咨询与建议

限定检索结果

文献类型

  • 2,705 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,762 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,686 篇 工学
    • 1,481 篇 计算机科学与技术...
    • 672 篇 软件工程
    • 493 篇 信息与通信工程
    • 356 篇 电气工程
    • 96 篇 控制科学与工程
    • 84 篇 网络空间安全
    • 65 篇 生物工程
    • 57 篇 电子科学与技术(可...
    • 43 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 29 篇 交通运输工程
    • 29 篇 安全科学与工程
    • 28 篇 建筑学
    • 26 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 324 篇 理学
    • 193 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 219 篇 管理学
    • 146 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 29 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 84 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 internet of thin...
  • 60 篇 peer-to-peer com...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,674 篇 英文
  • 81 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2762 条 记 录,以下是1971-1980 订阅
排序:
Supporting multi-row distributed transactions with global snapshot isolation using bare-bones HBase
Supporting multi-row distributed transactions with global sn...
收藏 引用
2010 11th IEEE/ACM international conference on Grid computing, Grid 2010
作者: Zhang, Chen De Sterck, Hans David R. Cheriton School of Computer Science University of Waterloo Waterloo Canada Department of Applied Mathematics University of Waterloo Waterloo Canada
Snapshot isolation (SI) is an important database transactional isolation level adopted by major database management systems (DBMS). Until now, there is no solution for any traditional DBMS to be easily replicated with... 详细信息
来源: 评论
A distributed storage system allowing application users to reserve I/O performance in advance for achieving SLA
A distributed storage system allowing application users to r...
收藏 引用
2010 11th IEEE/ACM international conference on Grid computing, Grid 2010
作者: Tanimura, Yusuke Hidetaka, Koie Kudoh, Tomohiro Kojima, Isao Tanaka, Yoshio Tsukuba Japan SURIGIKEN Co. Ltd. Tokyo Japan
Performance assurance has become an important aspect in grid and cloud computing which provide services over the Internet, and Service Level Agreements (SLA) are frequently contracted between users and the service pro... 详细信息
来源: 评论
Towards automating the configuration of a distributed storage system
Towards automating the configuration of a distributed storag...
收藏 引用
2010 11th IEEE/ACM international conference on Grid computing, Grid 2010
作者: Costa, Lauro B. Ripeanu, Matei Department of Electrical and Computer Engineering University of British Columbia Vancouver BC Canada
Versatile storage systems aim to maximize storage resource utilization by supporting the ability to 'morph' the storage system to best match the application's demands. To this end, versatile storage system... 详细信息
来源: 评论
thesis proposal on "Requirement engineering process for service oriented software development"  10
Thesis proposal on "Requirement engineering process for serv...
收藏 引用
11th international conference on Product Focused Software Development and Process Improvement, PROFES 2010
作者: Bano, Muneera Ikram, Naveed Niazi, Mahmood Department of Software Engineering International Islamic University Islamabad Pakistan School of Computing and Mathematics Keele University United Kingdom
Service Oriented Architecture (SOA) has become the new reference architecture for distributed computing. For the last few years the number of services on the web has increased exponentially. Among available services l... 详细信息
来源: 评论
A feature-based replica consistency strategy for spatial data in distributed GIS
A feature-based replica consistency strategy for spatial dat...
收藏 引用
11th international conference on Parallel and distributed computing, Applications and Technologies, PDCAT 2010
作者: Liang, Hong Wei, Judong Xing, Yongshan Wu, Jun DongYing 257061 China Zhongyuan Oilfield Oil Production Two Zhongyuan Oilfield PuYang HeNan China
in distributed Geographic Information System (GIS), spatial data has multi-source, heterogeneous characteristics, so there are data inconsistencies between nodes. Although there were many approaches about data consist... 详细信息
来源: 评论
NLAR: A new approach to AQM
NLAR: A new approach to AQM
收藏 引用
24th IEEE international conference on Advanced Information networking and Applications Workshops, WAINA 2010
作者: Fan, Xunli Zheng, Feng Guan, Lin Wang, Xingang School of Information Science and Technology Northwest University Xi'an 710127 China Department of Computer Science Loughborough University Loughborough LE11 3TU United Kingdom School of Computing Communications and Electronics University of Plymouth Plymouth PL4 8AA United Kingdom
the traditional adaptive Random Early Detection (RED) algorithm allows network to achieve high throughput and low average delay. However it uses a linear dropping probability function, which causes high jitter in the ... 详细信息
来源: 评论
Fine-grained tracking of grid infections
Fine-grained tracking of grid infections
收藏 引用
2010 11th IEEE/ACM international conference on Grid computing, Grid 2010
作者: Gehani, Ashish Baig, Basim Mahmood, Salman Tariq, Dawood Zaffar, Fareed Computer Science Laboratory SRI International Menlo Park CA 94025 United States Department of Computer Science Lahore University of Management Sciences Lahore 54792 Punjab Pakistan
Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. this has the advantage that the audit trail is limited in size since event sets can be succinctly represented... 详细信息
来源: 评论
CP-Nets Based Methodology for Integrating Functional Verification and Performance Analysis of Network Protocol
CP-Nets Based Methodology for Integrating Functional Verific...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Jing Liu Xinming Ye Jun Li Chinese Academy of Sciences Beijing Beijing CN Inner Mongolia University for the Nationalities Hohhot China Institute of Computing Technology Chinese Academy and Sciences China
It is very risky to improve the performance of network protocols without the assurance of its functional correctness, especially for protocols that with complicated and concurrent behaviors. However, in most of curren... 详细信息
来源: 评论
Rainbow: A robust and versatile measurement tool for Kademlia-based DHT networks
Rainbow: A robust and versatile measurement tool for Kademli...
收藏 引用
11th international conference on Parallel and distributed computing, Applications and Technologies, PDCAT 2010
作者: Liu, Xiangtao Meng, Tao Cai, Kai Cheng, Xueqi Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
In recent years, peer-to-peer (P2P) file sharing applications have dominated the Internet traffic volumes, and among them, BitTorrent and eMule constitute the majority. BitTorrent and eMule deploy their distributed ne... 详细信息
来源: 评论
XML Path Matching for Different Hierarchy Order of Elements in XML Documents
XML Path Matching for Different Hierarchy Order of Elements ...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Sutheetutt Vacharaskunee Sarun Intakosum Department of Mathematics and Computer Science Faculty of Science Software Systems Engineering Laboratory King Mongkut''s Institute of Technology Ladkrabang Bangkok Thailand
XML documents allow document owners to create their documents in their own formats (element names and structure). the same information might be described in several ways. To find the similarity between XML documents w... 详细信息
来源: 评论