咨询与建议

限定检索结果

文献类型

  • 2,699 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,682 篇 工学
    • 1,477 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 490 篇 信息与通信工程
    • 355 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 323 篇 理学
    • 192 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 83 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,687 篇 英文
  • 62 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2756 条 记 录,以下是1991-2000 订阅
排序:
Achieving Flow-Level Controllability in Network Intrusion Detection System
Achieving Flow-Level Controllability in Network Intrusion De...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Bo Song Weibing Yang Mingyu Chen Xiaofang Zhao Jianping Fan Chinese Academy of Sciences Beijing Beijing CN Institute of Computing Technology Chinese Academy and Sciences Beijing China
Current network intrusion detection systems are lack of controllability, manifested as significant packet loss due to the long-term resources occupation by a single flow. the reasons can be classified into two kinds. ... 详细信息
来源: 评论
Experiences with Hierarchical Storage Management support in Blue Whale File System
Experiences with Hierarchical Storage Management support in ...
收藏 引用
11th international conference on Parallel and distributed computing, Applications and Technologies, PDCAT 2010
作者: Ma, Hongyuan Liu, Zhenjun Zhang, Huan Feng, Shuo Han, Xiaoming Xu, Lu Institute of Computing Technology Chinese Academy of Sciences Graduate School of the Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China
In order to meet the challenges of significant storage and application growth, as well as shortened backup windows and limited IT resources, more and more organizations embrace Hierarchical Storage Management (HSM). P... 详细信息
来源: 评论
A Faster P Solution for the Byzantine Agreement Problem
A Faster P Solution for the Byzantine Agreement Problem
收藏 引用
11th international conference on Membrane computing
作者: Dinneen, Michael J. Kim, Yun-Bum Nicolescu, Radu Univ Auckland Dept Comp Sci Auckland 1 New Zealand
We propose an improved generic version of P modules, an extensible framework for recursive composition of P systems. We further provide a revised P solution for the Byzantine agreement problem, based on Exponential In... 详细信息
来源: 评论
A proposal for WS-agreement negotiation
A proposal for WS-agreement negotiation
收藏 引用
2010 11th IEEE/ACM international conference on Grid computing, Grid 2010
作者: Battré, Dominic Brazierz, Frances M.T. Clarkz, Kassidy P. Oeyz, Michael Papaspyroux, Alexander Wäldrichy, Oliver Wieder, Philipp Zieglery, Wolfgang Technische Universität Berlin Complex and Distributed IT Systems 10587 Berlin Germany Fraunhofer SCAI Schloss Birlinghoven 53754 Sankt-Augustin Germany Systems Engineering Faculty of Technology Policy and Management Delft University of Technology Netherlands Robotics Research Institute TU Dortmund University Dortmund Germany IT Management and Service Computing Group TU Dortmund University Dortmund Germany
the Web Services Agreement specification defines a normative language to formulate Service Level Agreements and a basic protocol to expose service-level descriptions, validate service-level requests, and come to an ag... 详细信息
来源: 评论
A novel model and a simulation tool for churn of P2P network
A novel model and a simulation tool for churn of P2P network
收藏 引用
11th international conference on Parallel and distributed computing, Applications and Technologies, PDCAT 2010
作者: Luo, Qiuming Li, Yun Dong, Wentao Liu, Gang Mao, Rui National High Performance Computing Center Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China College of Information Engineering Shenzhen University China
the prior studies setup the churn model by measuring the historical logs or records of a P2P network, and treat it as one whole black-box without understanding the inside of peer's population. the metrics used to ... 详细信息
来源: 评论
Analysis and modeling of time-correlated failures in large-scale distributed systems
Analysis and modeling of time-correlated failures in large-s...
收藏 引用
2010 11th IEEE/ACM international conference on Grid computing, Grid 2010
作者: Yigitbasi, Nezih Gallet, Matthieu Kondo, Derrick Iosup, Alexandru Epema, Dick Delft University of Technology Netherlands Ecole Normale Superieure de Lyon France INRIA Grenoble France
the analysis and modeling of the failures bound to occur in today's large-scale production systems is invaluable in providing the understanding needed to make these systems fault-tolerant yet efficient. Many previ... 详细信息
来源: 评论
Reliability analysis of declustered-parity RAID 6 with disk scrubbing and considering Irrecoverable Read Errors
Reliability analysis of declustered-parity RAID 6 with disk ...
收藏 引用
5th IEEE international conference on networking, Architecture and Storage, NAS 2010
作者: Gao, Yan Meister, Dirk Brinkmann, André University of Paderborn Paderborn Center for Parallel Computing Fuerstenallee 11 33102 Paderborn Germany
We investigate the impact of Irrecoverable Read Errors (IREs) on Mean Time To Data Loss (MTTDL) of declustered-parity RAID 6 systems. By extending the analytic model to study the reliability of RAID 5 systems from [1]... 详细信息
来源: 评论
An adaptive timeout strategy for UDP flows using SVMs
An adaptive timeout strategy for UDP flows using SVMs
收藏 引用
11th international conference on Parallel and distributed computing, Applications and Technologies, PDCAT 2010
作者: Cai, Jing Zhang, Zhibin Zhang, Peng Song, Xinbo Institute of Computing Technology Chinese Academy of Sciences Beijing China Graduate University of Chinese Academy of Sciences Beijing China National Engineering Laboratory for Information Security Beijing China
With the increase of network bandwidth, more and more new applications such as audio, video and online games have become the main body in network traffic. Based on realtime considerations, these new applications mostl... 详细信息
来源: 评论
Methodology of measurement for energy consumption of applications
Methodology of measurement for energy consumption of applica...
收藏 引用
international Workshop on Grid computing
作者: Georges Da Costa Helmut Hlavacs IRIT Université Paul Sabatier Toulouse France Department of Distributed and Multimedia Systems University of Technology Vienna Vienna Austria
For IT systems, energy awareness can be improved in two ways, (i) in a static or (ii) in a dynamic way. the first way leads to building energy efficient hardware that runs fast and consumes only a few watts. the secon... 详细信息
来源: 评论
On evaluation of the F0 estimation based on time-varying complex speech analysis
On evaluation of the F0 estimation based on time-varying com...
收藏 引用
作者: Funaki, Keiichi Computing and Networking Center University of the Ryukyus Japan
We have already proposed a robust fundamental frequency (F0) estimation based on robust ELS (Extended Least Square) time-varying complex-valued speech analysis for an analytic speech signal. It has been reported that ... 详细信息
来源: 评论