咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 35 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 5,705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,353 篇 计算机科学与技术...
    • 1,741 篇 电气工程
    • 1,629 篇 信息与通信工程
    • 1,221 篇 软件工程
    • 650 篇 控制科学与工程
    • 353 篇 测绘科学与技术
    • 345 篇 动力工程及工程热...
    • 270 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 200 篇 仪器科学与技术
    • 117 篇 石油与天然气工程
    • 107 篇 化学工程与技术
    • 105 篇 安全科学与工程
    • 92 篇 生物工程
    • 81 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 74 篇 交通运输工程
    • 69 篇 生物医学工程(可授...
    • 57 篇 土木工程
    • 56 篇 建筑学
  • 797 篇 理学
    • 403 篇 数学
    • 165 篇 物理学
    • 135 篇 化学
    • 109 篇 生物学
    • 94 篇 系统科学
    • 94 篇 统计学(可授理学、...
  • 560 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 94 篇 医学
    • 84 篇 临床医学
  • 62 篇 法学
  • 58 篇 经济学
  • 39 篇 农学
  • 17 篇 教育学
  • 17 篇 军事学
  • 7 篇 文学
  • 3 篇 艺术学

主题

  • 1,054 篇 wireless sensor ...
  • 177 篇 sensor systems
  • 164 篇 sensor nodes
  • 157 篇 wireless sensor ...
  • 157 篇 distributed comp...
  • 151 篇 wireless communi...
  • 150 篇 sensors
  • 143 篇 monitoring
  • 143 篇 sensor networks
  • 126 篇 cloud computing
  • 117 篇 protocols
  • 116 篇 internet of thin...
  • 113 篇 routing
  • 108 篇 distributed comp...
  • 105 篇 energy efficienc...
  • 87 篇 energy consumpti...
  • 75 篇 sensor phenomena...
  • 75 篇 distributed data...
  • 74 篇 optimization
  • 74 篇 security

机构

  • 14 篇 shanghai jiao to...
  • 10 篇 nanjing univ sta...
  • 10 篇 tu wien distribu...
  • 9 篇 suny stony brook...
  • 9 篇 institute of com...
  • 7 篇 department of co...
  • 7 篇 missouri univ sc...
  • 7 篇 state key labora...
  • 7 篇 univ virginia de...
  • 6 篇 nanjing universi...
  • 6 篇 department of co...
  • 6 篇 automation and c...
  • 6 篇 ieee
  • 6 篇 shihezi universi...
  • 6 篇 carnegie mellon ...
  • 6 篇 imperial coll lo...
  • 6 篇 chinese academy ...
  • 5 篇 nanjing univ pos...
  • 5 篇 univ sci & techn...
  • 5 篇 hong kong polyte...

作者

  • 14 篇 wang wei
  • 13 篇 dustdar schahram
  • 11 篇 wu jie
  • 11 篇 cao jiannong
  • 10 篇 stankovic john a...
  • 10 篇 beigl michael
  • 10 篇 agrawal dharma p...
  • 9 篇 bar-noy amotz
  • 9 篇 voigt thiemo
  • 9 篇 wang cong
  • 9 篇 rothermel kurt
  • 8 篇 vassiliou vasos
  • 8 篇 rinner bernhard
  • 8 篇 kulau ulf
  • 8 篇 wolf lars
  • 8 篇 nikoletseas soti...
  • 8 篇 abdelzaher tarek
  • 8 篇 chen guihai
  • 8 篇 liu yunhao
  • 7 篇 roedig utz

语言

  • 5,603 篇 英文
  • 90 篇 其他
  • 13 篇 中文
  • 1 篇 俄文
检索条件"任意字段=5th IEEE International Conference on Distributed Computing in Sensor Systems"
5705 条 记 录,以下是4481-4490 订阅
排序:
Secure Authentication in Wireless sensor Networks using RF Fingerprints
Secure Authentication in Wireless Sensor Networks using RF F...
收藏 引用
5th international conference on Embedded and Ubiquitous computing
作者: Knox, D. A. Kunz, T. Carleton Univ Dept Syst & Comp Engn Ottawa ON K1S 5B6 Canada
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wireless transmission medium and by the limited hardware and software capabilities of the nodes in such networks. We an... 详细信息
来源: 评论
An actor-oriented group mobility model forwireless ad hoc sensor networks
An actor-oriented group mobility model forwireless ad hoc se...
收藏 引用
28th international conference on distributed computing systems Workshops, ICDCS Workshops 2008
作者: Ochirsuren, Enkhbold Indrusiak, Leandro Soares Glesner, Manfred Darmstadt University of Technology Institute of Microelectronic Systems Karlstrasse 15 D-64283 Darmstadt Germany
High level system modeling has significant impact on the early analysis and evaluation of the embedded electronic systems. Being a class of distributed embedded systems, wireless ad hoc sensor networks can benefit fro... 详细信息
来源: 评论
Stochastic counting in sensor networks, or: Noise is good  1
收藏 引用
4th ieee international conference on distributed computing in sensor systems
作者: Baryshnikov, Y. M. Coffman, E. G. Kwak, K. J. Moran, Bill Bell Labs 600 Mt Ave Murray Hill NJ 07974 USA Columbia Univ Dept Elect Engn New York NY 10027 USA Univ Melbourne Dept Elect Engn Melbourne Vic 3010 Australia
We propose a novel algorithm of counting indistinguishable objects by a collection of sensors. the information on multiple counting is recovered from the stochastic correlation patterns.
来源: 评论
A Balanced Cluster Routing Protocol of Wireless sensor Network
A Balanced Cluster Routing Protocol of Wireless Sensor Netwo...
收藏 引用
5th international conference on Embedded Software and systems
作者: Zhang, Ruihua Wang, Lin Geng, Shichao Jia, Zhiping Shandong Univ Sch Comp Sci & Technol Jinan 250061 Peoples R China Univ Jinan Sch Mech Engn Jinan 250022 Peoples R China
Energy efficiency has been known as the most important problem in wireless sensor networks. As a classic clustering-based protocol LEACH do a tremendous contribution on energy, efficiency. But it has some drawbacks th... 详细信息
来源: 评论
Automated sensor-specific Power Management for Wireless sensor Networks
Automated Sensor-specific Power Management for Wireless Sens...
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Kim, Nakyoung Choi, Sukwon Cha, Hojung Yonsei Univ Dept Comp Sci Seoul 120749 South Korea
Power management of sensor nodes is essential to maximize the lifetime of wireless sensor networks. Energy consumption of individual sensor node differs greatly depending on its type. Existing operating systems for se... 详细信息
来源: 评论
GroupBeat: Wireless sensor Networks Made Reliable
GroupBeat: Wireless Sensor Networks Made Reliable
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Gobriel, Sameh Khattab, Sherif Mosse, Daniel Melhem, Rami Intel Corp Corp Technol Grp Santa Clara CA 95051 USA Univ Pittsburgh Comp Sci Dept Pittsburgh PA 15260 USA
In wireless sensor networks (WSN) node failures are typically detected using a heartbeat application, where a neighbor detects a failed node when it misses successive short messages ("heartbeats") that shoul... 详细信息
来源: 评论
Key Management for Wireless sensor Networks Using Trusted Neighbors
Key Management for Wireless Sensor Networks Using Trusted Ne...
收藏 引用
5th international conference on Embedded and Ubiquitous computing
作者: Yuan, Xue Juergensen, Helmut Azarderakhsh, Reza Reyhani-Masoleh, Arash Univ Western Ontario Dept Comp Sci London ON N6A 5B7 Canada Univ Western Ontario Dept Elect & Comp Engn London ON N6A 5B7 Canada
Establishing and maintaining secure communication paths in a wireless sensor network poses mathematical and technical challenges. We suggest to use random nonces to set up secure communication links after the network ... 详细信息
来源: 评论
An Energy-Efficient Waiting Caching Algorithm in Wireless sensor Networks
An Energy-Efficient Waiting Caching Algorithm in Wireless Se...
收藏 引用
5th international conference on Embedded and Ubiquitous computing
作者: Xu, Junfeng Li, Keqiu Shen, YanMing Liu, Jian Dalian Univ Technol Dept Comp Sci & Engn Dalian 116023 Peoples R China
In a wide range of applications, such as detecting environmental hazards, monitoring remote terrain and even monitoring customer behavior, Wireless sensor Networks (WSNs) are playing an important role. Due to the limi... 详细信息
来源: 评论
SESAME-P: Memory pool-based dynamic stack management for sensor operating systems  1
收藏 引用
4th ieee international conference on distributed computing in sensor systems
作者: Yi, Sangho Lee, Seungwoo Cho, Yookun Hong, Jiman School of Computer Science and Engineering Seoul National University   Flash Development Division Hynix Cooperation   School of Computing Soongsil University  
In wireless sensor networks, each sensor node has very small memory space compared with any other embedded computing systems. For this reason, operating systems running on the sensor nodes cannot allocate sufficient f... 详细信息
来源: 评论
distributed technology for global dominance
Distributed technology for global dominance
收藏 引用
5th international conference on Informatics in Control, Automation and Robotics
作者: Sapaty, Peter Simon Natl Acad Sci Inst Math Machines & Syst UA-03187 Kiev Ukraine
A flexible, ubiquitous, and universal solution for management of distributed dynamic systems will be presented. It allows us to grasp complex systems on a higher than usual, semantic level, penetrating their infrastru... 详细信息
来源: 评论