咨询与建议

限定检索结果

文献类型

  • 5,784 篇 会议
  • 113 册 图书
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,930 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,997 篇 工学
    • 2,300 篇 计算机科学与技术...
    • 1,252 篇 信息与通信工程
    • 1,124 篇 软件工程
    • 791 篇 电气工程
    • 756 篇 控制科学与工程
    • 164 篇 机械工程
    • 158 篇 电子科学与技术(可...
    • 148 篇 动力工程及工程热...
    • 125 篇 网络空间安全
    • 121 篇 生物工程
    • 113 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 90 篇 交通运输工程
    • 79 篇 安全科学与工程
    • 61 篇 建筑学
  • 684 篇 理学
    • 378 篇 数学
    • 153 篇 物理学
    • 143 篇 系统科学
    • 136 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 71 篇 化学
  • 542 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 179 篇 工商管理
    • 147 篇 图书情报与档案管...
    • 59 篇 公共管理
  • 171 篇 医学
    • 98 篇 临床医学
    • 98 篇 公共卫生与预防医...
    • 90 篇 基础医学(可授医学...
  • 121 篇 法学
    • 95 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 59 篇 农学
  • 58 篇 文学
  • 25 篇 教育学
  • 20 篇 军事学
  • 1 篇 艺术学

主题

  • 333 篇 control systems
  • 327 篇 social networkin...
  • 271 篇 communication sy...
  • 238 篇 wireless communi...
  • 230 篇 protocols
  • 212 篇 process control
  • 210 篇 traffic control
  • 210 篇 wireless sensor ...
  • 209 篇 computational mo...
  • 187 篇 access control
  • 183 篇 mobile communica...
  • 165 篇 software defined...
  • 158 篇 quality of servi...
  • 149 篇 routing
  • 147 篇 computer archite...
  • 146 篇 bandwidth
  • 141 篇 internet of thin...
  • 139 篇 throughput
  • 133 篇 monitoring
  • 129 篇 security

机构

  • 56 篇 state key labora...
  • 22 篇 chitkara univers...
  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 the 54th researc...
  • 9 篇 beijing jiaotong...
  • 8 篇 department of au...
  • 8 篇 maharishi school...
  • 8 篇 amrita vishwa vi...
  • 7 篇 delhi technologi...
  • 7 篇 beijing fibrlink...
  • 7 篇 electric power d...
  • 7 篇 technical univer...
  • 7 篇 univ petr & ener...
  • 7 篇 beijing universi...
  • 7 篇 department of el...
  • 7 篇 daffodil interna...
  • 6 篇 amrita vishwa vi...
  • 6 篇 huazhong univers...

作者

  • 27 篇 soman k. p.
  • 17 篇 k.p. soman
  • 14 篇 yang yang
  • 12 篇 singh rajesh
  • 12 篇 soman k.p.
  • 10 篇 geyong min
  • 10 篇 tai-hoon kim
  • 10 篇 leonard barolli
  • 9 篇 vishnu sharma
  • 9 篇 fatos xhafa
  • 9 篇 li jun
  • 8 篇 chen junliang
  • 8 篇 r. ramanathan
  • 8 篇 gehlot anita
  • 7 篇 rashidov aldeniz
  • 7 篇 wang lei
  • 7 篇 huo yonghua
  • 7 篇 jun li
  • 7 篇 cheng bo
  • 7 篇 kumar adesh

语言

  • 5,816 篇 英文
  • 69 篇 其他
  • 46 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Computing, Communication Control and Networking"
5930 条 记 录,以下是4801-4810 订阅
排序:
Metrics based performance control over text mining tools in bioinformatics  09
Metrics based performance control over text mining tools in ...
收藏 引用
international conference on advances in computing, communication and control, ICAC3'09
作者: Manicassamy, Jayanthi Dhavachelvan, P. Department of Computer Science Pondicherry University Pondicherry India
Bioinformatics is a field of biology merging with few other sciences like information technology and statistics which involves in the discovery of new tools for data analysis and interpretation of accurate result. Som... 详细信息
来源: 评论
A model for personalised communications control in pervasive systems
A model for personalised communications control in pervasive...
收藏 引用
IASTED international conference on advances in Computer Science and Engineering, ACSE 2009
作者: Papadopoulou, Elizabeth McBurney, Sarah Williams, M. Howard Heriot-Watt University Riccarton Edinburgh United Kingdom
As communication systems become more and more complex and integrate an increasing variety of different types of systems and devices, an important aim of pervasive systems is to provide users with more control over the... 详细信息
来源: 评论
Emerging Challenges for Security, Privacy and Trust  2009
收藏 引用
丛书名: IFIP advances in Information and communication Technology
2009年
作者: Dimitris Gritzalis Javier Lopez
This book constitutes the refereed proceedings of the 24th IFIP TC 11 international Information Security conference, SEC 2009, held in Pafos, Cyprus, in May 2009. The38 revised full papers presented were carefully rev...
来源: 评论
The RiverFish Approach to Business Process Modeling: Linking Business Steps to control-Flow Patterns
The RiverFish Approach to Business Process Modeling: Linking...
收藏 引用
4th international conference of Collaborative computing: networking, Applications and Worksharing
作者: Zuliane, Devanir Oikawa, Marcio K. Malkowski, Simon Alcazar, Jose Perez Ferreira, Joao Eduardo Univ Sao Paulo Dept Comp Sci Rua Matao 1010 BR-05508090 Sao Paulo Brazil Georgia Inst Technol Ctr Expt Res Comp Syst Atlanta GA 30332 USA
Despite the recent advances in the area of Business Process Management (BPM), today's business processes have largely been implemented without clearly defined conceptual modeling. This results in growing difficult... 详细信息
来源: 评论
Quantum mechanical modeling and molecular dynamic simulation of Ruthenium (Ru) polypyridyl complexes to study feasibility of artificial photosynthesis
Quantum mechanical modeling and molecular dynamic simulation...
收藏 引用
ARTCom 2009 - international conference on advances in Recent Technologies in communication and computing
作者: Premkumar, P. Krishnan Namboori, P.K. Sathishkumar, M. Ramachandran, K.I. Gopakumar, Deepa Rajasree, P.M. Computational Engineering and Networking Amrita Vishwa Vidyapeetham University Ettimadai Coimbatore-641105 India
A photochemical reaction is initiated by a charge separation process in the reaction center (RC) complex. Major research in this regard is to analyze the light driven electron transfer and to study the response of the... 详细信息
来源: 评论
An analysis of service disruption time for TCP applications using end-to-end mobility management protocols  09
An analysis of service disruption time for TCP applications ...
收藏 引用
7th international conference on advances in Mobile computing and Multimedia, MoMM2009
作者: Shah, Peer Azmat Yousaf, Muhammad Qayyum, Amir Malik, Shahzad A. M. A. Jinnah University Islamabad Pakistan Islamabad Pakistan Department of Electrical Engineering COMSATS Institute of Information Technology Islamabad Pakistan
Whenever a mobile node moves across different networks, service disruption occurs thus making mobility management a key issue. In order to ensure the continuity of TCP session between communicating nodes, a number of ... 详细信息
来源: 评论
Mathematical Modeling for Evaluation of Quality of Service Parameters in Next Generation Cellular Wireless Networks
Mathematical Modeling for Evaluation of Quality of Service P...
收藏 引用
international conference on advances in computing, control, & Telecommunication Technologies (ACT)
作者: Raj Kumar Samanta Partha Bhattacharjee Gautam Sanyal Department of CSE National Institute of Technology Durgapur West Bengal India Central Mechanical Engineering Research Institute Durgapur West Bengal India
In this paper, a mathematical model has been developed for cellular wireless network with Gamma inter-arrivals and general call holding times. Measurement based studies have shown that Poisson assumption averages out ... 详细信息
来源: 评论
A traffic cache for structure peer-to-peer networks
A traffic cache for structure peer-to-peer networks
收藏 引用
3rd international conference on Genetic and Evolutionary computing, WGEC 2009
作者: Lin, Kuisheng Zhou, Ya Huang, Guimin School of Computer and Control Guilin University of Electronic Technology Guilin China School of Informationand Communication Guilin University of Electronic Technology Guilin China
The rise in peer-to-peer (P2P) networking has been tremendous in last several years;a large amount of network bandwidth backbone is consumed by P2P traffic. Although many methods have been proposed to manage P2P traff... 详细信息
来源: 评论
Berkeley Wavelet Transform Based Image Watermarking
Berkeley Wavelet Transform Based Image Watermarking
收藏 引用
international conference on advances in Recent Technologies in communication and computing, ARTCom
作者: Remya Ravindran P. K.P. Soman Comput. Eng. & Networking Amrita Vishwa Vidyapeetham Coimbatore India
In this paper Berkeley wavelet transform (BWT) based watermarking is described. BWT is a two-dimensional triadic wavelet transform. In order to achieve copyright protection, the proposed scheme embeds watermark into h... 详细信息
来源: 评论
Sink-Anonymity Mobility control in Wireless Sensor Networks
Sink-Anonymity Mobility Control in Wireless Sensor Networks
收藏 引用
IEEE international conference on Wireless and Mobile computing, networking And communications (WiMob)
作者: Qijun Gu Xiao Chen Zhen Jiang Jie Wu Department of Computer Science Texas State University San Marcos San Marcos TX USA Department of Computer Science West Chester University West Chester PA USA Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL USA
As the technology of mobile sensors advances, mobility control becomes a viable option that can be utilized to minimize energy consumption in wireless sensor networks (WSNs). A mobility control protocol re-deploys mob... 详细信息
来源: 评论