咨询与建议

限定检索结果

文献类型

  • 5,780 篇 会议
  • 55 册 图书
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,868 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,996 篇 工学
    • 2,300 篇 计算机科学与技术...
    • 1,252 篇 信息与通信工程
    • 1,124 篇 软件工程
    • 791 篇 电气工程
    • 755 篇 控制科学与工程
    • 164 篇 机械工程
    • 158 篇 电子科学与技术(可...
    • 148 篇 动力工程及工程热...
    • 125 篇 网络空间安全
    • 121 篇 生物工程
    • 113 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 90 篇 交通运输工程
    • 79 篇 安全科学与工程
    • 61 篇 建筑学
  • 683 篇 理学
    • 378 篇 数学
    • 152 篇 物理学
    • 142 篇 系统科学
    • 136 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 71 篇 化学
  • 542 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 179 篇 工商管理
    • 147 篇 图书情报与档案管...
    • 59 篇 公共管理
  • 171 篇 医学
    • 98 篇 临床医学
    • 98 篇 公共卫生与预防医...
    • 90 篇 基础医学(可授医学...
  • 121 篇 法学
    • 95 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 59 篇 农学
  • 58 篇 文学
  • 25 篇 教育学
  • 20 篇 军事学
  • 1 篇 艺术学

主题

  • 333 篇 control systems
  • 326 篇 social networkin...
  • 271 篇 communication sy...
  • 236 篇 wireless communi...
  • 229 篇 protocols
  • 212 篇 process control
  • 210 篇 traffic control
  • 210 篇 wireless sensor ...
  • 209 篇 computational mo...
  • 187 篇 access control
  • 183 篇 mobile communica...
  • 164 篇 software defined...
  • 158 篇 quality of servi...
  • 149 篇 routing
  • 147 篇 computer archite...
  • 146 篇 bandwidth
  • 139 篇 internet of thin...
  • 139 篇 throughput
  • 132 篇 monitoring
  • 130 篇 security

机构

  • 56 篇 state key labora...
  • 22 篇 chitkara univers...
  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 the 54th researc...
  • 9 篇 beijing jiaotong...
  • 8 篇 department of au...
  • 8 篇 maharishi school...
  • 8 篇 amrita vishwa vi...
  • 7 篇 delhi technologi...
  • 7 篇 beijing fibrlink...
  • 7 篇 electric power d...
  • 7 篇 technical univer...
  • 7 篇 univ petr & ener...
  • 7 篇 beijing universi...
  • 7 篇 department of el...
  • 7 篇 daffodil interna...
  • 6 篇 amrita vishwa vi...
  • 6 篇 huazhong univers...

作者

  • 27 篇 soman k. p.
  • 17 篇 k.p. soman
  • 14 篇 yang yang
  • 12 篇 singh rajesh
  • 12 篇 soman k.p.
  • 10 篇 geyong min
  • 10 篇 leonard barolli
  • 9 篇 vishnu sharma
  • 9 篇 fatos xhafa
  • 9 篇 li jun
  • 8 篇 chen junliang
  • 8 篇 r. ramanathan
  • 8 篇 gehlot anita
  • 7 篇 rashidov aldeniz
  • 7 篇 wang lei
  • 7 篇 huo yonghua
  • 7 篇 jun li
  • 7 篇 cheng bo
  • 7 篇 kumar adesh
  • 6 篇 irfan awan

语言

  • 5,754 篇 英文
  • 69 篇 其他
  • 46 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Computing, Communication Control and Networking"
5868 条 记 录,以下是4871-4880 订阅
排序:
Packet Loss Concealment Using Enhanced Waveform Similarity OverLap-and-Add Technique with Management of Gains
Packet Loss Concealment Using Enhanced Waveform Similarity O...
收藏 引用
international conference on Wireless communications, networking and Mobile computing (WiCom)
作者: Mojia Li Muqing Wu Dapeng Wu Lizhong Wang Chunxiu Xu Broadband Communication Networks Lab Beijing University of Posts and Telecommunications Beijing China
Waveform similarity overlap-and-add technique (WSOLA) is widely used in packet loss concealment (PLC) of real time voice communications. In this paper, based on our enhanced WSOLA technique, an algorithm for PLC of vo... 详细信息
来源: 评论
A Fast-Roaming Authentication Method Using ID-Based Encryption for the 3G User Roaming between WLANs
A Fast-Roaming Authentication Method Using ID-Based Encrypti...
收藏 引用
international conference on Wireless communications, networking and Mobile computing (WiCom)
作者: Ze Wang Yan Zhang Wenju Liu Yongzhen Ke
EAP-AKA is a secure access protocol in the 3GPP WLAN-3G interworking scheme which can realize bi-directional authentication between 3G users and 3G networks, however WLAN access networks in the middle position are not... 详细信息
来源: 评论
Mathematical Modeling of Neuro-controlled Bionic Arm
Mathematical Modeling of Neuro-Controlled Bionic Arm
收藏 引用
international conference on advances in Recent Technologies in communication and computing, ARTCom
作者: Himanshu Shekhar Rahul Guha A. Vimala Juliet J. Sam Jeba Kumar School of Electrical Engineering Faculty of Engineering &Technology S. R. M. University Tamil Nadu India
A neuro-controlled bionic arm will be able to allow an amputee to move his or her prosthetic arm as if it is a real limb simply by thinking. The arm also empowers patients with more natural movement, greater range of ... 详细信息
来源: 评论
Design and Implementation of controllers for MIMO Process
Design and Implementation of Controllers for MIMO Process
收藏 引用
international conference on advances in Recent Technologies in communication and computing, ARTCom
作者: Rajini Jain T. Vinoprabha N. Sivakumaran T.K. Radhakrishnan Research scholar Nalanda Institute of Technology Bhubaneswar Orissa IN Department of Instrumentation and Control Engineering National Institute of Technology Tiruchirappalli India Dept. of Instrumentation and Control Engg. NIT Trichy Department of chemical Engineering National Institute of Technology Tiruchirappalli India Dept. of chemical Engg NIT Trichy
Most of the large and complex industrial processes are naturally Multi Input Multi Output systems. Compared with single-input single-output (SISO) counterparts, MIMO systems are more complex to control due to inherent... 详细信息
来源: 评论
Group communication Based Approach for Reliable Mobile Agent in Information Retrieval Applications
Group Communication Based Approach for Reliable Mobile Agent...
收藏 引用
international conference on advances in computing, control, & Telecommunication Technologies (ACT)
作者: M. Vigilson Prem S. Swamynathan Department of Information Technology RMD College of Engineering Chennai India Department of Computer Science and Engineering Anna University Chennai India
Mobile agents have attracted considerable interest in recent years. Mobile agents travel through servers to perform their programs. Maintaining mobile agent availability in the presence of agent server's crash, du... 详细信息
来源: 评论
A Multi-Role Authorization Method Used in Heterogeneous Wireless Network
A Multi-Role Authorization Method Used in Heterogeneous Wire...
收藏 引用
international conference on Wireless communications, networking and Mobile computing (WiCom)
作者: Wenjing Ma Mei Song Jiajia Wang Jianqing Wu Zhijun Ren Junde Song
Complex scenarios involving users' access in different administrative domains of wireless network do require a rather complete network access control mechanism. Thus, we propose an optimal solution where access ne... 详细信息
来源: 评论
Secured and Trusted Service Provision in Pervasive Environment
Secured and Trusted Service Provision in Pervasive Environme...
收藏 引用
IEEE international conference on Wireless and Mobile computing, networking And communications (WiMob)
作者: M. Ghorbel M. Khatib A. Mhamed M. Mokhtari Service Infrastructure Research Domain Alcatel-Lucent Bell Laboratories France Handicom laboratory Institute Telecom SudParis France
Thanks to pervasive environment, users can remotely have access to various resources and services within their public or private living space. Consequently, several security and privacy issues are raised especially du... 详细信息
来源: 评论
The Research of DDoS Attack Detecting Algorithm Based on the Feature of the Traffic
The Research of DDoS Attack Detecting Algorithm Based on the...
收藏 引用
international conference on Wireless communications, networking and Mobile computing (WiCom)
作者: Jiang Feng Yuan Liu Department of Information and Engineering Jiangnan University Wuxi China Department of Information and Engineering Digital Media Center Jiangnan University Wuxi China
As DDoS attacks can not be detected effectively by traditional methods in time, a DDoS attack detecting algorithm based on the relation of characteristic parameters is researched according to the analysis of the essen... 详细信息
来源: 评论
Cooperative Medium Access control in Wireless Networks: The Two-Hop Case
Cooperative Medium Access Control in Wireless Networks: The ...
收藏 引用
IEEE international conference on Wireless and Mobile computing, networking And communications (WiMob)
作者: Hongzhi Jiao Frank Y. Li Department of Information and Communication Technology University of Agder Grimstad Norway
Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In th... 详细信息
来源: 评论
Wavelet Adaptive Observer Based control for a Class of Uncertain Time Delay Nonlinear Systems with Input Constraints
Wavelet Adaptive Observer Based Control for a Class of Uncer...
收藏 引用
international conference on advances in Recent Technologies in communication and computing, ARTCom
作者: Manish Sharma Ajay Kulkarni Ajay Verma Medicaps Institute of Technology and Management Indore India DAVV I. E. T Indore India
This Paper investigates the mean to design the observer and observer based controllers for a class of delayed nonlinear systems with Lipschitz conditions and unknown dynamics subjected to input constraints. A new desi... 详细信息
来源: 评论