咨询与建议

限定检索结果

文献类型

  • 30,421 篇 会议
  • 297 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 30,758 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,582 篇 工学
    • 15,158 篇 计算机科学与技术...
    • 6,499 篇 信息与通信工程
    • 6,257 篇 软件工程
    • 5,558 篇 电气工程
    • 2,795 篇 控制科学与工程
    • 1,088 篇 动力工程及工程热...
    • 972 篇 机械工程
    • 938 篇 仪器科学与技术
    • 840 篇 电子科学与技术(可...
    • 424 篇 测绘科学与技术
    • 390 篇 网络空间安全
    • 355 篇 生物工程
    • 289 篇 安全科学与工程
    • 271 篇 交通运输工程
    • 231 篇 生物医学工程(可授...
    • 227 篇 建筑学
    • 200 篇 土木工程
    • 200 篇 石油与天然气工程
  • 3,229 篇 理学
    • 1,843 篇 数学
    • 588 篇 系统科学
    • 542 篇 物理学
    • 442 篇 统计学(可授理学、...
    • 413 篇 生物学
    • 233 篇 化学
  • 2,662 篇 管理学
    • 2,070 篇 管理科学与工程(可...
    • 825 篇 图书情报与档案管...
    • 744 篇 工商管理
  • 416 篇 医学
    • 344 篇 临床医学
    • 179 篇 基础医学(可授医学...
  • 239 篇 法学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 109 篇 农学
  • 74 篇 军事学
  • 53 篇 教育学
  • 48 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 4,966 篇 wireless sensor ...
  • 3,275 篇 distributed comp...
  • 1,700 篇 sensor systems
  • 1,120 篇 protocols
  • 1,049 篇 distributed comp...
  • 1,043 篇 monitoring
  • 1,010 篇 computer archite...
  • 976 篇 cloud computing
  • 961 篇 computer network...
  • 911 篇 computer science
  • 884 篇 distributed data...
  • 832 篇 sensors
  • 825 篇 computational mo...
  • 817 篇 wireless communi...
  • 795 篇 robot sensing sy...
  • 661 篇 application soft...
  • 629 篇 routing
  • 567 篇 sensor phenomena...
  • 564 篇 internet of thin...
  • 561 篇 peer to peer com...

机构

  • 40 篇 department of co...
  • 33 篇 shanghai jiao to...
  • 30 篇 department of co...
  • 30 篇 ieee
  • 29 篇 distributed syst...
  • 28 篇 school of comput...
  • 27 篇 tsinghua univers...
  • 26 篇 school of comput...
  • 24 篇 suny stony brook...
  • 22 篇 nanjing univ sta...
  • 21 篇 georgia inst tec...
  • 21 篇 state key labora...
  • 19 篇 georgia state un...
  • 19 篇 hong kong univ s...
  • 18 篇 school of comput...
  • 18 篇 institute of par...
  • 17 篇 shanghai jiao to...
  • 17 篇 georgia inst tec...
  • 17 篇 univ chinese aca...
  • 16 篇 tsinghua univ de...

作者

  • 88 篇 dustdar schahram
  • 52 篇 rajkumar buyya
  • 35 篇 hong-linh truong
  • 28 篇 zomaya albert y.
  • 27 篇 klaus wehrle
  • 27 篇 wu jie
  • 26 篇 liu yang
  • 26 篇 wehrle klaus
  • 25 篇 yang yang
  • 22 篇 wang lei
  • 20 篇 fortino giancarl...
  • 19 篇 duerr frank
  • 18 篇 lei wang
  • 18 篇 wang guojun
  • 17 篇 li li
  • 16 篇 rinner bernhard
  • 16 篇 liu ling
  • 14 篇 zhang lei
  • 14 篇 stankovic john a...
  • 14 篇 xhafa fatos

语言

  • 30,485 篇 英文
  • 161 篇 其他
  • 114 篇 中文
  • 3 篇 法文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems"
30758 条 记 录,以下是381-390 订阅
排序:
Modelling deployment costs of Precision Agriculture Monitoring systems  16
Modelling deployment costs of Precision Agriculture Monitori...
收藏 引用
16th Annual international conference on distributed computing in sensor systems (DCOSS)
作者: Triantafyllou, Anna Sarigiannidis, Panagiotis Bibi, Stamatia Vakouftsi, Fotini Vassilis, Pantzios Univ Western Macedonia Dept Elect & Comp Engn Kozani Greece Univ Western Macedonia Dept Mech Engn Kozani Greece Kozani Saffron Producers Cooperat Kozani Greece
Unmanned Aerial Vehicles (UAVs) and smart sensors are the tools towards the fifth agricultural revolution. Remote sensing is thriving in agriculture, broadening the horizons of cultivators and farming practitioners. H... 详细信息
来源: 评论
Fingerprinting Mobile User Positions in sensor Networks
Fingerprinting Mobile User Positions in Sensor Networks
收藏 引用
international conference on distributed computing systems (ICDCS 2010)
作者: Li, Mo Jiang, Xiaoye Guibas, Leonidas Stanford Univ Dept Comp Sci Stanford CA 94305 USA HKUST CSE Dept Hong Kong Hong Kong Peoples R China
We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through p... 详细信息
来源: 评论
(POSTER) Navigating the Unknown: Anomaly Detection in sensor Nodes Based on Event Traces  20
(POSTER) Navigating the Unknown: Anomaly Detection in Sensor...
收藏 引用
20th Annual international conference on distributed computing in Smart sensor systems and the Internet of Things (DCOSS-IoT)
作者: Band, Saurabh Foerster, Anna Univ Bremen Dept Sustainable Commun Networks Bremen Germany
In wireless sensor networks, post-deployment issues persist despite extensive testing, primarily due to unpredictable environmental factors and limited debugging tools for resource-constrained end nodes. This challeng... 详细信息
来源: 评论
How Different Transceiver Hardware Effects Concurrent Transmissions in WSNs  14
How Different Transceiver Hardware Effects Concurrent Transm...
收藏 引用
14th Annual international conference on distributed computing in sensor systems (DCOSS)
作者: von Zengen, Georg Baumstark, Alexander Willecke, Alexander Kulau, Ulf Wolf, Lars C. Tech Univ Carolo Wilhelmina Braunschweig Inst Operating Syst & Comp Networks Braunschweig Germany
The efficiency and effectiveness of network flooding protocols has recently been shown by many publications as well as real world deployments. One notable protocol is Glossy which combines Concurrent Transmission (CT)... 详细信息
来源: 评论
Practical Concurrent Wireless Charging Scheduling for sensor Networks  36
Practical Concurrent Wireless Charging Scheduling for Sensor...
收藏 引用
36th ieee international conference on distributed computing systems (ICDCS)
作者: Guo, Peng Liu, Xuefeng Tang, Tingfang Tang, Shaojie Cao, Jiannong Huazhong Univ Sci & Technol Wuhan Peoples R China Univ Texas Dallas Richardson TX 75083 USA Hong Kong Polytech Univ Hong Kong Hong Kong Peoples R China
In complex terrain where mobile chargers hardly move around, a feasible solution to charge wireless sensor networks (WSNs) is using multiple fixed chargers to charge WSNs concurrently with relative long distance. Due ... 详细信息
来源: 评论
Diffusion LMS Algorithms for sensor Networks over Non-ideal Inter-sensor Wireless Channels
Diffusion LMS Algorithms for Sensor Networks over Non-ideal ...
收藏 引用
7th ieee international conference on distributed computing in sensor systems (DCOSS)
作者: Abdolee, Reza Champagne, Benoit McGill Univ Montreal PQ H3A 2A7 Canada
In this paper, we propose diffusion-based least mean square (LMS) algorithms that are robust against fading phenomena in wireless channels. The proposed algorithms, developed by combining diffusion LMS and classical e... 详细信息
来源: 评论
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks
A Testing Framework for Discovering Vulnerabilities in 6LoWP...
收藏 引用
8th ieee international conference on distributed computing in sensor systems (DCOSS)/IWSN/WiSARN/PWSN
作者: Lahmadi, Abdelkader Brandin, Cesar Festor, Olivier Univ Lorraine LORIA F-54506 Vandoeuvre Les Nancy France
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. The 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low powe... 详细信息
来源: 评论
Scheduling High-Rate Unpredictable Traffic in ieee 802.15.4 TSCH Networks  13
Scheduling High-Rate Unpredictable Traffic in IEEE 802.15.4 ...
收藏 引用
13th ieee international conference on distributed computing in sensor systems (DCOSS)
作者: Elsts, Atis Fafoutis, Xenofon Pope, James Oikonomou, George Piechocki, Robert Craddock, Ian Univ Bristol Dept Elect & Elect Engn Bristol Avon England
The upcoming Internet of Things (IoT) applications include real-time human activity monitoring with wearable sensors. Compared to the traditional environmental sensing with low-power wireless nodes, these new applicat... 详细信息
来源: 评论
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless sensor Networks  37
Source Location Privacy-Aware Data Aggregation Scheduling fo...
收藏 引用
37th ieee international conference on distributed computing systems (ICDCS)
作者: Kirton, Jack Bradbury, Matthew Jhumka, Arshad Univ Warwick Dept Comp Sci Coventry W Midlands England
Source location privacy (SLP) is an important property for the class of asset monitoring problems in wireless sensor networks (WSNs). SLP aims to prevent an attacker from finding a valuable asset when a WSN node is br... 详细信息
来源: 评论
Evaluation of Occupancy Detection with distributed Environmental sensors for IoT Applications  20
Evaluation of Occupancy Detection with Distributed Environme...
收藏 引用
20th Annual international conference on distributed computing in Smart sensor systems and the Internet of Things (DCOSS-IoT)
作者: Bovo, Matteo Agyeman, Rockson Arif, Muhammad Rinner, Bernhard Univ Udine Dipartimento Matemat Informat & Fis Udine Italy Univ Klagenfurt Inst Networked & Embedded Syst Klagenfurt Austria AAU SAL USE Lab Silicon Austria Labs Klagenfurt Austria
Occupancy refers to the presence of people in rooms and buildings. It is an essential input for IoT applications, including controlling lighting, heating, access, and monitoring space limitation policies. Occupancy in... 详细信息
来源: 评论