咨询与建议

限定检索结果

文献类型

  • 30,489 篇 会议
  • 293 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 30,822 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,595 篇 工学
    • 15,167 篇 计算机科学与技术...
    • 6,502 篇 信息与通信工程
    • 6,259 篇 软件工程
    • 5,557 篇 电气工程
    • 2,798 篇 控制科学与工程
    • 1,088 篇 动力工程及工程热...
    • 971 篇 机械工程
    • 938 篇 仪器科学与技术
    • 839 篇 电子科学与技术(可...
    • 424 篇 测绘科学与技术
    • 392 篇 网络空间安全
    • 355 篇 生物工程
    • 291 篇 安全科学与工程
    • 274 篇 交通运输工程
    • 232 篇 生物医学工程(可授...
    • 227 篇 建筑学
    • 200 篇 土木工程
    • 200 篇 石油与天然气工程
  • 3,230 篇 理学
    • 1,844 篇 数学
    • 588 篇 系统科学
    • 541 篇 物理学
    • 443 篇 统计学(可授理学、...
    • 413 篇 生物学
    • 234 篇 化学
  • 2,661 篇 管理学
    • 2,069 篇 管理科学与工程(可...
    • 825 篇 图书情报与档案管...
    • 744 篇 工商管理
  • 417 篇 医学
    • 345 篇 临床医学
    • 180 篇 基础医学(可授医学...
  • 240 篇 法学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 110 篇 农学
  • 74 篇 军事学
  • 53 篇 教育学
  • 48 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 4,975 篇 wireless sensor ...
  • 3,284 篇 distributed comp...
  • 1,705 篇 sensor systems
  • 1,124 篇 protocols
  • 1,051 篇 distributed comp...
  • 1,049 篇 monitoring
  • 1,015 篇 computer archite...
  • 978 篇 cloud computing
  • 960 篇 computer network...
  • 911 篇 computer science
  • 889 篇 distributed data...
  • 837 篇 sensors
  • 831 篇 computational mo...
  • 822 篇 wireless communi...
  • 794 篇 robot sensing sy...
  • 660 篇 application soft...
  • 633 篇 routing
  • 573 篇 sensor phenomena...
  • 567 篇 internet of thin...
  • 561 篇 peer to peer com...

机构

  • 40 篇 department of co...
  • 33 篇 shanghai jiao to...
  • 30 篇 department of co...
  • 30 篇 ieee
  • 29 篇 distributed syst...
  • 28 篇 school of comput...
  • 27 篇 tsinghua univers...
  • 26 篇 school of comput...
  • 24 篇 suny stony brook...
  • 22 篇 nanjing univ sta...
  • 21 篇 georgia inst tec...
  • 19 篇 georgia state un...
  • 19 篇 hong kong univ s...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 18 篇 institute of par...
  • 17 篇 shanghai jiao to...
  • 17 篇 georgia inst tec...
  • 17 篇 univ chinese aca...
  • 16 篇 tsinghua univ de...

作者

  • 88 篇 dustdar schahram
  • 52 篇 rajkumar buyya
  • 35 篇 hong-linh truong
  • 28 篇 zomaya albert y.
  • 27 篇 klaus wehrle
  • 27 篇 wehrle klaus
  • 27 篇 wu jie
  • 26 篇 liu yang
  • 25 篇 yang yang
  • 22 篇 wang lei
  • 20 篇 fortino giancarl...
  • 19 篇 duerr frank
  • 18 篇 lei wang
  • 18 篇 wang guojun
  • 17 篇 li li
  • 16 篇 liu ling
  • 15 篇 rinner bernhard
  • 14 篇 zhang lei
  • 14 篇 stankovic john a...
  • 14 篇 xhafa fatos

语言

  • 29,798 篇 英文
  • 912 篇 其他
  • 117 篇 中文
  • 3 篇 法文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems"
30822 条 记 录,以下是4271-4280 订阅
排序:
DNA-based Secret Sharing and Hiding in Dispersed computing
DNA-based Secret Sharing and Hiding in Dispersed Computing
收藏 引用
ieee international conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Marek R. Ogiela Urszula Ogiela AGH University of Science and Technology Cryptography and Cognitive Informatics Laboratory Krakow Poland
In this paper will be described a new security protocol for secret sharing and hiding, which use selected personal features. Such technique allows to create human-oriented personalized security protocols dedicated for... 详细信息
来源: 评论
Portable Outdoor Air Quality Monitoring Using A Wireless sensor Network (WSN)  4
Portable Outdoor Air Quality Monitoring Using A Wireless Sen...
收藏 引用
4th ieee international conference on computing and Information Sciences, ICCIS 2021
作者: Aziz, Azrina Abd Drieberg, Micheal Halil, Nur Hazwani Ahmad Zahiruddin, Muhamad Amir Chandra, Indra Azwan, Mohamed Razif, Mohamed Universiti Teknologi PETRONAS Bandar Seri Iskandar Department of Electrical and Electronics Engineering Perak Malaysia Telkom University Engineering Physics School of Electrical Engineering Indonesia
Air pollution is a major environmental issue that is harmful to the living organisms and climate. The increasing level of air pollution contributed by the release of dangerous air particles are seriously degrading vis... 详细信息
来源: 评论
Intrusion Detection for Marine Meteorological sensor Network
Intrusion Detection for Marine Meteorological Sensor Network
收藏 引用
ieee international conference on Big Data and Cloud computing (BdCloud)
作者: Xin Su Guifu Zhang Minxue Zhang Baoliu Ye Hongyan Xing College of IOT Engineering Hohai University Changzhou Jiangsu China Information Department Hohai University Nanjing Jiangsu China Collaborative Innovation Center for Meteorological Disaster Prediction and Evaluation Nanjing University of Information Science and Technology Nanjing China Jiangsu Key Laboratory of Meteorological Detection and Information Processing Nanjing University of Information Science and Technology Nanjing China
The rapid development of intelligent devices and wireless communication has greatly promoted the intelligence of the maritime Internet of Things (MIoT) in recent years, and the marine meteorological sensor network (MM... 详细信息
来源: 评论
A 65nm 21.9pJ/Sa Pixel to PWM Conversion SoC with Time-domain Body Communication for ULP Body-Worn Video sensor Nodes with distributed Real-Time Inference
A 65nm 21.9pJ/Sa Pixel to PWM Conversion SoC with Time-domai...
收藏 引用
Custom Integrated Circuits conference (CICC)
作者: Gourab Barik Baibhab Chatterjee Gaurav Kumar K Shreyas Sen Purdue University USA University of Florida USA
With the growing presence of body-worn cameras, head-mounted devices, and smart glasses in the era of Internet of Bodies (loB) and Internet of Things (loT), the demand for low-power, smaller form-factor nodes for vide... 详细信息
来源: 评论
ENORMOuS: An environment-based autoscaling system.
ENORMOuS: An environment-based autoscaling system.
收藏 引用
ieee international conference on systems, Man, and Cybernetics (SMC)
作者: Gil-Azevedo, Renato Farias, Claudio Miceli Univ Fed Rio de Janeiro PPGI IM NCE Rio De Janeiro Brazil
This paper describes an auto scale approach driven by the use of environmental metrics to scale applications. On high granularity application environments, every application impacts directly in other applications. The... 详细信息
来源: 评论
A Hybrid Prediction Method Based on MODWT-EMD for Time Series in Wireless sensor Networks  16
A Hybrid Prediction Method Based on MODWT-EMD for Time Serie...
收藏 引用
16th ieee international conference on Intelligent systems and Knowledge Engineering, ISKE 2021
作者: Wang, Zhongmin Jia, Jingwen Gao, Cong Chen, Yanping Xia, Hong Xi'an University of Posts and Telecommunications Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an China Xi'an University of Posts and Telecommunications School of Computer Science Technology Xi'an China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an China
Time series is the main form of sensor data. Time series prediction is conducive to reduce the energy consumption of sensor nodes and increase the service life. As time cost and computation cost of the existing hybrid... 详细信息
来源: 评论
Personalized User Profiles-based Insider Threat Detection for distributed File System
Personalized User Profiles-based Insider Threat Detection fo...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Wu Xin Qingni Shen Ke Feng Yutang Xia Zhonghai Wu Zhenghao Lin Center for Data Science Academy for Advanced Interdisciplinary Studies Peking University Beijing China School of Software and Microelectronics Peking University Beijing China School of Economics Peking University Beijing China Questrom School of Business College of Arts & Sciences Boston University Boston Massachusetts United States
In recent years, data security incidents caused by insider threats in distributed file systems have attracted the attention of academia and industry. The most common way to detect insider threats is based on user prof... 详细信息
来源: 评论
Resource-Aware Split Federated Learning for Fall Detection in the Metaverse
Resource-Aware Split Federated Learning for Fall Detection i...
收藏 引用
ieee international conference on Wireless and Mobile computing, Networking And Communications (WiMob)
作者: Mohamad Wazzeh Ahmad Hammoud Mohsen Guizani Azzam Mourad Hadi Otrok Chamseddine Talhi Zbigniew Dziong Chang-Dong Wang Department of Software and IT Engineering Ecole de Technologie Supérieure Montreal Canada Department of CSM Artificial Intelligence and Cyber Systems Research Center Lebanese American University Beirut Lebanon Department of ML Mohamed Bin Zayed University of Artificial Intelligence Abu Dhabi UAE Department of Electrical Engineering Ecole de Technologie Supérieure Montreal Canada Department of Computer Science KU 6G Research Center Khalifa University Abu Dhabi UAE Department of Computer Science Center of Cyber-Physical Systems (C2PS) Khalifa University Abu Dhabi UAE School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
As the Metaverse develops, it is becoming more crucial to prioritize the safety of users, especially regarding the potential risks, such as users experiencing dizziness or making incorrect movements that may lead to f... 详细信息
来源: 评论
Sniffing Prevention in LoRa Network Using Combination of Advanced Encryption Standard (AES) and Message Authentication Code (MAC)
Sniffing Prevention in LoRa Network Using Combination of Adv...
收藏 引用
2021 international conference Advancement in Data Science, E-learning and Information systems, ICADEIS 2021
作者: Windya, Putri Apriyanti Suryani, Vera Wardana, Aulia Arif Telkom University School of Computing Bandung Indonesia
One of the characteristics of IoT devices is related to their limited resources. These devices are often referred to as IoT-constrained devices. The limited resources of IoT devices becomes a challenge in choosing an ... 详细信息
来源: 评论
4th international Symposium on Devices, Circuits and systems, ISDCS 2021 - conference Proceedings
4th International Symposium on Devices, Circuits and Systems...
收藏 引用
4th international Symposium on Devices, Circuits and systems, ISDCS 2021
The proceedings contain 32 papers. The topics discussed include: performance evaluation of unrolled cipher based glitch PUF implemented on Virtex-7;optimal sizing, placement and performance analysis of DSTATCOM with i...
来源: 评论