咨询与建议

限定检索结果

文献类型

  • 319 篇 会议
  • 215 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 356 篇 工学
    • 223 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 145 篇 信息与通信工程
    • 62 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 29 篇 生物工程
    • 28 篇 光学工程
    • 25 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 10 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 195 篇 理学
    • 115 篇 数学
    • 44 篇 物理学
    • 38 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 33 篇 生物学
    • 8 篇 化学
    • 7 篇 大气科学
  • 76 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 25 篇 图书情报与档案管...
  • 14 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 computer network...
  • 12 篇 protocols
  • 11 篇 internet of thin...
  • 10 篇 wireless communi...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 sensors
  • 10 篇 training
  • 9 篇 simulation
  • 9 篇 throughput
  • 8 篇 computer archite...
  • 8 篇 bandwidth
  • 8 篇 quality of servi...
  • 8 篇 energy consumpti...
  • 8 篇 scheduling
  • 8 篇 energy efficienc...
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 delays

机构

  • 11 篇 computer enginee...
  • 10 篇 state key labora...
  • 9 篇 school of electr...
  • 9 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 guangdong key la...
  • 7 篇 state key lab of...
  • 7 篇 institute of art...
  • 7 篇 john hopcroft ce...
  • 7 篇 the college of i...
  • 7 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 college of compu...
  • 6 篇 school of artifi...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 state key lab of...
  • 5 篇 non-terrestrial ...
  • 5 篇 the department o...
  • 5 篇 school of automa...

作者

  • 23 篇 zhong-ping jiang
  • 14 篇 jiang zhong-ping
  • 11 篇 su yikai
  • 10 篇 meng deyu
  • 10 篇 si jiangbo
  • 9 篇 halim yanikomero...
  • 9 篇 al-dhahir naofal
  • 9 篇 yanikomeroglu ha...
  • 8 篇 xiaofei yang
  • 8 篇 thiele lothar
  • 8 篇 kai ye
  • 7 篇 ling yuye
  • 7 篇 zheng qinghua
  • 7 篇 lothar thiele
  • 7 篇 woehrle matthias
  • 6 篇 tao bian
  • 6 篇 luo minnan
  • 6 篇 wu qingqing
  • 6 篇 pei qingqi
  • 6 篇 xu kui

语言

  • 508 篇 英文
  • 16 篇 其他
  • 10 篇 中文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Networks Lab"
535 条 记 录,以下是41-50 订阅
排序:
Partially reconfigurable cores for Xilinx Virtex
收藏 引用
Lecture Notes in computer Science
作者: Dyer, Matthias Plessl, Christian Platzner, Marco Computer Engineering and Networks Lab. Swiss Federal Institute of Technology ETH Zurich Switzerland
Recent generations of high-density and high-speed FPGAs provide a sufficient capacity for implementing complete configurable systems on a chip (CSoCs). Hybrid CPUs that combine standard CPU cores with reconfigurable c... 详细信息
来源: 评论
Heuristic surveillance of targets in sensor networks
Heuristic surveillance of targets in sensor networks
收藏 引用
2008 International Symposium on High Capacity Optical networks and Enabling Technologies, HONET 2008
作者: Kamel, Saeed Rahbar, Akbar Ghaffar Pour Computer Networks Research Lab Electrical Engineering Department Sahand University of Technology Tabriz Iran
A surveillance system is a sort of wireless sensor network to monitor targets, where a scheduling is required for monitoring period of each sensor in order to control the power consumption of sensors. In this network,... 详细信息
来源: 评论
RESOURCE CONSTRAINED SCHEDULING OF UNIFORM ALGORITHMS
收藏 引用
JOURNAL OF VLSI SIGNAL PROCESSING 1995年 第3期10卷 295-310页
作者: THIELE, L 1. Computer Engineering and Communication Networks Lab. (TIK) Swiss Federal Institute of Technology Zuerich (ETHZ) Gloriastrasse 35 CH-8092 Zuerich Switzerland
A method for optimizing the schedule and allocation of uniform algorithms onto processor arrays is derived. The main results described in the following paper are: (1) single (integer) linear programs are given for the...
来源: 评论
Demo abstract: IAssist - Rapid deployment and maintenance of tiny sensing systems
Demo abstract: IAssist - Rapid deployment and maintenance of...
收藏 引用
8th ACM International Conference on Embedded Networked Sensor Systems, SenSys 2010
作者: Keller, Matthias Hungerbuehler, Guido Knecht, Oliver Skeikh, Suhel Beutel, Jan Gubler, Stefanie Fiddes, Joel Gruber, Stephan Computer Engineering and Networks Lab. ETH Zurich Switzerland Department of Geography University of Zurich Switzerland
Commercial, coin-sized iButton temperature logger devices are well-suited for densely instrumenting large outdoor areas. An efficient workflow for deploying and maintaining those devices is necessary when striving to ... 详细信息
来源: 评论
A domain-based secure communication scheme with fault-tolerant capacity
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第5期4卷 44-52页
作者: Li, Huixian Pang, Liaojun Wang, Yumin School of Computer Science and Engineering Northwestern Polytechnical Univ Xi'an 710072 China State Key Lab. of Integrated Service Networks Xidian Univ Xi'an 710071 China
In order to solve the problems in wireless sensor networks, such as node failures and the key node attack, a secure communication model based on secret sharing is presented to improve the communication success rate. I... 详细信息
来源: 评论
Routing and call control algorithms for ring networks
收藏 引用
8th International Workshop on Algorithms and Data Structures, WADS 2003
作者: Sai Anand, R. Erlebach, Thomas Computer Engineering and Networks Lab Eidgenössische Technische Hochschule Zürich Switzerland
A vast majority of communications in a network occurs between pairs of nodes, each such interaction is termed a call. The job of a call control algorithm is to decide which of a set of calls to accept in the network s... 详细信息
来源: 评论
Poster abstract: Automatic configuration of controlled interference experiments in sensornet testbeds  12
Poster abstract: Automatic configuration of controlled inter...
收藏 引用
12th ACM Conference on Embedded Networked Sensor Systems, SenSys 2014
作者: Oppermann, Felix Jonathan Boano, Carlo Alberto Zimmerling, Marco Römer, Kay Institute for Technical Informatics Graz University of Technology Austria Computer Engineering and Networks Lab ETH Zurich Switzerland
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it rema... 详细信息
来源: 评论
Rupeas: Ruby powered event analysis DSL
Rupeas: Ruby powered event analysis DSL
收藏 引用
International Conference on Networked Sensing Systems
作者: Woehrle, Matthias Plessl, Christian Thiele, Lothar Computer Engineering and Networks Lab ETH Zurich Switzerland Paderborn Center for Parallel Computing University of Paderborn Germany
Wireless Sensor networks (WSNs) are unique embedded computer systems for distributed sensing of a dispersed phenomenon. As WSNs are deployed in remote locations for longterm unattended operation, assurance of correct ... 详细信息
来源: 评论
DiMo: Distributed node monitoring in wireless sensor networks
DiMo: Distributed node monitoring in wireless sensor network...
收藏 引用
11th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, MSWiM'08
作者: Meier, Andreas Motani, Mehul Siquan, Hu Künzli, Simon Computer Engineering and Networks Lab. ETH Zurich Switzerland Electrical and Computer Engineering National University of Singapore Singapore Singapore Siemens Building Technologies Zug Switzerland
Safety-critical wireless sensor networks, such as a distributed fire- or burglar-alarm system, require that all sensor nodes are up and functional. If an event is triggered on a node, this information must be forwarde... 详细信息
来源: 评论
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 499-510页
作者: Chao Wang Feng Hu Huanguo Zhang Jie Wu the Key Laboratory of Specialty Fiber Optics and Optical Access Networks School of Communication and Information EngineeringShanghai University the Department of Computer and Information Sciences Temple University the Key Lab of Aerospace Information Security and Trusted Computing Wuhan University
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas... 详细信息
来源: 评论