咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 48 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 119 篇 工学
    • 108 篇 计算机科学与技术...
    • 79 篇 软件工程
    • 38 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 7 篇 电气工程
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 3 篇 仪器科学与技术
    • 3 篇 电子科学与技术(可...
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 生物医学工程(可授...
  • 47 篇 理学
    • 34 篇 数学
    • 8 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 3 篇 物理学
    • 3 篇 化学
    • 3 篇 生物学
  • 40 篇 管理学
    • 25 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 7 篇 法学
    • 6 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 艺术学

主题

  • 17 篇 wireless sensor ...
  • 13 篇 calculus
  • 9 篇 computational mo...
  • 9 篇 distributed comp...
  • 9 篇 cloud computing
  • 8 篇 computer science
  • 8 篇 delays
  • 7 篇 quality of servi...
  • 7 篇 servers
  • 7 篇 delay
  • 6 篇 aggregates
  • 6 篇 computer network...
  • 6 篇 distributed comp...
  • 5 篇 wireless communi...
  • 5 篇 monitoring
  • 5 篇 machine learning
  • 5 篇 middleware
  • 5 篇 mobile computing
  • 5 篇 stochastic proce...
  • 4 篇 deep learning

机构

  • 10 篇 distributed comp...
  • 5 篇 cloud computing ...
  • 4 篇 distributed and ...
  • 4 篇 department of co...
  • 4 篇 disco distribute...
  • 3 篇 school of comput...
  • 3 篇 school of advanc...
  • 3 篇 lab. of computer...
  • 3 篇 bangalore univer...
  • 3 篇 xiangjiang lab
  • 3 篇 intelligent dist...
  • 3 篇 key laboratory o...
  • 3 篇 insa national in...
  • 3 篇 cloud computing ...
  • 2 篇 distributed comp...
  • 2 篇 parallel and dis...
  • 2 篇 large scale dist...
  • 2 篇 large scale dist...
  • 2 篇 distributed comp...
  • 2 篇 cnrs

作者

  • 16 篇 schmitt jens b.
  • 14 篇 rajkumar buyya
  • 10 篇 jens b. schmitt
  • 10 篇 janakiram d.
  • 8 篇 leila ismail
  • 6 篇 abdolreza abhari
  • 6 篇 ivan martinovic
  • 5 篇 martinovic ivan
  • 5 篇 steffen bondorf
  • 5 篇 zdarsky frank a.
  • 5 篇 garg vijay k.
  • 4 篇 vidyarthi deo pr...
  • 4 篇 s s iyengar
  • 4 篇 johari rahul
  • 4 篇 jens schmitt
  • 4 篇 l m patnaik
  • 4 篇 a. kumar
  • 3 篇 peichang shi
  • 3 篇 ponnavaikko kove...
  • 3 篇 paul nikolaus

语言

  • 197 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"机构=Distributed Computer Systems Lab"
206 条 记 录,以下是101-110 订阅
排序:
Dimensioning of time-critical WSNs -theory, implementation and evaluation
收藏 引用
Journal of Communications 2011年 第5期6卷 360-369页
作者: Suriyachai, Petcharat Roedig, Utz Scott, Andrew Gollan, Nicos Schmitt, Jens Department of Computer Engineering Faculty of Engineering Prince of Songkla University Thailand InfoLab21 Lancaster University United Kingdom Distributed Computer Systems Lab University of Kaiserslautern Germany
It is difficult to design and operate a Wireless Sensor Network (WSN) that ensures timely data delivery. Hence, few time-critical WSNs are nowadays in operation despite numerous application scenarios that would benefi... 详细信息
来源: 评论
A comparison of Wireless Fidelity (Wi-Fi) fingerprinting techniques
A comparison of Wireless Fidelity (Wi-Fi) fingerprinting tec...
收藏 引用
International Conference on Information and Communication Technology Convergence (ICTC)
作者: Lersan B. Del Mundo Rafael Lean D. Ansay Cedric Angelo M. Festin Roel M. Ocampo Networks and Distributed Systems Laboratory Department of Computer Science University of the Philippines Diliman Quezon Philippines Computer Networks Lab Electrical and Electronics Engineering Institute University of the Philippines Diliman Quezon Philippines
Among several techniques proposed for indoor positioning using IEEE 802.11 Wireless Fidelity (Wi-Fi) based networks, those that rely on fingerprinting have been demonstrated to outperform those based on lateration, an... 详细信息
来源: 评论
Persistent Ocean Monitoring with Underwater Gliders: Towards Accurate Reconstruction of Dynamic Ocean Processes
Persistent Ocean Monitoring with Underwater Gliders: Towards...
收藏 引用
2011 IEEE International Conference on Robotics and Automation(2011年IEEE世界机器人与自动化大会 ICRA 2011)
作者: Ryan N. Smith Mac Schwager Daniela Rus Stephen L. Smith Gaurav S. Sukhatme School of Engineering Systems at the Queensland University of Technology BrisbaneQLD4000 Australia GRASP Lab University of PennsylvaniaPhiladelphiaPA 19104USA Distributed Robotics Lab Computer Science and Artificial Intelligence LaboratoryMassachusetts Insti Robotic Embedded Systems Laboratory Department of Computer ScienceUniversity of Southern California
This paper proposes a path planning algorithm and a velocity control algorithm for underwater gliders to persistently monitor a patch of ocean. The algorithms address a pressing need among ocean scientists to collect ... 详细信息
来源: 评论
Improving range query performance on historic web page data
Improving range query performance on historic web page data
收藏 引用
5th Annual ChinaGrid Conference, ChinaGrid 2010
作者: Li, Geng Peng, Bo Lab. of Computer Networks and Distributed Systems Peking University Beijing China
This paper is about the performance of range queries on historic web page data set, i.e. requests into a data set of web pages that keeps record of historic versions of HTML data of URLs on the web for a subset of dat... 详细信息
来源: 评论
A bandwidth reservation strategy for multiprocessor real-time scheduling
A bandwidth reservation strategy for multiprocessor real-tim...
收藏 引用
16th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2010
作者: Massa, Ernesto Lima, George Department of Computer Science Distributed Systems Lab. UFBA - Federal University of Bahia Salvador Brazil
The problem of scheduling a set of tasks on a multiprocessor architecture is addressed. Tasks are assumed to be sporadic with arbitrary deadlines and may migrate between processors. The execution of migrating tasks is... 详细信息
来源: 评论
SUDOKU: Secure and usable deployment of keys on wireless sensors
SUDOKU: Secure and usable deployment of keys on wireless sen...
收藏 引用
2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
作者: Wilhelm, Matthias Martinovic, Ivan Uzun, Ersin Schmitt, Jens B. Disco / Distributed Computer Systems Lab. TU Kaiserslautern Germany Computer Science Department University of California Irvine CA United States
Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secre... 详细信息
来源: 评论
Statistical response time bounds in randomly deployed wireless sensor networks
Statistical response time bounds in randomly deployed wirele...
收藏 引用
Conference on Local computer Networks (LCN)
作者: Steffen Bondorf B. Schmitt Jens disco | Distributed Computer Systems Lab University of Kaiserslautern Germany Distributed Computer Systems Lab University of Kaiserslautern Germany
Response time bounds are important for many application scenarios of wireless sensor networks (WSN). Often, during the planning phase of a WSN its topology is not known. It rather results from a deployment process. Th... 详细信息
来源: 评论
Improving Range Query Performance on Historic Web Page Data
Improving Range Query Performance on Historic Web Page Data
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Geng Li Bo Peng Lab of Computer Networks and Distributed Systems Peking University Beijing China
This paper is about the performance of range queries on historic web page data set, i.e. requests into a data set of web pages that keeps record of historic versions of HTML data of URLs on the web for a subset of dat... 详细信息
来源: 评论
Wide area distributed file systems-A scalability and performance survey
收藏 引用
Scalable Computing 2010年 第3期11卷 305-326页
作者: Ponnavaikko, Kovendhan Dharanipragada, Janakiram Distributed and Object Systems Lab Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India
Recent decades have witnessed an explosive growth in the amounts of digital data in various fields of arts, science and engineering. Such data is generally of interest to a large number of people spread over wide geog... 详细信息
来源: 评论
SUDOKU: Secure and usable deployment of keys on wireless sensors
SUDOKU: Secure and usable deployment of keys on wireless sen...
收藏 引用
IEEE Workshop on Secure Network Protocols (NPSec)
作者: Matthias Wilhelm Ivan Martinovic Ersin Uzun Jens B. Schmitt Disco / Distributed Computer Systems Lab TU Kaiserslautern Germany Computer Science Department University of California Irvine USA
Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secre... 详细信息
来源: 评论