咨询与建议

限定检索结果

文献类型

  • 153 篇 会议
  • 43 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 49 篇 计算机科学与技术...
    • 45 篇 信息与通信工程
    • 41 篇 软件工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 电气工程
    • 8 篇 网络空间安全
    • 7 篇 控制科学与工程
    • 6 篇 光学工程
    • 6 篇 安全科学与工程
    • 5 篇 动力工程及工程热...
    • 4 篇 航空宇航科学与技...
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
    • 2 篇 船舶与海洋工程
  • 29 篇 理学
    • 19 篇 数学
    • 9 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 3 篇 生物学
    • 2 篇 系统科学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 4 篇 公共管理
    • 3 篇 图书情报与档案管...
  • 7 篇 医学
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
    • 3 篇 基础医学(可授医学...
  • 5 篇 法学
    • 5 篇 社会学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 军事学

主题

  • 16 篇 computer network...
  • 15 篇 mimo
  • 12 篇 computer science
  • 12 篇 protocols
  • 11 篇 wireless communi...
  • 11 篇 ip networks
  • 10 篇 routing
  • 10 篇 transmitting ant...
  • 10 篇 intelligent netw...
  • 10 篇 wireless sensor ...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 throughput
  • 9 篇 monitoring
  • 9 篇 internet
  • 9 篇 receiving antenn...
  • 9 篇 transmitters
  • 9 篇 telecommunicatio...
  • 8 篇 quality of servi...
  • 8 篇 delay

机构

  • 19 篇 computer network...
  • 13 篇 wireless network...
  • 9 篇 state key labora...
  • 5 篇 wireless and net...
  • 4 篇 karachi pakistan
  • 4 篇 department of co...
  • 3 篇 department of ph...
  • 3 篇 department of co...
  • 3 篇 university centr...
  • 3 篇 health managemen...
  • 3 篇 health systems a...
  • 3 篇 department of pu...
  • 3 篇 suraj eye instit...
  • 3 篇 budapest univers...
  • 3 篇 biomedical resea...
  • 3 篇 department of co...
  • 3 篇 centre for heart...
  • 3 篇 networking and t...
  • 3 篇 school of comput...
  • 3 篇 computer network...

作者

  • 17 篇 erwin p. rathgeb
  • 10 篇 rathgeb erwin p.
  • 6 篇 dirk hoffstadt
  • 6 篇 j.g. andrews
  • 5 篇 wenwu zhu
  • 5 篇 qian zhang
  • 5 篇 irfan simsek
  • 5 篇 r.w. heath
  • 5 篇 mohit p. tahilia...
  • 5 篇 qiao xiuquan
  • 4 篇 erwin rathgeb
  • 4 篇 martin becke
  • 4 篇 robert w. heath
  • 3 篇 riebach stephan
  • 3 篇 ekaterina volodi...
  • 3 篇 heath robert w.
  • 3 篇 mirica andreea
  • 3 篇 a. forenza
  • 3 篇 dandona rakhi
  • 3 篇 majeed azeem

语言

  • 190 篇 英文
  • 7 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Networking Technology Group"
199 条 记 录,以下是1-10 订阅
排序:
A Real-Time Acceleration-Based Frailty Detection System for Elderly Care  17
A Real-Time Acceleration-Based Frailty Detection System for ...
收藏 引用
17th International Convention on Rehabilitation Engineering and Assistive technology, i-CREATe 2024
作者: Sansrimahachai, Watsawee Toachoodee, Manachai Khemapech, Ittipong School of Science and Technology University of the Thai Chamber of Commerce System and Networking Group Computer Science Department Bangkok Thailand University of the Thai Chamber of Commerce System and Networking Group School of Science and Technology Bangkok Thailand
Over the past decade, almost all countries in the world have experiencing growth in both the size and the proportion of elderly people in the population. The number of world's aging population is expected to reach... 详细信息
来源: 评论
Joint alignment and steering to manage interference
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 429-438页
作者: Zhao Li Xiujuan Liang Yinghou Liu Jia Liu Zheng Yan School of Cyber Engineering Xidian UniversityXi'an710126China Technol.on Commun.Net.Lab. The 54th Research Inst.of China Elec.Technol.Group Corp.Shijiazhuang050081China School of Computer Science and Technology Xidian UniversityXi'an710126China The Department of Communications and Networking(Comnet) Aalto University02150EspooFinland
In wireless communication networks,mobile users in overlapping areas may experience severe interference,therefore,designing effective Interference Management(IM)methods is crucial to improving network ***,when managin... 详细信息
来源: 评论
The ACK Policy Optimization Algorithm for QUIC
The ACK Policy Optimization Algorithm for QUIC
收藏 引用
Conference on Local computer Networks (LCN)
作者: Ekaterina Volodina Erwin P. Rathgeb Computer Networking Technology Group University of Duisburg-Essen Essen Germany
In order to achieve new performance gains, network protocols are constantly being improved. One of the important novel developments is the new generation transport protocol QUIC. Although QUIC includes many advanced o...
来源: 评论
Zero-Knowledge and Identity-Based Authentication, Authorization, Access Control, and Key Exchange for Publish/Subscribe in Internet of Things
Zero-Knowledge and Identity-Based Authentication, Authorizat...
收藏 引用
Cloudification of the Internet of Things (CIoT)
作者: Irfan Simsek Computer Networking Technology Group University of Duisburg-Essen Essen Germany
Clients and brokers have to communicate via secure channels in the broker-based publish/subscribe model which can be regarded as one of the communication models usually used in the Internet of Things (IoT). A secure c... 详细信息
来源: 评论
A Real-Time Acceleration-Based Frailty Detection System for Elderly Care
A Real-Time Acceleration-Based Frailty Detection System for ...
收藏 引用
Rehabilitation Engineering and Assistive technology (i-CREATe), International Convention on
作者: Watsawee Sansrimahachai Manachai Toachoodee Ittipong Khemapech Computer Science Department System and Networking Group School of Science and Technology University of the Thai Chamber of Commerce Bangkok Thailand System and Networking Group School of Science and Technology University of the Thai Chamber of Commerce Bangkok Thailand
Over the past decade, almost all countries in the world have experiencing growth in both the size and the proportion of elderly people in the population. The number of world's aging population is expected to reach... 详细信息
来源: 评论
Smart Contract Vulnerabilities and Detection Methods: A Survey
Smart Contract Vulnerabilities and Detection Methods: A Surv...
收藏 引用
International Conference on Computing and networking technology (ICCNT)
作者: Ayush Gurjar B. R. Chandavarkar Department of Computer Science and Engineering Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
Smart contracts are fundamental to blockchain technology, enabling automated contract execution without intermediaries. Their widespread adoption, particularly on platforms like Ethereum, has led to significant digita... 详细信息
来源: 评论
Joint Deployment and Resource Allocation for Multi-AeBS Networks: A Two-Timescale Optimization Framework Using MADRL
收藏 引用
IEEE Transactions on Communications 2024年 第6期73卷 4272-4289页
作者: Zhao, Yikun Zhou, Fanqin Feng, Lei Sun, Yao Li, Wenjing Lim, Wei Yang Bryan Xiong, Zehui Mao, Shiwen Han, Zhu State Key Laboratory of Networking and Switching Technology Beijing100876 China University of Glasgow James Watt School of Engineering GlasgowG12 8QQ United Kingdom Nanyang Technological University Alibaba Group and Alibaba-NTU Joint Research Institute Singapore Singapore University of Technology and Design Information Systems Technology and Design Pillar Singapore487372 Singapore Auburn University Department of Electrical and Computer Engineering AuburnAL36849 United States University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
As an important component of the space-air-ground integrated network, aerial base station (AeBS) systems have gained significant attention for their flexibility in mobility and cost-effective construction. Nevertheles... 详细信息
来源: 评论
Dynamic Content Security Policy Generation at Client-Side to Mitigate XSS Attacks
Dynamic Content Security Policy Generation at Client-Side to...
收藏 引用
International Conference on Computing and networking technology (ICCNT)
作者: Raghvendra Pratap Singh B. R. Chandavarkar Department of Computer Science and Engineering Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
Cross-site scripting (XSS) attacks are a major threat to web applications and have consistently ranked among the OWASP Top 10 vulnerabilities. Attackers can inject malicious scripts that execute within a user’s brows... 详细信息
来源: 评论
Reliable Communication Protocols for Underwater Wireless Sensor Networks: A Survey
Reliable Communication Protocols for Underwater Wireless Sen...
收藏 引用
International Conference on Computing and networking technology (ICCNT)
作者: Prajwal Manohar Bhopale B. R. Chandavarkar Department of Computer Science and Engineering Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
Underwater Wireless Sensor Networks (UWSNs) have received tremendous concern and interest in recent years. They find many applications, from underwater exploration and monitoring to naval and marine operations. Howeve... 详细信息
来源: 评论
Multiple Circular Ring-canals on the Starfish Routing Backbone in Wireless Sensor Networks  4
Multiple Circular Ring-canals on the Starfish Routing Backbo...
收藏 引用
4th International Conference on Sustainable Technologies for Industry 4.0, STI 2022
作者: Mozumder, Md. Daiyan Uddin Hosen, Riaj Hossain, Md. Mamun Habib, Md. Ahsan Roy, Palash Razzaque, Md. Abdur Green University of Bangladesh Department of Computer Science and Engineering Dhaka Bangladesh University of Dhaka Green Networking Research Group Department of Computer Science and Engineering Bangladesh Mawlana Bhashani Science and Technology University Department of Information and Communication Technology Bangladesh
To capture real-time data from Wireless Sensor Network Applications, utilizing unmanned aerial vehicles (UAVs) is becoming popular for minimizing end-to-end latency and reducing packet loss issues with extended networ... 详细信息
来源: 评论