咨询与建议

限定检索结果

文献类型

  • 1,146 篇 会议
  • 11 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 827 篇 工学
    • 727 篇 计算机科学与技术...
    • 380 篇 电气工程
    • 244 篇 信息与通信工程
    • 200 篇 测绘科学与技术
    • 196 篇 软件工程
    • 177 篇 机械工程
    • 89 篇 控制科学与工程
    • 33 篇 动力工程及工程热...
    • 23 篇 电子科学与技术(可...
    • 21 篇 仪器科学与技术
    • 12 篇 安全科学与工程
    • 11 篇 交通运输工程
    • 8 篇 网络空间安全
    • 7 篇 土木工程
    • 5 篇 建筑学
    • 4 篇 力学(可授工学、理...
    • 3 篇 光学工程
  • 117 篇 理学
    • 90 篇 数学
    • 22 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 9 篇 系统科学
    • 8 篇 化学
    • 5 篇 生物学
    • 3 篇 大气科学
  • 77 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 11 篇 医学
    • 10 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 356 篇 wireless sensor ...
  • 82 篇 distributed comp...
  • 78 篇 sensors
  • 61 篇 protocols
  • 58 篇 distributed comp...
  • 57 篇 sensor systems
  • 56 篇 wireless communi...
  • 43 篇 sensor networks
  • 38 篇 energy consumpti...
  • 37 篇 computer science
  • 37 篇 routing
  • 34 篇 monitoring
  • 33 篇 mobile communica...
  • 32 篇 delay
  • 31 篇 wireless telecom...
  • 30 篇 mobile computing
  • 30 篇 computer network...
  • 29 篇 internet of thin...
  • 28 篇 sensor phenomena...
  • 27 篇 wireless sensor ...

机构

  • 7 篇 nanjing univ sta...
  • 5 篇 suny stony brook...
  • 4 篇 uppsala univ upp...
  • 4 篇 college of compu...
  • 4 篇 univ cyprus dept...
  • 4 篇 school of electr...
  • 4 篇 chalmers univ te...
  • 3 篇 tech univ carolo...
  • 3 篇 institute of ope...
  • 3 篇 dalian univ tech...
  • 3 篇 school of big da...
  • 3 篇 univ fed minas g...
  • 3 篇 univ missouri de...
  • 3 篇 univ kiel kiel
  • 3 篇 georgia state un...
  • 3 篇 hamburg univ tec...
  • 3 篇 department of co...
  • 3 篇 washington univ ...
  • 3 篇 eth dept comp sc...
  • 3 篇 univ cyprus dept...

作者

  • 10 篇 voigt thiemo
  • 8 篇 bar-noy amotz
  • 8 篇 vassiliou vasos
  • 8 篇 kulau ulf
  • 8 篇 nikoletseas soti...
  • 7 篇 landsiedel olaf
  • 7 篇 wolf lars
  • 6 篇 xing guoliang
  • 6 篇 thiemo voigt
  • 6 篇 beferull-lozano ...
  • 6 篇 rolim jose
  • 6 篇 angelopoulos con...
  • 6 篇 agrawal dharma p...
  • 6 篇 duquennoy simon
  • 5 篇 baltasar beferul...
  • 5 篇 dai haipeng
  • 5 篇 lars wolf
  • 5 篇 cao jiannong
  • 5 篇 sotiris nikolets...
  • 5 篇 das sajal k.

语言

  • 1,149 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"任意字段=First IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2005"
1159 条 记 录,以下是1031-1040 订阅
排序:
Defending against Sybil attacks in sensor networks
Defending against Sybil attacks in sensor networks
收藏 引用
international conference on distributed computing systems Workshop
作者: Qinghua Zhang Pan Wang D.S. Reeves Peng Ning Cyber Defense Laboratory Computer Science Department North Carolina State University Raleigh NC USA
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certificates are a way to prove identities. Ho... 详细信息
来源: 评论
A distributed system for answering range queries on sensor network data
A distributed system for answering range queries on sensor n...
收藏 引用
ieee Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: A. Cuzzocrea F. Furfaro S. Greco E. Masciari G.M. Mazzeo D. Sacca DEIS Università della Calabria Rende Italy ICAR-CNR Rende Italy
A distributed system for approximate query answering on sensor network data is proposed, where a suitable compression technique is exploited to represent data and support query answering. Each node of the system store... 详细信息
来源: 评论
A topologically-aware worm propagation model for wireless sensor networks
A topologically-aware worm propagation model for wireless se...
收藏 引用
international conference on distributed computing systems Workshop
作者: S.A. Khayam H. Radha Department of Electrical & Computer Engineering Michigan State University East Lansing MI USA
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propagation to disseminate security-critica... 详细信息
来源: 评论
A distributed and Cooperative Target Localization Algorithm in Wireless sensor Networks
A Distributed and Cooperative Target Localization Algorithm ...
收藏 引用
ieee international conference on Parallel and distributed computing, Applications and Technologies (PDCAT)
作者: Xing-yu Pi Hong-yi Yu Institute of Information Science and Technology Zhengzhou China
Wireless sensor networks (WSNs) are important for a number of strategic applications. Target localization is an important task in WSNs. In this paper, a distributed and cooperative target localization algorithm in wir... 详细信息
来源: 评论
A systems programming language for wireless networked embedded systems
A systems programming language for wireless networked embedd...
收藏 引用
ieee international conference on Parallel and distributed computing, Applications and Technologies (PDCAT)
作者: Xiaohua Luo Kougen Zheng Zhaohui Wu Yunhe Pan College of Computer Science University of Zhejiang Hangzhou Zhejiang China
Wireless networked sensors raise a great number of programming challenges in applications. In this paper, we present AntC, a systems programming language, which focuses on the super-micro embedded system that supports... 详细信息
来源: 评论
Resilient Localization for sensor Networks in Outdoor Environments
Resilient Localization for Sensor Networks in Outdoor Enviro...
收藏 引用
international conference on distributed computing systems
作者: YoungMin Kwon K. Mechitov S. Sundresh Wooyoung Kim Gul Agha Department of Computer Science University of Illinois Urbana-Champaign Urbana-Champaign IL USA
The process of computing the physical locations of nodes in a wireless sensor network is known as localization. Self-localization is critical for large-scale sensor networks because manual or assisted localization is ... 详细信息
来源: 评论
A Spatiotemporal Query Service for Mobile Users in sensor Networks
A Spatiotemporal Query Service for Mobile Users in Sensor Ne...
收藏 引用
international conference on distributed computing systems
作者: Chenyang Lu Guoliang Xing O. Chipara Chien-Liang Fok S. Bhattacharya Department of Computer Science and Engineering Washington University Saint Louis USA
This paper presents MobiQuery, a spatiotemporal query service that allows mobile users to periodically gather information from their surrounding areas through a wireless sensor network. A key advantage of MobiQuery li... 详细信息
来源: 评论
Reconciling the theory and practice of (un)reliable wireless broadcast
Reconciling the theory and practice of (un)reliable wireless...
收藏 引用
international conference on distributed computing systems Workshop
作者: G. Chockler M. Demirbas S. Gilbert N. Lynch C. Newport T. Nolte MIT Computer Science and Artificial Intelligence Laboratory USA
Theorists and practitioners have fairly different perspectives on how wireless broadcast works. Theorists think about synchrony; practitioners think about backoff. Theorists assume reliable communication; practitioner... 详细信息
来源: 评论
Symmetrical Fairness in Infrastructure Access in Multi-hop Wireless Networks
Symmetrical Fairness in Infrastructure Access in Multi-hop W...
收藏 引用
international conference on distributed computing systems
作者: S.M. Das H. Pucha Y.C. Hu School of Electrical and Computer Engineering Center for Wireless Systems and Applications Purdue University West Lafayette IN USA
In this paper, we study the problem of providing fairness in multi-hop wireless infrastructure access. In such networks, it is well known that the use of current media access and transport protocols can result in seve... 详细信息
来源: 评论
Efficient Power Management Based on Application Timing Semantics for Wireless sensor Networks
Efficient Power Management Based on Application Timing Seman...
收藏 引用
international conference on distributed computing systems
作者: O. Chipara Chenyang Lu G.-C. Roman Department of Computer Science and Engineering Washington University of Saint Louis USA
This paper proposes Efficient Sleep Scheduling based on Application Timing (ESSAT), a novel power management scheme that aggressively exploits the timing semantics of wireless sensor network applications. We present t... 详细信息
来源: 评论