咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是51-60 订阅
排序:
Trusting the Cloud-Native Edge: Remotely Attested Kubernetes Workers  33
Trusting the Cloud-Native Edge: Remotely Attested Kubernetes...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Thijsman, Jordi Sebrechts, Merlijn De Turck, Filip Volckaert, Bruno Ghent Univ Imec Dept Informat Technol IDLab Ghent Belgium
A Kubernetes cluster typically consists of trusted nodes, running within the confines of a physically secure datacenter. With recent advances in edge orchestration, this is no longer the case. This poses a new challen... 详细信息
来源: 评论
Performance Analysis for Underwater Video Transmission with Imperfect Resampling  33
Performance Analysis for Underwater Video Transmission with ...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Hegazy, Rana Milstein, Laurence Cosman, Pamela
Large Doppler shifts are a challenge in underwater wireless acoustic communication compared to terrestrial wireless radio communication. Resampling and Doppler shift compensation are used at the receiver to counteract... 详细信息
来源: 评论
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach  33
Redefining DDoS Attack Detection Using A Dual-Space Prototyp...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Martinez, Fernando Mapkar, Mariyam Alfatemi, Ali Rahouti, Mohamed Xin, Yufeng Xiong, Kaiqi Ghani, Nasir Fordham Univ Comp & Informat Sci Dept Bronx NY 10023 USA UNC Chapel Hill RENCI Chapel Hill NC 27517 USA Univ S Florida Cyber Florida Tampa FL 33617 USA Univ S Florida Elect Engn Dept Tampa FL 33617 USA
Distributed Denial of Service (DDoS) attacks pose an increasingly substantial cybersecurity threat to organizations across the globe. In this paper, we introduce a new deep learning-based technique for detecting DDoS ... 详细信息
来源: 评论
Cooperative Task Offloading for Multi-Access Edge-Cloud networks: A Multi-Group Multi-Agent Deep Reinforcement Learning  33
Cooperative Task Offloading for Multi-Access Edge-Cloud Netw...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Suzuki, Akito Kobayashi, Masahiro Old, Eiji NTT Corp Network Serv Syst Labs Tokyo Japan Kyoto Univ Grad Sch Informat Kyoto Japan
Cloud computing (CC) and edge computing (EC) enhance the performance of end devices (EDs) with limited computational power by offloading tasks to cloud and edge servers, respectively. Multi-access edge computing (MEC)... 详细信息
来源: 评论
Big Data Quality Scoring for Structured Data Using MapReduce  33
Big Data Quality Scoring for Structured Data Using MapReduce
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Wu, Yalong Dhamodharan, Shalini Ghattamaneni, Vinuthna Kokila, Narmada Pathakamuri, Chandrika Carter, Timothy Tian, Pu Sha, Kewei Univ Houston Clear Lake Dept Comp Sci Houston TX 77058 USA Stockton Univ Sch Business Galloway NJ 08205 USA Univ North Texas Dept Informat Sci Denton TX 76203 USA
In the current big data landscape, where data forms the cornerstone of myriad applications, it is crucial to establish the reliability and credibility of application outcomes through the prism of high-quality data. No... 详细信息
来源: 评论
Downlink STBC-GSSK and STBC-UAV Assisted NOMA for 6G and Beyond  33
Downlink STBC-GSSK and STBC-UAV Assisted NOMA for 6G and Bey...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Bal, Anindya Chowdhury, Sumit Cai, Haofan Univ Hawaii Manoa Elect & Comp Engn Honolulu HI 96822 USA
Since only a portion of the overall transmit power is reserved in non-orthogonal multiple access (NOMA), cell edge users have slightly reduced spectral density. As a result, the coupled users in NOMA have a limited pe... 详细信息
来源: 评论
Hide-and-Seek: Data Sharing with Customizable Machine Learnability and Privacy  33
Hide-and-Seek: Data Sharing with Customizable Machine Learna...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Xu, Hairuo Shu, Tao Auburn Univ Dept Comp Sci & Software Engn Auburn AL 36849 USA
With the immense amount of publicly available data online, many companies and research institute are able to download the online data for free and train the machine learning models which will finally result in product... 详细信息
来源: 评论
Comparing Space Versus Surface Gateways for Internetworking pLEO Satellite networks  33
Comparing Space Versus Surface Gateways for Internetworking ...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Ko, Allan Shake, Thomas Amin, Rahul MIT Lincoln Lab 244 Wood St Lexington MA 02173 USA
Multiple governments and companies are deploying massive scale "proliferated Low Earth Orbit" (pLEO) satellite networks consisting of hundreds to thousands of satellites and promising low-latency global conn... 详细信息
来源: 评论
Advanced DDoS Attack Classification using Ensemble Model with Meta-Learner  33
Advanced DDoS Attack Classification using Ensemble Model wit...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Kumar, Ankith Indra Ishigaki, Genya San Jose State Univ Dept Comp Sci San Jose CA 95192 USA
In response to the security threats posed by Distributed Denial of Service (DDoS) attacks, this paper presents an intrusion detection framework with a high-accuracy multi-class classification model. In addition to the... 详细信息
来源: 评论
RAPID: Reinforcement Learning-Aided Femtocell Placement for Indoor Drone Localization  33
RAPID: Reinforcement Learning-Aided Femtocell Placement for ...
收藏 引用
33rd IEEE International Conference on computer communications and networks (ICCCN)
作者: Famili, Alireza Tabrizian, Amin Atalay, Tolga Stavrou, Angelos Wei, Peng WayWave Inc Fairfax VA 22032 USA George Washington Univ Dept Comp Sci Washington DC USA Virginia Tech Dept Elect & Comp Engn Blacksburg VA USA
Mobile networks are swiftly advancing to accommodate the burgeoning spectrum of applications. The architecture of 5G networks integrates the principle of network slices, logically isolated end-to-end segments tailored... 详细信息
来源: 评论