咨询与建议

限定检索结果

文献类型

  • 261 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 155 篇 工学
    • 151 篇 计算机科学与技术...
    • 52 篇 信息与通信工程
    • 51 篇 软件工程
    • 46 篇 电气工程
    • 44 篇 机械工程
    • 40 篇 测绘科学与技术
    • 13 篇 控制科学与工程
    • 11 篇 动力工程及工程热...
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
  • 27 篇 理学
    • 14 篇 数学
    • 7 篇 生物学
    • 5 篇 系统科学
    • 4 篇 物理学
    • 3 篇 化学
    • 1 篇 大气科学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 18 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 69 篇 wireless sensor ...
  • 14 篇 routing
  • 13 篇 wireless communi...
  • 13 篇 delay
  • 12 篇 sensors
  • 12 篇 sensor networks
  • 9 篇 computational mo...
  • 9 篇 algorithm design...
  • 9 篇 protocols
  • 9 篇 mobile communica...
  • 9 篇 distributed data...
  • 8 篇 robot sensing sy...
  • 8 篇 wireless sensor ...
  • 7 篇 deep learning
  • 7 篇 relays
  • 7 篇 energy consumpti...
  • 7 篇 internet
  • 7 篇 energy efficienc...
  • 6 篇 approximation al...
  • 6 篇 cameras

机构

  • 4 篇 college of compu...
  • 4 篇 school of electr...
  • 3 篇 school of big da...
  • 3 篇 school of cybers...
  • 3 篇 school of comput...
  • 2 篇 beijing key labo...
  • 2 篇 nanjing universi...
  • 2 篇 tech univ carolo...
  • 2 篇 college of compu...
  • 2 篇 sichuan universi...
  • 2 篇 school of comput...
  • 2 篇 department of in...
  • 2 篇 school of comput...
  • 2 篇 computer technol...
  • 2 篇 school of inform...
  • 2 篇 huawei 2012 labs
  • 2 篇 zhejiang univers...
  • 2 篇 guangdong provin...
  • 2 篇 univ valencia ir...
  • 2 篇 department of el...

作者

  • 5 篇 baltasar beferul...
  • 4 篇 beferull-lozano ...
  • 3 篇 ramamurthy sreen...
  • 3 篇 wang guojun
  • 3 篇 landsiedel olaf
  • 3 篇 roy nirmalya
  • 2 篇 xianzhang chen
  • 2 篇 duo liu
  • 2 篇 santosh shah
  • 2 篇 kay romer
  • 2 篇 wan jian
  • 2 篇 pedro m. crespo
  • 2 篇 buesching felix
  • 2 篇 hu jun
  • 2 篇 ma huadong
  • 2 篇 tan yujuan
  • 2 篇 insausti xabier
  • 2 篇 vora adnan
  • 2 篇 nirjon shahriar
  • 2 篇 kulau ulf

语言

  • 260 篇 英文
  • 3 篇 中文
检索条件"任意字段=8th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2012"
262 条 记 录,以下是191-200 订阅
排序:
Gain-Constrained Filtering with Probabilistic sensor Delays and Correlated Noises
Gain-Constrained Filtering with Probabilistic Sensor Delays ...
收藏 引用
18th international conference on Automation and computing (ICAC) - Integration of Design and Engineering
作者: Hu, Jun Wang, Zidong Shen, Bo Gao, Huijun Harbin Inst Technol Res Inst Intelligent Control & Syst Harbin 150001 Peoples R China Brunel Univ Dept Informat Syst & Comp Uxbridge UB8 3PH Middx England Univ Duisburg Essen Inst Automat Control & Complex Syst D-47057 Duisburg Germany
In this paper, the gain-constrained recursive filtering problem is investigated for a class of time-varying stochastic systems with probabilistic sensor delays and correlated noises. the phenomenon of probabilistic se... 详细信息
来源: 评论
Radiation Awareness in three-Dimensional Wireless sensor Networks
Radiation Awareness in Three-Dimensional Wireless Sensor Net...
收藏 引用
international conference on distributed computing in sensor systems (dcoss)
作者: S. Nikoletseas D. Patroumpa V.K. Prasanna C. Raptopoulos J. Rolim Computer Technology Institute University of Patras Greece University of Southern California Los Angeles CA USA Centre Universitaire ďInformatique University of Geneva Switzerland
this research attempts a first step towards investigating the aspect of radiation awareness in environments with abundant heterogeneous wireless networking. We call radiation at a point of a 3D wireless network the to... 详细信息
来源: 评论
ERRAGMap: Visualization tool
ERRAGMap: Visualization tool
收藏 引用
8th international conference on Information Science and Digital Content Technology, ICIDT 2012
作者: Gillani, Saira Naz, Sheneela Naeem, Muhammad Afzal, Muhammad Tanvir Qayyum, Amir M. A. Jinnah University Islamabad Pakistan Center of Excellence in Data Mining M. A. Jinnah University Islamabad Pakistan Distributed and Semantic Computing M. A. Jinnah University Islamabad Pakistan
Earthquakes are considered one of the major disastrous situations for any nation. the horrible earthquake may claim hundreds of lives, thousands of injuries and demolishing thousands of houses. When an earthquake hits... 详细信息
来源: 评论
Power-Efficient Algorithms for Fourier Analysis over Random Wireless sensor Network
Power-Efficient Algorithms for Fourier Analysis over Random ...
收藏 引用
international conference on distributed computing in sensor systems (dcoss)
作者: Xi Xu Rashid Ansari Ashfaq Khokhar Department of Electrical and Computer Engineering University of Illinois Chicago Chicago IL USA
Reduced execution time and increased power efficiency are important objectives in the distributed execution of collaborative signal processing tasks over wireless sensor networks. the power-efficient implementation of... 详细信息
来源: 评论
Neuron inspired collaborative transmission in wireless sensor networks
Neuron inspired collaborative transmission in wireless senso...
收藏 引用
8th Annual international conference on Mobile and Ubiquitous systems: computing, Networking and Services, MobiQuitous 2011
作者: Sigg, Stephan Jakimovski, Predrag Becker, Florian Schmidtke, Hedda R. Neumann, Alexander Ji, Yusheng Beigl, Michael Tokyo Japan Pervasive Computing Systems TecO Germany
We establish a wireless sensor network that emulates biological neuronal structures for the purpose of creating smart spaces. Two different types of wireless nodes working together are used to mimic the behaviour of a... 详细信息
来源: 评论
Secure location verification using radio broadcast
收藏 引用
8th international conference on Principles of distributed systems (OPODIS 2004)
作者: Vora, Adnan Nesterenko, Mikhail Kent State Univ Dept Comp Sci Kent OH 44242 USA
Secure location verification is a recently stated problem that has a number of practical applications. the problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a desi... 详细信息
来源: 评论
Applying Data Mining Techniques to Intrusion Detection in Wireless sensor Networks
Applying Data Mining Techniques to Intrusion Detection in Wi...
收藏 引用
8th international conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Coppolino, Luigi D'Antonio, Salvatore Garofalo, Alessia Romano, Luigi Univ Naples Parthenope Dept Technol Naples Italy
Wireless sensor Networks (WSNs) have become a hot research topic in recent years. they have many potential applications for both civil and military tasks. However, the unattended nature of WSNs and the limited computa... 详细信息
来源: 评论
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optimization in Intelligent Transportation IoT  19
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optim...
收藏 引用
2022 ieee SmartWorld, 19th ieee international conference on Ubiquitous Intelligence and computing, 2022 ieee international conference on Autonomous and Trusted Vehicles conference, 22nd ieee international conference on Scalable computing and Communications, 2022 ieee international conference on Digital Twin, 8th ieee international conference on Privacy computing and 2022 ieee international conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Yi, Lingzhi Luo, Bin Zhu, Chenlu Deng, Xianjun Xia, Yunzhi Wu, Hengshan Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China University of South China School of Civil Engineering Hengyang421001 China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Hubei Chutian Expressway Digital Technology Co. Ltd Wuhan430074 China
the integration of Internet of things (IoT)-based highway bridge structural health monitoring (HBSHM) and intelligent transportation systems (ITS) plays an essential role in detecting damage for large and complex brid... 详细信息
来源: 评论
8th international Joint conference on e-Business and Telecommunications, ICETE 2011
8th International Joint Conference on e-Business and Telecom...
收藏 引用
8th international Joint conference on e-Business and Telecommunications, ICETE 2011
the proceedings contain 37 papers. the special focus in this conference is on e-business and telecommunications. the topics include: Face recognition in uncontrolled environments, experiments in an airport;paradigms o...
来源: 评论
A novel distributed energy-efficient self-organized algorithm for wireless ad hoc networks
A novel distributed energy-efficient self-organized algorith...
收藏 引用
8th international conference on Intelligent Environments, IE 2012
作者: Olascuaga-Cabrera, J. Guadalupe Mendez-Vazquez, Andres Lopez-Mellado, Ernesto CINVESTAV Unidad Guadalajara Av. del Bosque 1145 Col El Bajio 45015 Zapopan Jal Mexico
Wireless ad-hoc networks require a special management because of their hardware and energy limitations compared with wired networks. the problem of constructing a backbone structure over wireless ad-hoc networks has b... 详细信息
来源: 评论