咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,731 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是161-170 订阅
排序:
VEC-MOTAG: Vehicular Edge computing Based Moving Target Defense System  11th
VEC-MOTAG: Vehicular Edge Computing Based Moving Target Defe...
收藏 引用
11th international conference on Computer Engineering and Networks, CENet2021
作者: Zhang, Bingchi Yang, Shujie Zhang, Tao Ji, Weixiao Ding, Zhongyi Shen, Jiahao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Nowadays, with the rising of intelligent vehicles and the gradual maturity of the concept of intelligent transportation, the demand of vehicles for communication and computing power in VANET is rapidly increasing. the... 详细信息
来源: 评论
Real-Time Scheduling of Asynchronous TSN Traffic  11
Real-Time Scheduling of Asynchronous TSN Traffic
收藏 引用
11th international conference on Networks, Communication and computing, ICNCC 2022
作者: Cheng, Yufan Wang, Ying Wen, Jiachen Yu, Peng State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications No. 10 Xi Tu Cheng Road Beijing China
Time sensitive networking (TSN) is a new set of Ethernet standards that provide real-time and security for automotive, aerospace and industrial automation applications. Traffic in time sensitive networks has combinati... 详细信息
来源: 评论
Quantum computing in Cybersecurity and LLM
Quantum Computing in Cybersecurity and LLM
收藏 引用
international conference on Web Research (ICWR)
作者: Fazel Mohammad Ali Pour Mohammad Hossein Arastoo Faculty of Technology and Engineering Behbahan Khatam-Alanbia University of Technology Khuzestan Iran Faculty of Technology and Engineering Azad University of Kashan Kashan Iran
Quantum computing is fundamentally transforming the cybersecurity landscape by simultaneously introducing robust defense mechanisms and sophisticated attack vectors. this paper explores the dual nature of quantum comp... 详细信息
来源: 评论
A distributed Intelligent Intrusion Detection System based on Parallel Machine Learning and Big Data Analysis
A Distributed Intelligent Intrusion Detection System based o...
收藏 引用
11th international conference on Sensor Networks, SENSORNETS 2022
作者: Louati, Faten Ktata, Farah Barika Amor, Ikram Amous Ben Faculty of Economics and Management of Sfax Tunisia Higher Institute of Applied Sciences and Technology of Sousse Tunisia National School of Electronics and Telecommunications of Sfax Tunisia Tunisia
networking security continue to be a serious challenge for all domains because of the increasing number of attacks launched every day due to the advent of connected devices and the emergence of the Internet. Hence, In... 详细信息
来源: 评论
Trust-Based Security Architecture for Edge computing: A Simulation Study of Dynamic Trust Evolution and Attack Detection  11
Trust-Based Security Architecture for Edge Computing: A Simu...
收藏 引用
11th international Scientific conference "Information Technology and Implementation", IT and I 2024
作者: Kuznetsov, Oleksandr Frontoni, Emanuele Kuznetsova, Yelyzaveta Smirnov, Oleksii Moskovchenko, Illarion Department of Theoretical and Applied Sciences eCampus University Via Isimbardi 10 CO Novedrate22060 Italy Department of Political Sciences Communication and International Relations University of Macerata Via Crescimbeni 30/32 Macerata62100 Italy Department of Information and Communication Systems Security School of Computer Sciences V. N. Karazin Kharkiv National University 4 Svobody Sq. Kharkiv61022 Ukraine Department of cyber security and software Central Ukrainian National Technical University 8 University Ave Kropyvnytskyi25006 Ukraine Department of mathematical and software of automated control systems Faculty of automated control systems and ground support for aviation flights Ivan Kozhedub Kharkiv National Air Force University Sumska str. 77/79 Kharkiv61023 Ukraine
this paper presents a comprehensive experimental study of a novel trust-based security architecture for edge computing environments. We introduce an adaptive security framework that combines dynamic trust evaluation w... 详细信息
来源: 评论
Automating the Deployment of distributed Applications by Combining Multiple Deployment Technologies  11
Automating the Deployment of Distributed Applications by Com...
收藏 引用
11th international conference on Cloud computing and Services Science (CLOSER)
作者: Wurster, Michael Breitenbucher, Uwe Brogi, Antonio Diez, Felix Leymann, Frank Soldani, Jacopo Wild, Karoline Univ Stuttgart Inst Architecture Applicat Syst Stuttgart Germany Univ Pisa Dept Comp Sci Pisa Italy
Various deployment technologies have been released to support automating the deployment of distributed applications. Although many of these technologies provide general-purpose functionalities to deploy applications a... 详细信息
来源: 评论
11th international conference on High-Performance computing Systems and Technologies in Scientific Research, Automation of Control and Production, HPCST 2021
11th International Conference on High-Performance Computing ...
收藏 引用
11th international conference on High-Performance computing Systems and Technologies in Scientific Research, Automation of Control and Production, HPCST 2021
the proceedings contain 32 papers. the special focus in this conference is on High-Performance computing Systems and Technologies in Scientific Research, Automation of Control and Production. the topics include: Mathe...
来源: 评论
BEAM PROFILE MONITORING AND distributed ANALYSIS USING thE RabbitMQ MESSAGE BROKER  11
BEAM PROFILE MONITORING AND DISTRIBUTED ANALYSIS USING THE R...
收藏 引用
11th international Beam Instrumentation conference, IBIC 2022
作者: Proft, D. Desch, K. Elsner, D. Frommberger, F. Kronenberg, S. Spreitzer, A. Switka, M. Physikalisches Institut University of Bonn Germany
the ELSA facility utilizes several digital cameras for beam profile measurements on luminous screens and synchrotron radiation monitors. Currently a multitude of devices with analog signal output are being replaced in... 详细信息
来源: 评论
Optimal Decomposition of Control of distributed Cyber-physical System  11
Optimal Decomposition of Control of Distributed Cyber-physic...
收藏 引用
11th IEEE international conference on Intelligent Data Acquisition and Advanced computing Systems - Technology and Applications (IDAACS)
作者: Dubovoi, Volodymyr Sembrat, Demian Yukhymchuk, Mariia Vinnytsia Natl Tech Univ Khmelnytsky Highway 95 UA-21021 Vinnytsia Ukraine
the article proposes the use of a formal approach to the decomposition of the architecture of a decentralized coordination control system of distributed cyber-physical systems using microservices, which minimizes the ... 详细信息
来源: 评论
the Use of Cloud computing and its Security Risks in a Philippine Education System: A Literature Review
The Use of Cloud Computing and its Security Risks in a Phili...
收藏 引用
Information and Education Technology (ICIET), international conference on
作者: Eric Blancaflor Bianca Ysabel P. Saunar Tristian Darrel C. Bilbao Ian Howell B. Villarias Iris Paula V. Mapue School of Information Technology Mapua University Makati Philippines
Cloud computing is a technology that impacted the performance of modern markets and businesses. Because of this, cloud computing has become more significant to humans with its virtualization and distributed computing.... 详细信息
来源: 评论