咨询与建议

限定检索结果

文献类型

  • 30,489 篇 会议
  • 293 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 30,822 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,595 篇 工学
    • 15,167 篇 计算机科学与技术...
    • 6,502 篇 信息与通信工程
    • 6,259 篇 软件工程
    • 5,557 篇 电气工程
    • 2,798 篇 控制科学与工程
    • 1,088 篇 动力工程及工程热...
    • 971 篇 机械工程
    • 938 篇 仪器科学与技术
    • 839 篇 电子科学与技术(可...
    • 424 篇 测绘科学与技术
    • 392 篇 网络空间安全
    • 355 篇 生物工程
    • 291 篇 安全科学与工程
    • 274 篇 交通运输工程
    • 232 篇 生物医学工程(可授...
    • 227 篇 建筑学
    • 200 篇 土木工程
    • 200 篇 石油与天然气工程
  • 3,230 篇 理学
    • 1,844 篇 数学
    • 588 篇 系统科学
    • 541 篇 物理学
    • 443 篇 统计学(可授理学、...
    • 413 篇 生物学
    • 234 篇 化学
  • 2,661 篇 管理学
    • 2,069 篇 管理科学与工程(可...
    • 825 篇 图书情报与档案管...
    • 744 篇 工商管理
  • 417 篇 医学
    • 345 篇 临床医学
    • 180 篇 基础医学(可授医学...
  • 240 篇 法学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 110 篇 农学
  • 74 篇 军事学
  • 53 篇 教育学
  • 48 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 4,975 篇 wireless sensor ...
  • 3,284 篇 distributed comp...
  • 1,705 篇 sensor systems
  • 1,124 篇 protocols
  • 1,051 篇 distributed comp...
  • 1,049 篇 monitoring
  • 1,015 篇 computer archite...
  • 978 篇 cloud computing
  • 960 篇 computer network...
  • 911 篇 computer science
  • 889 篇 distributed data...
  • 837 篇 sensors
  • 831 篇 computational mo...
  • 822 篇 wireless communi...
  • 794 篇 robot sensing sy...
  • 660 篇 application soft...
  • 633 篇 routing
  • 573 篇 sensor phenomena...
  • 567 篇 internet of thin...
  • 561 篇 peer to peer com...

机构

  • 40 篇 department of co...
  • 33 篇 shanghai jiao to...
  • 30 篇 department of co...
  • 30 篇 ieee
  • 29 篇 distributed syst...
  • 28 篇 school of comput...
  • 27 篇 tsinghua univers...
  • 26 篇 school of comput...
  • 24 篇 suny stony brook...
  • 22 篇 nanjing univ sta...
  • 21 篇 georgia inst tec...
  • 19 篇 georgia state un...
  • 19 篇 hong kong univ s...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 18 篇 institute of par...
  • 17 篇 shanghai jiao to...
  • 17 篇 georgia inst tec...
  • 17 篇 univ chinese aca...
  • 16 篇 tsinghua univ de...

作者

  • 88 篇 dustdar schahram
  • 52 篇 rajkumar buyya
  • 35 篇 hong-linh truong
  • 28 篇 zomaya albert y.
  • 27 篇 klaus wehrle
  • 27 篇 wehrle klaus
  • 27 篇 wu jie
  • 26 篇 liu yang
  • 25 篇 yang yang
  • 22 篇 wang lei
  • 20 篇 fortino giancarl...
  • 19 篇 duerr frank
  • 18 篇 lei wang
  • 18 篇 wang guojun
  • 17 篇 li li
  • 16 篇 liu ling
  • 15 篇 rinner bernhard
  • 14 篇 zhang lei
  • 14 篇 stankovic john a...
  • 14 篇 xhafa fatos

语言

  • 29,798 篇 英文
  • 912 篇 其他
  • 117 篇 中文
  • 3 篇 法文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems"
30822 条 记 录,以下是4261-4270 订阅
排序:
A Layer-Based Sparsification Method For distributed DNN Training
A Layer-Based Sparsification Method For Distributed DNN Trai...
收藏 引用
ieee international conference on High Performance computing and Communications (HPCC)
作者: Yanqing Hu Qing Ye Zhongyu Zhang Jiancheng Lv Sichuan University Chengdu China
With the increasing size of Deep Neural Networks (DNNs) and datasets, DNN training will consume a lot of time. Various distributed strategies have been utilized to speed up the training process. Nevertheless, the freq... 详细信息
来源: 评论
A sensor attack detection method based on fusion interval and historical measurement in CPS  39
A sensor attack detection method based on fusion interval an...
收藏 引用
39th ieee international Performance computing and Communications conference (IPCCC)
作者: Cai, Xiaobo Han, Ke Li, Yan Li, Xuefei Zhang, Jiajin Zhang, Yue Yunnan Agr Univ Coll Big Data Kunming Yunnan Peoples R China Kunming Met Coll Sch Elect & Mech Engn Kunming Yunnan Peoples R China
Cyber-physical systems (CPS) is a next-generation intelligent system that realizes close integration of computing, communication and physical elements based on environmental perception. The interaction between informa... 详细信息
来源: 评论
A Cloud-Based Key Rolling Technique for Alleviating Join Procedure Replay Attacks in LoRaWAN-based Wireless sensor Networks
A Cloud-Based Key Rolling Technique for Alleviating Join Pro...
收藏 引用
ieee international conference on Big Data
作者: Dimitra Papatsaroucha Nikolaos Astyrakakis Evangelos Pallis Panagiotis I. Radoglou Grammatikis Panagiotis G. Sarigiannidis Evangelos K. Markakis Department of Computer & Electrical Engineering Hellenic Mediterranean University Heraklion Greece Department of Industrial Design and Production Engineering University of West Attica Athens Greece K3Y Sofia Bulgaria Department of Informatics and Telecommunication Engineering University of Western Macedonia Kozani Greece
Nowadays, numerous devices are utilizing the IoT world, connecting and providing access to data and sensor measurements in vast networks of interconnected objects and devices. Considering the great communication dista... 详细信息
来源: 评论
A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework
A Novel Blockchain-based Decentralized Multi-party Certifica...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shalitha Wijethilaka Awaneesh Kumar Yadav An Braeken Madhusanka Liyanage School of Computer Science University College Dublin Ireland Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee Uttarakhand India Department of Engineering Technology (INDI) Vrije Universiteit Brussel Belgium Centre for Wireless Communications University of Oulu Finland
Digital certificates play a significant role in the current communication systems. However, with the limitations in the existing Certificate Management Frameworks (CMFs), such as single point of failure, the profound ... 详细信息
来源: 评论
Design of MRCC for LCL Filtered Grid Connected Inverter with sensor-Less Active Damping
Design of MRCC for LCL Filtered Grid Connected Inverter with...
收藏 引用
Annual Siberian Russian Workshop on Electron Devices and Materials (EDM)
作者: Mohammad Alshiekh Department of Industrial Electronics Tomsk University of Control Systems and Radio Electronics (TUSUR) Tomsk Russia
Voltage source inverter is widely utilized in modern power systems, especially in distributed power generation systems that rely on renewable energy. The LCL filter is used to connect voltage source inverter to the gr... 详细信息
来源: 评论
Design and Development of Cloud Based Mobile Health Monitoring System  3
Design and Development of Cloud Based Mobile Health Monitori...
收藏 引用
3rd ieee international Virtual conference on Innovations in Power and Advanced computing Technologies, i-PACT 2021
作者: Prasanth, C.P. Prakash, R. Rufus, Elizabeth Alex, Zachariah C School of Electronics Engineering Vellore Institute of Technology Department of Internet of Things and Sensor Systems Vellore India School of Electronics Engineering Vellore Institute of Technology Department of Sensor and Biomedical Technology Vellore India
The present covid-19 pandemic necessitates the need for a cost effective and efficient remote health monitoring mechanisms for the collection, transmission, evaluation, and communication of patient health data from el... 详细信息
来源: 评论
distributed DoS Detection in IoT Networks Using Intelligent Machine Learning Algorithms  2
Distributed DoS Detection in IoT Networks Using Intelligent ...
收藏 引用
2nd international conference on Smart Technologies in computing, Electrical and Electronics, ICSTCEE 2021
作者: Binny, S. Pendyala, Shamili Srimani Pimo, S. John Aurelia, Sagaya Reddy, P Rahul Satyanarayana, Damaraju Sri Sai Kristu Jyoti College of Management and Technology Department of Computer Science Kerala India Institute of Aeronautical Engineering Department of ECE Hyderabad India St. Xavier's Catholic College of Engineering Nagercoil India Christ University Bangalore India Geethanjali Institute of Science and Technology ECE Nellore India Chalmers University of Technology Goteborg Sweden
The threat of a distributed Denial of Service (DDoS) attack on web-based services and applications is grave. It only takes a few minutes for one of these attacks to cripple these services, making them unavailable to a... 详细信息
来源: 评论
Enhancing Irrigation Efficiency with AI-Based Instinctive Irrigation System (IIS) in Wireless sensor Networks
Enhancing Irrigation Efficiency with AI-Based Instinctive Ir...
收藏 引用
ieee international conference on System, Computation, Automation and Networking (ICSCAN)
作者: M. Pajany K. Suresh Kumar T. Ananth Kumar R. Rajmohan K. Gopal Ram Department of Computer Science and Engineering Presidency University Bangalore Karnataka India Electronics and Communication Engineering IFET College of Engineering Tamil Nadu India Computer Science and Engineering IFET College of Engineering Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Tamil Nadu India Electronics and Communication Engineering Stella Mary's College of Engineering Tamil Nadu India
An AI-assisted intuitive irrigation system built on Arduino and Zigbee that operates within a wireless sensor network is an example of an innovative application of technology in the field of agriculture. This technolo...
来源: 评论
Predictive Maintenance in Electrical Machines: An Edge computing Approach
Predictive Maintenance in Electrical Machines: An Edge Compu...
收藏 引用
Industrial Cyber-Physical systems (ICPS)
作者: Javier De las Morenas Francisco Moya-Ferná ndez Mantis Research Group University of Castilla-La Mancha Almaden-Toledo Spain
Predictive maintenance is one of the premises of the Industry 4.0. A condition monitoring and fault diagnostic never seen before are possible with the new technologies embracing the digitalisation. This paper presents... 详细信息
来源: 评论
Zero Trust Score-based Network-level Access Control in Enterprise Networks
Zero Trust Score-based Network-level Access Control in Enter...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Leonard Bradatsch Oleksandr Miroshkin Nataša Trkulja Frank Kargl Institute of Distributed Systems Ulm University Ulm Germany KIZ Ulm University Ulm Germany
Zero Trust security has recently gained attention in enterprise network security. One of its key ideas is making network-level access decisions based on trust scores. However, score-based access control in the enterpr... 详细信息
来源: 评论