咨询与建议

限定检索结果

文献类型

  • 30,570 篇 会议
  • 296 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 30,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,665 篇 工学
    • 15,226 篇 计算机科学与技术...
    • 6,553 篇 信息与通信工程
    • 6,289 篇 软件工程
    • 5,594 篇 电气工程
    • 2,850 篇 控制科学与工程
    • 1,102 篇 动力工程及工程热...
    • 978 篇 机械工程
    • 942 篇 仪器科学与技术
    • 850 篇 电子科学与技术(可...
    • 430 篇 网络空间安全
    • 424 篇 测绘科学与技术
    • 355 篇 生物工程
    • 306 篇 安全科学与工程
    • 289 篇 交通运输工程
    • 233 篇 生物医学工程(可授...
    • 227 篇 建筑学
    • 219 篇 石油与天然气工程
    • 200 篇 土木工程
    • 181 篇 环境科学与工程(可...
  • 3,249 篇 理学
    • 1,857 篇 数学
    • 588 篇 系统科学
    • 544 篇 物理学
    • 449 篇 统计学(可授理学、...
    • 413 篇 生物学
    • 238 篇 化学
  • 2,701 篇 管理学
    • 2,108 篇 管理科学与工程(可...
    • 844 篇 图书情报与档案管...
    • 746 篇 工商管理
  • 420 篇 医学
    • 345 篇 临床医学
  • 247 篇 法学
  • 196 篇 经济学
    • 195 篇 应用经济学
  • 111 篇 农学
  • 74 篇 军事学
  • 54 篇 教育学
  • 48 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 4,984 篇 wireless sensor ...
  • 3,284 篇 distributed comp...
  • 1,706 篇 sensor systems
  • 1,123 篇 protocols
  • 1,052 篇 monitoring
  • 1,052 篇 distributed comp...
  • 1,015 篇 computer archite...
  • 979 篇 cloud computing
  • 961 篇 computer network...
  • 911 篇 computer science
  • 890 篇 distributed data...
  • 842 篇 sensors
  • 832 篇 computational mo...
  • 823 篇 wireless communi...
  • 796 篇 robot sensing sy...
  • 660 篇 application soft...
  • 633 篇 routing
  • 575 篇 internet of thin...
  • 573 篇 sensor phenomena...
  • 561 篇 peer to peer com...

机构

  • 40 篇 department of co...
  • 33 篇 shanghai jiao to...
  • 30 篇 distributed syst...
  • 30 篇 department of co...
  • 30 篇 ieee
  • 28 篇 school of comput...
  • 27 篇 tsinghua univers...
  • 26 篇 school of comput...
  • 24 篇 suny stony brook...
  • 22 篇 nanjing univ sta...
  • 21 篇 georgia inst tec...
  • 19 篇 georgia state un...
  • 19 篇 hong kong univ s...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 18 篇 institute of par...
  • 17 篇 shanghai jiao to...
  • 17 篇 georgia inst tec...
  • 17 篇 univ chinese aca...
  • 16 篇 tsinghua univ de...

作者

  • 88 篇 dustdar schahram
  • 52 篇 rajkumar buyya
  • 35 篇 hong-linh truong
  • 28 篇 zomaya albert y.
  • 27 篇 klaus wehrle
  • 27 篇 wehrle klaus
  • 27 篇 wu jie
  • 26 篇 liu yang
  • 25 篇 yang yang
  • 22 篇 wang lei
  • 20 篇 fortino giancarl...
  • 19 篇 duerr frank
  • 18 篇 lei wang
  • 18 篇 wang guojun
  • 17 篇 li li
  • 16 篇 rinner bernhard
  • 16 篇 liu ling
  • 14 篇 zhang lei
  • 14 篇 stankovic john a...
  • 14 篇 xhafa fatos

语言

  • 29,528 篇 英文
  • 1,266 篇 其他
  • 118 篇 中文
  • 3 篇 法文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems"
30906 条 记 录,以下是4201-4210 订阅
排序:
A Middleware for Digital Twin-Enabled Flying Network Simulations Using UBSim and UB-ANC
A Middleware for Digital Twin-Enabled Flying Network Simulat...
收藏 引用
international conference on distributed computing in sensor systems (DCOSS)
作者: Sabarish Krishna Moorthy Ankush Harindranath Maxwell McManus Zhangyu Guan Nicholas Mastronarde Elizabeth Serena Bentley Michael Medley Department of Electrical Engineering University at Buffalo Buffalo NY USA Air Force Research Laboratory (AFRL) Rome NY USA
Data-driven control based on AI/ML techniques has a great potential to enable zero-touch automated modeling, optimization and control of complex wireless systems. However, it is challenging to collect network traces i... 详细信息
来源: 评论
Lifecycle Management Protocols for Batteryless, Intermittent sensor Nodes  39
Lifecycle Management Protocols for Batteryless, Intermittent...
收藏 引用
39th ieee international Performance computing and Communications conference (IPCCC)
作者: Wymore, Mathew L. Deep, Vishal Narayanan, Vishak Duwe, Henry Qiao, Daji Iowa State Univ Elect & Comp Engn Ames IA 50011 USA
Nodes in batteryless sensor networks operate intermittently, making tasks such as node-to-node communication and coordinated computation extremely challenging. Adding to this challenge, a node typically has little con... 详细信息
来源: 评论
Optimized Data Storage Algorithm of IoT Based on Cloud computing in distributed System
Optimized Data Storage Algorithm of IoT Based on Cloud Compu...
收藏 引用
Emerging Trends in Industry 4.0 (ETI 4.0)
作者: K.Jaya Deepthi T.Suresh Balakrishnan Prabhakar Krishnan U.Samson Ebenezar Nageshwari Department of AIML Mohan Babu University Tirupati-2 AP India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India IEEE Research Scientist Center for Cyber security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri-campus India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical SciencesSaveetha University Chennai Tamil Nadu India Department of Computer Science and Engineering CARE College of Engineering Trichy Tamil Nadu
IoT and cloud technology are vital for large systems. An improved data storage technique for IoT applications and cloud distribution is described in this research. Scalability, reliability, latency, and resource usage... 详细信息
来源: 评论
2021 ieee/CIC international conference on Communications in China, ICCC 2021
2021 IEEE/CIC International Conference on Communications in ...
收藏 引用
2021 ieee/CIC international conference on Communications in China, ICCC 2021
The proceedings contain 207 papers. The topics discussed include: unsourced random access with a massive MIMO receiver: exploiting angular domain sparsity;BS-RIS-user association and beamforming designs for RIS-aided ...
来源: 评论
ERAIA - Enabling Intelligence Data Pipelines for IoT-based Application systems  18
ERAIA - Enabling Intelligence Data Pipelines for IoT-based A...
收藏 引用
ieee international conference on Pervasive computing and Communications (PerCom)
作者: Hernandez, Aitor Xiao, Bin Tudor, Valentin Ericsson Res Stockholm Sweden
Establishing upon the connectivity layer provided by Internet of Things (IoT) platforms, modern industries are moving towards management and computation solutions which enable Artificial Intelligence (AI) services for... 详细信息
来源: 评论
distributed Scheduling Algorithm for Optimizing Age of Information in Wireless Networks  39
Distributed Scheduling Algorithm for Optimizing Age of Infor...
收藏 引用
39th ieee international Performance computing and Communications conference (IPCCC)
作者: Yu, Dongxiao Duan, Xinpeng Li, Feng Liang, Yi Yang, Huan Yu, Jiguo Shandong Unaivers Sch Comp Sci & Technol Qingdao Peoples R China Georgia State Univ Dept Comp Sci Atlanta GA 30303 USA Qingdao Univ Coll Comp Sci & Technol Qingdao Peoples R China Qilu Univ Technol Sch Comp Sci & Technol Shandong Acad Sci Jinan Peoples R China Shandong Comp Sci Ctr Natl Supercomp Ctr Jinan Jinan Peoples R China
Age of Information (AoI) is an emerging concept to model information freshness from the perspective of destinations of information deliveries. Serving as a metric to characterize the data delivery timeliness, the peak... 详细信息
来源: 评论
RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0
RunPHI: Enabling Mixed-criticality Containers via Partitioni...
收藏 引用
ieee international conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Marco Barletta Marcello Cinque Luigi De Simone Raffaele Della Corte Giorgio Farina Daniele Ottaviano DIETI - Universitaà degli Studi di Napoli Federico II Napoli Italy
Orchestration systems are becoming a key component to automatically manage distributed computing resources in many fields with criticality requirements like Industry 4.0 (14.0). However, they are mainly linked to OS-l... 详细信息
来源: 评论
Acoustic sensor Networks: An Energy Efficient Grey Wolf Optimization Algorithm development for underwater networks  1
Acoustic Sensor Networks: An Energy Efficient Grey Wolf Opti...
收藏 引用
1st ieee international Interdisciplinary Humanitarian conference for Sustainability, IIHC 2022
作者: Vanitha, V. Barve, Amit Singh, Arjun Javanthi, R. Dwivedi, Rakesh Kumar Vishwath, N.C. Ajay India Department of CSE PIET Parul University Gujarat Vadodara India Dev Bhoomi Uttarakhand University Department of School of Engineering Uttarakhand Dehradun India Department of Computer Science & IT Bangalore India Faculty of Engineering Teer Thanker Mahaveer University Department of Computing Sciences & IT Uttar Pradesh Moradabad India Parul University Aeronautical Department Parul Institute of Engineering and Technology India
Underground wireless sensors (UWASNs) are intended to serve a range of needs for global research and marine management. For some of these uses, the network of several sensors is positioned underwater at various depths... 详细信息
来源: 评论
XGBoost and Deep Learning Based-Federated Learning for DDoS Attack Detection in 5G Core Network VNFs
XGBoost and Deep Learning Based-Federated Learning for DDoS ...
收藏 引用
ieee international conference on Computer Communication and the Internet (ICCCI)
作者: Abdoul-Aziz Maiga Edwin Ataro Stanley Githinji Pan African University Institute for Basic Sciences Technology and Innovation Nairobi Kenya Department of Electrical and Electronic Engineering Technical University of Kenya Nairobi Kenya Department of Computing United States International University-Africa (USIU-A) Nairobi Kenya
distributed Denial-of-Service (DDoS) attacks can employ cloud network zombies to compromise the availability of 5G network services and hinder the ability of telecommunication service providers (TSPs) to deliver promi... 详细信息
来源: 评论
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
international conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论