咨询与建议

限定检索结果

文献类型

  • 1,714 篇 会议
  • 29 册 图书
  • 22 篇 期刊文献

馆藏范围

  • 1,765 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 1,194 篇 计算机科学与技术...
    • 536 篇 软件工程
    • 235 篇 电气工程
    • 203 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 45 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 31 篇 生物工程
    • 19 篇 动力工程及工程热...
    • 17 篇 力学(可授工学、理...
    • 16 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 13 篇 化学工程与技术
    • 13 篇 石油与天然气工程
    • 12 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 11 篇 土木工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 交通运输工程
  • 243 篇 理学
    • 172 篇 数学
    • 33 篇 生物学
    • 33 篇 系统科学
    • 31 篇 物理学
    • 20 篇 化学
    • 19 篇 统计学(可授理学、...
  • 165 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 65 篇 医学
    • 60 篇 临床医学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 法学
  • 5 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 1 篇 军事学

主题

  • 154 篇 distributed comp...
  • 84 篇 distributed comp...
  • 78 篇 parallel process...
  • 68 篇 cloud computing
  • 51 篇 artificial intel...
  • 50 篇 computational mo...
  • 46 篇 computer archite...
  • 46 篇 software enginee...
  • 46 篇 distributed data...
  • 44 篇 parallel program...
  • 38 篇 parallel computi...
  • 35 篇 application soft...
  • 32 篇 big data
  • 31 篇 optimization
  • 31 篇 intelligent netw...
  • 31 篇 protocols
  • 30 篇 parallel algorit...
  • 30 篇 concurrent compu...
  • 30 篇 fault tolerance
  • 29 篇 resource managem...

机构

  • 7 篇 chinese acad sci...
  • 6 篇 univ adelaide sc...
  • 5 篇 zhejiang univ co...
  • 5 篇 shanghai jiao to...
  • 4 篇 school of comput...
  • 4 篇 harbin inst tech...
  • 4 篇 univ stuttgart i...
  • 4 篇 univ otago dept ...
  • 4 篇 univ stuttgart i...
  • 4 篇 institute of com...
  • 4 篇 national laborat...
  • 3 篇 huazhong univ sc...
  • 3 篇 univ sydney sch ...
  • 3 篇 huazhong univers...
  • 3 篇 univ chinese aca...
  • 3 篇 reutlingen univ ...
  • 3 篇 centre for distr...
  • 3 篇 chinese acad sci...
  • 3 篇 lomonosov moscow...
  • 3 篇 university of el...

作者

  • 14 篇 zomaya albert y.
  • 11 篇 rothermel kurt
  • 10 篇 shen hong
  • 7 篇 jack dongarra
  • 6 篇 li y
  • 6 篇 albert y. zomaya
  • 6 篇 roman wyrzykowsk...
  • 5 篇 fahringer thomas
  • 5 篇 duerr frank
  • 5 篇 jerzy waśniewski
  • 5 篇 leymann frank
  • 5 篇 kopp oliver
  • 5 篇 li kuan-ching
  • 5 篇 nakayama shigeru
  • 5 篇 konrad karczewsk...
  • 5 篇 huang z.
  • 5 篇 lee young choon
  • 4 篇 leung k.
  • 4 篇 yang yang
  • 4 篇 prodan radu

语言

  • 1,702 篇 英文
  • 30 篇 俄文
  • 29 篇 其他
  • 4 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=10th International Conference on Parallel and Distributed Computing, Applications and Technologies"
1765 条 记 录,以下是1451-1460 订阅
排序:
An improved P2P model based on chord
An improved P2P model based on chord
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Yu, D Chen, XM Chang, YL Wuhan Univ Comp Sci Wuhan 430079 Hubei Peoples R China
Chord is a classical peer-to-peer document routing model. In this paper, we firstly present an improved Chord model, in which the nodes are organized into groups, to enhance the lookup efficiency and decrease the impa... 详细信息
来源: 评论
How to build bargaining agents in the e-commerce modeling and analysis
How to build bargaining agents in the e-commerce modeling an...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Chen, YL Wang, XJ Ye, C Zhu, WQ Wuhan Univ Inst Syst Engn Hubei 430072 Peoples R China
the paper presents the pricing strategies for automatic agent, which is design for e-commerce in the reality. Given the characters of e-commerce in reality, the paper firstly model the bargaining process;Secondly clas... 详细信息
来源: 评论
A run-time scheduling policy for dependent tasks in grid computing systems
A run-time scheduling policy for dependent tasks in grid com...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Jin, H He, YX Wen, WD Liu, HW Wuhan Univ Comp Sch Wuhan 430072 Hubei Peoples R China
this paper presents a run-time scheduling policy to map tasks to resources in grid computing systems based on Multi-Agent System (MAS). this policy schedules tasks in run-time and avoids the waste of resources. A simu... 详细信息
来源: 评论
Developing context-aware applications in ubiquitous computing environments
Developing context-aware applications in ubiquitous computin...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Sun, J Wu, ZH Zhejiang Univ Coll Comp Sci Hangzhou 310027 Zhejiang Peoples R China
Context-aware computing is a computing paradigm in which appiications can discover and take advantage of context information. Faced with the diverse mix of distributed and heterogeneous sensors, embedded devices and m... 详细信息
来源: 评论
A scalable security architecture for grid
A scalable security architecture for grid
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Zhou, Q Yang, G Shen, JA Rong, CM Nanjing Univ Posts & Telecommun Dept Comp Sci & Technol Nanjing 210003 Peoples R China
Grid is a distributed computing and resource environment. Security is an important issue in the grid environment. In this paper we present a prototype of the grid security architecture. It shows that the architecture ... 详细信息
来源: 评论
Using semantic Web technologies to specify constraints of RBAC
Using semantic Web technologies to specify constraints of RB...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Wu, D Lin, J Dong, YB Zhu, ML Zhejiang Univ Coll Comp Sci Hangzhou 310027 Peoples R China
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management. One of important aspects in RBAC is constraints that con... 详细信息
来源: 评论
A novel security model based on virtual organization for grid
A novel security model based on virtual organization for gri...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Wu, XY Yang, G Shen, JA Zhou, Q Nanjing Univ Posts & Telecommun Nanjing 210003 Peoples R China
Security is an important issue in research and appliance of grid computing. Grid security model is composed of a series of mechanism and strategy to solve various practical security problems. this paper presents a gri... 详细信息
来源: 评论
Design of virtual personal computing environment for ubiquitous computing
Design of virtual personal computing environment for ubiquit...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Su, XL Li, JT Jiang, FQ Shi, HZ Guo, JB Zhu, ZM Chinese Acad Sci Inst Comp Technol Beijing Peoples R China
this paper presents a ubiquitous computing technology called Virtual Personal computing Environment (VPCE), which enables users to access their personalized computing environments anywhere using any available terminal... 详细信息
来源: 评论
A distributed architecture for network performance measurement and evaluation system
A distributed architecture for network performance measureme...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Sun, HJ Fang, BX Zhang, HL Harbin Inst Technol Natl Comp Informat Content Secur Key Lib Harbin 150001 Peoples R China
Quality of Service (QoS) has now become a central issue in network design and application. this article describes a distributed architecture for linking geographically distributed network performance measurement and e... 详细信息
来源: 评论
A study of parallel prefetching algorithms using trace-driven simulation
A study of parallel prefetching algorithms using trace-drive...
收藏 引用
6th international conference on parallel and distributed computing, applications and technologies (PDCAT 2005)
作者: Hu, DQ Xie, CS Bin, C Huazhong Univ Sci & Technol Dept Comp Sci Natl Storage Syst Lab Wuhan 430074 Peoples R China
I/O for parallel and distributed systems has drawn increasing attention over the past decade as it has become apparent that I/O performance, rather than CPU performance, may be the key limiting factor in the performan... 详细信息
来源: 评论