咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是271-280 订阅
排序:
Cooperative Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network Allocation  30
Cooperative Multi-Agent Deep Reinforcement Learning for Dyna...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Suzuki, Akito Kawahara, Ryoichi Harada, Shigeaki NTT Corp NTT Network Technol Labs Tokyo Japan Toyo Univ Fac Informat Networking Innovat & Design Tokyo Japan
Network traffic and computing demand have been changing dramatically due to the growth of various types of network services, e.g., high-quality video delivery and operating system (OS) updates. To maximize the utiliza... 详细信息
来源: 评论
A Few-Shot Class-Incremental Learning Approach for Intrusion Detection  30
A Few-Shot Class-Incremental Learning Approach for Intrusion...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Wang, Tingting Lv, Qiujian Hu, Bo Sun, Degang Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Classic network intrusion detection methods usually are supervised machine learning models, which are obtained by offline training and can achieve good performance in the initial stage of system construction. However,... 详细信息
来源: 评论
Epinoia: Intent Checker for Stateful networks  30
Epinoia: Intent Checker for Stateful Networks
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Wang, Huazhe Sharma, Puneet Ahmed, Faraz Kang, Joon-Myung Qian, Chen Yannakakis, Mihalis Microsoft Redmond WA 98052 USA Hewlett Packard Labs Palo Alto CA USA UC Santa Cruz Santa Cruz CA USA Columbia Univ New York NY 10027 USA Google Mountain View CA 94043 USA
Intent-Based Networking (IBN) has been increasingly deployed in production enterprise networks. Automated network configuration in IBN lets operators focus on intents- i.e., the end to end business objectives-rather t... 详细信息
来源: 评论
Network Traffic Characteristics of IoT Devices in Smart Homes  30
Network Traffic Characteristics of IoT Devices in Smart Home...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Mainuddin, Md Duan, Zhenhai Dong, Yingfei Florida State Univ Dept Comp Sci Tallahassee FL 32306 USA Univ Hawaii Dept Elect Engn Honolulu HI 96822 USA
Understanding network traffic characteristics of IoT devices plays a critical role in improving both the performance and security of IoT devices, including IoT device identification, classification, and anomaly detect... 详细信息
来源: 评论
Efficient and Trustworthy Authentication in 5G networks Based on Blockchain  30
Efficient and Trustworthy Authentication in 5G Networks Base...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Liu, Jian Huang, Chin-Tser Univ South Carolina Columbia SC 29208 USA
The global coronavirus pandemic is reshaping our daily lives and has forced many people to work and socialize remotely. This trend also increases the demand for highly available and trustworthy Internet access. Compar... 详细信息
来源: 评论
Research on User Access Selection Mechanism Based on Maximum Throughput for 5G Network Slicing  30
Research on User Access Selection Mechanism Based on Maximum...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Lu, Yangguang Chen, Xin Xi, Ranran Chen, Ying Beijing Informat Sci & Technol Univ Sch Comp Sci Beijing Peoples R China
With the development of Internet of Things (IoT) and network technologies, traditional networks cannot cope with the growth of network traffic and the changes in service requirements. The 5-th Generation Mobile Commun... 详细信息
来源: 评论
Online Partial Service Hosting at the Edge  30
Online Partial Service Hosting at the Edge
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Narayana, V. S. Ch Lakshmi Agarwala, Mohit Karamchandani, Nikhil Moharir, Sharayu Indian Inst Technol Dept Elect Engn Mumbai Maharashtra India
We consider the problem of service hosting where an application provider can dynamically rent edge computing resources and serve user requests from the edge to deliver a better quality of service. A key novelty of thi... 详细信息
来源: 评论
Storage Protection with Connectivity and Processing Restoration for Survivable Cloud Services  30
Storage Protection with Connectivity and Processing Restorat...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Natalino, Carlos Rostami, Ahmad Monti, Paolo Chalmers Univ Technol Dept Elect Engn SE-41296 Gothenburg Sweden Ericsson Res Farogatan 6 SE-16483 Stockholm Sweden Corp Res Robert Bosch GmbH D-70839 Gerlingen Germany
The operation and management of software-based communication systems and services is a big challenge for infrastructure and service providers. The challenge is mainly associated with the more significant number of con... 详细信息
来源: 评论
Influence Spread Control in Complex networks via Removal of Feed Forward Loops  30
Influence Spread Control in Complex Networks via Removal of ...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Roy, Satyaki Roy, Prithwiraj Nadendla, Venkata Sriram Siddhardh Das, Sajal K. Univ N Carolina Dept Genet Chapel Hill NC 27515 USA Missouri Univ Sci & Technol Dept Comp Sci Rolla MO 65409 USA
Selective removal of certain subgraphs called motifs based on the spread function value is one of the most powerful approaches to curb the overall influence spread in any complex network. In this paper, we first prove... 详细信息
来源: 评论
Combining Auto-Encoder with LSTM for WiFi-Based Fingerprint Positioning  30
Combining Auto-Encoder with LSTM for WiFi-Based Fingerprint ...
收藏 引用
30th International Conference on computer communications and networks (ICCCN)
作者: Liu, Yu-Ting Chen, Jen-Jee Tseng, Yu-Chee Li, Frank Y. Natl Yang Ming Chiao Tung Univ Coll Artificial Intelligence Taipei Taiwan Univ Agder UiA Dept Informat & Commun Technol N-4898 Grimstad Norway
Although indoor positioning has long been investigated by various means, its accuracy remains concern. Several recent studies have applied machine learning algorithms to explore wireless fidelity (WiFi)-based position... 详细信息
来源: 评论