咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是11-20 订阅
排序:
Private Set Intersection Protocol with Perfect Hashing on OKVS: An Enhanced Approach for Privacy-Preserving Operations  33
Private Set Intersection Protocol with Perfect Hashing on OK...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Lee, Jiyeon Halla Univ Dept AI Informat Secur Wonju South Korea
This paper introduces a novel protocol for solving the Private Set Intersection (PSI) problem, leveraging the Oblivious Key-Value Stores (OKVS) data structure. OKVS enhances traditional Key-Value Stores (KVS) by addin... 详细信息
来源: 评论
A MECApp-aware Lifecycle Management Approach in 5G Edge-Cloud Deployments  33
A MECApp-aware Lifecycle Management Approach in 5G Edge-Clou...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Bellavista, Paolo Bujari, Armir Foschini, Luca Sabbioni, Andrea Venanzi, Riccardo Univ Bologna Dept Comp Sci & Engn Bologna Italy
The recent trend pushing towards reliance on edge computing, virtualization and programmatic 5G network control has sparked the development of a myriad of open-source resource management and orchestration projects for... 详细信息
来源: 评论
SleepWalker: Constrastive Fine-tuning Technique for Text to Kinematics Models for Human computer Interaction  33
SleepWalker: Constrastive Fine-tuning Technique for Text to ...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Edwards, Demarcus Rawat, Danda B. Howard Univ Dept Elect Engn & Comp Sci Washington DC 20059 USA
In this paper, we present SleepWalker, a few-shot fine-tuning approach for conditional text-to-motion generation. Our key innovation is extending contrastive learning, previously applied to image diffusion, to the new... 详细信息
来源: 评论
Sharing Stateless Containers among MEC Applications Composed of Multiple Containers  33
Sharing Stateless Containers among MEC Applications Composed...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Yanagisawa, Shuntaro Yamada, Kohki Sekiguchi, Atsushi Kondo, Takao Kumakura, Ken Maesako, Keisuke Zhang, Liang Mori, Kosuke Teraoka, Fumio Keio Univ Grad Sch Sci & Technol Yokohama Kanagawa Japan Hokkaido Univ Informat Initiat Ctr Sapporo Hokkaido Japan SoftBank Corp Tokyo Japan Keio Univ Fac Sci & Technol Yokohama Kanagawa Japan
In an MEC (Multi-access Edge Computing) environment, it is suitable to compose an application as a set of containers for flexibility in resource allocation. This paper proposes stateless shared containers (SS-Containe... 详细信息
来源: 评论
Advancing Network Security with Quantum-Safe System Integration  33
Advancing Network Security with Quantum-Safe System Integrat...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Mao, Jianzhou Xu, Guobin Sakk, Eric Wang, Shuangbao(Paul) Morgan State Univ Dept Comp Sci Baltimore MD 21239 USA
As quantum computing continues to advance, it poses unprecedented risks to traditional factor-based encryption methods, such as RSA, undermining the security of current cryptographic protocols. To address this pivotal... 详细信息
来源: 评论
On Improved Efficiency and Forward Security of 0-RTT Key Exchange for SDP  33
On Improved Efficiency and Forward Security of 0-RTT Key Exc...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Zhang, Lei Ge, Jingguo Wu, Yulei Le, Tong Li, Hui Yuepeng, E. Chinese Acad Sci Key Lab Cyberspace Secur Def Inst Informat Engn Beijing 100085 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Univ Bristol Sch Elect Elect & Mech Engn Bristol BS8 1UB Avon England
The Transport Layer Security (TLS) protocol has been widely used in software-defined perimeter (SDP) to establish secure, encrypted connections between distributed SDP components. To improve communication efficiency o... 详细信息
来源: 评论
ECO: Edge Continuum Orchestrator Framework for managing serverless chains across the Cloud-Edge Spectrum  33
ECO: Edge Continuum Orchestrator Framework for managing serv...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Alarbi, Muhamed Belson, Robert Lutfiyya, Hanan Univ Western Ontario Dept Comp Sci London ON Canada Amazon Web Serv AWS Edge Comp New York NY USA
The proliferation of smart devices has paved the way for the development of intelligent applications across various sectors. While Cloud Computing offers virtually limitless resources for deploying applications and ha... 详细信息
来源: 评论
Acies-OS: A Content-Centric Platform for Edge AI Twinning and Orchestration  33
Acies-OS: A Content-Centric Platform for Edge AI Twinning an...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Li, Jinyang Chen, Yizhuo Kimura, Tomoyoshi Wang, Tianshi Wang, Ruijie Kara, Denizhan Hu, Yigong Wu, Li Hanafy, Walid A. Souza, Abel Shenoy, Prashant Wigness, Maggie Bhattacharyya, Joydeep Kim, Jae Wang, Guijun Kimberly, Greg Eckhardt, Josh Osipychev, Denis Abdelzaher, Tarek Univ Illinois Dept Comp Sci Champaign IL 61820 USA Univ Massachusetts Dept Comp Sci Amherst MA 01003 USA DEVCOM Army Res Lab Adelphi MD 20783 USA Boeing Co Seattle WA 98108 USA
This paper describes Acies-OS, a content-centric platform for edge AI twinning and orchestration that allows easy deployment, re-configuration, and control of edge AI services, augmented by a digital twin. The work is... 详细信息
来源: 评论
Explainability Guided Adversarial Evasion Attacks on Malware Detectors  33
Explainability Guided Adversarial Evasion Attacks on Malware...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Aryal, Kshitiz Gupta, Maanak Abdelsalam, Mahmoud Saleh, Moustafa Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA North Carolina A&T State Univ Dept Comp Sci Greensboro NC 27411 USA Oracle Oracle Cloud Infrastruct Seattle WA 98101 USA
As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical. In the malware domain, this advers... 详细信息
来源: 评论
Cloudy Forecast: How Predictable is Communication Latency in the Cloud?  33
Cloudy Forecast: How Predictable is Communication Latency in...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Hilyard, Owen Cui, Bocheng Webster, Marielle Muralikrishna, Abishek Bangalore Charapko, Aleksey Univ New Hampshire Durham NH 03824 USA
Many systems and services rely on timing assumptions for performance and availability to perform critical aspects of their operation, such as various timeouts for failure detectors or optimizations to concurrency cont... 详细信息
来源: 评论