咨询与建议

限定检索结果

文献类型

  • 2,861 篇 会议
  • 33 册 图书
  • 29 篇 期刊文献

馆藏范围

  • 2,923 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,831 篇 工学
    • 1,590 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 486 篇 信息与通信工程
    • 443 篇 电气工程
    • 127 篇 控制科学与工程
    • 64 篇 生物工程
    • 55 篇 网络空间安全
    • 49 篇 电子科学与技术(可...
    • 41 篇 动力工程及工程热...
    • 37 篇 仪器科学与技术
    • 30 篇 机械工程
    • 28 篇 建筑学
    • 28 篇 测绘科学与技术
    • 26 篇 环境科学与工程(可...
    • 23 篇 生物医学工程(可授...
    • 22 篇 安全科学与工程
    • 20 篇 土木工程
  • 276 篇 理学
    • 130 篇 数学
    • 68 篇 生物学
    • 49 篇 系统科学
    • 42 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 15 篇 化学
  • 261 篇 管理学
    • 185 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 44 篇 法学
    • 30 篇 社会学
  • 30 篇 医学
    • 25 篇 基础医学(可授医学...
    • 22 篇 临床医学
  • 28 篇 经济学
    • 27 篇 应用经济学
  • 15 篇 教育学
  • 14 篇 文学
  • 8 篇 农学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 297 篇 cloud computing
  • 225 篇 distributed comp...
  • 119 篇 computer archite...
  • 105 篇 protocols
  • 103 篇 social networkin...
  • 86 篇 servers
  • 86 篇 mobile computing
  • 84 篇 computational mo...
  • 77 篇 security
  • 73 篇 distributed data...
  • 69 篇 resource managem...
  • 66 篇 internet of thin...
  • 65 篇 mobile communica...
  • 64 篇 computer science
  • 63 篇 peer to peer com...
  • 62 篇 edge computing
  • 60 篇 peer-to-peer com...
  • 59 篇 grid computing
  • 58 篇 routing
  • 57 篇 internet

机构

  • 27 篇 state key labora...
  • 20 篇 school of inform...
  • 17 篇 shandong provinc...
  • 17 篇 daffodil interna...
  • 12 篇 beijing univ pos...
  • 7 篇 school of comput...
  • 6 篇 the 54th researc...
  • 5 篇 aalto univ dept ...
  • 5 篇 grid computing a...
  • 5 篇 university of ch...
  • 5 篇 cent s univ sch ...
  • 5 篇 department of co...
  • 5 篇 school of inform...
  • 4 篇 xidian universit...
  • 4 篇 web intelligence...
  • 4 篇 graduate univers...
  • 4 篇 school of comput...
  • 4 篇 eth zurich
  • 4 篇 international sc...
  • 4 篇 web intelligence...

作者

  • 12 篇 dustdar schahram
  • 10 篇 syed akhter hoss...
  • 10 篇 wang hong
  • 9 篇 sheikh abujar
  • 8 篇 hong wang
  • 8 篇 buyya rajkumar
  • 8 篇 rothermel kurt
  • 7 篇 yang yang
  • 6 篇 xu jie
  • 6 篇 wang wei
  • 6 篇 parashar manish
  • 6 篇 zheng yan
  • 6 篇 yan zheng
  • 5 篇 duerr frank
  • 5 篇 yang fangchun
  • 5 篇 truong hong-linh
  • 5 篇 huo yonghua
  • 5 篇 de pietro giusep...
  • 5 篇 debajyoti mukhop...
  • 5 篇 abu kaisar moham...

语言

  • 2,874 篇 英文
  • 23 篇 其他
  • 20 篇 中文
  • 5 篇 俄文
  • 2 篇 乌克兰文
检索条件"任意字段=10th International Conference on Distributed Computing and Networking"
2923 条 记 录,以下是2721-2730 订阅
排序:
Design and implementation of Acceptance Monitor for building intrusion tolerant systems
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2003年 第14期33卷 1399-1417页
作者: Wang, R Wang, FY Byrd, GT MCNC Inst Res & Dev Adv Networking Res Durham NC 27709 USA N Carolina State Univ Dept ECE Raleigh NC 27695 USA
Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. Intrusion tolerance, however, focuses o... 详细信息
来源: 评论
Cloud to cloud: a framework model for next generation network management
Cloud to cloud: a framework model for next generation networ...
收藏 引用
international conference on Telecommunications (ICT)
作者: Di Wu Guoqing Zhang Jing Yang Institute of Computing Technology Chinese Academy and Sciences Beijing China UTStarcom Inc. Alameda CA USA
With the rapid growth in network scale and capacity, the traditional peer-to-peer (P2P) network management model is not suitable. We present a novel network management framework model called "cloud to cloud"... 详细信息
来源: 评论
10th international Workshop on Abstract State Machines, ASM 2003
收藏 引用
10th international Workshop on Abstract State Machines, ASM 2003
the proceedings contain 35 papers. the special focus in this conference is on Abstract State Machines. the topics include: Experiments with test case generation and runtime analysis;a framework for proving contract-eq...
来源: 评论
Design and implementation of Acceptance Monitor for building intrusion tolerant systems
Design and implementation of Acceptance Monitor for building...
收藏 引用
10th international conference on Computer Communications and Networks
作者: Wang, R Wang, FY Byrd, GT MCNC Inst Res & Dev Adv Networking Res Durham NC 27709 USA N Carolina State Univ Dept ECE Raleigh NC 27695 USA
Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. Intrusion tolerance, however, focuses o... 详细信息
来源: 评论
10th international Symposium on Static Analysis, SAS 2003
收藏 引用
10th international Symposium on Static Analysis, SAS 2003
the proceedings contain 27 papers. the special focus in this conference is on Static Analysis of Object-Oriented Languages and Static Analysis of Concurrent Languages. the topics include: Precise analysis of string ex...
来源: 评论
Layered multicast with TCP-friendly congestion control using active networks
Layered multicast with TCP-friendly congestion control using...
收藏 引用
international conference on Telecommunications (ICT)
作者: Lechang Cheng M.R. Ito Department of Electrical & Computer Engineering University of British Columbia Vancouver BC Canada
the paper introduces a new scheme of receiver-driven layered multicast using active networks (RLM-AN). As most layered multicast schemes conduct an end-to-end congestion control mechanism, we propose a distributed TCP... 详细信息
来源: 评论
Binary and multi-valued cellular array models of linear distributed parameter systems
Binary and multi-valued cellular array models of linear dist...
收藏 引用
IEEE international conference on Electronics, Circuits and Systems (ICECS)
作者: D. Hamano N. Tabuki H. Fujisaka M. Morisue Faculty of Information Science Hiroshima City University Asaminami Hiroshima Japan
Cellular array models of linear distributed parameter systems are proposed. One of the arrays is a discrete model of diffusion systems. the cells have one-bit variables /spl isin/{1, -1} and change their values accord... 详细信息
来源: 评论
Evolutionary synthesis of communication protocols
Evolutionary synthesis of communication protocols
收藏 引用
international conference on Telecommunications (ICT)
作者: S.G. Araujo A.C.P. Pedroza A.C. Mesquita Electrical Engineering Department Federal University of Rio de Janeiro Rio de Janeiro Brazil
A methodology for the synthesis of communication protocols based on evolutionary techniques is presented. It enables to automatically generate finite-state models that synthesize protocol specifications from partial i... 详细信息
来源: 评论
Multimedia ad hoc wireless LANs with distributed channel allocation based on OFDM-CDMA
Multimedia ad hoc wireless LANs with distributed channel all...
收藏 引用
international conference on Telecommunications (ICT)
作者: Hyunho Yang Kiseon Kim Deptment of Computer & Information Science Suncheon Changam College Suncheon-si Jeonnam-do Republic of Korea Department of Information and Communications KJIST Kwangju South Korea Department of Information and Communications Puk-gu Kwangju Republic of Korea
A resource management scheme for multimedia ad hoc wireless LANs (AWLAN) based on orthogonal frequency division multiplexing-code division multiple access (OFDM-CDMA) is presented. this scheme combines distributed res... 详细信息
来源: 评论
Formal specifications of computer-based systems
Formal specifications of computer-based systems
收藏 引用
international conference and Workshop on Engineering of Computer-Based Systems
作者: M. Sveda C. Rattray J. Rozenblit Brno University of Technology Czech Republic University of Stirling UK University of Arizona Tucson Tucson AZ USA
the IFIP TC10 Working Group 10.1 "Computer Aided Systems theory" Committee Meeting at the Vienna University of Technology on the 30/sup th/ September 1999, resulted in a resolution to support a joint worksho... 详细信息
来源: 评论