咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 35 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 5,705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,354 篇 计算机科学与技术...
    • 1,741 篇 电气工程
    • 1,630 篇 信息与通信工程
    • 1,221 篇 软件工程
    • 650 篇 控制科学与工程
    • 353 篇 测绘科学与技术
    • 345 篇 动力工程及工程热...
    • 270 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 200 篇 仪器科学与技术
    • 117 篇 石油与天然气工程
    • 107 篇 化学工程与技术
    • 105 篇 安全科学与工程
    • 92 篇 生物工程
    • 82 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 74 篇 交通运输工程
    • 69 篇 生物医学工程(可授...
    • 57 篇 土木工程
    • 56 篇 建筑学
  • 797 篇 理学
    • 403 篇 数学
    • 165 篇 物理学
    • 135 篇 化学
    • 109 篇 生物学
    • 94 篇 系统科学
    • 94 篇 统计学(可授理学、...
  • 561 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 94 篇 医学
    • 84 篇 临床医学
  • 62 篇 法学
  • 58 篇 经济学
  • 38 篇 农学
  • 17 篇 教育学
  • 17 篇 军事学
  • 7 篇 文学
  • 3 篇 艺术学

主题

  • 1,054 篇 wireless sensor ...
  • 177 篇 sensor systems
  • 164 篇 sensor nodes
  • 157 篇 wireless sensor ...
  • 157 篇 distributed comp...
  • 151 篇 wireless communi...
  • 150 篇 sensors
  • 143 篇 monitoring
  • 143 篇 sensor networks
  • 126 篇 cloud computing
  • 117 篇 protocols
  • 116 篇 internet of thin...
  • 113 篇 routing
  • 108 篇 distributed comp...
  • 105 篇 energy efficienc...
  • 87 篇 energy consumpti...
  • 75 篇 optimization
  • 75 篇 sensor phenomena...
  • 75 篇 distributed data...
  • 74 篇 security

机构

  • 14 篇 shanghai jiao to...
  • 10 篇 nanjing univ sta...
  • 10 篇 tu wien distribu...
  • 9 篇 suny stony brook...
  • 9 篇 institute of com...
  • 7 篇 department of co...
  • 7 篇 missouri univ sc...
  • 7 篇 state key labora...
  • 7 篇 univ virginia de...
  • 6 篇 nanjing universi...
  • 6 篇 department of co...
  • 6 篇 automation and c...
  • 6 篇 ieee
  • 6 篇 shihezi universi...
  • 6 篇 carnegie mellon ...
  • 6 篇 imperial coll lo...
  • 6 篇 chinese academy ...
  • 5 篇 nanjing univ pos...
  • 5 篇 univ sci & techn...
  • 5 篇 hong kong polyte...

作者

  • 14 篇 wang wei
  • 13 篇 dustdar schahram
  • 11 篇 wu jie
  • 11 篇 cao jiannong
  • 10 篇 stankovic john a...
  • 10 篇 beigl michael
  • 10 篇 agrawal dharma p...
  • 9 篇 bar-noy amotz
  • 9 篇 voigt thiemo
  • 9 篇 wang cong
  • 9 篇 rothermel kurt
  • 8 篇 vassiliou vasos
  • 8 篇 rinner bernhard
  • 8 篇 kulau ulf
  • 8 篇 wolf lars
  • 8 篇 nikoletseas soti...
  • 8 篇 abdelzaher tarek
  • 8 篇 chen guihai
  • 8 篇 liu yunhao
  • 7 篇 roedig utz

语言

  • 5,604 篇 英文
  • 89 篇 其他
  • 13 篇 中文
  • 1 篇 俄文
检索条件"任意字段=5th IEEE International Conference on Distributed Computing in Sensor Systems"
5705 条 记 录,以下是4911-4920 订阅
排序:
Optimizing security computation cost for mobile agent platforms
Optimizing security computation cost for mobile agent platfo...
收藏 引用
5th ieee international conference on Industrial Informatics
作者: Malik, Najmus Saqib Treytl, Albert Vienna Univ Technol Inst Comp Technol Gusshausstr 27-29-384 A-1040 Vienna Austria Austrian Acad Sci Res Unit Integrated Sensor Syst A-2700 Wiener Neustadt Austria
this paper focuses on the optimization of computation cost for agent platform, which appears due to complex security operations. Traditionally, a security manager is integrated within an agent platform, which performs... 详细信息
来源: 评论
WSNodeRater - An optimized reputation system framework for security aware energy efficient geographic routing in WSNs
WSNodeRater - An optimized reputation system framework for s...
收藏 引用
5th ieee/ACS international conference on Computer systems and Applications (AICCSA-07)
作者: Maarouf, Ismat K. Naseer, A. R. King Fahd Univ Petr & Minerals Dhahran 31261 Saudi Arabia
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. the motivation for tackling this problem comes directly front the highly constrained nature of WSN and... 详细信息
来源: 评论
A QoS scheduler packets for wireless sensor networks
A QoS scheduler packets for wireless sensor networks
收藏 引用
5th ieee/ACS international conference on Computer systems and Applications (AICCSA-07)
作者: Ouferhat, Nesrine Mellouk, Abdelhamid Univ Paris 12 Lab Image Signal & Intelligent Syst Lab LISSI SCTICIUTC V 122Rue Armangot F-94400 Vitry Sur Seine France
QoS routing in a wireless sensor network is difficult because the network topology may change constantly, and the available state information for routing is inherently imprecise. Ever more complex sensors have become ... 详细信息
来源: 评论
Doppler effect on location-based tracking in Mobile sensor Networks
Doppler effect on location-based tracking in Mobile Sensor N...
收藏 引用
5th ieee/ACS international conference on Computer systems and Applications (AICCSA-07)
作者: Hamdi, Mohamed Bellazreg, Ramzi Boudriga, Noureddine Communication Networks and Security Research Lab. University of 7th of November Carthage Tunisia
Mobile sensor Networks (MSNs) consist of large number of small and computationally impoverished devices deployed over an area to track mobile objects. Mobility is becoming an important feature of MSNs. Recently, senso... 详细信息
来源: 评论
Efficiently accessing remote resources in distributed real-time systems
Efficiently accessing remote resources in distributed real-t...
收藏 引用
13th ieee international conference on Embedded and Real-Time computing systems and Applications
作者: Usher, Paul S. Audsley, Neil C. Univ York Dept Comp Sci York YO10 5DD N Yorkshire England
this paper examines the structures that are used by traditional real-time and networked operating systems in order to show that they are poorly suited to providing efficient access to remote devices. It also argues th... 详细信息
来源: 评论
the design of large scale U-IT application USN by USN middleware
The design of large scale U-IT application USN by USN middle...
收藏 引用
5th ACIS international conference on Software Engineering Reseach, Management and Applications held in Conjuction with 1st international Workshop on Advanced Internet Technology and Applications
作者: Ju, Hui-Dong Lim, Hyuk Jin Yoe, Hyun Sunchon Natl Univ Sch Informat & Commun Engn 315 Maegok Dong Sunchon 540742 South Korea
Recently, the research trend and developmental tendency of ubiquitous computing technologies have been heading in the direction which seamlessly provides the optimum service to users through context-awareness, analogy... 详细信息
来源: 评论
Implementation of the sensor-MAC protocol for the JiST/SWANS simulator
Implementation of the sensor-MAC protocol for the JiST/SWANS...
收藏 引用
5th ieee/ACS international conference on Computer systems and Applications (AICCSA-07)
作者: Tippanagoudar, Veerendra Mahgoub, Imad Badi, Ahmed Florida Atlantic Univ Dept Comp Sci & Engn Boca Raton FL 33431 USA
Wireless sensor networks consist of very large number of resource constrained nodes. therefore, protocols and applications for wireless sensor networks need to be very scalable and efficient. To properly evaluate the ... 详细信息
来源: 评论
Terminal mobility services in the middleware environment
Terminal mobility services in the middleware environment
收藏 引用
5th ieee/ACS international conference on Computer systems and Applications (AICCSA-07)
作者: Ahmad, Syed Zubair Qadir, Mohammad Abdul Mohammad Ali Jinnah Univ Ctr Distributed & Semant Comp Islamabad Campus Islamabad Pakistan
Terminal Mobility is a much more common activity today then it was anticipated a few years back. Mobility itself is a complex phenomenon which is further complicated in a distributed application environment due to abs... 详细信息
来源: 评论
Robcast: A singlehop reliable broadcast protocol for wireless sensor networks
Robcast: A singlehop reliable broadcast protocol for wireles...
收藏 引用
27th international conference on distributed computing systems Workshops, ICDCSW'07
作者: Demirbas, Murat Balachandran, Srivats Department of Computer Science and Engineering University at Buffalo SUNY Buffalo NY 14260
Empirical studies show that wireless sensor networks (WSNs) are extremely prone to the hidden terminal problem. As much as 50% of packet losses have been blamed to the hidden terminal problem under bursty communicatio... 详细信息
来源: 评论
A context middleware based on sensor and RFID information
A context middleware based on sensor and RFID information
收藏 引用
5th Annual ieee international conference on Pervasive computing and Communications Workshops, PerCom Workshops 2007
作者: López, Tomás Sánchez Daeyoung, Kim AutoID Lab Korea ICU Daejeon Korea Republic of
Pervasive computing environments have traditionally used distributed sensors to gather user context. EPC (Electronic Product Code) information extracted from RFID tags could additionally provide identification informa... 详细信息
来源: 评论