咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 35 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 5,705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,354 篇 计算机科学与技术...
    • 1,741 篇 电气工程
    • 1,630 篇 信息与通信工程
    • 1,221 篇 软件工程
    • 650 篇 控制科学与工程
    • 353 篇 测绘科学与技术
    • 345 篇 动力工程及工程热...
    • 270 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 200 篇 仪器科学与技术
    • 117 篇 石油与天然气工程
    • 107 篇 化学工程与技术
    • 105 篇 安全科学与工程
    • 92 篇 生物工程
    • 82 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 74 篇 交通运输工程
    • 69 篇 生物医学工程(可授...
    • 57 篇 土木工程
    • 56 篇 建筑学
  • 797 篇 理学
    • 403 篇 数学
    • 165 篇 物理学
    • 135 篇 化学
    • 109 篇 生物学
    • 94 篇 系统科学
    • 94 篇 统计学(可授理学、...
  • 561 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 94 篇 医学
    • 84 篇 临床医学
  • 62 篇 法学
  • 58 篇 经济学
  • 38 篇 农学
  • 17 篇 教育学
  • 17 篇 军事学
  • 7 篇 文学
  • 3 篇 艺术学

主题

  • 1,054 篇 wireless sensor ...
  • 177 篇 sensor systems
  • 164 篇 sensor nodes
  • 157 篇 wireless sensor ...
  • 157 篇 distributed comp...
  • 151 篇 wireless communi...
  • 150 篇 sensors
  • 143 篇 monitoring
  • 143 篇 sensor networks
  • 126 篇 cloud computing
  • 117 篇 protocols
  • 116 篇 internet of thin...
  • 113 篇 routing
  • 108 篇 distributed comp...
  • 105 篇 energy efficienc...
  • 87 篇 energy consumpti...
  • 75 篇 optimization
  • 75 篇 sensor phenomena...
  • 75 篇 distributed data...
  • 74 篇 security

机构

  • 14 篇 shanghai jiao to...
  • 10 篇 nanjing univ sta...
  • 10 篇 tu wien distribu...
  • 9 篇 suny stony brook...
  • 9 篇 institute of com...
  • 7 篇 department of co...
  • 7 篇 missouri univ sc...
  • 7 篇 state key labora...
  • 7 篇 univ virginia de...
  • 6 篇 nanjing universi...
  • 6 篇 department of co...
  • 6 篇 automation and c...
  • 6 篇 ieee
  • 6 篇 shihezi universi...
  • 6 篇 carnegie mellon ...
  • 6 篇 imperial coll lo...
  • 6 篇 chinese academy ...
  • 5 篇 nanjing univ pos...
  • 5 篇 univ sci & techn...
  • 5 篇 hong kong polyte...

作者

  • 14 篇 wang wei
  • 13 篇 dustdar schahram
  • 11 篇 wu jie
  • 11 篇 cao jiannong
  • 10 篇 stankovic john a...
  • 10 篇 beigl michael
  • 10 篇 agrawal dharma p...
  • 9 篇 bar-noy amotz
  • 9 篇 voigt thiemo
  • 9 篇 wang cong
  • 9 篇 rothermel kurt
  • 8 篇 vassiliou vasos
  • 8 篇 rinner bernhard
  • 8 篇 kulau ulf
  • 8 篇 wolf lars
  • 8 篇 nikoletseas soti...
  • 8 篇 abdelzaher tarek
  • 8 篇 chen guihai
  • 8 篇 liu yunhao
  • 7 篇 roedig utz

语言

  • 5,604 篇 英文
  • 89 篇 其他
  • 13 篇 中文
  • 1 篇 俄文
检索条件"任意字段=5th IEEE International Conference on Distributed Computing in Sensor Systems"
5705 条 记 录,以下是4791-4800 订阅
排序:
RFMS: Real-time Flood Monitoring System with wireless sensor networks
RFMS: Real-time Flood Monitoring System with wireless sensor...
收藏 引用
ieee Internatonal conference on Mobile Adhoc and sensor systems (MASS)
作者: Jong-uk Lee Jae-Eon Kim Daeyoung Kim Poh Kit Chong Jungsik Kim Philjae Jang Information and Communications University South Korea Sensor Networks Research Inc.
In this paper, we present RFMS, the real-time flood monitoring system with wireless sensor networks, which is deployed in two volcanic islands Ulleung-do and Dok-do located in the East Sea near to the Korean peninsula... 详细信息
来源: 评论
A probabilistic replication and storage scheme for large wireless networks of small devices
A probabilistic replication and storage scheme for large wir...
收藏 引用
ieee Internatonal conference on Mobile Adhoc and sensor systems (MASS)
作者: Daniela Gavidia Maarten van Steen Vrije Universiteit Amsterdam Amsterdam Netherlands
Nodes in wireless ad hoc networks are often limited in terms of resources, such as storage, power, and bandwidth. A downside of this is the fact that local storage at one node cannot accommodate the vast amount of dat... 详细信息
来源: 评论
More is more: the benefits of dense sensor deployment
More is more: The benefits of dense sensor deployment
收藏 引用
ieee Internatonal conference on Mobile Adhoc and sensor systems (MASS)
作者: Amotz Bar-Noy theodore Brown Matthew P. Johnson Deniz Sarioz Dinesh Verma Chai Wah Wu Department of Computer Science Graduate Center of the City University of New York USA IBM Thomas J. Watson Research Center Hawthorne Yorktown Heights NY USA
An ad-hoc sensor network is composed of sensing devices which can measure or detect features of their environment, communicate with one other and possibly with other devices that perform data fusion. One of the proble... 详细信息
来源: 评论
Automated sensor-specific power management for wireless sensor networks
Automated sensor-specific power management for wireless sens...
收藏 引用
ieee Internatonal conference on Mobile Adhoc and sensor systems (MASS)
作者: Nakyoung Kim Sukwon Choi Hojung Cha Department of Computer Science Yonsei University Seoul South Korea
Power management of sensor nodes is essential to maximize the lifetime of wireless sensor networks. Energy consumption of individual sensor node differs greatly depending on its type. Existing operating systems for se... 详细信息
来源: 评论
Cost-effective multidimensional publish/subscribe services in sensor networks
Cost-effective multidimensional publish/subscribe services i...
收藏 引用
ieee Internatonal conference on Mobile Adhoc and sensor systems (MASS)
作者: Duc A. Tran Cuong H. Pham Department of Computer Science University of Massachusetts Boston MA USA
Publish/subscribe services are natural applications of sensor networks as sensors are designed mainly to detect and notify upon events of interest. To enable these services, the brokerage mechanism that routes a given... 详细信息
来源: 评论
An Efficient Policy System for Body sensor Networks
An Efficient Policy System for Body Sensor Networks
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Yanmin Zhu Sye Loong Keoh Morris Sloman Emil Lupu Naranker Dulay Nathaniel Pryce Department of Computing Imperial College London UK
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventional sensor networks for environmental ... 详细信息
来源: 评论
Collision classification-based MAC protocol for ieee 802.11 wireless local area networks
Collision classification-based MAC protocol for IEEE 802.11 ...
收藏 引用
international conference on Broadband Networks (BroadNets)
作者: Qifei Zhang Chao Gui Baolin Sun School of Computing Hubei University of Economics China
Traditional backoff algorithms in distributed contention-based MAC protocols adopt contention window scheme for collision resolution. Collided nodes are redistributed in extended windows to avoid further collision. Ho... 详细信息
来源: 评论
Performance Analysis of Group Based Detection for Sparse sensor Networks
Performance Analysis of Group Based Detection for Sparse Sen...
收藏 引用
ieee international conference on distributed computing systems
作者: Jingbin Zhang Gang Zhou Sang H. Son John A. Stankovic Kamin Whitehouse Computer Science Department University of Virginia Charlottesville VA 22903
In this paper, we analyze the performance of group based detection in sparse sensor networks, when the system level detection decision is made based on the detection reports generated from multiple sensing periods. Sp... 详细信息
来源: 评论
EcoDAQ: A Case Study of a Densely distributed Real-Time System for High Data Rate Wireless Data Acquisition
EcoDAQ: A Case Study of a Densely Distributed Real-Time Syst...
收藏 引用
ieee international conference on Embedded and Real-Time computing systems and Applications (RTCSA)
作者: Chong-Jing Chen Pai H. Chou Center for Embedded Computer Systems University of California Irvine CA USA Department of Computer Science National Tsing Hua University Hsinchu Taiwan
Densely distributed wireless real-time system must perform communication scheduling and protocols in addition to task scheduling to achieve schedulability and reliable communication. While many wireless sensor network... 详细信息
来源: 评论
Real-time Detection of Clone Attacks in Wireless sensor Networks
Real-time Detection of Clone Attacks in Wireless Sensor Netw...
收藏 引用
ieee international conference on distributed computing systems
作者: Kai Xing Fang Liu Xiuzhen Cheng David H. C. Du Department of Computer Science The George Washington University Washington DC 20052 USA
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node... 详细信息
来源: 评论