咨询与建议

限定检索结果

文献类型

  • 3,128 篇 会议
  • 36 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 3,168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,908 篇 工学
    • 1,671 篇 计算机科学与技术...
    • 743 篇 信息与通信工程
    • 711 篇 电气工程
    • 501 篇 软件工程
    • 254 篇 测绘科学与技术
    • 226 篇 控制科学与工程
    • 223 篇 机械工程
    • 143 篇 动力工程及工程热...
    • 89 篇 仪器科学与技术
    • 59 篇 电子科学与技术(可...
    • 50 篇 网络空间安全
    • 47 篇 安全科学与工程
    • 45 篇 交通运输工程
    • 28 篇 生物工程
    • 27 篇 土木工程
    • 22 篇 建筑学
    • 13 篇 化学工程与技术
  • 271 篇 理学
    • 148 篇 数学
    • 52 篇 化学
    • 41 篇 系统科学
    • 35 篇 统计学(可授理学、...
    • 32 篇 生物学
    • 26 篇 物理学
  • 220 篇 管理学
    • 174 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 28 篇 医学
    • 20 篇 临床医学
    • 11 篇 公共卫生与预防医...
  • 25 篇 法学
    • 22 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 10 篇 军事学
  • 9 篇 文学
  • 7 篇 农学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 983 篇 wireless sensor ...
  • 267 篇 sensor systems
  • 223 篇 distributed comp...
  • 181 篇 sensors
  • 164 篇 wireless communi...
  • 156 篇 protocols
  • 149 篇 monitoring
  • 113 篇 sensor networks
  • 110 篇 routing
  • 109 篇 computer network...
  • 103 篇 sensor phenomena...
  • 99 篇 internet of thin...
  • 99 篇 robot sensing sy...
  • 97 篇 energy consumpti...
  • 96 篇 mobile communica...
  • 89 篇 sensor nodes
  • 86 篇 mobile computing
  • 84 篇 energy efficienc...
  • 80 篇 intelligent sens...
  • 77 篇 computer archite...

机构

  • 9 篇 nanjing univ sta...
  • 9 篇 suny stony brook...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 state key labora...
  • 7 篇 department of co...
  • 7 篇 hong kong univ s...
  • 6 篇 dalian univ tech...
  • 6 篇 department of el...
  • 6 篇 department of co...
  • 6 篇 missouri univ sc...
  • 6 篇 michigan state u...
  • 6 篇 key lab ubiquito...
  • 6 篇 univ virginia de...
  • 6 篇 univ illinois de...
  • 6 篇 institute of com...
  • 5 篇 college of compu...
  • 5 篇 georgia state un...
  • 5 篇 distributed syst...

作者

  • 17 篇 dharma p. agrawa...
  • 16 篇 sotiris nikolets...
  • 13 篇 agrawal dharma p...
  • 12 篇 abdelzaher tarek
  • 11 篇 bar-noy amotz
  • 11 篇 sarigiannidis pa...
  • 11 篇 voigt thiemo
  • 11 篇 nikoletseas soti...
  • 11 篇 liu yunhao
  • 10 篇 stankovic john a...
  • 10 篇 wu jie
  • 9 篇 panagiotis sarig...
  • 9 篇 lars wolf
  • 9 篇 rothermel kurt
  • 9 篇 jiannong cao
  • 8 篇 thomas lagkas
  • 8 篇 vassiliou vasos
  • 8 篇 lagkas thomas
  • 8 篇 dai haipeng
  • 8 篇 ulf kulau

语言

  • 3,156 篇 英文
  • 10 篇 中文
  • 3 篇 其他
检索条件"任意字段=IEEE International Conference on Distributed Computing in Sensor Systems DCoSS"
3168 条 记 录,以下是81-90 订阅
排序:
Resilient Self-Calibration in distributed Visual sensor Networks  15
Resilient Self-Calibration in Distributed Visual Sensor Netw...
收藏 引用
15th Annual international conference on distributed computing in sensor systems (dcoss)
作者: Simonjan, Jennifer Dieber, Bernhard Rinner, Bernhard Alpen Adria Univ Klagenfurt Klagenfurt Austria JOANNEUM RES Graz Austria
Today, camera networks are pervasively used in smart environments such as intelligent homes, industrial automation or surveillance. These applications often require cameras to be aware of their spatial neighbors or ev... 详细信息
来源: 评论
Work-in-Progress: Efficient Heuristics for Low Radiation Paths in Wireless sensor Networks
Work-in-Progress: Efficient Heuristics for Low Radiation Pat...
收藏 引用
7th ieee international conference on distributed computing in sensor systems (dcoss)
作者: Nikoletseas, S. Patroumpa, D. Raptopoulos, C. Jose, Rolim Computer Technology Institute (CTI) and University of Patras Greece
We call radiation at a point of a wireless network the total amount of electromagnetic quantity (energy or power density) the point is exposed to. The impact of radiation can be high and we believe it is worth studyin... 详细信息
来源: 评论
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks
A Testing Framework for Discovering Vulnerabilities in 6LoWP...
收藏 引用
8th ieee international conference on distributed computing in sensor systems (dcoss)/IWSN/WiSARN/PWSN
作者: Lahmadi, Abdelkader Brandin, Cesar Festor, Olivier Univ Lorraine LORIA F-54506 Vandoeuvre Les Nancy France
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. The 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low powe... 详细信息
来源: 评论
Real-time distributed Visual Feature Extraction from Video in sensor Networks
Real-time Distributed Visual Feature Extraction from Video i...
收藏 引用
9th ieee international conference on distributed computing in sensor systems (dcoss)
作者: Eriksson, Emil Dan, Gyorgy Fodor, Viktoria KTH Royal Inst Technol Sch Elect Engn Stockholm Sweden
Enabling visual sensor networks to perform visual analysis tasks in real-time is challenging due to the computational complexity of detecting and extracting visual features. A promising approach to address this challe... 详细信息
来源: 评论
Soft Handover Method for Mobile Wireless sensor Networks Based on 6LoWPAN
Soft Handover Method for Mobile Wireless Sensor Networks Bas...
收藏 引用
7th ieee international conference on distributed computing in sensor systems (dcoss)
作者: Petajajarvi, Juha Karvonen, Heikki Univ Oulu Ctr Wireless Commun Oulu Finland
In many wireless sensor network applications the sensor nodes needs to be mobile. In order to support mobility, the management of several issues, such as routing, handover, security, addressing and auto-configuration ... 详细信息
来源: 评论
Optimal Deployment of Dense WSN for Error Bounded Air Pollution Mapping  12
Optimal Deployment of Dense WSN for Error Bounded Air Pollut...
收藏 引用
12th ieee Annual international conference on distributed computing in sensor systems (dcoss)
作者: Boubrima, Ahmed Bechkit, Walid Rivano, Herve Univ Lyon Inria INSA Lyon CITI F-69621 Villeurbanne France
Air pollution has become a major issue of modern megalopolis because of industrial emissions and increasing urbanization along with traffic jams and heating/cooling of buildings. Monitoring urban air quality is theref... 详细信息
来源: 评论
Energy Efficient Data Collection via Supervised In-Network Classification of sensor Data  12
Energy Efficient Data Collection via Supervised In-Network C...
收藏 引用
12th ieee Annual international conference on distributed computing in sensor systems (dcoss)
作者: Rossi, Lorenzo A. Krishnamachari, Bhaskar Kuo, C. -C. Jay Univ Southern Calif Ming Hsieh Dept Elect Engn Los Angeles CA 90089 USA
In wireless sensor networks, data collection (or gathering) is the task of transmitting rounds of measurements of physical phenomena from the sensor nodes to a sink node. We study how to increase the efficiency of dat... 详细信息
来源: 评论
A Virtual Sink-based Strategy for Reducing the Funneling Effect in ieee 802.15.4 DSME Networks  18
A Virtual Sink-based Strategy for Reducing the Funneling Eff...
收藏 引用
18th Annual international conference on distributed computing in sensor systems (dcoss)
作者: Gonzalez, Ivonne Andrea Mantilla Turau, Volker Hamburg Univ Technol Inst Telemat Hamburg Germany
The MAC protocol ieee 802.15.4 DSME has features for WSNs to support exigent requirements such as high reliability and adaptability to dynamic traffic. This work introduces the concept of a virtual sink, which compris... 详细信息
来源: 评论
LOCALIZED ENERGY EFFICIENT ROUTING FOR WIRELESS sensor NETWORKS
LOCALIZED ENERGY EFFICIENT ROUTING FOR WIRELESS SENSOR NETWO...
收藏 引用
7th ieee international conference on distributed computing in sensor systems (dcoss)
作者: Cevik, T. Zaim, A. Halim
With the evolution of electronics, wireless sensor networks have been very popular in many domains of human life such as health, industry and military. This popularity has taken the attention on to the researches abou... 详细信息
来源: 评论
Anomaly detection of data and topology patterns in WSNs  17
Anomaly detection of data and topology patterns in WSNs
收藏 引用
17th Annual ieee international conference on distributed computing in sensor systems (ieee dcoss)
作者: Zakrzewski, Robert Martin, Trevor Oikonomou, George Univ Bristol Commun Syst & Networks Bristol Avon England Univ Bristol Artificial Intelligence Grp Bristol Avon England
Wireless sensor networks are often distributed which makes detection of cyber-attacks or misconfiguration hard. Topology and data patterns change may result from attacks leading to the compromise of data and service a... 详细信息
来源: 评论