咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 35 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 5,705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,353 篇 计算机科学与技术...
    • 1,741 篇 电气工程
    • 1,629 篇 信息与通信工程
    • 1,221 篇 软件工程
    • 650 篇 控制科学与工程
    • 353 篇 测绘科学与技术
    • 345 篇 动力工程及工程热...
    • 270 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 200 篇 仪器科学与技术
    • 117 篇 石油与天然气工程
    • 107 篇 化学工程与技术
    • 105 篇 安全科学与工程
    • 92 篇 生物工程
    • 81 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 74 篇 交通运输工程
    • 69 篇 生物医学工程(可授...
    • 57 篇 土木工程
    • 56 篇 建筑学
  • 797 篇 理学
    • 403 篇 数学
    • 165 篇 物理学
    • 135 篇 化学
    • 109 篇 生物学
    • 94 篇 系统科学
    • 94 篇 统计学(可授理学、...
  • 560 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 94 篇 医学
    • 84 篇 临床医学
  • 62 篇 法学
  • 58 篇 经济学
  • 39 篇 农学
  • 17 篇 教育学
  • 17 篇 军事学
  • 7 篇 文学
  • 3 篇 艺术学

主题

  • 1,054 篇 wireless sensor ...
  • 177 篇 sensor systems
  • 164 篇 sensor nodes
  • 157 篇 wireless sensor ...
  • 157 篇 distributed comp...
  • 151 篇 wireless communi...
  • 150 篇 sensors
  • 143 篇 monitoring
  • 143 篇 sensor networks
  • 126 篇 cloud computing
  • 117 篇 protocols
  • 116 篇 internet of thin...
  • 113 篇 routing
  • 108 篇 distributed comp...
  • 105 篇 energy efficienc...
  • 87 篇 energy consumpti...
  • 75 篇 sensor phenomena...
  • 75 篇 distributed data...
  • 74 篇 optimization
  • 74 篇 security

机构

  • 14 篇 shanghai jiao to...
  • 10 篇 nanjing univ sta...
  • 10 篇 tu wien distribu...
  • 9 篇 suny stony brook...
  • 9 篇 institute of com...
  • 7 篇 department of co...
  • 7 篇 missouri univ sc...
  • 7 篇 state key labora...
  • 7 篇 univ virginia de...
  • 6 篇 nanjing universi...
  • 6 篇 department of co...
  • 6 篇 automation and c...
  • 6 篇 ieee
  • 6 篇 shihezi universi...
  • 6 篇 carnegie mellon ...
  • 6 篇 imperial coll lo...
  • 6 篇 chinese academy ...
  • 5 篇 nanjing univ pos...
  • 5 篇 univ sci & techn...
  • 5 篇 hong kong polyte...

作者

  • 14 篇 wang wei
  • 13 篇 dustdar schahram
  • 11 篇 wu jie
  • 11 篇 cao jiannong
  • 10 篇 stankovic john a...
  • 10 篇 beigl michael
  • 10 篇 agrawal dharma p...
  • 9 篇 bar-noy amotz
  • 9 篇 voigt thiemo
  • 9 篇 wang cong
  • 9 篇 rothermel kurt
  • 8 篇 vassiliou vasos
  • 8 篇 rinner bernhard
  • 8 篇 kulau ulf
  • 8 篇 wolf lars
  • 8 篇 nikoletseas soti...
  • 8 篇 abdelzaher tarek
  • 8 篇 chen guihai
  • 8 篇 liu yunhao
  • 7 篇 roedig utz

语言

  • 5,603 篇 英文
  • 90 篇 其他
  • 13 篇 中文
  • 1 篇 俄文
检索条件"任意字段=5th IEEE International Conference on Distributed Computing in Sensor Systems"
5705 条 记 录,以下是4521-4530 订阅
排序:
Context Integration for Smart Workflows
Context Integration for Smart Workflows
收藏 引用
6th ieee international conference on Pervasive computing and Communications
作者: Wieland, Matthias Kaczmarczyk, Peter Nicklas, Daniela Univ Stuttgart Inst Architecture Applicat Syst Univ Str 38 D-70569 Stuttgart Germany Univ Stuttgart Inst Parallel & Distributed Syst D-70569 Stuttgart Germany
the usage of workflow technology to model and execute business processes is widespread in many enterprises and within the software industry. With the growing maturity of sensors, wireless communication, and distribute... 详细信息
来源: 评论
A Formal Specification and Verification Framework for Designing and Verifying Reliable and Dependable Software for Computerized Numerical Control (CNC) systems
A Formal Specification and Verification Framework for Design...
收藏 引用
28th international conference on distributed computing systems
作者: Cao, Yunan Shao, Zili Wang, Meng Xue, Chun Jason Chen, Youdong Wei, Hongxing Wang, Tianmiao Beijing Univ Aeronaut & Astronaut Robot Res Inst Beijing Peoples R China Hong Kong Polytech Univ Dept Comp Hong Kong Hong Kong Peoples R China City Univ Hong Kong Dept Comp Sci Kowloon Peoples R China
As a distributed computing system, a CNC system needs to be operated reliably, dependably and safely. How to design reliable and dependable software and perform effective verification for CNC systems becomes an import... 详细信息
来源: 评论
An enhanced sensor scheduling protocol for wireless sensor networks
An enhanced sensor scheduling protocol for wireless sensor n...
收藏 引用
28th international conference on distributed computing systems Workshops, ICDCS Workshops 2008
作者: Fu, Cheng Wang, Bang Hock, Beng Lim Intelligent Systems Centre Nanyang Technological University
An important design challenge in wireless sensor network application development is to provide appropriate middleware service protocols to control the energy consumption according to specific application scenarios. In... 详细信息
来源: 评论
Proceedings - the 28th international conference on distributed computing systems, ICDCS 2008
Proceedings - The 28th International Conference on Distribut...
收藏 引用
28th international conference on distributed computing systems, ICDCS 2008
the proceedings contain 102 papers. the topics discussed include: computer science as a lens on the sciences;real-time detection of clone attacks in wireless sensor networks;comparing symmetric-key and public-key base... 详细信息
来源: 评论
Improvement of the performance of distributed OS-CFAR system by (μ+λ)-ES optimisation
Improvement of the performance of distributed OS-CFAR system...
收藏 引用
2008 5th international Multi-conference on systems, Signals and Devices, SSD'08
作者: Abdou, Latifa Soltani, Faouzi Département d' Automatique Université de Biskra Algeria Département d'Electronique Université de Constantine Algeria
Genetic algorithms (GAs) are algorithms of exploration based on natural selection and on genetic. they are very flexible tools used to optimise very irregular functions, badly conditioned or complexes to calculate. th... 详细信息
来源: 评论
Dynamic Update System for K Queries in Wireless sensor Networks
Dynamic Update System for K Queries in Wireless Sensor Netwo...
收藏 引用
4th international conference on Wireless Communications, Networking and Mobile computing
作者: Bajracharya, Manoj Chen, Ming Shanghai Ocean Univ Coll Informat Technol Shanghai 200090 Peoples R China
Recent years have seen the emergence of wireless sensor network systems that must support the real time query with the high data rate. sensor top K query plays a critical role for energy efficient of wireless sensor s... 详细信息
来源: 评论
Compromised sensor nodes detection: A quantitative approach
Compromised sensor nodes detection: A quantitative approach
收藏 引用
28th international conference on distributed computing systems Workshops, ICDCS Workshops 2008
作者: Li, Tao Song, Min Alam, Mansoor EECS Department University of Toledo Toledo OH 43606 United States ECE Department Old Dominion University Norfolk VA 23529 United States
In a wireless sensor network, an adversary may crack legal nodes or deploy malicious nodes to launch various attacks. these nodes are collectively called compromised nodes. In this paper, we define a Data Transmission... 详细信息
来源: 评论
Why is IPSec a viable option for Wireless sensor Networks
Why is IPSec a viable option for Wireless Sensor Networks
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Granjal, Jorge Silva, Ricardo Monteiro, Edmundo Silva, Jorge Sa Boavida, Fernando Univ Coimbra P-3000 Coimbra Portugal
Many issues still remain to be addressed in order to achieve acceptable security in Wireless sensor Networks (WSNs). this necessity, together with the adoption of IPv6 on WSNs being defined at the 6lowpan working grou... 详细信息
来源: 评论
Detecting Sybil Attacks in Wireless and sensor Networks Using Cluster Analysis
Detecting Sybil Attacks in Wireless and Sensor Networks Usin...
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Yang, Jie Chen, Yingying Trappe, Wade Stevens Inst Technol Dept ECE Hoboken NJ 07030 USA Rutgers State Univ WINLAB Piscataway NJ 08854 USA
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. the traditional approach to address sybil attacks is to employ ... 详细信息
来源: 评论
Fault-Tolerant Event Region Detection in Wireless sensor Networks Using Statistical Hypothesis Test
Fault-Tolerant Event Region Detection in Wireless Sensor Net...
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Cao, Donglei Jin, Beihong Cao, Jiannong Chinese Acad Sci Grad Univ Beijing 100864 Peoples R China Chinese Acad Sci Inst Software Beijing 100864 Peoples R China Hong Kong Polytecn Univ Dept Comput Hong Kong Peoples R China
Most existing algorithms for fault-tolerant event region detection only assume that events are spatially correlated, but we argue that events are usually both spatially and temporally correlated. By examining the temp... 详细信息
来源: 评论