咨询与建议

限定检索结果

文献类型

  • 2,697 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,754 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,680 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 355 篇 电气工程
    • 91 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 40 篇 仪器科学与技术
    • 34 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 323 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 47 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,730 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2754 条 记 录,以下是151-160 订阅
排序:
MORA on the Edge: a testbed of Multiple Option Resource Allocation  11
MORA on the Edge: a testbed of Multiple Option Resource Allo...
收藏 引用
11th IEEE international conference on Cloud networking (CloudNet)
作者: Ouedraogo, Wendlasida Di Stefano, Alessandro Araldo, Andrea Di Stefano, Antonella Inst Polytech Paris Telecom SudParis Palaiseau France Univ Catania Dept Elect Elect & Informat Engn Catania Italy
In this paper, we present an implementation of the concept of Multiple Option Resource Allocation (MORA) in the context of Multitenant Edge computing. We assume a Network Operator (NO) owns computational resources on ... 详细信息
来源: 评论
A domain-specific question answering system based on ontology and question templates
A domain-specific question answering system based on ontolog...
收藏 引用
11th ACIS international conference on Software Engineering, Artificial Intelligence, networking and Parallel/distributed computing, SNPD2010
作者: Wang, D.S. Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China Graduate University of the Chinese Academy of Sciences Beijing China Department of Computer Science Jiangsu University of Science and Technology Zhenjiang China
the rapid growth in the development of Internet-based information systems increases the demand for natural language interfaces that are easy to set up and maintain. Unfortunately, the problem of deep understanding nat... 详细信息
来源: 评论
Efficient privacy preserving matchmaking for mobile social networking against malicious users
Efficient privacy preserving matchmaking for mobile social n...
收藏 引用
11th IEEE international conference on Trust, Security and Privacy in computing and Communications, TrustCom-2012
作者: Wang, Yong Zhang, Ting-Ting Li, Hong-Zong He, Long-Ping Peng, Jing Department of Computer Science and Communication Engineering University of Electronic and Science Technology of China Chengdu China
Making friends with some common attributes is one of the most popular applications in the mobile social networking (MSN). However, how to preserve the users' privacy while matchmaking has been considered as the ke... 详细信息
来源: 评论
the application of grid on distributed data mining
收藏 引用
11th Joint international Computer conference (JICC 2005)
作者: Jiang, WS Yu, JH Chongqing Univ Dept Elect Engn Chongqing 400030 Peoples R China
In industrial, scientific and commercial fields, geographically dispersed large data sets are necessary to be analyzed to get a lot of useful information by using distributed data mining (DDM). However, DDM now confro... 详细信息
来源: 评论
Indoor Mapping for Location-based Policy Tooling Using Bluetooth Low Energy Beacons  11
Indoor Mapping for Location-based Policy Tooling Using Bluet...
收藏 引用
11th IEEE international conference on Wireless and Mobile computing, networking and Communications (WiMob)
作者: Sharhan, Senan M. H. Zickau, Sebastian Tech Univ Berlin Telekom Innovat Labs Serv Centr Networking Berlin Germany
Most service providers and data owners desire to control the access to sensitive resources. the user may express restrictions, such as who can access the resources, at which point in time and from which location. Howe... 详细信息
来源: 评论
IMPLEMENTING CONSISTENCY CONTROL MECHANISMS IN thE CLOUDS distributed OPERATING SYSTEM
收藏 引用
11th international CONF ON distributed computing SYSTEMS
作者: CHEN, RC DASGUPTA, P Siemens-Nixdorf Information Systems Cambridge MA USA
Implementation of a kernel-level consistency control mechanism called invocation-based consistency control (IBCC) is presented. IBCC supports general-purpose persistent object-based distributed computing. IBCC provide... 详细信息
来源: 评论
A Survey on Authorization in distributed Systems: Information Storage, Data Retrieval and Trust Evaluation  16
A Survey on Authorization in Distributed Systems: Informatio...
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on Embedded Software and Systems
作者: Ahadipour, Ava Schanzenbach, Martin Fraunhofer Inst Appl & Integrated Secur AISEC Garching Germany
In distributed environments, entities are distributed among different security domains and they do not have prior knowledge of one another. In this setting, distributed systems and their security components such as en... 详细信息
来源: 评论
Combining Heuristics to Optimize and Scale the Placement of IoT Applications in the Fog  11
Combining Heuristics to Optimize and Scale the Placement of ...
收藏 引用
11th IEEE/ACM international conference on Utility and Cloud computing (UCC-Companion) / 5th IEEE/ACM international conference on Big Data computing, Applications and Technologies (BDCAT)
作者: Xia, Ye Etchevers, Xavier Letondeur, Loic Lebre, Adrien Coupaye, thierry Desprez, Frederic Orange Labs Meylan France INRIA IMT Atlantique LS2N Nantes France UGA INRIA CNRS LIG Grenoble France
As fog computing brings processing and storage resources to the edge of the network, there is an increasing need of automated placement (i.e., host selection) to deploy distributed applications. Such a placement must ... 详细信息
来源: 评论
A HIERARCHICAL MODELING OF AVAILABILITY IN distributed SYSTEMS
收藏 引用
11th international CONF ON distributed computing SYSTEMS
作者: HARIRI, S MUTLU, HB ECE Dept Syracuse Univ NY USA
A two-level hierarchical model is proposed to analyze the availability of distributed systems as perceived by their users. At the higher level (user level), the availability of the tasks (processes) is analyzed in ter... 详细信息
来源: 评论
A model-driven framework for trusted computing based systems
A model-driven framework for trusted computing based systems
收藏 引用
11th IEEE international Enterprise distributed Object computing conference
作者: Alam, Masoom Seifert, Jean-Pierre Zhan, Xinwen Univ Innsbruck A-6020 Innsbruck Austria Samsung Informat Syst Amer San Jose CA 94043 USA
Existing approaches for Trust Management through software alone - by their very principle - are uncompromising and have inherent weaknesses. Once the information leaves the service provider platform, there is no way t... 详细信息
来源: 评论