咨询与建议

限定检索结果

文献类型

  • 88 篇 会议
  • 28 篇 期刊文献

馆藏范围

  • 116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 69 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 44 篇 信息与通信工程
    • 14 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 11 篇 控制科学与工程
    • 6 篇 光学工程
    • 4 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 环境科学与工程(可...
    • 2 篇 安全科学与工程
  • 47 篇 理学
    • 33 篇 数学
    • 13 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 3 篇 生物学
    • 1 篇 化学
    • 1 篇 大气科学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学

主题

  • 6 篇 authentication
  • 5 篇 wireless sensor ...
  • 5 篇 cryptography
  • 3 篇 sensor nodes
  • 3 篇 cognitive radio
  • 3 篇 protocols
  • 3 篇 telecommunicatio...
  • 3 篇 wireless network...
  • 3 篇 energy efficienc...
  • 2 篇 knowledge based ...
  • 2 篇 viterbi algorith...
  • 2 篇 computational co...
  • 2 篇 ad hoc networks
  • 2 篇 wireless communi...
  • 2 篇 optical fibers
  • 2 篇 optimization
  • 2 篇 energy consumpti...
  • 2 篇 peak to average ...
  • 2 篇 decision making
  • 2 篇 topology

机构

  • 6 篇 computer enginee...
  • 5 篇 state key lab. o...
  • 5 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 department of el...
  • 3 篇 key lab. of comp...
  • 3 篇 school of comput...
  • 3 篇 embedded softwar...
  • 2 篇 school of mathem...
  • 2 篇 state key lab. o...
  • 2 篇 computer enginee...
  • 2 篇 department of el...
  • 2 篇 wireless network...
  • 2 篇 college of compu...
  • 2 篇 computer enginee...
  • 2 篇 school of comput...
  • 2 篇 school of softwa...
  • 2 篇 department of ps...
  • 2 篇 cream group stat...
  • 2 篇 science and tech...

作者

  • 5 篇 pei qingqi
  • 5 篇 woehrle matthias
  • 4 篇 wang xinmei
  • 4 篇 li hui
  • 3 篇 hu weisheng
  • 3 篇 su yikai
  • 3 篇 meier andreas
  • 3 篇 pang liaojun
  • 3 篇 plessl christian
  • 3 篇 langendoen koen
  • 3 篇 guo wei
  • 3 篇 beutel jan
  • 2 篇 chen zhong
  • 2 篇 jun hou
  • 2 篇 bu shu-po
  • 2 篇 li peng
  • 2 篇 guo hong
  • 2 篇 kaklamani dimitr...
  • 2 篇 wang jing
  • 2 篇 dai yafei

语言

  • 109 篇 英文
  • 6 篇 中文
  • 1 篇 其他
检索条件"机构=Computer Engineering and Networks Lab."
116 条 记 录,以下是31-40 订阅
排序:
Layer key management scheme on wireless sensor networks
Layer key management scheme on wireless sensor networks
收藏 引用
5th International Conference on Information Assurance and Security, IAS 2009
作者: Pei, Qingqi Wang, Lei Yin, Hao Pang, Liaojun Tang, Hong Institute of China Electronic System Engineering Corporation Beijing 100039 China Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system canno... 详细信息
来源: 评论
A security testing approach for WSN protocols based on object-oriented attack model
A security testing approach for WSN protocols based on objec...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Qi, Yue Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio... 详细信息
来源: 评论
Expected system energy consumption minimization in leakage-aware DVS systems
Expected system energy consumption minimization in leakage-a...
收藏 引用
International Symposium on Low Power Electronics and Design (ISLPED)
作者: Jian-Jia Chen Lothar Thiele Computer Engineering and Networks Lab. (TIK) Swiss Federal Institute of Technology Zurich (ETH Zurich) Switzerland Computer Engineering and Networks Lab. (TIK) (ETH Zurich) Switzerland
The pursuit of energy efficiency is becoming more and more important in hardware and software designs. This research explores energy-efficient scheduling for a periodic real-time task with uncertain execution time in ... 详细信息
来源: 评论
An automated black-box testing approach for WSN security protocols
An automated black-box testing approach for WSN security pro...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Ji, Shirui Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro... 详细信息
来源: 评论
On the performance of spatial multiplexing in MIMO-WCDMA networks with Principal Component Analysis at the reception  9
On the performance of spatial multiplexing in MIMO-WCDMA net...
收藏 引用
9th European Conference on Antennas and Propagation, EuCAP 2015
作者: Gkonis, Panagiotis K. Kapsalis, Andrew P. Zekios, Constantinos L. Kaklamani, Dimitra I. Venieris, Iakovos S. Chrysomalis, Michael T. Kyriakou, George A. National Technical University of Athens School of Electrical and Computer Engineering Intelligent Communications and Broadband Networks Laboratory 9 Heroon Polytechneioy str Zografou Athens Greece Democritus University of Thrace Department of Electrical and Computer Engineering Microwaves Lab. Xanthi Greece
The goal of the study presented in this work is to evaluate the performance of MIMO-WCDMA networks in spatial multiplexing transmission mode. In this context, different bit streams are transmitted from each transmit a... 详细信息
来源: 评论
Incentive-compatible caching and peering in data-oriented networks  08
Incentive-compatible caching and peering in data-oriented ne...
收藏 引用
2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08
作者: Rajahalme, Jarno Särelä, Mikko Nikander, Pekka Tarkoma, Sasu Nokia Siemens Networks Ericsson Research Nomadic Lab. Canada Helsinki Institute for Information Technology HIIT Finland Helsinki University of Technology Computer Science and Engineering Dept. Finland
Several new, data-oriented internetworking architectures have been proposed recently. However, the practical deployability of such designs is an open question. In this paper, we consider data-oriented network designs ... 详细信息
来源: 评论
Wideband compressed sensing for cognitive radios
Wideband compressed sensing for cognitive radios
收藏 引用
2011 IEEE Military Communications Conference, MILCOM 2011
作者: Ayhan Sakarya, F. Nagel, George S. Tran, Lan H. Molnar, Joseph A. Networks and Communications Systems Branch Information Technology Division Naval Research Lab. Washington DC United States School of Electrical and Computer Engineering College of Engineering Georgia Institute of Technology Atlanta GA United States
Efficient utilization of spectral bands in a dynamic environment with a continuously changing occupation rate is challenging. Static spectral allocations preclude the use of unoccupied spectrum, unless the spectrum ma... 详细信息
来源: 评论
RGH: An efficient RSU-aided group-based hierarchical privacy enhancement protocol for VANETs
RGH: An efficient RSU-aided group-based hierarchical privacy...
收藏 引用
13th International Conference on Web-Age Information Management, WAIM 2012
作者: Yang, Tao Kong, Lingbo Yu, Liangwen Hu, Jianbin Chen, Zhong MoE Key Lab. of High Confidence Software Technologies Peking University 100871 Beijing China MoE Key Lab. of Computer Networks and Information Security Peking University 100871 Beijing China School of Electronics Engineering and Computer Science Peking University 100871 Beijing China School of Software Engineering Beijing Jiaotong University 100044 Beijing China
VANETs are gaining significant prominence from both academia and industry in recent years. In this paper, we introduce an Efficient RSU-aided Group-based Hierarchical Privacy Enhancement Protocol for VANETs. The proto... 详细信息
来源: 评论
MisDis: An efficent misbehavior discovering method based on accountability and state machine in VANET
MisDis: An efficent misbehavior discovering method based on ...
收藏 引用
15th Asia-Pacific Web Conference on Web Technologies and Applications, APWeb 2013
作者: Yang, Tao Xin, Wei Yu, Liangwen Yang, Yong Hu, Jianbin Chen, Zhong MoE Key Lab. of High Confidence Software Technologies Peking University 100871 Beijing China MoE Key Lab. of Computer Networks and Information Security Peking University 100871 Beijing China School of Electronics Engineering and Computer Science Peking University 100871 Beijing China School of Software Engineering Beijing Jiaotong University 100044 Beijing China
VANET has some prominent features such as channel-opening, large-scale, fast, dynamic-changing, so there is some misbehavior vehicles. Due to the large number of vehicles, even if there is only 1% percent of misbehavi... 详细信息
来源: 评论
Performance measurement for voice services in heterogeneous wired networks
Performance measurement for voice services in heterogeneous ...
收藏 引用
4th International ICST Conference on Testbeds and Research Infrastructures for the Development of networks and Communities, TRIDENTCOM 2008
作者: Alawieh, Basel Ahmed, Rana Mouftah, Hussein T. Department of Electrical Engineering Concordia University Montreal QC Canada Department of Computer Engineering American University of Sharjah Sharjah United Arab Emirates Optical Networks Research Lab. SITE University of Ottawa Ottawa ON Canada
Voice over IP (VoIP) service providers implementing different protocols in their core networks are required to coordinate in order to provision, support and deliver voice services to end clients. This paper presents a... 详细信息
来源: 评论