咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 70 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 155 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 96 篇 计算机科学与技术...
    • 58 篇 电气工程
    • 54 篇 信息与通信工程
    • 29 篇 控制科学与工程
    • 21 篇 软件工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 5 篇 机械工程
    • 2 篇 交通运输工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 测绘科学与技术
  • 18 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 15 篇 理学
    • 8 篇 数学
    • 6 篇 系统科学
    • 3 篇 物理学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 155 篇 distributed prot...
  • 17 篇 protocols
  • 12 篇 wireless sensor ...
  • 9 篇 multi-agent syst...
  • 8 篇 consensus
  • 7 篇 optimization
  • 7 篇 wireless sensor ...
  • 7 篇 topology
  • 6 篇 fault tolerance
  • 6 篇 fairness
  • 5 篇 network topology
  • 5 篇 efficiency
  • 5 篇 self-organizatio...
  • 5 篇 resilience
  • 5 篇 self-stabilizati...
  • 5 篇 wireless network...
  • 4 篇 ganglia
  • 4 篇 peer-to-peer net...
  • 4 篇 random schedule
  • 4 篇 convergence

机构

  • 5 篇 univ wollongong ...
  • 5 篇 beihang univ bua...
  • 4 篇 southeast univ s...
  • 3 篇 curtin univ sch ...
  • 3 篇 beihang univ bua...
  • 3 篇 univ liverpool d...
  • 3 篇 penn state univ ...
  • 3 篇 univ roma la sap...
  • 3 篇 shandong univ sc...
  • 3 篇 jinan univ coll ...
  • 2 篇 beijing inst tec...
  • 2 篇 univ sci & techn...
  • 2 篇 osaka univ grad ...
  • 2 篇 comp technol ins...
  • 2 篇 zhongyuan univ t...
  • 2 篇 penn state univ ...
  • 2 篇 indian inst tech...
  • 2 篇 univ sci & techn...
  • 2 篇 univ michigan de...
  • 1 篇 suny buffalo dep...

作者

  • 6 篇 di pietro robert...
  • 6 篇 conti mauro
  • 6 篇 michail othon
  • 6 篇 tixeuil sebastie...
  • 6 篇 mei alessandro
  • 5 篇 chin kwan-wu
  • 5 篇 masuzawa toshimi...
  • 4 篇 spirakis paul g.
  • 4 篇 soh sieteng
  • 4 篇 wen guanghui
  • 4 篇 inoue michiko
  • 4 篇 mancini luigi v.
  • 4 篇 ooshita fukuhito
  • 4 篇 yasumi hiroto
  • 3 篇 zou yao
  • 3 篇 hou i-hong
  • 3 篇 mandal partha sa...
  • 3 篇 wen jinming
  • 3 篇 he tengjiao
  • 2 篇 mouftah hussein ...

语言

  • 155 篇 英文
检索条件"主题词=distributed protocol"
155 条 记 录,以下是101-110 订阅
排序:
Stability Analysis of Nonlinear Networks via M-matrix Theory: Beyond Linear Consensus
Stability Analysis of Nonlinear Networks via M-matrix Theory...
收藏 引用
American Control Conference
作者: Airlie Chapman Mehran Mesbahi Department of Aeronautics and Astronautics University of Washington WA 98105
This paper examines the set of equilibria and asymptotic stability of a large class of dynamical networks with nonidentical nonlinear node dynamics. The interconnection dynamics are defined by M-matrices. An example o... 详细信息
来源: 评论
MUSTER: Adaptive Energy-Aware Multisink Routing in Wireless Sensor Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2011年 第12期10卷 1694-1709页
作者: Mottola, Luca Picco, Gian Pietro Swedish Inst Comp Sci S-16440 Stockholm Sweden Univ Trento DISI I-38050 Povo TN Italy
Wireless sensor networks (WSNs) are increasingly proposed for applications characterized by many-to-many communication, where multiple sources report their data to multiple sinks. Unfortunately, mainstream WSN collect... 详细信息
来源: 评论
Deterministic secure positioning in wireless sensor networks
收藏 引用
THEORETICAL COMPUTER SCIENCE 2011年 第35期412卷 4471-4481页
作者: Delaet, Sylvie Mandal, Partha Sarathi Rokicki, Mariusz A. Tixeuil, Sebastien UPMC Sorbonne Univ Inst Univ France Paris France Univ Paris Sud Paris France Indian Inst Technol Gauhati India Univ Liverpool Liverpool L69 3BX Merseyside England
The position verification problem is an important building block for a large subset of wireless sensor network (WSN) applications. Indeed, the performance of the WSN degrades significantly when misbehaving nodes repor... 详细信息
来源: 评论
Immediate neighbor scheduling (INS): An adaptive protocol for mobile ad hoc networks using direct-sequence spread-spectrum modulation
收藏 引用
AD HOC NETWORKS 2011年 第3期9卷 453-467页
作者: Wolf, Brian J. Russell, Harlan B. Clemson Univ Dept Elect & Comp Engn Clemson SC 29631 USA
We investigate a new approach for scheduling transmissions in a mobile ad hoc network employing direct-sequence spread-spectrum (DSSS). Multiple-access interference may be better tolerated in these systems, allowing h... 详细信息
来源: 评论
distributed Detection of Clone Attacks in Wireless Sensor Networks
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2011年 第5期8卷 685-698页
作者: Conti, Mauro Di Pietro, Roberto Mancini, Luigi Vincenzo Mei, Alessandro Univ Roma La Sapienza Dipartimento Informat I-00198 Rome Italy Univ Rome Tre Dipartimento Matemat I-00146 Rome Italy
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, ea... 详细信息
来源: 评论
Spatial-Temporal Coverage Optimization in Wireless Sensor Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2011年 第4期10卷 465-478页
作者: Liu, Changlei Cao, Guohong Penn State Univ Dept Comp Sci & Engn University Pk PA 16802 USA
Mission-driven sensor networks usually have special lifetime requirements. However, the density of the sensors may not be large enough to satisfy the coverage requirement while meeting the lifetime constraint at the s... 详细信息
来源: 评论
Finite-time consensus for multi-agent systems via terminal feedback iterative learning
收藏 引用
IET CONTROL THEORY AND APPLICATIONS 2011年 第18期5卷 2098-2110页
作者: Meng, D. Jia, Y. Beihang Univ BUAA Res Div 7 Beijing 100191 Peoples R China Beihang Univ BUAA Dept Syst & Control Beijing 100191 Peoples R China Beihang Univ BUAA SMSS Key Lab Math Informat & Behav Semant Beijing 100191 Peoples R China
This study is devoted to the finite-time consensus problem of multi-agent systems with higher-order dynamics, and presents a framework for effectively constructing distributed protocols which incorporate iterative lea... 详细信息
来源: 评论
RELIABLE COMMUNICATION ON EMULATED CHANNELS RESILIENT TO TRANSIENT FAULTS
收藏 引用
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE 2011年 第5期22卷 1099-1122页
作者: Yamauchi, Yukiko Bein, Doina Masuzawa, Toshimitsu Nara Inst Sci & Technol Grad Sch Informat Sci Nara Japan Penn State Univ Informat Sci & Technol Div University Pk PA 16802 USA Osaka Univ Grad Sch Informat Sci & Technol Suita Osaka 565 Japan
Topology embedding enables one to execute a protocol designed for a specific (virtual) topology on another (real) topology by embedding the virtual topology on the real topology. In this paper, we propose a self-stabi... 详细信息
来源: 评论
A Randomized, Efficient, and distributed protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks  07
A Randomized, Efficient, and Distributed Protocol for the De...
收藏 引用
8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
作者: Conti, Mauro Di Pietro, Roberto Mancini, Luigi V. Mei, Alessandro Univ Roma La Sapienza Dipartimento Informat I-00198 Rome Italy
Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a lar... 详细信息
来源: 评论
M-Backs: Mobile Backbones for Multi-hop Wireless Networks
M-Backs: Mobile Backbones for Multi-hop Wireless Networks
收藏 引用
IEEE Wireless Communications and Networking Conference (WCNC)
作者: Nanni, Maurizio A. Basagni, Stefano Northeastern Univ ECE Dept Boston MA 02115 USA
We present a new distributed protocol for setting up and maintaining a backbone for multi-hop mobile networks. Our solution, termed M-Backs, is effective in producing backbones with limited size, while being robust an... 详细信息
来源: 评论