咨询与建议

限定检索结果

文献类型

  • 5,783 篇 会议
  • 112 册 图书
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,928 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,999 篇 工学
    • 2,303 篇 计算机科学与技术...
    • 1,255 篇 信息与通信工程
    • 1,126 篇 软件工程
    • 791 篇 电气工程
    • 760 篇 控制科学与工程
    • 165 篇 机械工程
    • 158 篇 电子科学与技术(可...
    • 148 篇 动力工程及工程热...
    • 129 篇 网络空间安全
    • 121 篇 生物工程
    • 113 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 90 篇 交通运输工程
    • 78 篇 安全科学与工程
    • 61 篇 建筑学
  • 687 篇 理学
    • 381 篇 数学
    • 153 篇 物理学
    • 143 篇 系统科学
    • 136 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 71 篇 化学
  • 545 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 179 篇 工商管理
    • 150 篇 图书情报与档案管...
    • 62 篇 公共管理
  • 174 篇 医学
    • 101 篇 公共卫生与预防医...
    • 98 篇 临床医学
    • 90 篇 基础医学(可授医学...
  • 121 篇 法学
    • 95 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 59 篇 农学
  • 58 篇 文学
  • 24 篇 教育学
  • 20 篇 军事学
  • 1 篇 艺术学

主题

  • 333 篇 control systems
  • 326 篇 social networkin...
  • 271 篇 communication sy...
  • 236 篇 wireless communi...
  • 229 篇 protocols
  • 212 篇 process control
  • 210 篇 traffic control
  • 210 篇 wireless sensor ...
  • 209 篇 computational mo...
  • 187 篇 access control
  • 183 篇 mobile communica...
  • 166 篇 software defined...
  • 158 篇 quality of servi...
  • 149 篇 routing
  • 147 篇 computer archite...
  • 146 篇 bandwidth
  • 139 篇 internet of thin...
  • 139 篇 throughput
  • 132 篇 monitoring
  • 129 篇 security

机构

  • 56 篇 state key labora...
  • 22 篇 chitkara univers...
  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 the 54th researc...
  • 9 篇 beijing jiaotong...
  • 8 篇 department of au...
  • 8 篇 maharishi school...
  • 8 篇 amrita vishwa vi...
  • 7 篇 delhi technologi...
  • 7 篇 beijing fibrlink...
  • 7 篇 electric power d...
  • 7 篇 technical univer...
  • 7 篇 univ petr & ener...
  • 7 篇 beijing universi...
  • 7 篇 department of el...
  • 7 篇 daffodil interna...
  • 6 篇 amrita vishwa vi...
  • 6 篇 huazhong univers...

作者

  • 27 篇 soman k. p.
  • 17 篇 k.p. soman
  • 14 篇 yang yang
  • 12 篇 singh rajesh
  • 12 篇 soman k.p.
  • 10 篇 geyong min
  • 10 篇 tai-hoon kim
  • 10 篇 leonard barolli
  • 9 篇 vishnu sharma
  • 9 篇 fatos xhafa
  • 9 篇 li jun
  • 8 篇 chen junliang
  • 8 篇 r. ramanathan
  • 8 篇 gehlot anita
  • 7 篇 rashidov aldeniz
  • 7 篇 wang lei
  • 7 篇 huo yonghua
  • 7 篇 jun li
  • 7 篇 cheng bo
  • 7 篇 kumar adesh

语言

  • 5,812 篇 英文
  • 71 篇 其他
  • 46 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Computing, Communication Control and Networking"
5928 条 记 录,以下是131-140 订阅
排序:
Two Types of Flows Admission control by altruistic behavior based on warning
Two Types of Flows Admission control by altruistic behavior ...
收藏 引用
international conference on computing, networking and communications (ICNC)
作者: Miyata, Sumiko Shibaura Inst Technol Koto Ku 3-7-5 Toyosu Tokyo 1358548 Japan
In recent years, opportunities to view streaming flows are increasing. For this reason, it is a problem that various types of communication requests occupy bandwidth. In order to solve such a problem, call admission c... 详细信息
来源: 评论
Comparative Study of Underwater Sensor networking Routing Protocols  2
Comparative Study of Underwater Sensor Networking Routing Pr...
收藏 引用
2nd IEEE international conference on advances in computing, communication control and networking, ICACCCN 2020
作者: Astya, Rani Jha, C.K. Banasthali Vidyapith Dept. of Computer Science and Engineering India
Underwater wireless sensor network is one of the emerging research areas. Small size sensors are deployed in the deep-sea water. These sensors are constrained with limited, energy, memory, and computing. Sensors are u... 详细信息
来源: 评论
Detection and Prevention Mechanism for DDoS Attacks in Cloud computing:The Role of Software-Defined networking(SDN)  5
Detection and Prevention Mechanism for DDoS Attacks in Cloud...
收藏 引用
5th IEEE international conference on advances in computing, communication control and networking, ICAC3N 2023
作者: Shilpa Dahiya, Mamta Virmani, Charu Mriirs Computer Science And Engineering Faridabad India Mriirs Computer Science Engineering School Of Engineering And Technology Faridabad India
Cloud computing has developed as a vital technology for offering on-demand computing resources that meet the changing requirements of modern applications. The cloud environment, on the other hand, is especially vulner... 详细信息
来源: 评论
Towards Trust-Centric networking: A General Model for Trust Evaluation  22
Towards Trust-Centric Networking: A General Model for Trust ...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Murillo, Andres F. Messous, Ayoub Otung, Andikan Sekiya, Motoyoshi Fujitsu Res Europe Slough Berks England Fujitsu Labs Kawasaki Kanagawa Japan
advances in networking and computing are moving society towards a cyber space, in which more aspects of our daily lives are being conducted over the Internet. This movement generates concerns regarding trust between t... 详细信息
来源: 评论
An Efficient Distributed Approach for Load Balancing in IoT Based on SDN Principles  10
An Efficient Distributed Approach for Load Balancing in IoT ...
收藏 引用
10th international conference on computing, communication and networking Technologies (ICCCNT)
作者: Eghbali, Zahra Lighvan, Mina Zolfy Beheshti, Arezoo Univ Tabriz Fac Elect & Comp Engn Tabriz Iran
Internet of things is a new technology which is heavily affecting different aspects of human life. The number of smart devices connecting to IoT and the amount of data gathered or produced by these devices are increas... 详细信息
来源: 评论
Power control with QoS constraints in WSN using Game Theoretic Approach
Power Control with QoS constraints in WSN using Game Theoret...
收藏 引用
3rd international conference on computing communication and networking Technologies (ICCCNT)
作者: Valli, R. Dananjayan, P. Pondicherry Engn Coll Pondicherry India
The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful.... 详细信息
来源: 评论
Behavioral Modeling for Public Safety communication in Wireless Mesh networking
Behavioral Modeling for Public Safety Communication in Wirel...
收藏 引用
6th international conference on Wireless communications, networking and Mobile computing (WICOM)
作者: Wei, Qian He, Jingsha Zhang, Xing Beijing Univ Technol Coll Comp Sci & Technol Beijing Peoples R China Beijing Univ Technol Sch Software Engn Beijing Peoples R China
Accompanying dramatic advances in wireless Mesh networking, the demand for advanced mechanisms to employ wireless Mesh networks in public safety continues to grow. However, this special field communication brings new ... 详细信息
来源: 评论
Generation, Optimization and control of Electric Power in Sugar Mill  2
Generation, Optimization and Control of Electric Power in Su...
收藏 引用
2nd IEEE international conference on advances in computing, communication control and networking, ICACCCN 2020
作者: Jethi, Govind Singh Sunori, Sandeep Singh Bhakuni, Abhijit Singh Bisht, Vimal Puneja, Pradeep Gehu Department of Cse Bhimtal India Gehu Department of Ece Bhimtal India
The prime objective of a sugar mill is to produce sugar crystals. It is always desirable to yield maximum quantity of rich quality sugar. In this paper, another aspect of sugar mill has been taken up as a case study a... 详细信息
来源: 评论
A Review on Video Summarization Approcahes : Recent advances and Directions
A Review on Video Summarization Approcahes : Recent Advances...
收藏 引用
2018 IEEE international conference on advances in computing, communication control and networking, ICACCCN 2018
作者: Bora, Amit Sharma, Shanu Department of Computer Science Engineering Amity University Uttar Pradesh India
With the advancement of technology and easy accessibility of internet, an enormous amount of audio visual content is generated daily. This multimedia content takes a lot of space and time to be processed which decreas... 详细信息
来源: 评论
Security Challenges in Software Defined Network and their Solutions  8
Security Challenges in Software Defined Network and their So...
收藏 引用
8th international conference on computing, communication and networking Technologies (ICCCNT)
作者: Patil, Varsha Patil, Charulata Awale, R. N. VJTI Dept Elect Engn Bombay 400019 Maharashtra India
The main purpose of Software Defined networking (SDN) is to allow network engineers to respond quickly to changing network industrial requirements. This network technology focuses on making network as adaptable and ac... 详细信息
来源: 评论