咨询与建议

限定检索结果

文献类型

  • 888 篇 会议
  • 11 篇 期刊文献

馆藏范围

  • 899 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 486 篇 工学
    • 368 篇 计算机科学与技术...
    • 348 篇 电气工程
    • 214 篇 信息与通信工程
    • 89 篇 软件工程
    • 23 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 8 篇 光学工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 5 篇 航空宇航科学与技...
    • 4 篇 建筑学
    • 3 篇 力学(可授工学、理...
    • 3 篇 石油与天然气工程
    • 3 篇 安全科学与工程
  • 59 篇 理学
    • 38 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 12 篇 统计学(可授理学、...
  • 37 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 9 篇 图书情报与档案管...
  • 11 篇 教育学
    • 11 篇 教育学
  • 5 篇 法学
    • 5 篇 社会学
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学

主题

  • 112 篇 computer network...
  • 73 篇 wireless sensor ...
  • 50 篇 wireless network...
  • 40 篇 throughput
  • 39 篇 bandwidth
  • 38 篇 telecommunicatio...
  • 33 篇 protocols
  • 31 篇 computer science
  • 31 篇 neural networks
  • 31 篇 delay
  • 29 篇 routing
  • 29 篇 computer archite...
  • 28 篇 routing protocol...
  • 27 篇 ad hoc networks
  • 27 篇 quality of servi...
  • 26 篇 costs
  • 24 篇 ip networks
  • 23 篇 traffic control
  • 23 篇 network topology
  • 21 篇 conferences

机构

  • 5 篇 department of co...
  • 4 篇 univ hong kong d...
  • 4 篇 xidian univ stat...
  • 4 篇 tsinghua univ de...
  • 4 篇 institute of com...
  • 4 篇 graduate school ...
  • 4 篇 univ texas austi...
  • 3 篇 univ sci & techn...
  • 3 篇 univ calif river...
  • 3 篇 univ politecnica...
  • 3 篇 tsinghua univ de...
  • 3 篇 univ sci & techn...
  • 3 篇 univ wisconsin m...
  • 3 篇 school of comput...
  • 3 篇 univ calif los a...
  • 3 篇 iit dept comp sc...
  • 3 篇 politecnico di t...
  • 3 篇 tsinghua nationa...
  • 3 篇 tsinghua univ in...
  • 3 篇 imdea networks i...

作者

  • 4 篇 steinmetz ralf
  • 4 篇 ralf steinmetz
  • 3 篇 muntean gabriel-...
  • 3 篇 li xin
  • 3 篇 jayasumana anura...
  • 3 篇 boukerche azzedi...
  • 3 篇 li yong
  • 3 篇 hollick matthias
  • 3 篇 matthias hollick
  • 3 篇 farid naït-abdes...
  • 3 篇 wan peng-jun
  • 3 篇 li xiaoming
  • 3 篇 azzedine boukerc...
  • 3 篇 hossam hassanein
  • 3 篇 leonardi emilio
  • 3 篇 wang xinbing
  • 3 篇 libman lavy
  • 3 篇 anura p. jayasum...
  • 3 篇 wei yang
  • 3 篇 lavy libman

语言

  • 895 篇 英文
  • 4 篇 其他
检索条件"任意字段=IEEE 34th Conference on Local Computer Networks"
899 条 记 录,以下是21-30 订阅
排序:
Performance of Cooperative Relaying with ARQ in Wireless Sensor networks
Performance of Cooperative Relaying with ARQ in Wireless Sen...
收藏 引用
ieee 34th conference on local computer networks
作者: Culver, Stephen Gidlund, Mikael Wang, Gang NokiaSiemens Networks London England ABB Corp Res Vasteras Sweden Philips Res Eindhoven Netherlands
Cooperative transmission is an efficient technique to realize diversity gain in wireless fading channels via a distributed way. Cooperative automatic repeat request (ARQ) is known as a protocol which exploit spatial d... 详细信息
来源: 评论
Performance of a multi-channel MAC protocol based on ieee 802.15.4 Radio
Performance of a multi-channel MAC protocol based on IEEE 80...
收藏 引用
ieee 34th conference on local computer networks
作者: Namboothiri, P. Gireesan Sivalingam, Krishna M. Indian Inst Technol Dept CSE Madras 600036 Tamil Nadu India
this paper presents an implementation based study of multi-channel medium access control protocols in hardware constrained wireless sensor network(WSN) nodes with 802.15.4 radio. In the network architecture presented,... 详细信息
来源: 评论
Data Fusion Latency in Internet-Based Sensor networks
Data Fusion Latency in Internet-Based Sensor Networks
收藏 引用
ieee 34th conference on local computer networks
作者: Lee, Panho Jayasumana, Anura P. Doshi, Saket Chandrasekar, V. Colorado State Univ Dept Elect & Comp Engn Ft Collins CO 80523 USA
Multi-sensor data fusion latency in Internet-based sensor applications is analyzed. the Probabilistic Estimation of Periodic Backlog (PEPB) technique presented takes into account the nature of sensor data generation a... 详细信息
来源: 评论
On Limited-Range Strategic/Random Jamming Attacks in Wireless Ad hoc networks
On Limited-Range Strategic/Random Jamming Attacks in Wireles...
收藏 引用
ieee 34th conference on local computer networks
作者: Panyim, Korporn Hayajneh, thaier Krishnamurthy, Prashant Tipper, David Univ Pittsburgh Pittsburgh PA 15213 USA
Jamming attacks are considered one of the most devastating attacks as they are difficult to prevent and sometimes hard to detect. In this paper we consider the impact of the placement and range of limited-range jammer...
来源: 评论
A Polling Method Using Orthogonal Signalling for Wireless local Area networks
A Polling Method Using Orthogonal Signalling for Wireless Lo...
收藏 引用
ieee 34th conference on local computer networks
作者: Ko, Jae Hoon Kwon, Soonmok Kim, Cheeha Pohang Univ Sci & Technol POSTECH Dept Comp Sci & Engn Pohang Gyungbuk South Korea
the point coordination function (PCF) of the ieee 802.11 WLAN facilitates deterministic frame transfer by a polling mechanism. this enables to support quality of service. Despite this benefit the PCF could be ineffici... 详细信息
来源: 评论
Enhanced Access Network Discovery and Selection in 3GPP Evolved Packet Core
Enhanced Access Network Discovery and Selection in 3GPP Evol...
收藏 引用
ieee 34th conference on local computer networks
作者: Corici, Marius Diez, Alberto Vingarzan, Dragos Magedanz, thomas Pampu, Cornel Qing, Zhou Fraunhofer Fokus Inst Berlin Germany Huawei Technol Berlin Germany
Mobility in a wireless heterogeneous scenario in which the mobile devices are able to connect to more than one access technology requires a new architectural development for the network connectivity management. the pr... 详细信息
来源: 评论
Distributed Bandwidth Reservation Strategies to Support Efficient Bandwidth Utilization and QoS on a Per-Link Basis in ieee 802.16 Mesh networks
Distributed Bandwidth Reservation Strategies to Support Effi...
收藏 引用
ieee 34th conference on local computer networks
作者: Mogre, Parag S. Hollick, Matthias Steinmetz, Ralf Dadia, Viraj Sengupta, Somnath Tech Univ Darmstadt Multimedia Commun Lab KOM Darmstadt Germany Kalpana Chaola Space Technol Cell Elect & Elect Commun Engn Dept Kharagpur W Bengal India
the ieee 802.16 standard specifies a MeSH mode of operation which permits the setup of Wireless Mesh networks (WMN) with per-link QoS support. the standard specifies both distributed as well as centralized reservation... 详细信息
来源: 评论
On-demand Multicast Routing Protocol with local Repair and Quality of Service Support
On-demand Multicast Routing Protocol with Local Repair and Q...
收藏 引用
ieee 34th conference on local computer networks
作者: Nourazar, Saeed Kaboudvand, Frazaneh Khavasi, Ali Asghar Khodabandeh Azad Univ Dept Comp Engn Zanjan Iran Zanjan Azad Univ Dept Comp Engn Zanjan Iran
In this paper we propose a mesh based" on demand" multicast routing protocol for Ad-Hoc networks with QoS (quality of service) and reliable multicast support. the proposed scheme has five key features;(a) it... 详细信息
来源: 评论
Evaluation of IPv6 over Low-Power Wireless Personal Area networks Implementations
Evaluation of IPv6 over Low-Power Wireless Personal Area Net...
收藏 引用
ieee 34th conference on local computer networks
作者: Korte, Kevin Dominik Tumar, Iyad Schoenwaelder, Juergen Jacobs Univ Bremen D-28759 Bremen Germany
A common radio technology used in wireless sensor networks is the ieee 802.15.4 standard. Wireless sensor networks have so far used custom, light-weight, and application specific network protocols on top of ieee 802.1... 详细信息
来源: 评论
Stealthy dissemination in intruder tracking sensor networks
Stealthy dissemination in intruder tracking sensor networks
收藏 引用
ieee 34th conference on local computer networks
作者: Turgut, Damla Turgut, Beguemhan Boeloeni, Ladislau Univ Cent Florida Sch EECS 4000 Cent Florida Ave Orlando FL 32816 USA Rutgers State Univ Dept Comp Sci Piscataway NJ 08854 USA
Many sensor networks are deployed to detect and track intruders. If the existence and location of sensor nodes is disclosed to the opponent, the nodes can be easily disabled or compromised. Wireless transmissions in t... 详细信息
来源: 评论