咨询与建议

限定检索结果

文献类型

  • 3,135 篇 会议
  • 35 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 3,174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,909 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 744 篇 信息与通信工程
    • 711 篇 电气工程
    • 502 篇 软件工程
    • 254 篇 测绘科学与技术
    • 227 篇 控制科学与工程
    • 223 篇 机械工程
    • 143 篇 动力工程及工程热...
    • 90 篇 仪器科学与技术
    • 59 篇 电子科学与技术(可...
    • 51 篇 网络空间安全
    • 48 篇 安全科学与工程
    • 46 篇 交通运输工程
    • 28 篇 生物工程
    • 27 篇 土木工程
    • 22 篇 建筑学
    • 13 篇 化学工程与技术
  • 272 篇 理学
    • 148 篇 数学
    • 53 篇 化学
    • 41 篇 系统科学
    • 35 篇 统计学(可授理学、...
    • 32 篇 生物学
    • 26 篇 物理学
  • 221 篇 管理学
    • 175 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 28 篇 医学
    • 20 篇 临床医学
    • 11 篇 公共卫生与预防医...
  • 25 篇 法学
    • 22 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 10 篇 军事学
  • 9 篇 文学
  • 7 篇 农学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 986 篇 wireless sensor ...
  • 268 篇 sensor systems
  • 223 篇 distributed comp...
  • 186 篇 sensors
  • 166 篇 wireless communi...
  • 156 篇 protocols
  • 150 篇 monitoring
  • 111 篇 routing
  • 111 篇 sensor networks
  • 110 篇 computer network...
  • 103 篇 sensor phenomena...
  • 99 篇 internet of thin...
  • 98 篇 energy consumpti...
  • 98 篇 robot sensing sy...
  • 96 篇 mobile communica...
  • 89 篇 sensor nodes
  • 87 篇 mobile computing
  • 84 篇 energy efficienc...
  • 79 篇 distributed data...
  • 79 篇 intelligent sens...

机构

  • 9 篇 nanjing univ sta...
  • 9 篇 suny stony brook...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 state key labora...
  • 7 篇 department of co...
  • 7 篇 hong kong univ s...
  • 6 篇 dalian univ tech...
  • 6 篇 department of el...
  • 6 篇 department of co...
  • 6 篇 missouri univ sc...
  • 6 篇 michigan state u...
  • 6 篇 key lab ubiquito...
  • 6 篇 univ virginia de...
  • 6 篇 univ illinois de...
  • 6 篇 institute of com...
  • 5 篇 college of compu...
  • 5 篇 georgia state un...
  • 5 篇 distributed syst...

作者

  • 17 篇 dharma p. agrawa...
  • 16 篇 sotiris nikolets...
  • 13 篇 agrawal dharma p...
  • 12 篇 abdelzaher tarek
  • 11 篇 bar-noy amotz
  • 11 篇 sarigiannidis pa...
  • 11 篇 voigt thiemo
  • 11 篇 nikoletseas soti...
  • 11 篇 liu yunhao
  • 10 篇 stankovic john a...
  • 10 篇 wu jie
  • 9 篇 panagiotis sarig...
  • 9 篇 lars wolf
  • 9 篇 rothermel kurt
  • 9 篇 jiannong cao
  • 8 篇 thomas lagkas
  • 8 篇 vassiliou vasos
  • 8 篇 lagkas thomas
  • 8 篇 dai haipeng
  • 8 篇 ulf kulau

语言

  • 3,105 篇 英文
  • 60 篇 其他
  • 12 篇 中文
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems DCoSS"
3174 条 记 录,以下是2391-2400 订阅
排序:
Pair-wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless sensor Networks using Vector Algebra
Pair-wise Network Topology Authenticated Hybrid Cryptographi...
收藏 引用
5th ieee international conference on Mobile Ad-Hoc and sensor systems
作者: Pugliese, Marco Santucci, Fortunato Univ Aquila Ctr Excellence DEWS I-67100 Laquila Italy
This paper proposes a novel hybrid cryptographic scheme for the generation of pair-wise network topology authenticated (TAK) keys in a Wireless sensor Network (WSN) using vector algebra in GF(q). The proposed scheme i... 详细信息
来源: 评论
DPICache: A distributed Program Image Cache for Wireless sensor Networks
DPICache: A Distributed Program Image Cache for Wireless Sen...
收藏 引用
ieee/ASME international conference on Mechatronic and Embedded systems and Applications
作者: Ellul, Joshua Martinez, Kirk Univ Southampton Dept Elect & Comp Sci Southampton SO17 1BJ Hants England
Wireless sensor networks, like other computing platforms, require software updates from time to time due to software bugs, new functionality, better understanding of the surrounding environment or new applications. Ph... 详细信息
来源: 评论
CME: A contour mapping engine in wireless sensor networks
CME: A contour mapping engine in wireless sensor networks
收藏 引用
28th international conference on distributed computing systems, ICDCS 2008
作者: Xu, Yingqi Lee, Wang-Chien Mitchell, Gail Pennsylvania State University University Park PA 16802 United States BBN Technologies Cambridge MA 02138 United States
Contour maps, showing topological distribution of extracted features, are crucial for many applications. Building a dynamic contour map in a wireless sensor network is a challenging task due to the constrained network... 详细信息
来源: 评论
Time-bounded and space-bounded sensing in wireless sensor networks  1
收藏 引用
4th ieee international conference on distributed computing in sensor systems
作者: Saukh, Olga Sauter, Robert Marron, Pedro Jose Univ Bonn D-5300 Bonn Germany
Most papers on sensing in wireless sensor networks use only very simple sensors, e.g. humidity or temperature, to illustrate their concepts. However, in a large number of scenarios including structural health monitori... 详细信息
来源: 评论
Fault-tolerant compression algorithms for delay-sensitive sensor network's with unreliable links  1
收藏 引用
4th ieee international conference on distributed computing in sensor systems
作者: Guitton, Alexandre Trigoni, Niki Helmer, Sven Univ Clermont Ferrand 2 CNRS LIMOS Clermont Ferrand France Univ Oxford Comp Lab Oxford OX1 2JD England Univ London Birkbeck Coll London WC1E 7HU England
We compare the performance of standard data compression techniques in the presence of communication failures. Their performance is inferior to sending data without compression when the packet loss rate of a link is ab... 详细信息
来源: 评论
Intrusion objects with shapes under randomized scheduling algorithm in sensor networks
Intrusion objects with shapes under randomized scheduling al...
收藏 引用
28th international conference on distributed computing systems Workshops, ICDCS Workshops 2008
作者: Xiao, Yang Chen, Hui Zhang, Yanping Du, Xiaojiang Sun, Bo Wu, Kui Dept. of Computer Science Univ. of Alabama Dept. of Computer Science Virginia State Univ. Dept. of Computer Science North Dakota State Univ. Dept. of Computer Science Lamar Univ. Dept. of Computer Science Univ. of Victoria
Wireless sensor networks have many applications. In this paper, we are particularly interested in a sensor network which is used for monitoring a field to detect intrusion objects such as enemy tanks, enemy cars, etc.... 详细信息
来源: 评论
A novel CDS-based reputation monitoring system for wireless sensor networks
A novel CDS-based reputation monitoring system for wireless ...
收藏 引用
28th international conference on distributed computing systems Workshops, ICDCS Workshops 2008
作者: Srinivasan, Avinash Li, Feng Wu, Jie Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL 33431 United States
Reputation and Trust-based Monitoring systems (RTMSs) have provided a ubiquitous framework for secure Wireless sensor Network (WSN) computing. Employing sensors for neighborhood monitoring, which is secondary to their... 详细信息
来源: 评论
Multi-root, multi-query processing in sensor networks  1
收藏 引用
4th ieee international conference on distributed computing in sensor systems
作者: Zhang, Zhiguo Kshemkalyani, Ajay Shatz, Sol M. Univ Illinois Dept Comp Sci Chicago IL 60607 USA
sensor networks can be viewed as large distributed databases, and SQL-like high-level declarative languages can be used for data and information retrieval. Energy constraints make optimizing query processing particula... 详细信息
来源: 评论
A Hilbert curve-based distributed index for window queries in wireless data broadcast systems
A Hilbert curve-based distributed index for window queries i...
收藏 引用
2008 ieee international conference on sensor Networks, Ubiquitous, and Trustworthy computing, SUTC 2008
作者: Shen, Jun-Hong Chang, Ye-In Dept. of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung Taiwan
Location-dependent spatial query in the wireless environment is that mobile users query the spatial objects dependent on their current location. The window query is one of the essential spatial queries, which finds sp... 详细信息
来源: 评论
Proceedings - The 28th international conference on distributed computing systems, ICDCS 2008
Proceedings - The 28th International Conference on Distribut...
收藏 引用
28th international conference on distributed computing systems, ICDCS 2008
The proceedings contain 102 papers. The topics discussed include: computer science as a lens on the sciences;real-time detection of clone attacks in wireless sensor networks;comparing symmetric-key and public-key base... 详细信息
来源: 评论