Roma La Sapienza Dip Informat Rome Italy Sandia Natl Labs Albuquerque NM USA
We propose scalable models and centralized heuristics for the concurrent and coordinated movement of multiple sinks in a wireless sensor network (WSN). the proposed centralized heuristic runs in polynomial time given ... 详细信息
来源: 评论
A Constant Factor Localized Algorithm for computing Connected Dominating Sets in Wireless sensor Networks
A Constant Factor Localized Algorithm for Computing Connecte...
收藏 引用
14th international conference on Parallel and distributed systems
作者: Islam, Kamrul Akl, Selim G. Meijer, Henk Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
Connected dominating sets (CDSs) are probably the most common way of constructing virtual backbones for broadcasting operation in wireless sensor networks. this is because such backbones guarantee to reduce unnecessar... 详细信息
来源: 评论
An entropy-based trust modeling and evaluation for wireless sensor networks
An entropy-based trust modeling and evaluation for wireless ...
收藏 引用
5th international conference on Embedded Software and systems
作者: Dai Hongjun Jia Zhiping Dong Xiaona Shandong Univ Sch Comp Sci & Technol Jinan 250101 Shandong Peoples R China Earthquake Adm Shandong Province Jinan 250014 Peoples R China
Wireless sensor networks are hard to be stable and vulnerable to various attacks, so it's a need to find the mechanisms to evaluate trustworthiness with trusted computing theories. In this paper, a novel entropy-b... 详细信息
来源: 评论
A Scalable Hybrid Routing Architecture with Off-Network Control Processing for Very Large sensor Networks
A Scalable Hybrid Routing Architecture with Off-Network Cont...
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Wu, Tao Biswas, Subir Michigan State Univ Dept Elect & Comp Engn E Lansing MI 48824 USA
this paper presents a novel architectural solution to address the problem of scalable routing in very large sensor networks. We develop a routing solution Off-Network Control Processing (ONCP) that achieves control sc... 详细信息
来源: 评论
MobASim: a Software Platform for Mobile Ad Hoc Networks Modeling and Simulation
MobASim: a Software Platform for Mobile Ad Hoc Networks Mode...
收藏 引用
4th Annual ieee international conference on Wireless and Mobile computing, Networking and Communications (WIMOB)/SecPriWiMob/SAUCEWiMob/HWN-RMQWiMob/STWiMob
作者: Sikora, Andrzej Niewiadomska-Szynkiewicz, Ewa Warsaw Univ Technol Inst Control & Computat Engn PL-00665 Warsaw Poland
this paper addresses issues associated with modeling and simulation of wireless, mobile, and ad hoc networks. Particular attention is paid to an approach for federating parallel and distributed ad hoc networks simulat... 详细信息
来源: 评论
Quality of Trilateration: Confidence based Iterative Localization
Quality of Trilateration: Confidence based Iterative Localiz...
收藏 引用
28th international conference on distributed computing systems
作者: Yang, Zheng Liu, Yunhao Hong Kong Univ Sci & Technol Hong Kong Hong Kong Peoples R China
the proliferation of wireless and mobile devices has fostered the demand of context aware applications. Location is one of the most significant contexts. Multi-lateration, as a basic building block of localization, ho... 详细信息
来源: 评论
the Trustworthiness Based on Hash Chain in Wireless sensor Network
The Trustworthiness Based on Hash Chain in Wireless Sensor N...
收藏 引用
5th international conference on Embedded and Ubiquitous computing
作者: Xiong Peng Zhang Wei E China Normal Univ Dept Comp Sci & Technol Shanghai 200062 Peoples R China
With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. the scheme inclu... 详细信息
来源: 评论