咨询与建议

限定检索结果

文献类型

  • 3,135 篇 会议
  • 35 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 3,174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,909 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 744 篇 信息与通信工程
    • 711 篇 电气工程
    • 502 篇 软件工程
    • 254 篇 测绘科学与技术
    • 227 篇 控制科学与工程
    • 223 篇 机械工程
    • 143 篇 动力工程及工程热...
    • 90 篇 仪器科学与技术
    • 59 篇 电子科学与技术(可...
    • 51 篇 网络空间安全
    • 48 篇 安全科学与工程
    • 46 篇 交通运输工程
    • 28 篇 生物工程
    • 27 篇 土木工程
    • 22 篇 建筑学
    • 13 篇 化学工程与技术
  • 272 篇 理学
    • 148 篇 数学
    • 53 篇 化学
    • 41 篇 系统科学
    • 35 篇 统计学(可授理学、...
    • 32 篇 生物学
    • 26 篇 物理学
  • 221 篇 管理学
    • 175 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 28 篇 医学
    • 20 篇 临床医学
    • 11 篇 公共卫生与预防医...
  • 25 篇 法学
    • 22 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 10 篇 军事学
  • 9 篇 文学
  • 7 篇 农学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 986 篇 wireless sensor ...
  • 268 篇 sensor systems
  • 223 篇 distributed comp...
  • 182 篇 sensors
  • 166 篇 wireless communi...
  • 156 篇 protocols
  • 150 篇 monitoring
  • 113 篇 sensor networks
  • 111 篇 routing
  • 109 篇 computer network...
  • 103 篇 sensor phenomena...
  • 99 篇 internet of thin...
  • 98 篇 energy consumpti...
  • 98 篇 robot sensing sy...
  • 96 篇 mobile communica...
  • 89 篇 sensor nodes
  • 86 篇 mobile computing
  • 85 篇 energy efficienc...
  • 80 篇 intelligent sens...
  • 77 篇 computer archite...

机构

  • 9 篇 nanjing univ sta...
  • 9 篇 suny stony brook...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 state key labora...
  • 7 篇 department of co...
  • 7 篇 hong kong univ s...
  • 6 篇 dalian univ tech...
  • 6 篇 department of el...
  • 6 篇 department of co...
  • 6 篇 missouri univ sc...
  • 6 篇 michigan state u...
  • 6 篇 key lab ubiquito...
  • 6 篇 univ virginia de...
  • 6 篇 univ illinois de...
  • 6 篇 institute of com...
  • 5 篇 college of compu...
  • 5 篇 georgia state un...
  • 5 篇 distributed syst...

作者

  • 17 篇 dharma p. agrawa...
  • 16 篇 sotiris nikolets...
  • 13 篇 agrawal dharma p...
  • 12 篇 abdelzaher tarek
  • 11 篇 bar-noy amotz
  • 11 篇 sarigiannidis pa...
  • 11 篇 voigt thiemo
  • 11 篇 nikoletseas soti...
  • 11 篇 liu yunhao
  • 10 篇 stankovic john a...
  • 10 篇 wu jie
  • 9 篇 panagiotis sarig...
  • 9 篇 lars wolf
  • 9 篇 rothermel kurt
  • 9 篇 jiannong cao
  • 8 篇 thomas lagkas
  • 8 篇 vassiliou vasos
  • 8 篇 lagkas thomas
  • 8 篇 dai haipeng
  • 8 篇 ulf kulau

语言

  • 3,105 篇 英文
  • 60 篇 其他
  • 12 篇 中文
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems DCoSS"
3174 条 记 录,以下是2351-2360 订阅
排序:
distributed computing in sensor systems - Second ieee international conference, dcoss 2006, Proceedings
收藏 引用
2nd ieee international conference - distributed computing in sensor systems, dcoss 2006
The proceedings contain 33 papers. The topics discussed include: stabilizing consensus in mobile networks;when birds die: making population protocols fault-tolerant;distributed model-free stochastic optimization in wi... 详细信息
来源: 评论
distributed Connected Dominating Set Construction in Geometric k-Disk Graphs
Distributed Connected Dominating Set Construction in Geometr...
收藏 引用
28th international conference on distributed computing systems
作者: Xing, Kai Cheng, Wei Park, E. K. Rotenstreich, Shmuel George Washington Univ Washington DC 20052 USA Univ Missouri Comp Sci & Elect Engn Kansas City MO 64110 USA
In this paper we study the problem of minimum connected dominating set in geometric k-disk graphs. This research is motivated by the problem of virtual backbone construction in wireless ad hoc and sensor networks, whe... 详细信息
来源: 评论
Improving Energy Conservation Using Bulk Transmission over High-Power Radios in sensor Networks
Improving Energy Conservation Using Bulk Transmission over H...
收藏 引用
28th international conference on distributed computing systems
作者: Sengul, Cigdem Bakht, Mehedi Harris, Albert, III Abdelzaher, Tarek Kravets, Robin ASAP/INRIA UIUC CReSIS-KU
Low power radios, such as the CC2420, have been widely popular with recent sensor platforms. This paper explores the potential for energy savings from adding a high-power high-bandwidth, radio to current sensor platfo... 详细信息
来源: 评论
Comparing Symmetric-key and Public-key based Security Schemes in sensor Networks: A Case Study of User Access Control
Comparing Symmetric-key and Public-key based Security Scheme...
收藏 引用
28th international conference on distributed computing systems
作者: Wang, Haodong Sheng, Bo Tan, Chiu C. Li, Qun Coll William & Mary Williamsburg VA 23187 USA
While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public... 详细信息
来源: 评论
Locality Sensitive Information Brokerage in distributed sensor Networks
Locality Sensitive Information Brokerage in Distributed Sens...
收藏 引用
28th international conference on distributed computing systems
作者: Lu, Hong Jiang, Anxiao (Andrew) Liu, Steve Texas A&M Univ Dept Comp Sci College Stn TX 77843 USA
In sensor network applications, sensors often need to retrieve data from each (other. Information brokerage is a scheme that stores data (or index files of data) at rendezvous nodes, so that every sensor can efficient... 详细信息
来源: 评论
Data Estimation in sensor Networks Using Physical and Statistical Methodologies
Data Estimation in Sensor Networks Using Physical and Statis...
收藏 引用
28th international conference on distributed computing systems
作者: Li, Yingshu Ai, Chunyu Deshmukh, Wiwek R. Wu, Yiwei Georgia State Univ Dept Comp Sci Atlanta GA 30303 USA
Wireless sensor Networks (WSNs) are employed in many applications in order to collect data. One key challenge is to minimize energy consumption to prolong network lifetime. A scheme of making some nodes asleep and est... 详细信息
来源: 评论
Probing Queries in Wireless sensor Networks
Probing Queries in Wireless Sensor Networks
收藏 引用
28th international conference on distributed computing systems
作者: Pan, Liqiang Luo, Jizhou Li, Jianzhong Harbin Inst Technol Sch Comp Sci & Technol Harbin 150006 Peoples R China
For queries in wireless sensor networks, empty sets may be returned as query results which could confuse users a lot and users obtain no useful information about the monitored objects from the empty sets. To solve the... 详细信息
来源: 评论
Hotness-aware sensor Networks
Hotness-aware Sensor Networks
收藏 引用
28th international conference on distributed computing systems
作者: Li, Dong Zhu, Yanmin Cui, Li Ni, Lionel M. Chinese Acad Sci Inst Comp Sci Beijing 100864 Peoples R China Hong Kong Univ Sci & Technol Hong Kong Peoples R China Grad Sch Chinese Acad Sci Beijing 100864 Peoples R China Imperial Coll London London England
In a realistic sensor network, in particular with a non-uniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are subject to excessive power consumpti... 详细信息
来源: 评论
Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile sensor Networks
Connectivity-Guaranteed and Obstacle-Adaptive Deployment Sch...
收藏 引用
28th international conference on distributed computing systems
作者: Tan, Guang Jarvis, Stephen A. Kermarrec, Anne-Marie INRIA Rennes F-35043 Rennes France Univ Warwick Dept Comp Sci Coventry CV4 7AL W Midlands England
Mobile sensors can move and self-deploy into a network. While focusing on the problems of coverage, existing deployment schemes mostly over-simplify the conditions for network connectivity: they either assume that the... 详细信息
来源: 评论
Real-time Detection of Clone Attacks in Wireless sensor Networks
Real-time Detection of Clone Attacks in Wireless Sensor Netw...
收藏 引用
28th international conference on distributed computing systems
作者: Xing, Kai Liu, Fang Cheng, Xiuzhen Du, David H. C. George Washington Univ Dept Comp Sci Washington DC 20052 USA Univ Texas Pan Amer Dept Comp Sci Edinburg TX 78541 USA Univ Minnesota NSF Dept Comp Sci & Engn Minneapolis MN 55455 USA
A central problem in sensor network security is that sensor, are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node... 详细信息
来源: 评论