咨询与建议

限定检索结果

文献类型

  • 153 篇 会议
  • 42 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 90 篇 工学
    • 50 篇 计算机科学与技术...
    • 45 篇 信息与通信工程
    • 42 篇 软件工程
    • 16 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 8 篇 网络空间安全
    • 7 篇 控制科学与工程
    • 6 篇 光学工程
    • 6 篇 安全科学与工程
    • 5 篇 动力工程及工程热...
    • 4 篇 航空宇航科学与技...
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
  • 28 篇 理学
    • 19 篇 数学
    • 9 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 3 篇 生物学
    • 2 篇 系统科学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 4 篇 公共管理
    • 3 篇 图书情报与档案管...
  • 8 篇 医学
    • 5 篇 临床医学
    • 4 篇 公共卫生与预防医...
    • 3 篇 基础医学(可授医学...
  • 5 篇 法学
    • 5 篇 社会学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 军事学
    • 2 篇 军队指挥学

主题

  • 16 篇 computer network...
  • 15 篇 mimo
  • 12 篇 computer science
  • 12 篇 protocols
  • 11 篇 wireless communi...
  • 11 篇 ip networks
  • 10 篇 routing
  • 10 篇 transmitting ant...
  • 10 篇 intelligent netw...
  • 10 篇 wireless sensor ...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 throughput
  • 9 篇 monitoring
  • 9 篇 internet
  • 9 篇 receiving antenn...
  • 9 篇 transmitters
  • 9 篇 telecommunicatio...
  • 8 篇 quality of servi...
  • 8 篇 delay

机构

  • 19 篇 computer network...
  • 13 篇 wireless network...
  • 9 篇 state key labora...
  • 5 篇 wireless and net...
  • 4 篇 department of ph...
  • 4 篇 karachi pakistan
  • 4 篇 health managemen...
  • 4 篇 health systems a...
  • 4 篇 centre for heart...
  • 4 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 university centr...
  • 3 篇 department of so...
  • 3 篇 department of pu...
  • 3 篇 suraj eye instit...
  • 3 篇 budapest univers...
  • 3 篇 biomedical resea...
  • 3 篇 department of me...
  • 3 篇 center of comple...
  • 3 篇 julius centre fo...

作者

  • 17 篇 erwin p. rathgeb
  • 10 篇 rathgeb erwin p.
  • 6 篇 dirk hoffstadt
  • 6 篇 j.g. andrews
  • 5 篇 wenwu zhu
  • 5 篇 qian zhang
  • 5 篇 irfan simsek
  • 5 篇 r.w. heath
  • 5 篇 mohit p. tahilia...
  • 5 篇 qiao xiuquan
  • 4 篇 erwin rathgeb
  • 4 篇 alvis-guzman nel...
  • 4 篇 martin becke
  • 4 篇 robert w. heath
  • 3 篇 riebach stephan
  • 3 篇 ekaterina volodi...
  • 3 篇 abbafati cristia...
  • 3 篇 bärnighausen til...
  • 3 篇 heath robert w.
  • 3 篇 mirica andreea

语言

  • 193 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Networking Technology Group"
198 条 记 录,以下是1-10 订阅
排序:
A Real-Time Acceleration-Based Frailty Detection System for Elderly Care  17
A Real-Time Acceleration-Based Frailty Detection System for ...
收藏 引用
17th International Convention on Rehabilitation Engineering and Assistive technology, i-CREATe 2024
作者: Sansrimahachai, Watsawee Toachoodee, Manachai Khemapech, Ittipong School of Science and Technology University of the Thai Chamber of Commerce System and Networking Group Computer Science Department Bangkok Thailand University of the Thai Chamber of Commerce System and Networking Group School of Science and Technology Bangkok Thailand
Over the past decade, almost all countries in the world have experiencing growth in both the size and the proportion of elderly people in the population. The number of world's aging population is expected to reach... 详细信息
来源: 评论
Joint alignment and steering to manage interference
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 429-438页
作者: Zhao Li Xiujuan Liang Yinghou Liu Jia Liu Zheng Yan School of Cyber Engineering Xidian UniversityXi'an710126China Technol.on Commun.Net.Lab. The 54th Research Inst.of China Elec.Technol.Group Corp.Shijiazhuang050081China School of Computer Science and Technology Xidian UniversityXi'an710126China The Department of Communications and Networking(Comnet) Aalto University02150EspooFinland
In wireless communication networks,mobile users in overlapping areas may experience severe interference,therefore,designing effective Interference Management(IM)methods is crucial to improving network ***,when managin... 详细信息
来源: 评论
The ACK Policy Optimization Algorithm for QUIC
The ACK Policy Optimization Algorithm for QUIC
收藏 引用
Conference on Local computer Networks (LCN)
作者: Ekaterina Volodina Erwin P. Rathgeb Computer Networking Technology Group University of Duisburg-Essen Essen Germany
In order to achieve new performance gains, network protocols are constantly being improved. One of the important novel developments is the new generation transport protocol QUIC. Although QUIC includes many advanced o...
来源: 评论
Zero-Knowledge and Identity-Based Authentication, Authorization, Access Control, and Key Exchange for Publish/Subscribe in Internet of Things
Zero-Knowledge and Identity-Based Authentication, Authorizat...
收藏 引用
Cloudification of the Internet of Things (CIoT)
作者: Irfan Simsek Computer Networking Technology Group University of Duisburg-Essen Essen Germany
Clients and brokers have to communicate via secure channels in the broker-based publish/subscribe model which can be regarded as one of the communication models usually used in the Internet of Things (IoT). A secure c... 详细信息
来源: 评论
A Real-Time Acceleration-Based Frailty Detection System for Elderly Care
A Real-Time Acceleration-Based Frailty Detection System for ...
收藏 引用
Rehabilitation Engineering and Assistive technology (i-CREATe), International Convention on
作者: Watsawee Sansrimahachai Manachai Toachoodee Ittipong Khemapech Computer Science Department System and Networking Group School of Science and Technology University of the Thai Chamber of Commerce Bangkok Thailand System and Networking Group School of Science and Technology University of the Thai Chamber of Commerce Bangkok Thailand
Over the past decade, almost all countries in the world have experiencing growth in both the size and the proportion of elderly people in the population. The number of world's aging population is expected to reach... 详细信息
来源: 评论
Smart Contract Vulnerabilities and Detection Methods: A Survey
Smart Contract Vulnerabilities and Detection Methods: A Surv...
收藏 引用
International Conference on Computing and networking technology (ICCNT)
作者: Ayush Gurjar B. R. Chandavarkar Department of Computer Science and Engineering Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
Smart contracts are fundamental to blockchain technology, enabling automated contract execution without intermediaries. Their widespread adoption, particularly on platforms like Ethereum, has led to significant digita... 详细信息
来源: 评论
Dynamic Content Security Policy Generation at Client-Side to Mitigate XSS Attacks
Dynamic Content Security Policy Generation at Client-Side to...
收藏 引用
International Conference on Computing and networking technology (ICCNT)
作者: Raghvendra Pratap Singh B. R. Chandavarkar Department of Computer Science and Engineering Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
Cross-site scripting (XSS) attacks are a major threat to web applications and have consistently ranked among the OWASP Top 10 vulnerabilities. Attackers can inject malicious scripts that execute within a user’s brows... 详细信息
来源: 评论
Reliable Communication Protocols for Underwater Wireless Sensor Networks: A Survey
Reliable Communication Protocols for Underwater Wireless Sen...
收藏 引用
International Conference on Computing and networking technology (ICCNT)
作者: Prajwal Manohar Bhopale B. R. Chandavarkar Department of Computer Science and Engineering Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
Underwater Wireless Sensor Networks (UWSNs) have received tremendous concern and interest in recent years. They find many applications, from underwater exploration and monitoring to naval and marine operations. Howeve... 详细信息
来源: 评论
Multiple Circular Ring-canals on the Starfish Routing Backbone in Wireless Sensor Networks  4
Multiple Circular Ring-canals on the Starfish Routing Backbo...
收藏 引用
4th International Conference on Sustainable Technologies for Industry 4.0, STI 2022
作者: Mozumder, Md. Daiyan Uddin Hosen, Riaj Hossain, Md. Mamun Habib, Md. Ahsan Roy, Palash Razzaque, Md. Abdur Green University of Bangladesh Department of Computer Science and Engineering Dhaka Bangladesh University of Dhaka Green Networking Research Group Department of Computer Science and Engineering Bangladesh Mawlana Bhashani Science and Technology University Department of Information and Communication Technology Bangladesh
To capture real-time data from Wireless Sensor Network Applications, utilizing unmanned aerial vehicles (UAVs) is becoming popular for minimizing end-to-end latency and reducing packet loss issues with extended networ... 详细信息
来源: 评论
Enhanced Zero-Knowledge and Identity-Based Authentication with integrated Key Exchange for Internet of Things
Enhanced Zero-Knowledge and Identity-Based Authentication wi...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Irfan Simsek Computer Networking Technology Group University of Duisburg-Essen Essen Germany
Sensitive data have to be communicated via secure channels generally set up by using cryptography. This needs an authentic key exchange, which in turn requires an authentication process. However, the Internet of Thing...
来源: 评论