咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 220 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 360 篇 工学
    • 224 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 147 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 59 篇 电子科学与技术(可...
    • 44 篇 电气工程
    • 29 篇 生物工程
    • 28 篇 光学工程
    • 26 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 198 篇 理学
    • 117 篇 数学
    • 45 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 9 篇 化学
    • 7 篇 大气科学
  • 77 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 16 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 11 篇 optimization
  • 10 篇 wireless communi...
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 9 篇 quality of servi...
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 beamforming
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 state key lab of...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 integrated servi...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 11 篇 si jiangbo
  • 10 篇 al-dhahir naofal
  • 10 篇 meng deyu
  • 9 篇 halim yanikomero...
  • 9 篇 yanikomeroglu ha...
  • 8 篇 xiaofei yang
  • 8 篇 thiele lothar
  • 8 篇 kai ye
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 513 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering & Networks Lab"
540 条 记 录,以下是81-90 订阅
排序:
Survey on IoT-based waste Management Systems  8
Survey on IoT-based waste Management Systems
收藏 引用
8th International Conference on Web Research, ICWR 2022
作者: Younesi, Abolfazl Fard, Hamed Shahbazi Yengikand, Alireza Belal Pezeshki, Vahid University of Tabriz Miyaneh Technical & Engineering Faculty Tabriz Iran Sahand University of Tabriz Computer Networks Research Lab Sahand New Town Tabriz Iran
The increasing population has led to a disruption of health status due to the waste management system. Waste management in the form of smart cities has created a kind of concern and is an activity that can provide env... 详细信息
来源: 评论
On selection of energy-efficient data aggregation node in wireless sensor networks
On selection of energy-efficient data aggregation node in wi...
收藏 引用
作者: Lee, Euisin Park, Soochang Yu, Fucai Kim, Sang-Ha Department of Computer Engineering Chungnam National University Daejeon Korea Republic of Key Lab of Broadband Optical Fiber Transmission and Communication Networks UESTC Chengdu China
In-network data aggregation is one of the most important issues for achieving energy-efficiency in wireless sensor networks since sensor nodes in the surrounding region of an event may generate redundant sensed data. ... 详细信息
来源: 评论
Class treatment in queueing systems: Discrimination and fairness aspects
Class treatment in queueing systems: Discrimination and fair...
收藏 引用
3rd International Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2008
作者: Raz, David Levy, Hanoch Avi-Itzhak, Benjamin Holon Institute of Technology Holon Israel Computer Engineering and Networks Lab ETH Zurich Switzerland RUTCOR Rutgers University New BrunswickNJ United States
Customer classification and prioritization are commonly utilized in applications to provide queue preferential service. Their fairness aspects, which are inherent to any preferential system and highly important to cus... 详细信息
来源: 评论
Continuous spectrum sensing in cognitive radio networks
Continuous spectrum sensing in cognitive radio networks
收藏 引用
2012 2nd International Conference on Business Computing and Global Informatization, BCGIN 2012
作者: Ding, Hanqing Zhao, Zhiyuan School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Lab. of Integrated Service Networks Xidian University Xi'an China
In cognitive radio (CR) systems, secondary users (SUs) have to detect channel periodically during their data transmission to decide whether the channel is idle in order to avoid unacceptable interferences to primary u... 详细信息
来源: 评论
Recognition of wobbling and nutating cone-shaped targets
Recognition of wobbling and nutating cone-shaped targets
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010
作者: Ding, Hanqing Guan, Yongsheng School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Lab. of Integrated Service Networks Xidian University Xi'an China
Recognition of wobbling and nutating cone-shaped targets is a major challenge in space target recognition area. In this paper, we develop a signal model of multiple scattering centers on the wobbling and nutating cone... 详细信息
来源: 评论
Data complexity-based batch sanitization method against poison in distributed learning
收藏 引用
Digital Communications and networks 2024年 第2期10卷 416-428页
作者: Silv Wang Kai Fan Kuan Zhang Hui Li Yintang Yang State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an710126China Department of Electrical and Computer Engineering University of Nebraska-LincolnLincolnNE68588USA Key Lab.of the Minist.of Educ.for Wide Bandgap Semiconductor Materials and Devices Xidian UniversityXi'an710071China
The security of Federated Learning(FL)/Distributed Machine Learning(DML)is gravely threatened by data poisoning attacks,which destroy the usability of the model by contaminating training samples,so such attacks are ca... 详细信息
来源: 评论
Automated Wireless Sensor Network Testing
Automated Wireless Sensor Network Testing
收藏 引用
International Conference on Networked Sensing Systems (INSS)
作者: Jan Beutel Matthias Dyer Roman Lim Christian Plessl Matthias Wohrle Mustafa Yucel Lothar Thiele Computer Engineering and Networks Lab ETH Zurich Zurich Switzerland
The design of distributed, wireless, and embedded system is a tedious and error-prone process. Experiences from previous real-world wireless sensor network (WSN) deployments strongly indicate that it is vital to follo... 详细信息
来源: 评论
Designing a High-Reliability Low-Power Status Monitoring Protocol
Designing a High-Reliability Low-Power Status Monitoring Pro...
收藏 引用
International Conference on Networked Sensing Systems (INSS)
作者: Andreas Meier Jan Beutel Roman Lim Lothar Thiele Computer Engineering and Networks Lab ETH Zurich Zurich Switzerland
This paper describes the design and implementation of a high-reliability and low-power status monitoring protocol, e.g. for wireless alarm systems. The dual design approach followed consists of an in-depth device char... 详细信息
来源: 评论
A security testing approach for WSN protocols based on object-oriented attack model
A security testing approach for WSN protocols based on objec...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Qi, Yue Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio... 详细信息
来源: 评论
An automated black-box testing approach for WSN security protocols
An automated black-box testing approach for WSN security pro...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Ji, Shirui Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro... 详细信息
来源: 评论