咨询与建议

限定检索结果

文献类型

  • 3,136 篇 会议
  • 36 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 3,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,911 篇 工学
    • 1,674 篇 计算机科学与技术...
    • 745 篇 信息与通信工程
    • 712 篇 电气工程
    • 502 篇 软件工程
    • 254 篇 测绘科学与技术
    • 227 篇 控制科学与工程
    • 223 篇 机械工程
    • 143 篇 动力工程及工程热...
    • 90 篇 仪器科学与技术
    • 59 篇 电子科学与技术(可...
    • 51 篇 网络空间安全
    • 48 篇 安全科学与工程
    • 46 篇 交通运输工程
    • 28 篇 生物工程
    • 27 篇 土木工程
    • 22 篇 建筑学
    • 13 篇 化学工程与技术
  • 272 篇 理学
    • 148 篇 数学
    • 53 篇 化学
    • 41 篇 系统科学
    • 35 篇 统计学(可授理学、...
    • 32 篇 生物学
    • 26 篇 物理学
  • 221 篇 管理学
    • 175 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 28 篇 医学
    • 20 篇 临床医学
    • 11 篇 公共卫生与预防医...
  • 25 篇 法学
    • 22 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 10 篇 军事学
  • 9 篇 文学
  • 7 篇 农学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 987 篇 wireless sensor ...
  • 268 篇 sensor systems
  • 223 篇 distributed comp...
  • 182 篇 sensors
  • 166 篇 wireless communi...
  • 156 篇 protocols
  • 150 篇 monitoring
  • 113 篇 sensor networks
  • 111 篇 routing
  • 109 篇 computer network...
  • 103 篇 sensor phenomena...
  • 99 篇 internet of thin...
  • 99 篇 robot sensing sy...
  • 98 篇 energy consumpti...
  • 96 篇 mobile communica...
  • 89 篇 sensor nodes
  • 86 篇 mobile computing
  • 85 篇 energy efficienc...
  • 80 篇 intelligent sens...
  • 77 篇 computer archite...

机构

  • 9 篇 nanjing univ sta...
  • 9 篇 suny stony brook...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 state key labora...
  • 7 篇 department of co...
  • 7 篇 hong kong univ s...
  • 6 篇 dalian univ tech...
  • 6 篇 department of el...
  • 6 篇 department of co...
  • 6 篇 missouri univ sc...
  • 6 篇 michigan state u...
  • 6 篇 key lab ubiquito...
  • 6 篇 univ virginia de...
  • 6 篇 univ illinois de...
  • 6 篇 institute of com...
  • 5 篇 college of compu...
  • 5 篇 georgia state un...
  • 5 篇 distributed syst...

作者

  • 17 篇 dharma p. agrawa...
  • 16 篇 sotiris nikolets...
  • 13 篇 agrawal dharma p...
  • 12 篇 abdelzaher tarek
  • 11 篇 bar-noy amotz
  • 11 篇 sarigiannidis pa...
  • 11 篇 voigt thiemo
  • 11 篇 nikoletseas soti...
  • 11 篇 liu yunhao
  • 10 篇 stankovic john a...
  • 10 篇 wu jie
  • 9 篇 panagiotis sarig...
  • 9 篇 lars wolf
  • 9 篇 rothermel kurt
  • 9 篇 jiannong cao
  • 8 篇 thomas lagkas
  • 8 篇 vassiliou vasos
  • 8 篇 lagkas thomas
  • 8 篇 dai haipeng
  • 8 篇 ulf kulau

语言

  • 3,100 篇 英文
  • 67 篇 其他
  • 12 篇 中文
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems DCoSS"
3176 条 记 录,以下是2901-2910 订阅
Data-Centric Attribute Allocation and Retrieval (DCAAR) scheme for wireless sensor networks
Data-Centric Attribute Allocation and Retrieval (DCAAR) sche...
收藏 引用
2nd ieee international conference on Mobile Ad-hoc and sensor systems, MASS 2005
作者: Biswas, Ratnabali Chowdhury, Kaushik Agrawal, Dharma P. OBR Research Center for Distributed and Mobile Computing Dept. of ECECS University of Cincinnati Cincinnati OH 45221-0030
Wireless sensor networks have enabled information gathering from a large geographical region and present unprecedented opportunities for a broad spectrum of monitoring applications. In this paper, we propose a data-ce... 详细信息
来源: 评论
Coverage and energy efficient information gathering protocol in wireless sensor networks
Coverage and energy efficient information gathering protocol...
收藏 引用
6th international conference on Parallel and distributed computing, Applications and Technologies (PDCAT 2005)
作者: Liu, XW Hou, HF Yang, JY Yu, HY Hu, HY Zhengzhou Informat Sci & Technol Inst Zhengzhou Peoples R China
Coverage and energy efficiency are two important concerns in wireless sensor networks. In this paper, a coverage and energy efficient (CEE) task assigning strategy is presented The basic idea of CEE is to assign task;... 详细信息
来源: 评论
Routing explicit side information for data compression in wireless sensor networks
收藏 引用
1st ieee international conference on distributed computing in sensor systems
作者: Luo, HY Pottie, G Univ Calif Los Angeles Los Angeles CA 90095 USA
Two difficulties in designing data-centric routes [2,3,4,5] in wireless sensor networks are the lack of reasonably practical data aggregation models and the high computational complexity resulting from the coupling of... 详细信息
来源: 评论
An efficient topology maintenance algorithm based on shortest path tree for wireless sensor networks
An efficient topology maintenance algorithm based on shortes...
收藏 引用
6th international conference on Parallel and distributed computing, Applications and Technologies (PDCAT 2005)
作者: Shen, Z Chang, YL Zhang, X Cui, C Xidian Univ Natl Key Lab Integrated Serv Xian 710071 Peoples R China
The topology of a wireless sensor network has a significant effect on the network performance. Although topology control algorithms can optimize the network topology, the resultant topology is usually changeable. In t... 详细信息
来源: 评论
Monte Carlo simulation of LEACH protocol for wireless sensor networks
Monte Carlo simulation of LEACH protocol for wireless sensor...
收藏 引用
6th international conference on Parallel and distributed computing, Applications and Technologies (PDCAT 2005)
作者: Wang, Y Xiong, MD Dalian Maritime Univ Coll Informat Technol Dalian 116026 Peoples R China
LEACH protocol for wireless sensor network has attracted intensive attention because of its energy efficient, Simplicity and load balancing. LEACH is a cluster-based protocol, and the numbers of cluster heads and clus... 详细信息
来源: 评论
sensor data collection with expected reliability guarantees
Sensor data collection with expected reliability guarantees
收藏 引用
Third ieee international conference on Pervasive computing and Communications Workshops, PerCom 2005 Workshops
作者: Han, Qi Lazaridis, Iosif Mehrotra, Sharad Venkatasubramanian, Nalini Department of Computer Science University of California Irvine CA 92697
Due to the fragility of small sensors, their finite energy supply and the loss of packets in the wireless channel, reports from sensors may not reach the sink node. In this paper we consider the problem of sensor data... 详细信息
来源: 评论
ieee 802.11 DCF based MAC protocols for multiple beam antennas and their limitations
IEEE 802.11 DCF based MAC protocols for multiple beam antenn...
收藏 引用
2nd ieee international conference on Mobile Ad-hoc and sensor systems, MASS 2005
作者: Jain, Vivek Gupta, Anurag Lalf, Dhananjay Agrawal, Dharma P. OBR Center for Distributed and Mobile Computing Department of ECECS University of Cincinnati Research and Technology Center Robert Bosch Corporation
Multiple beam antennas can receive (or transmit) data on multiple beams simultaneously. The aim of this paper is to show the limitations of using ieee 802.11 distributed coordination function (DCF) based schemes for m... 详细信息
来源: 评论
Passive source localization using power spectral analysis and decision fusion in wireless distributed sensor networks
Passive source localization using power spectral analysis an...
收藏 引用
ITCC 2005 - international conference on Information Technology: Coding and computing
作者: Ziaur Rahman, M. Karmakar, Gour C. Dooley, Laurence S. GSCIT Monash University Churchill Vic. 3842 Australia
Source localization is a challenging issue for multisensor multitarget detection, tracking and estimation problems in wireless distributed sensor networks. In this paper, a novel source localization method, called pas... 详细信息
来源: 评论
SHARP: A new approach to relative localization in wireless sensor networks
SHARP: A new approach to relative localization in wireless s...
收藏 引用
25th ieee international conference on distributed computing systems
作者: Ahmed, AA Shi, HC Shang, Y Univ Missouri Dept Comp Sci Columbia MO 65211 USA
For wireless sensor networks, localization is crucial due to the dynamic nature of deployment. In relative localization, nodes use the distance measurements to estimate their positions relative to some coordinate syst... 详细信息
来源: 评论
Efficient pairwise key establishment and management in static wireless sensor networks
Efficient pairwise key establishment and management in stati...
收藏 引用
2nd ieee international conference on Mobile Ad-hoc and sensor systems, MASS 2005
作者: Cheng, Yi Agrawal, Dharma P. OBR Center Distributed and Mobile Computing Lab. University of Cincinnati Cincinnati OH 45221
Key establishment and management is the core of security protocols for wireless sensor networks deployed in the hostile environment. Due to the strict resource constraints, traditional asymmetric key cryptosystems, su... 详细信息
来源: 评论