咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是181-190 订阅
排序:
DLT-based Data Mules for Smart Territories  31
DLT-based Data Mules for Smart Territories
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Zichichit, Mirko Serenat, Luca Ferrettit, Stefano D'Angelo, Gabriele Univ Politecn Madrid Ontol Engn Grp Madrid Spain Univ Bologna Dept Comp Sci & Engn Bologna Italy Univ Urbino Carlo Bo Dept Pure & Appl Sci Urbino Italy
Many services that are taken for granted in smart cities are not even remotely available in dislocated areas yet, due to the lack of or too costly wide area network connectivity. With the aim to offer a practical and ... 详细信息
来源: 评论
Design and Implementation of a Strong Representation System for Network Policies  31
Design and Implementation of a Strong Representation System ...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Lan, Fangping Biswas, Sanchari Qui, Bin Wu, Jie Wang, Anduo Temple Univ Dept Comp & Informat Sci Philadelphia PA 19122 USA
Policy information in computer networking today, such as reachability objectives of a controller program running on a Software Defined Network (henceforth referred to as SDN) or Border Gateway Protocol (henceforth ref... 详细信息
来源: 评论
LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems  31
LiTIV: A Lightweight Traceable Data Integrity Verification S...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Xu, Xin Wang, Wei Lin, Jingqiang Yang, Zhen Fan, Haoling Wang, Qiongxiao Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100084 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100084 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100084 Peoples R China Univ Sci & Technol China Sch Cyber Sci & Technol Hefei 230026 Peoples R China Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China
Conventional data integrity solutions for Version Control Systems (VCSs) include hash verification, commit signature and log-based schemes. However, existing schemes either bring heavy burden to the VCS client, or pla... 详细信息
来源: 评论
Using Markov Chain Monte Carlo Algorithm for Sampling Imbalance Binary IDS Datasets  31
Using Markov Chain Monte Carlo Algorithm for Sampling Imbala...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Abedzadeh, Najmeh Jacobs, Dr. Matthew Catholic Univ Amer EECS Dept Sch Engn Washington DC USA
Malicious cyber-attacks can hide themselves in large imbalanced datasets which makes it difficult for Intrusion Detection Systems (IDS) to detect them. Much research has been done in using machine learning and deep le... 详细信息
来源: 评论
Exon: An Oblivious Exactly-Once Messaging Protocol  31
Exon: An Oblivious Exactly-Once Messaging Protocol
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Kassam, Ziad Almeida, Paulo Sergio Shoker, Ali INESC TEC HASLab Braga Portugal Minho Univ Braga Portugal CEMSE KAUST RC3 Thuwal Saudi Arabia
TCP is typically the default transport protocol of choice for its supposed reliability, even for message-oriented middleware (e.g., ZeroMQ) or inter-actor communication (e.g., distributed Erlang). However, under netwo... 详细信息
来源: 评论
A QoS Guarantee Mechanism for Service Function Chains in NFV-enabled networks  31
A QoS Guarantee Mechanism for Service Function Chains in NFV...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Yue, Yi Yang, Wencong Zhang, Xuebei Huang, Rong Tang, Xiongyang China Unicorn Res Inst Future Network Res Dept Beijing Peoples R China
Network Function Virtualization (NFV) is an emerging technology that extracts network functions from dedicated devices and instantiates them in the form of Virtual Network Functions (VNFs). In this paper, we focus on ... 详细信息
来源: 评论
Distributed Ledgers for Enhanced Machine-to-Machine Trust in Smart Cities  31
Distributed Ledgers for Enhanced Machine-to-Machine Trust in...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Hickert, Cameron Tekeoglu, Ali Maurio, Joseph Watson, Ryan Syed, Daniel Chavis, Jeffrey Brown, Gill Sookoor, Tamim Johns Hopkins Univ Appl Phys Lab Baltimore MD 21218 USA
Incorporating smart technology into critical infrastructure (CI) and smart cities promises substantial efficiency improvements as networks of machines communicate and make rapid decisions autonomously. Yet the promise... 详细信息
来源: 评论
PPAS: Privacy-preserving Resource Discovery for Multi-domain SFC orchestration  31
PPAS: Privacy-preserving Resource Discovery for Multi-domain...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Joshi, Neha Kumar, Rishabh Thakur, Abhishek Franklin, A. Antony Kumar, N. V. Narendra Indian Inst Technol Hyderabad Telangana India IDRBT Hyderabad Telangana India
Service function chaining of network-functions across multiple domains enables next-generation services to be offered efficiently. Multi-domain orchestrator decouples the complexities of setting up such chains across ... 详细信息
来源: 评论
A Defense-Attack Game under Multiple Preferences and Budget Constraints with Equilibrium  31
A Defense-Attack Game under Multiple Preferences and Budget ...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Niknami, Nadia Sawwan, Abdalaziz Wu, Jie Temple Univ Dept Comp & Informat Sci Philadelphia PA 19122 USA
Cyber-security research often focuses on attack-defense games where a strategic attacker seeks to destroy the defender's targets or kill him. In such a game there is a defender who just try to protect himself. In ... 详细信息
来源: 评论
Intelligent Reflecting Surface-Aided Centralized Scheduling for mmWave V2V networks  31
Intelligent Reflecting Surface-Aided Centralized Scheduling ...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Pan, Sheng Zhang, Xinming Sung, Dan Keun Univ Sci & Technol China Sch Comp Sci & Technol Hefei 230027 Peoples R China Korea Adv Inst Sci & Technol Sch Elect Engn Daejeon South Korea
In this paper, we investigate how to efficiently schedule vehicle-to-vehicle (V2V) requests in millimeter wave (mmWave) vehicular networks. Considering the vulnerability of mmWave signals to blockages and the disadvan... 详细信息
来源: 评论