咨询与建议

限定检索结果

文献类型

  • 785 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 791 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 591 篇 工学
    • 531 篇 计算机科学与技术...
    • 346 篇 信息与通信工程
    • 201 篇 电气工程
    • 170 篇 软件工程
    • 62 篇 动力工程及工程热...
    • 61 篇 控制科学与工程
    • 55 篇 测绘科学与技术
    • 51 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 18 篇 建筑学
    • 15 篇 仪器科学与技术
    • 12 篇 生物工程
    • 12 篇 网络空间安全
    • 9 篇 光学工程
    • 8 篇 土木工程
    • 8 篇 交通运输工程
    • 7 篇 力学(可授工学、理...
  • 92 篇 理学
    • 35 篇 数学
    • 27 篇 物理学
    • 20 篇 系统科学
    • 13 篇 生物学
    • 8 篇 化学
    • 6 篇 统计学(可授理学、...
  • 31 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 18 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
    • 9 篇 社会学
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 2 篇 艺术学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 180 篇 wireless sensor ...
  • 97 篇 sensor networks
  • 35 篇 sensor nodes
  • 26 篇 energy harvestin...
  • 24 篇 embedded systems
  • 24 篇 sensor network
  • 21 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 13 篇 testbed
  • 11 篇 sensor
  • 10 篇 localization
  • 9 篇 architecture
  • 9 篇 middleware
  • 9 篇 energy efficienc...
  • 8 篇 testbeds
  • 8 篇 machine learning
  • 8 篇 cyber-physical s...
  • 8 篇 wireless
  • 7 篇 tinyos
  • 7 篇 deployment

机构

  • 13 篇 univ virginia de...
  • 8 篇 eth zurich
  • 5 篇 tsinghua univers...
  • 5 篇 politecnico di m...
  • 5 篇 university of ca...
  • 5 篇 uppsala universi...
  • 5 篇 computer enginee...
  • 5 篇 university of tr...
  • 4 篇 university of vi...
  • 4 篇 delft univ techn...
  • 4 篇 univ massachuset...
  • 4 篇 department of co...
  • 4 篇 univ calif berke...
  • 4 篇 stanford univers...
  • 4 篇 university of ne...
  • 4 篇 stanford univ st...
  • 4 篇 stanford univers...
  • 3 篇 department of co...
  • 3 篇 singapore univer...
  • 3 篇 department of co...

作者

  • 16 篇 whitehouse kamin
  • 16 篇 levis philip
  • 15 篇 he tian
  • 12 篇 stankovic john a...
  • 11 篇 dutta prabal
  • 11 篇 voigt thiemo
  • 10 篇 zimmerling marco
  • 9 篇 culler david
  • 9 篇 ganesan deepak
  • 9 篇 srivastava mani
  • 9 篇 dunkels adam
  • 9 篇 kim sukun
  • 8 篇 thiele lothar
  • 7 篇 gu yu
  • 7 篇 lu chenyang
  • 7 篇 hu wen
  • 7 篇 morikawa hiroyuk...
  • 7 篇 suzuki makoto
  • 7 篇 beutel jan
  • 6 篇 welsh matt

语言

  • 791 篇 英文
检索条件"任意字段=Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems"
791 条 记 录,以下是311-320 订阅
排序:
Piggyback CrowdSensing (PCS): Energy efficient crowdsourcing of mobile sensor data by exploiting smartphone app opportunities  13
Piggyback CrowdSensing (PCS): Energy efficient crowdsourcing...
收藏 引用
11th acm conference on embedded networked sensor systems, SenSys 2013
作者: Lane, Nicholas D. Chon, Yohan Zhou, Lin Zhang, Yongzhe Li, Fan Kimz, Dongwon Ding, Guanzhong Zhao, Feng Cha, Hojung Microsoft Research Asia United States Yonsei University Korea Republic of UC Santa Barbara United States Shanghai Jiao Tong University China Pearson China National Tsing Hua University China
Fueled by the widespread adoption of sensor-enabled smart-phones, mobile crowdsourcing is an area of rapid innova-tion. Many crowd-powered sensor systems are now part of our daily life { for example, providing highway... 详细信息
来源: 评论
A Rule Verification and Resolution Framework in Smart Building System
A Rule Verification and Resolution Framework in Smart Buildi...
收藏 引用
19th IEEE International conference on Parallel and Distributed systems (ICPADS)
作者: Luo, Hong Wang, Ruosi Li, Xinming Beijing Univ Posts & Telecommun Sch Comp Sci Beijing 100876 Peoples R China Acad Equipment Sci & Technol Complex Elect Syst Simulat Lab Beijing 101416 Peoples R China
In smart building, services are stored as rules and achieved by rule analyzing and executing. However, the irrational contents of rules and conflicts between rules may bring confusion and maloperation in the rule syst... 详细信息
来源: 评论
Development of Efficient Role-based sensor Network Applications with Excel Spreadsheets
Development of Efficient Role-based Sensor Network Applicati...
收藏 引用
19th IEEE International conference on Parallel and Distributed systems (ICPADS)
作者: Boelmann, Christopher Weis, Torben Univ Duisburg Essen Distributed Syst Grp Duisburg Germany
Natural scientists use large scale sensor networks for gathering and analyzing environmental data. However, the implementation work requires expert programmers. the problem is complicated by limited battery lifetime, ... 详细信息
来源: 评论
Social Web of things: A Survey
Social Web of Things: A Survey
收藏 引用
19th IEEE International conference on Parallel and Distributed systems (ICPADS)
作者: Chung, Tein-Yaw Mashal, Ibrahim Alsaryrah, Osama Huy, Van Kuo, Wen-Hsing Agrawal, Dharma P. Yuan Ze Univ Dept Comp Sci & Engn Taoyuan Taiwan Yuan Ze Univ Dept Elect Engn Taoyuan Taiwan Univ Cincinnati Dept EECS Ctr Distributed & Mobile Comp Cincinnati OH 45221 USA
Recently, Wireless sensor Networks (WSNs) are spread all over the world, and are commonly used to collect physical information from the surrounding world. WSNs play a central role in the Internet of things (IoT) visio... 详细信息
来源: 评论
SenSys 2011 - proceedings of the 9th acm conference on embedded networked sensor systems
SenSys 2011 - Proceedings of the 9th ACM Conference on Embed...
收藏 引用
9th acm conference on embedded networked sensor systems, SenSys 2011
the proceedings contain 75 papers. the topics discussed include: on the implications of the log-normal path loss model: an efficient method to deploy and move sensor motes;lossy links, low power, high throughput;indus...
来源: 评论
SmartLoc: Push the limit of the inertial sensor based metropolitan localization using smartphone  13
SmartLoc: Push the limit of the inertial sensor based metrop...
收藏 引用
19th Annual International conference on Mobile Computing and Networking, MobiCom 2013
作者: Bo, Cheng Li, Xiang-Yang Jung, Taeho Mao, Xufei Tao, Yue Yao, Lan Illinois Institute of Technology Chicago IL 60616 United States Tsinghua University Beijing China Northeastern University Shenyang China
We present SmartLoc, a localization system to estimate the location and the traveling distance by leveraging the lower-power inertial sensors embedded in smartphones as a supplementary to GPS. To minimize the negative... 详细信息
来源: 评论
Communication in extreme wireless sensor networks  13
Communication in extreme wireless sensor networks
收藏 引用
proceedings of the 11th acm conference on embedded networked sensor systems
作者: Marco Cattani Marco Zuniga Matthias Woehrle Koen Langendoen Delft University of Technology The Netherlands
In spite of using unreliable resource-constrained devices, sensor networks can nowadays deliver 99.9% of their data with duty cycles well below 1%. this remarkable performance is, however, dependent on one or more of ...
来源: 评论
Comparison of two paradigms for image analysis in visual sensor networks  13
Comparison of two paradigms for image analysis in visual sen...
收藏 引用
proceedings of the 11th acm conference on embedded networked sensor systems
作者: A. Canclini L. Baroffio M. Cesana A. Redondi M. Tagliasacchi Politecnico di Milano
this interactive demo presents and compares two different paradigms for image analysis in visual sensor networks (VSN), using a testbed based on battery-operated Beagle-Bone platforms with sight and wireless communica... 详细信息
来源: 评论
Building embedded applications via REST services for the internet of things  13
Building embedded applications via REST services for the int...
收藏 引用
proceedings of the 11th acm conference on embedded networked sensor systems
作者: Floris Van den Abeele Jeroen Hoebeke Isam Ishaq Girum K. Teklemariam Jen Rossey Ingrid Moerman Piet Demeester Ghent University - iMinds
As embedded networks are evolving to open systems, it's becoming possible to create new applications on top of these existing embedded systems. However, developing new applications can be difficult due to the larg...
来源: 评论
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks  13
A robust iterative filtering technique for wireless sensor n...
收藏 引用
proceedings of the 11th acm conference on embedded networked sensor systems
作者: Mohsen Rezvani Aleksandar Ignjatovic Elisa Bertino Sanjay Jha University of New South Wales Purdue University
In this paper we introduce a novel sophisticated collusion attack scenario against a number of existing iterative filtering algorithms. To address this security issue, we propose an improvement for iterative filtering... 详细信息
来源: 评论