咨询与建议

限定检索结果

文献类型

  • 1,709 篇 会议
  • 29 册 图书
  • 23 篇 期刊文献

馆藏范围

  • 1,761 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 1,194 篇 计算机科学与技术...
    • 535 篇 软件工程
    • 235 篇 电气工程
    • 203 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 45 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 31 篇 生物工程
    • 19 篇 动力工程及工程热...
    • 17 篇 力学(可授工学、理...
    • 16 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 13 篇 化学工程与技术
    • 13 篇 石油与天然气工程
    • 12 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 11 篇 土木工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 交通运输工程
  • 243 篇 理学
    • 172 篇 数学
    • 33 篇 生物学
    • 33 篇 系统科学
    • 31 篇 物理学
    • 20 篇 化学
    • 19 篇 统计学(可授理学、...
  • 164 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 65 篇 医学
    • 60 篇 临床医学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 法学
  • 5 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 1 篇 军事学

主题

  • 154 篇 distributed comp...
  • 84 篇 distributed comp...
  • 77 篇 parallel process...
  • 67 篇 cloud computing
  • 51 篇 artificial intel...
  • 50 篇 computational mo...
  • 46 篇 computer archite...
  • 46 篇 software enginee...
  • 46 篇 distributed data...
  • 44 篇 parallel program...
  • 38 篇 parallel computi...
  • 35 篇 application soft...
  • 32 篇 big data
  • 31 篇 optimization
  • 31 篇 intelligent netw...
  • 31 篇 protocols
  • 30 篇 parallel algorit...
  • 30 篇 concurrent compu...
  • 30 篇 fault tolerance
  • 29 篇 resource managem...

机构

  • 7 篇 chinese acad sci...
  • 6 篇 univ adelaide sc...
  • 5 篇 zhejiang univ co...
  • 5 篇 shanghai jiao to...
  • 4 篇 school of comput...
  • 4 篇 harbin inst tech...
  • 4 篇 univ stuttgart i...
  • 4 篇 univ otago dept ...
  • 4 篇 univ stuttgart i...
  • 4 篇 institute of com...
  • 4 篇 national laborat...
  • 3 篇 huazhong univ sc...
  • 3 篇 univ sydney sch ...
  • 3 篇 univ chinese aca...
  • 3 篇 reutlingen univ ...
  • 3 篇 centre for distr...
  • 3 篇 chinese acad sci...
  • 3 篇 lomonosov moscow...
  • 3 篇 university of el...
  • 3 篇 ibm thomas j. wa...

作者

  • 14 篇 zomaya albert y.
  • 11 篇 rothermel kurt
  • 10 篇 shen hong
  • 7 篇 jack dongarra
  • 6 篇 li y
  • 6 篇 albert y. zomaya
  • 6 篇 roman wyrzykowsk...
  • 5 篇 fahringer thomas
  • 5 篇 duerr frank
  • 5 篇 jerzy waśniewski
  • 5 篇 leymann frank
  • 5 篇 kopp oliver
  • 5 篇 li kuan-ching
  • 5 篇 nakayama shigeru
  • 5 篇 konrad karczewsk...
  • 5 篇 huang z.
  • 5 篇 lee young choon
  • 4 篇 leung k.
  • 4 篇 yang yang
  • 4 篇 prodan radu

语言

  • 1,723 篇 英文
  • 30 篇 俄文
  • 4 篇 其他
  • 3 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=10th International Conference on Parallel and Distributed Computing, Applications and Technologies"
1761 条 记 录,以下是1621-1630 订阅
排序:
A similarity-based view to distributed information retrieval with mobile agents
A similarity-based view to distributed information retrieval...
收藏 引用
IEEE international conference on Fuzzy Systems (FUZZ-IEEE)
作者: V. Loia P. Luongo S. Senatore M.I. Sessa Dipartimento Matematica e Informatica Universita E28099di Salemo Baronissi Italy
Although advanced and innovative technologies have been used to retrieve information, the need of advanced, new techniques for Web information retrieval is extant. One of the main difficulties is to return accurate in... 详细信息
来源: 评论
Transaction Finality through Ledger Checkpoints
Transaction Finality through Ledger Checkpoints
收藏 引用
international conference on parallel and distributed Systems (ICPADS)
作者: Ratul Antik Das Md. Muhaimin Shah Pahalovi Muhammad Nur Yanhaona Research and Development Kona Software Lab Dhaka Bangladesh
the reversal of transactions due to blockchain ledger reorganization has become a major hindrance for public blockchain technologies' adoption in real-world business and financial applications. Since a typical rea... 详细信息
来源: 评论
Towards Traceability across Sovereign, distributed RFID Databases
Towards Traceability across Sovereign, Distributed RFID Data...
收藏 引用
international Symposium on Database Engineering and applications (IDEAS)
作者: Rakesh Agrawal Alvin Cheung Karin Kailing Stefan Schonauer Microsoft Search Labs CA USA IBM Almaden Research Center San Jose CA USA
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as radio-frequency identification (RFID) and upcoming standards such as the electronic product... 详细信息
来源: 评论
Optimal Placement of Application-Level Checkpoints
Optimal Placement of Application-Level Checkpoints
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Panfeng Wang Zhiyuan Wang Yunfei Du Xuejun Yang Haifang Zhou National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha Hunan China
One of the basic problems related to the efficient application-level checkpointing is the placement of checkpoints in the source codes. In this paper we discuss two common questions with a source-to-source precompiler... 详细信息
来源: 评论
A distributed multipath algorithm for providing bandwidth guaranteed routing
A distributed multipath algorithm for providing bandwidth gu...
收藏 引用
Asia-Pacific conference on Communications
作者: S. Zarifzadeh H. Mohammadi H. Khanmirza N. Yazdani Electronic and Computer Department University of Tehran Tehran Iran Electronic and Computer Department University of Tehran Tehran Tehran Iran
QoS routing is one of the key technologies to provide guaranteed service in IP networks. In most of the previous works on bandwidth constrained QoS routing, the source looks for one feasible path that satisfies a cert... 详细信息
来源: 评论
A high-performance computational resource broker for grid computing environments
A high-performance computational resource broker for grid co...
收藏 引用
international conference on Advanced Information Networking and applications (AINA)
作者: Chao-Tung Yang Po-Chi Shih Kuan-Ching Li High-Performance Computing Laboratory Department of Computer Science and Tunghai University Taichung Taiwan Parallel and Distributed Processing Center Department of Computer Science and Information Management Providence University Taichung Taiwan
Internet computing and grid technologies promise to change the way we tackle complex problems. they will enable large-scale aggregation and sharing of computational, data and other resources across institutional bound... 详细信息
来源: 评论
Preventing Sybil Attack in Blockchain using distributed Behavior Monitoring of Miners
Preventing Sybil Attack in Blockchain using Distributed Beha...
收藏 引用
international conference on computing and Networking Technology (ICCNT)
作者: P Swathi Chirag Modi Dhiren Patel NIT Goa India VJTI Mumbai Maharashtra India
Blockchain technology is useful with the record keeping of digital transactions, IoT, supply chain management etc. However, we have observed that the traditional attacks are possible on blockchain due to lack of robus... 详细信息
来源: 评论
A discontinuous Galerkin method for mathematical simulating of gas-liquid mixture flows  10
A discontinuous Galerkin method for mathematical simulating ...
收藏 引用
10th international conference on High-Performance computing Systems and technologies in Scientific Research, Automation of Control and Production, HPCST 2020
作者: Shurina, E.P. Itkina, N.B. Markov, S.I. Trofimuk Institute of Petroleum Geology and Geophysics SB RAS 3 Koptug ave. Novosibirsk630090 Russia Novosibirsk State Technical University 20 Karla Marx ave. Novosibirsk630073 Russia Institute of Computational Technologies SB RAS 6 Academician M.A. Lavrentiev ave. Novosibirsk630090 Russia
We present mathematical simulating results of a gas-liquid mixture flow in a cylindrical pipe. the gas-liquid mixture consists of the mineralized water and propane gas. To analyze the mineral composition of the fluid,... 详细信息
来源: 评论
Automated Pricing-based Provisioning of SDN/NFV Services in distributed Multi-access Edge computing using Cooperative Multi-Agent Deep Reinforcement Learning
Automated Pricing-based Provisioning of SDN/NFV Services in ...
收藏 引用
international conference on Dependable Systems and their applications (DSA)
作者: Jean Jimmy Julien Sirapop Nuannimnoi Ching-Yao Huang EECS International Graduate Program National Yang-Ming Chiao Tung University Hsinshu City Taiwan Electronics Engineering National Yang-Ming Chiao Tung University Hsinshu City Taiwan
the disruption caused by Software Defined Network and Network Function Virtualization (SDN/NFV) technologies will have many impacts on the telecom network. Specifically, the network architecture based on ETSI MANO com...
来源: 评论
A Memory Access Pattern-Based Program Profiling System for Dynamic parallelism Prediction
A Memory Access Pattern-Based Program Profiling System for D...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications
作者: Zijun Han Guangzhi Qu Dona Burkard Kelvin Dobbins Comput. Sci. & Eng. Dept. Oakland Univ. Rochester MI USA Res. & Innovation Center Ford Motor Co. Dearbon MI USA
parallel computing is the simultaneous use of multiple computer resources to solve a computational problem. In order to automatically execute a sequential program so that inherent parallelism could utilize the underly... 详细信息
来源: 评论