咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 219 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 358 篇 工学
    • 224 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 148 篇 信息与通信工程
    • 62 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 29 篇 生物工程
    • 27 篇 光学工程
    • 25 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 196 篇 理学
    • 117 篇 数学
    • 43 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 8 篇 化学
    • 7 篇 大气科学
  • 77 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 16 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 11 篇 optimization
  • 10 篇 wireless communi...
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 quality of servi...
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 beamforming
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 state key lab of...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 integrated servi...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 11 篇 si jiangbo
  • 10 篇 al-dhahir naofal
  • 10 篇 meng deyu
  • 9 篇 halim yanikomero...
  • 9 篇 yanikomeroglu ha...
  • 8 篇 thiele lothar
  • 7 篇 xiaofei yang
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 kai ye
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 511 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
538 条 记 录,以下是421-430 订阅
排序:
Network Coding-based Reliable Broadcast Transmission in Wireless networks
收藏 引用
China Communications 2010年 第2期7卷 71-77页
作者: Wang Jing Chi Kaikai Wang Xinmei School of Information Engineering Chang an University Xi an 710064 China College of Computer Science and Technology Zhejiang University of Technology Hangzhou 310023 China State Key Lab. of Integrated Service Networks Xidian University Xi an 710071 China
Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-com... 详细信息
来源: 评论
Schedulability and end-to-end latency in distributed ECU networks: Formal modeling and precise estimation
Schedulability and end-to-end latency in distributed ECU net...
收藏 引用
6th Embedded Systems Week 2010, ESWEEK 2010 - 10th ACM International Conference on Compilers, Architecture and Synthesis for Embedded Systems, EMSOFT'10
作者: Rajeev, A.C. Mohalik, Swarup Dixit, Manoj G. Chokshi, Devesh B. Ramesh, S. General Motors Global Research and Development India Science Lab. Bangalore India Computer Engineering and Networks Lab ETH Zürich Zürich Switzerland
Embedded control systems in automobiles are typically implemented by a set of tasks deployed on multiple Electronic Control Units (ECUs) communicating via one or more buses like CAN or FlexRay. In the case of safety-c... 详细信息
来源: 评论
Secure communication model of WSN based on secret sharing
Secure communication model of WSN based on secret sharing
收藏 引用
International Conference on Computational Intelligence and Security
作者: Zhao, Xiaohui Pang, Liaojun Bi, Jingjuan Pei, Qingqi Li, Huixian Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Department of Computer Science and Engineering Northwestern Polytechnical University Xi'an 710072 China
In order to solve the problems in wireless sensor networks, such as node failure and losing of master key, a secure communication model based on secret sharing in wireless sensor networks is presented in this paper. I... 详细信息
来源: 评论
On selection of energy-efficient data aggregation node in wireless sensor networks
On selection of energy-efficient data aggregation node in wi...
收藏 引用
作者: Lee, Euisin Park, Soochang Yu, Fucai Kim, Sang-Ha Department of Computer Engineering Chungnam National University Daejeon Korea Republic of Key Lab of Broadband Optical Fiber Transmission and Communication Networks UESTC Chengdu China
In-network data aggregation is one of the most important issues for achieving energy-efficiency in wireless sensor networks since sensor nodes in the surrounding region of an event may generate redundant sensed data. ... 详细信息
来源: 评论
Recognition of wobbling and nutating cone-shaped targets
Recognition of wobbling and nutating cone-shaped targets
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010
作者: Ding, Hanqing Guan, Yongsheng School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Lab. of Integrated Service Networks Xidian University Xi'an China
Recognition of wobbling and nutating cone-shaped targets is a major challenge in space target recognition area. In this paper, we develop a signal model of multiple scattering centers on the wobbling and nutating cone... 详细信息
来源: 评论
A signal processing view on packet sampling and anomaly detection
A signal processing view on packet sampling and anomaly dete...
收藏 引用
IEEE INFOCOM 2010
作者: Brauckhoff, Daniela Salamatian, Kave May, Martin Computer Engineering and Networks Laboratory ETH Zurich Zurich Switzerland Computing Department Lancaster University Lancaster United Kingdom Paris Research Lab. Thomson Paris France
Anomaly detection methods typically operate on preprocessed traffic traces. Firstly, most traffic capturing devices today employ random packet sampling, where each packet is selected with a certain probability, to cop... 详细信息
来源: 评论
Camera calibration using lengths of corresponding line segments
Camera calibration using lengths of corresponding line segme...
收藏 引用
Pacific Rim Symposium on Image and Video Technology
作者: Wang, Ruiyan Jiang, Guang Quan, Long Wu, Chengke State Key Lab. of Integrated Service Networks School of Telecommunications Engineering Xidian University Xi'an China Department of Computer Science Hong Kong University of Science and Technology Hong Kong Hong Kong
Camera calibration using patterns is widely used in computer vision and industry. The accuracy of calibration depends on the accuracy of the pattern. A high accuracy pattern is usually difficult to manufacture in labs... 详细信息
来源: 评论
An efficient intruder deduction system with XOR
收藏 引用
Journal of Computational Information Systems 2010年 第11期6卷 3535-3540页
作者: Yang, Yuanyuan Ma, Wenping Bai, Xiaofeng Liu, Weibo School of Telecommunications Engineering Xidian University Xi'an 710071 China Ministry of Education Key Lab. of Computer Networks and Information Security China
We propose a new intruder deduction system with XOR named IDX. By introducing the concept of abstract XOR term and its operation rules, IDX is able to eliminate complex equational reasoning of XOR. Moreover, it reduce... 详细信息
来源: 评论
Distributed video coding for wireless visual sensor networks using low power Huffman coding
Distributed video coding for wireless visual sensor networks...
收藏 引用
Annual Conference on Information Sciences and Systems (CISS)
作者: Hassan Abid Saad Qaisar NUST School of Electrical Engineering &Computer Science Core Communications and Networks Laboratory (CoNNekT Lab) Islamabad Pakistan School of Electrical Engineering & Computer Science NUST Islamabad Pakistan
Practical distributed video coding is enthralling problem to solve for the research community. In this work, we present a distributed video codec to reduce energy consumption at the sensor node. Video compression is c... 详细信息
来源: 评论
Integrated magnetic array for bio-object sensing and manipulation
Integrated magnetic array for bio-object sensing and manipul...
收藏 引用
IEEE Biomedical Circuits and Systems (BIOCAS)
作者: Faisal T. Abu-Nimeh M. Salem Fathi Circuits Systems and Neural Networks Lab Dept. of Electrical & Computer Engineering Michigan State University East Lansing USA Dept. of Electrical & Computer Engineering Michigan State University East Lansing USA
Magnetic molecular-level interrogation, manipulation, and diagnosis are emerging as lab-on-chip platforms. These platforms entail low-cost, low-power, portable, and high efficiency integrated implementations. We intro... 详细信息
来源: 评论