咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 70 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 155 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 96 篇 计算机科学与技术...
    • 58 篇 电气工程
    • 54 篇 信息与通信工程
    • 29 篇 控制科学与工程
    • 21 篇 软件工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 5 篇 机械工程
    • 2 篇 交通运输工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 测绘科学与技术
  • 18 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 15 篇 理学
    • 8 篇 数学
    • 6 篇 系统科学
    • 3 篇 物理学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 155 篇 distributed prot...
  • 17 篇 protocols
  • 12 篇 wireless sensor ...
  • 9 篇 multi-agent syst...
  • 8 篇 consensus
  • 7 篇 optimization
  • 7 篇 wireless sensor ...
  • 7 篇 topology
  • 6 篇 fault tolerance
  • 6 篇 fairness
  • 5 篇 network topology
  • 5 篇 efficiency
  • 5 篇 self-organizatio...
  • 5 篇 resilience
  • 5 篇 self-stabilizati...
  • 5 篇 wireless network...
  • 4 篇 ganglia
  • 4 篇 peer-to-peer net...
  • 4 篇 random schedule
  • 4 篇 convergence

机构

  • 5 篇 univ wollongong ...
  • 5 篇 beihang univ bua...
  • 4 篇 southeast univ s...
  • 3 篇 curtin univ sch ...
  • 3 篇 beihang univ bua...
  • 3 篇 univ liverpool d...
  • 3 篇 penn state univ ...
  • 3 篇 univ roma la sap...
  • 3 篇 shandong univ sc...
  • 3 篇 jinan univ coll ...
  • 2 篇 beijing inst tec...
  • 2 篇 univ sci & techn...
  • 2 篇 osaka univ grad ...
  • 2 篇 comp technol ins...
  • 2 篇 zhongyuan univ t...
  • 2 篇 penn state univ ...
  • 2 篇 indian inst tech...
  • 2 篇 univ sci & techn...
  • 2 篇 univ michigan de...
  • 1 篇 suny buffalo dep...

作者

  • 6 篇 di pietro robert...
  • 6 篇 conti mauro
  • 6 篇 michail othon
  • 6 篇 tixeuil sebastie...
  • 6 篇 mei alessandro
  • 5 篇 chin kwan-wu
  • 5 篇 masuzawa toshimi...
  • 4 篇 spirakis paul g.
  • 4 篇 soh sieteng
  • 4 篇 wen guanghui
  • 4 篇 inoue michiko
  • 4 篇 mancini luigi v.
  • 4 篇 ooshita fukuhito
  • 4 篇 yasumi hiroto
  • 3 篇 zou yao
  • 3 篇 hou i-hong
  • 3 篇 mandal partha sa...
  • 3 篇 wen jinming
  • 3 篇 he tengjiao
  • 2 篇 mouftah hussein ...

语言

  • 155 篇 英文
检索条件"主题词=distributed protocol"
155 条 记 录,以下是111-120 订阅
排序:
Target-Oriented Coverage Maximization in Visual Sensor Networks
Target-Oriented Coverage Maximization in Visual Sensor Netwo...
收藏 引用
9th ACM International Symposium on Mobility Management and Wireless Access
作者: Munishwar, Vikram P. Abu-Ghazaleh, Nael B. SUNY Binghamton Binghamton NY USA
Visual sensor networks (VSNs) are networks made up of a possibly large number of cameras that together monitor an area or targets of interest. In VSNs, camera coverage control is necessary to allow automatic tracking ... 详细信息
来源: 评论
Secure Position Verification for Wireless Sensor Networks in Noisy Channels
收藏 引用
10th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW)
作者: Mandal, Partha Sarathi Ghosh, Anil K. Indian Inst Technol Gauhati 781039 India Indian Stat Inst Kolkata 700108 India
Position verification in wireless sensor networks (WSNs) is quite tricky in presence of attackers (malicious sensor nodes), who try to break the verification protocol by reporting their incorrect positions (locations)... 详细信息
来源: 评论
Maximum Metric Spanning Tree Made Byzantine Tolerant
收藏 引用
25th International Symposium on distributed Computing (DISC 2011)
作者: Dubois, Swan Masuzawa, Toshimitsu Tixeuil, Sebastien UPMC Sorbonne Univ CNRS REGALLIP6 UMR7606LIP6 Inria F-75252 Paris France Osaka Univ 2-2 Yamadaoka Suita Osaka 5650871 Japan
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine t... 详细信息
来源: 评论
Optimal Topology Design for Dynamic Networks
Optimal Topology Design for Dynamic Networks
收藏 引用
IEEE Conference on Decision and Control
作者: Ran Dai Mehran Mesbahi Department of Aeronautics and Astronautics University of Washington Seattle WA
In this paper, we examine optimization-based methods for designing the network topology when the desired topology should have certain global variational properties, such as minimal power consumption for information ex... 详细信息
来源: 评论
Localized Multicast: Efficient and distributed Replica Detection in Large-Scale Sensor Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2010年 第7期9卷 913-926页
作者: Zhu, Bo Setia, Sanjeev Jajodia, Sushil Roy, Sankardas Wang, Lingyu Concordia Univ Concordia Inst Informat Syst Engn Montreal PQ H3G 2W1 Canada George Mason Univ Dept Comp Sci Fairfax VA 22030 USA
Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take a... 详细信息
来源: 评论
The Impact of Topology on Byzantine Containment in Stabilization
The Impact of Topology on Byzantine Containment in Stabiliza...
收藏 引用
24th International Symposium on distributed Computing
作者: Dubois, Swan Masuzawa, Toshimitsu Tixeuil, Sebastien Univ Paris 06 LIP6 UMR 7606 F-75252 Paris 05 France Osaka Univ Osaka Japan
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine t... 详细信息
来源: 评论
distributed Multi-Failure Localization protocol for All-Optical Networks
Distributed Multi-Failure Localization Protocol for All-Opti...
收藏 引用
International Conference on Optical Network Design and Modeling
作者: Khair, Mazen Zheng, Jun Mouftah, Hussein T. Univ Ottawa Sch Informat Technol & Engn Ottawa ON K1N 6N5 Canada
In this paper, we propose a distributed fault localization protocol, called Parallel Limited Perimeter Vector Matching (P-LVM) protocol, for localizing multi-link failures in all-optical networks. The P-LVM protocol i... 详细信息
来源: 评论
distributed fault tolerant computation of weakly connected dominating set in ad hoc networks
收藏 引用
JOURNAL OF SUPERCOMPUTING 2010年 第1期53卷 182-195页
作者: Xu, Zhenyu Wang, James Srimani, Pradip K. Clemson Univ Sch Comp Clemson SC 29634 USA
Our purpose in this paper is to propose a self-stabilizing protocol for weakly connected dominating set (WCDS) set in a given ad hoc network graph. WCDS is a particular variant of graph domination predicates which pla... 详细信息
来源: 评论
Hidden primary user awareness in cognitive radio routing: the SBBO protocol
Hidden primary user awareness in cognitive radio routing: th...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 2010)
作者: Salvo, Pierpaolo Cuomo, Francesca Abbagnale, Anna Univ Roma La Sapienza Dept Info Com I-00184 Rome Italy
We propose a distributed routing scheme for cognitive radio ad hoc networks which, besides the awareness of the dynamic behavior of the primary users, also considers that some primary users may be hidden to secondary ... 详细信息
来源: 评论
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against Node Capture Attack
The Smallville Effect: Social Ties Make Mobile Networks More...
收藏 引用
8th ACM International Symposium on Mobility Management and Wireless Access
作者: Conti, Mauro Di Pietro, Roberto Gabrielli, Andrea Mancini, Luigi V. Mei, Alessandro Vrije Univ Amsterdam Dept Comp Sci NL-1081 HV Amsterdam Netherlands
Mobile Ad Hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A f... 详细信息
来源: 评论