咨询与建议

限定检索结果

文献类型

  • 1,709 篇 会议
  • 29 册 图书
  • 23 篇 期刊文献

馆藏范围

  • 1,761 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 1,194 篇 计算机科学与技术...
    • 535 篇 软件工程
    • 235 篇 电气工程
    • 203 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 45 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 31 篇 生物工程
    • 19 篇 动力工程及工程热...
    • 17 篇 力学(可授工学、理...
    • 16 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 13 篇 化学工程与技术
    • 13 篇 石油与天然气工程
    • 12 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 11 篇 土木工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 交通运输工程
  • 243 篇 理学
    • 172 篇 数学
    • 33 篇 生物学
    • 33 篇 系统科学
    • 31 篇 物理学
    • 20 篇 化学
    • 19 篇 统计学(可授理学、...
  • 164 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 65 篇 医学
    • 60 篇 临床医学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 法学
  • 5 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 1 篇 军事学

主题

  • 154 篇 distributed comp...
  • 84 篇 distributed comp...
  • 77 篇 parallel process...
  • 67 篇 cloud computing
  • 51 篇 artificial intel...
  • 50 篇 computational mo...
  • 46 篇 computer archite...
  • 46 篇 software enginee...
  • 46 篇 distributed data...
  • 44 篇 parallel program...
  • 38 篇 parallel computi...
  • 35 篇 application soft...
  • 32 篇 big data
  • 31 篇 optimization
  • 31 篇 intelligent netw...
  • 31 篇 protocols
  • 30 篇 parallel algorit...
  • 30 篇 concurrent compu...
  • 30 篇 fault tolerance
  • 29 篇 resource managem...

机构

  • 7 篇 chinese acad sci...
  • 6 篇 univ adelaide sc...
  • 5 篇 zhejiang univ co...
  • 5 篇 shanghai jiao to...
  • 4 篇 school of comput...
  • 4 篇 harbin inst tech...
  • 4 篇 univ stuttgart i...
  • 4 篇 univ otago dept ...
  • 4 篇 univ stuttgart i...
  • 4 篇 institute of com...
  • 4 篇 national laborat...
  • 3 篇 huazhong univ sc...
  • 3 篇 univ sydney sch ...
  • 3 篇 univ chinese aca...
  • 3 篇 reutlingen univ ...
  • 3 篇 centre for distr...
  • 3 篇 chinese acad sci...
  • 3 篇 lomonosov moscow...
  • 3 篇 university of el...
  • 3 篇 ibm thomas j. wa...

作者

  • 14 篇 zomaya albert y.
  • 11 篇 rothermel kurt
  • 10 篇 shen hong
  • 7 篇 jack dongarra
  • 6 篇 li y
  • 6 篇 albert y. zomaya
  • 6 篇 roman wyrzykowsk...
  • 5 篇 fahringer thomas
  • 5 篇 duerr frank
  • 5 篇 jerzy waśniewski
  • 5 篇 leymann frank
  • 5 篇 kopp oliver
  • 5 篇 li kuan-ching
  • 5 篇 nakayama shigeru
  • 5 篇 konrad karczewsk...
  • 5 篇 huang z.
  • 5 篇 lee young choon
  • 4 篇 leung k.
  • 4 篇 yang yang
  • 4 篇 prodan radu

语言

  • 1,723 篇 英文
  • 30 篇 俄文
  • 4 篇 其他
  • 3 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=10th International Conference on Parallel and Distributed Computing, Applications and Technologies"
1761 条 记 录,以下是1631-1640 订阅
排序:
the Library for Hadoop Deflate Compression Based on FPGA Accelerator with Load Balance
The Library for Hadoop Deflate Compression Based on FPGA Acc...
收藏 引用
IEEE international conference on parallel and distributed computing, applications and technologies (PDCAT)
作者: Haixin Du Jiankui Zhang Shihao Sha Cai Ye Qiuming Luo College of Computer Science and Software Engineering Shenzhen University NHPCC/Guangdong Key Laboratory of popular HPC and Guangdong Province Engineering Center of China-made High Performance Data Computing System Shenzhen China
Hadoop application will produce lots of intermediate results in the map/reduce process that requires disk I/O and network transmission. By compressing the large-scale data of intermediate result, it will greatly impro... 详细信息
来源: 评论
Market-Oriented Grid computing and the Gridbus Middleware
Market-Oriented Grid Computing and the Gridbus Middleware
收藏 引用
international conference on Advanced computing and Communications (ADCOM)
作者: Rajkumar Buyya Grid Computing and Distributed Systems (GRIDS) Laboratory University of Melbourne Australia
Grid computing, one of the latest buzzwords in the ICT industry, is emerging as a new paradigm for Internet-based parallel and distributing computing. Despite a number of advances in grid computing, resource managemen... 详细信息
来源: 评论
Robustness in context-aware mobile computing
Robustness in context-aware mobile computing
收藏 引用
IEEE international conference on Wireless and Mobile computing, Networking And Communications (WiMob)
作者: Hannes Wolf Klaus Herrmann Kurt Rothermel Institute of Parallel and Distributed Systems Universität Stuttgart Germany
High level context recognition and situation detection are enabling technologies for unobtrusive mobile computing systems. Significant progress has been made in processing and managing context information, leading to ... 详细信息
来源: 评论
TOTEM : Token for controlled computation: Integrating Blockchain with Big Data
TOTEM : Token for controlled computation: Integrating Blockc...
收藏 引用
international conference on computing and Networking Technology (ICCNT)
作者: Dhanya therese Jose Antorweep Chakravorty Chunming Rong University of Stavanger Stavanger Norway
Conventional methods for data analysis demands data be moved across networks for analysis. Along with it being highly network intensive, data owners are also reluctant to provide their data due to security and privacy... 详细信息
来源: 评论
GPU parallel Acceleration of Frequency Domain Algorithm for Calculating Radar Target Echoes
GPU Parallel Acceleration of Frequency Domain Algorithm for ...
收藏 引用
IEEE international conference on parallel and distributed computing, applications and technologies (PDCAT)
作者: Zhao Naixuan Zhang Ge Wang Zijian Kuang Ling University of Electronic Science and Technology of China
After the radar detects the target by transmitting signal, the target returns echo signal, which contains the position and velocity of the target. To meet the demand of high-performance echo computing for real-time ra... 详细信息
来源: 评论
Exploring the Emerging technologies Within the Blockchain Landscape  6th
Exploring the Emerging Technologies Within the Blockchain La...
收藏 引用
6th international conference on Emerging technologies in computing, iCETiC 2023
作者: Tareq, Mohammad Ali Tripathi, Piyush Issa, Nurhayati Md. Miraz, Mahdi H. Kuala Lumpur Malaysia Texas A&M University College Station College StationTX United States Yamaguchi University Yamaguchi Japan Xiamen University Malaysia Selangor Malaysia Wrexham University Wrexham United Kingdom University of South Wales Pontypridd United Kingdom
Although blockchain technology was first introduced in 2008 and materialised in 2009, the early usage of blockchain were mainly limited to financial technologies, particularly cryptocurrencies. Later, blockchain becam... 详细信息
来源: 评论
Reusable software components for performability tools, and their utilization for web-based configurable tools  10th
Reusable software components for performability tools, and t...
收藏 引用
10th international conference on Modelling Techniques and Tools for Computer Performance Evaluation, Tools 1998
作者: Van Moorsel, Aad P. A. Huang, Yiqing Distributed Software Research Department Bell Laboratories Research Lucent Technologies 600 Mountain Ave Murray HillNJ07974 United States Center for Reliable and High-Performance Computing Coordinated Science Laboratory University of Illinois at Urbana-Champaign 1308 W. Main St UrbanaIL61801 United States
this paper discusses software reusability strategies for performance and reliability modeling tools. Special emphasis is on web-embedded tools, and the potential interaction between such tools. We present the system a... 详细信息
来源: 评论
Detecting Model Changes in Organisational Processes: A Cloud-Based Approach  10th
Detecting Model Changes in Organisational Processes: A Clou...
收藏 引用
10th IFIP WG 6.12 European conference on Service-Oriented and Cloud computing, ESOCC 2023
作者: Fabra, J. Gallego-Fontenla, V. Vidal, J.C. de Quirós, J. García Álvarez, P. Lama, M. Bugarín, A. Ramos-Soto, A. University of Zaragoza Zaragoza Spain Research Center in Intelligent Technologies University of Santiago de Compostela A Coruña Spain Inverbis Analytics Lugo Spain
Process mining techniques extract knowledge from event logs within organizations to understand and improve the behavior of their business processes. these techniques utilize a wide range of methods to automatically ge... 详细信息
来源: 评论
Comparative Analysis of Security Algorithms used in Cloud computing
Comparative Analysis of Security Algorithms used in Cloud Co...
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Mohd Tajammul Rafat Parveen Iftikhar Aslam Tayubi Jamia Millia Islamia New Delhi India King Abdulaziz University Jeddah Saudi Arabia
Cloud computing is a technique that enables the users to access applications to infrastructure through subscription methods on remote location. Cloud computing, being collective technique, possesses features of variou... 详细信息
来源: 评论
Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation
Quantifying the Impact of Design Strategies for Big Data Cyb...
收藏 引用
IEEE international conference on parallel and distributed computing, applications and technologies (PDCAT)
作者: Faheem Ullah M. Ali Babar CREST ??? Centre for Research on Engineering of Software Technologies The University of Adelaide Australia Cyber Security Adelaide The University of Adelaide Australia
Big Data Cyber Security Analytics (BDCA) systems use big data technologies (e.g., Hadoop and Spark) for collecting, storing, and analyzing a large volume of security event data to detect cyber-attacks. the state-of-th... 详细信息
来源: 评论