咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 215 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 356 篇 工学
    • 223 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 145 篇 信息与通信工程
    • 62 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 29 篇 生物工程
    • 28 篇 光学工程
    • 25 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 195 篇 理学
    • 115 篇 数学
    • 44 篇 物理学
    • 38 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 8 篇 化学
    • 7 篇 大气科学
  • 76 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 14 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 10 篇 wireless communi...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 quality of servi...
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 delays

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 state key lab of...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 school of automa...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 10 篇 meng deyu
  • 10 篇 si jiangbo
  • 9 篇 halim yanikomero...
  • 9 篇 al-dhahir naofal
  • 9 篇 yanikomeroglu ha...
  • 8 篇 xiaofei yang
  • 8 篇 thiele lothar
  • 8 篇 kai ye
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 508 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
535 条 记 录,以下是91-100 订阅
排序:
An automated black-box testing approach for WSN security protocols
An automated black-box testing approach for WSN security pro...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Ji, Shirui Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro... 详细信息
来源: 评论
A Dynamic Resource-Aware Routing Protocol in Resource-Constrained Opportunistic networks
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 4147-4167页
作者: Aref Hassan Kurd Ali Halikul Lenando Slim Chaoui Mohamad Alrfaay Medhat A.Tawfeek Department of Computer Systems and Communication Technologies Faculty of Computer Science and Information TechnologyUniversiti Malaysia Sarawak(UNIMAS)Kota Samarahan94300Malaysia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka2014KSA Unit-Lab of Sciences of Electronics Technologies of Information and TelecommunicationsSfax UniversitySfaxTunisia Department of Basic Sciences First Common Year DeanshipJouf UniversitySakaka2014KSA Department of Computer Sciences College of Computer and Information SciencesJouf UniversitySakaka2014KSA Department of Computer Sciences Faculty of Computers and InformationMenoufia UniversityEgypt
Recently,Opportunistic networks(OppNets)are considered to be one of the most attractive developments of Mobile Ad Hoc networks that have arisen thanks to the development of intelligent *** are characterized by a rough... 详细信息
来源: 评论
Investigating and exploiting the bias of the weighted hypervolume to articulate user preferences
Investigating and exploiting the bias of the weighted hyperv...
收藏 引用
11th Annual Genetic and Evolutionary Computation Conference, GECCO-2009
作者: Auger, Anne Bader, Johannes Brockhoff, Dimo Zitzler, Eckart TAO Team INRIA Saclay LRI Paris Sud University 91405 Orsay Cedex France Computer Engineering and Networks Lab. ETH Zurich 8092 Zurich Switzerland
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weighted case to incorporate various user pr... 详细信息
来源: 评论
An identity-based secure routing protocol in WSNs
An identity-based secure routing protocol in WSNs
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Li, Weichang Li, Hongning Xie, Min Bu, Shupo Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou China
It has been proved that Asymmetric cryptography can be used in Wireless Sensor networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery ... 详细信息
来源: 评论
A signal processing view on packet sampling and anomaly detection
A signal processing view on packet sampling and anomaly dete...
收藏 引用
IEEE INFOCOM 2010
作者: Brauckhoff, Daniela Salamatian, Kave May, Martin Computer Engineering and Networks Laboratory ETH Zurich Zurich Switzerland Computing Department Lancaster University Lancaster United Kingdom Paris Research Lab. Thomson Paris France
Anomaly detection methods typically operate on preprocessed traffic traces. Firstly, most traffic capturing devices today employ random packet sampling, where each packet is selected with a certain probability, to cop... 详细信息
来源: 评论
REGULAR STATE MACHINES
收藏 引用
Parallel Algorithms and Applications 2000年 第3-4期15卷 265-300页
作者: Lothar Thiele - thiele@tik.ee.ethz.ch[a] Jrgen Teich - teich@date.upb.de Supported in part under grant DFG TE163/5-1[b] Karsten Strehl - strehl@tik.ee.ethz.ch[a] [a] Computer Engineering and Networks Lab TIK Swiss Federal Institute of Technology ETH Zurich Switzerland [b] Computer Engineering Lab DA TE University of Paderborn Paderborn Germany
In this paper, we introduce a model called regular state machines (RSMs) that characterizes a class of state transition systems with regular transition behavior. It turns out that many process graph models such as syn... 详细信息
来源: 评论
On the performance of spatial multiplexing in MIMO-WCDMA networks with Principal Component Analysis at the reception  9
On the performance of spatial multiplexing in MIMO-WCDMA net...
收藏 引用
9th European Conference on Antennas and Propagation, EuCAP 2015
作者: Gkonis, Panagiotis K. Kapsalis, Andrew P. Zekios, Constantinos L. Kaklamani, Dimitra I. Venieris, Iakovos S. Chrysomalis, Michael T. Kyriakou, George A. National Technical University of Athens School of Electrical and Computer Engineering Intelligent Communications and Broadband Networks Laboratory 9 Heroon Polytechneioy str Zografou Athens Greece Democritus University of Thrace Department of Electrical and Computer Engineering Microwaves Lab. Xanthi Greece
The goal of the study presented in this work is to evaluate the performance of MIMO-WCDMA networks in spatial multiplexing transmission mode. In this context, different bit streams are transmitted from each transmit a... 详细信息
来源: 评论
Poster abstract: An automated real-time and affordable airborne pollen sensing system  18
Poster abstract: An automated real-time and affordable airbo...
收藏 引用
18th ACM/IEEE International Conference on Information Processing in Sensor networks, IPSN 2019
作者: Cao, Nam Saukh, Olga Thiele, Lothar Institute of Technical Informatics Graz University of Technology Austria Institute of Technical Informatics TU Graz / CSH Vienna Austria Computer Engineering and Networks Lab ETH Zurich Switzerland
In this paper, we present the design of our prototype of an automated real-time and affordable pollen sensing system. The design consists of three main subsystems: (1) a trap with automatic filtering, (2) a particle c... 详细信息
来源: 评论
Interval diagram techniques for symbolic model checking of Petri nets  99
Interval diagram techniques for symbolic model checking of P...
收藏 引用
Proceedings of the conference on Design, automation and test in Europe
作者: Karsten Strehl Lothar Thiele Computer Engineering and Networks Lab Swiss Federal Institute of Technology Switzerland
No abstract available.
来源: 评论
Automatic configuration of controlled interference experiments in sensornet testbeds  14
Automatic configuration of controlled interference experimen...
收藏 引用
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems
作者: Felix Jonathan Oppermann Carlo Alberto Boano Marco Zimmerling Kay Römer Graz University of Technology Computer Engineering and Networks Lab ETH Zurich
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it rema...
来源: 评论