咨询与建议

限定检索结果

文献类型

  • 261 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 155 篇 工学
    • 151 篇 计算机科学与技术...
    • 52 篇 信息与通信工程
    • 51 篇 软件工程
    • 46 篇 电气工程
    • 44 篇 机械工程
    • 40 篇 测绘科学与技术
    • 13 篇 控制科学与工程
    • 11 篇 动力工程及工程热...
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
  • 27 篇 理学
    • 14 篇 数学
    • 7 篇 生物学
    • 5 篇 系统科学
    • 4 篇 物理学
    • 3 篇 化学
    • 1 篇 大气科学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 18 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 69 篇 wireless sensor ...
  • 14 篇 routing
  • 13 篇 wireless communi...
  • 13 篇 delay
  • 12 篇 sensors
  • 12 篇 sensor networks
  • 9 篇 computational mo...
  • 9 篇 algorithm design...
  • 9 篇 protocols
  • 9 篇 mobile communica...
  • 9 篇 distributed data...
  • 8 篇 robot sensing sy...
  • 8 篇 wireless sensor ...
  • 7 篇 deep learning
  • 7 篇 relays
  • 7 篇 energy consumpti...
  • 7 篇 internet
  • 7 篇 energy efficienc...
  • 6 篇 approximation al...
  • 6 篇 cameras

机构

  • 4 篇 college of compu...
  • 4 篇 school of electr...
  • 3 篇 school of big da...
  • 3 篇 school of cybers...
  • 3 篇 school of comput...
  • 2 篇 beijing key labo...
  • 2 篇 nanjing universi...
  • 2 篇 tech univ carolo...
  • 2 篇 college of compu...
  • 2 篇 sichuan universi...
  • 2 篇 school of comput...
  • 2 篇 department of in...
  • 2 篇 school of comput...
  • 2 篇 computer technol...
  • 2 篇 school of inform...
  • 2 篇 huawei 2012 labs
  • 2 篇 zhejiang univers...
  • 2 篇 guangdong provin...
  • 2 篇 univ valencia ir...
  • 2 篇 department of el...

作者

  • 5 篇 baltasar beferul...
  • 4 篇 beferull-lozano ...
  • 3 篇 ramamurthy sreen...
  • 3 篇 wang guojun
  • 3 篇 landsiedel olaf
  • 3 篇 roy nirmalya
  • 2 篇 xianzhang chen
  • 2 篇 duo liu
  • 2 篇 santosh shah
  • 2 篇 kay romer
  • 2 篇 wan jian
  • 2 篇 pedro m. crespo
  • 2 篇 buesching felix
  • 2 篇 hu jun
  • 2 篇 ma huadong
  • 2 篇 tan yujuan
  • 2 篇 insausti xabier
  • 2 篇 vora adnan
  • 2 篇 nirjon shahriar
  • 2 篇 kulau ulf

语言

  • 260 篇 英文
  • 3 篇 中文
检索条件"任意字段=8th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2012"
262 条 记 录,以下是251-260 订阅
排序:
Fault diagnosis in multi layered De Bruijn based architectures for sensor networks
Fault diagnosis in multi layered De Bruijn based architectur...
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Anas Abu Taleb J. Mathew D. K. Pradhan Department of Computer Science University of Bristol UK
Wireless sensor networks are expected to operate in an unattended manner for long periods of time. As a result, they should be able to tolerate faults and maintain a reasonable performance level. therefore, we propose... 详细信息
来源: 评论
Demonstration abstract: Globally interconnected WSAN testbeds
Demonstration abstract: Globally interconnected WSAN testbed...
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Lasse thiem Gabriele Goldacker Mario Schuster thomas Luckenbach Byung Kyu Kim Fraunhofer Institute for Open Communication Systems Berlin Germany National Information and Society Agency Seoul South Korea
this demonstration presents the ongoing development of a framework for a global wireless sensor / actuator network (GWSAN). this GWSAN is formed through the interconnection of about 10 WSAN testbeds currently mainly l... 详细信息
来源: 评论
A semi-distributed localization protocol for wireless sensor and actor networks
A semi-distributed localization protocol for wireless sensor...
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Giacomo Ghidini Cristina M. Pinotti Sajal K. Das Center of Research in Wireless Mobility and Networking Department of Computer Science and Engineering University of Technology Arlington USA Department of Computer Science and Mathematics University of Perugia Italy
We consider a wireless sensor and actor network (WSAN) consisting of a large number of tiny, low-cost sensors uniformly and independently distributed in a two-dimensional geographical region around a few powerful enti... 详细信息
来源: 评论
Definition and configuration of reliable event detection for heterogeneous WSN
Definition and configuration of reliable event detection for...
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Steffen Ortmann IHP Microelectronics Germany
this work introduces an intuitive XML-based Event Specification Language (ESL) that simplifies event configuration to a level that is even suitable for non-professionals. It features hardware independent description e... 详细信息
来源: 评论
Smart lighting using LED luminaries
Smart lighting using LED luminaries
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Sachin Bhardwaj Tanir Özçelebi Johan Lukkien Department of Mathematics and Computer Science Eindhoven University of Technology Eindhoven The Netherlands
the target of a smart lighting system is to control light sources in an environment (e.g. home, office) adaptively according to user contexts and preferences. Literature work in this area focuses on traditional light ... 详细信息
来源: 评论
Web services on embedded systems - a performance study
Web services on embedded systems - a performance study
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Christin Groba Siobhán Clarke Lero Graduate School of Software Engineering Distributed Systems Group School of Computer Science and Statistics Trinity College Dublin Dublin Ireland
A platform-independent communication mechanism is essential for the seamless integration of embedded devices into the Web of things. Web services provide for such communication, though there remains an open question a... 详细信息
来源: 评论
Integrating people-centric sensing with social networks: A privacy research agenda
Integrating people-centric sensing with social networks: A p...
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Ioannis Krontiris Felix C. Freiling Laboratory of Dependable Distributed Systems University of Mannheim Germany
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices, such as the camera, the microphone o... 详细信息
来源: 评论
Optimal rate allocation of compressed data streams in multihop sensor networks
收藏 引用
5th ieee international conference on distributed computing in sensor systems, dcoss 2009
作者: Lin, Chun Lung Wang, Jia Shung Department of Computer Science National Tsing Hua Univeristy Hsinchu Taiwan
Consider that a transform coder is installed at each sensor node. In this paper, an analytical framework for optimal rate allocation of compressed data streams in wireless multihop sensor networks is presented. Compac... 详细信息
来源: 评论
In-network outlier detection in wireless sensor networks
In-network outlier detection in wireless sensor networks
收藏 引用
26th ieee Internationa26th ieee international conference on distributed computing systems, ICDCS 2006
作者: Branch, Joel Szymanski, Boleslaw Giannella, Chris Wolff, Ran Kargupta, Hillol Computer Science Rensselaer Polytechnic Institute 110 8th Street Troy NY 12180 Computer Science and Electrical Engineering University of Maryland Baltimore County 1000 Hilltop Circle Baltimore MD 21250
To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an algorithm that (1) is flexible with respect to the outlier definition, (2) works in-network with a communication load... 详细信息
来源: 评论
Secure location verification using radio broadcast
收藏 引用
ieee TRANSACTIONS ON DEPENDABLE AND SECURE computing 2006年 第4期3卷 377-385页
作者: Vora, Adnan Nesterenko, Mikhail Kent State Univ Dept Comp Sci Kent OH 44242 USA
Secure location verification is a recently stated problem that has a number of practical applications. the problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a desi... 详细信息
来源: 评论