咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,731 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是201-210 订阅
排序:
MANET Security through a distributed Policy-Based Evaluation of Node Behaviour  11
MANET Security Through a Distributed Policy-Based Evaluation...
收藏 引用
11th IEEE international Wireless Communications and Mobile computing conference (IEEE IWCMC)
作者: Tajalli-Yazdi, Arash Lutfiyya, Hanan Kidston, David Univ Western Ontario Dept Comp Sci London ON Canada Canada Commun Res Ctr Ottawa ON Canada
While MANETs can provide seamless networking that is fast and easy to deploy, the lack of a stable topology, no centralized control, and the use of wireless links with limited bandwidth make MANETs highly vulnerable t... 详细信息
来源: 评论
distributed Systems Combined with Advanced Network: Evolution, Applications and Challenges
Distributed Systems Combined with Advanced Network: Evolutio...
收藏 引用
8th international conference on Wireless Communications, networking and Mobile computing (WiCOM)
作者: Cheng, Hongbing Yang, Hengchang Rong, Chunming Jiangsu City Vocat Coll Dept Informat Engn Nanjing Jiangsu Peoples R China Univ Stavanger Dept Elect Engn Comp Sci Stavanger Norway
As an effective and popular method to solve big data storage, computation and processing, distributed system has been a widespread hot issue for these years. With the continuous development of modern computer, network... 详细信息
来源: 评论
A model for distributing and querying a data warehouse on a computing grid
A model for distributing and querying a data warehouse on a ...
收藏 引用
11th international conference on Parallel and distributed Systems
作者: Wehrle, P Miquel, M Tchounikine, A INSA Lyon LIRIS Lyon France
Data warehouses store large volumes of data according to a multidimensional model with dimensions representing different axes of analysis. OLAP systems (OnLine Analytical Processing) provide the ability to interactive... 详细信息
来源: 评论
Adapting Kubernetes controllers to the edge: on-demand control planes using Wasm and WASI  11
Adapting Kubernetes controllers to the edge: on-demand contr...
收藏 引用
11th IEEE international conference on Cloud networking (CloudNet)
作者: Sebrechts, Merlijn Ramlot, Tim Borny, Sander Goethals, Tom Volckaert, Bruno De Turck, Filip Univ Ghent Dept Informat Technol Intec IDLab Imec Ghent Belgium
Kubernetes' high resource requirements hamper its adoption in constrained environments such as the edge and fog. Its extensible control plane is a significant contributor to this, consisting of long-lived processe... 详细信息
来源: 评论
Early Detection of distributed Denial of Service Attack in Era of Software-Defined Network  11
Early Detection of Distributed Denial of Service Attack in E...
收藏 引用
11th international conference on Contemporary computing, IC3 2018
作者: Kumar Joshi, Bineet Joshi, Nitin Chandra Joshi, Mahesh Department of Information Technology Kumaun University Nainital India Currently in SRHU Dehradun India
A distributed Denial of Service (DDoS) attack try to make services or resources unavailable to legitimate customers of that service or resource. these attacks are relatively easy to perform and extremely hard to detec... 详细信息
来源: 评论
distributed Artificial Neural Network Model for Neutron Flux Mapping in Nuclear Reactors  11
Distributed Artificial Neural Network Model for Neutron Flux...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Bahuguna, S.K. Mukhopadhyay, S. Tiwari, A.P. Bhabha Atomic Research Centre Homi Bhabha National Institute Mumbai400094 India
Neutron flux distribution inside the core of large size nuclear reactors is a function of space and time. An online Flux Mapping System (FMS) is needed to monitor the core during the reactor operation. FMS estimates t... 详细信息
来源: 评论
Machine Learning Methodology for Enhancing Automated Process in IT incident Management
Machine Learning Methodology for Enhancing Automated Process...
收藏 引用
11th IEEE international Symposium on Network computing and Applications (NCA)
作者: Li, Haochen Zhan, Zhiqiang Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Beijing 100088 Peoples R China
Operating system experienced a rise in number of incidents in recent years. Analysis and reemployment of past solution therefore may make a contribution in reducing service interrupt time and minimizing business losse... 详细信息
来源: 评论
Algorithms of Authentication and Authorization by Proxy in distributed Information-computing Environment  11
Algorithms of Authentication and Authorization by Proxy in D...
收藏 引用
11th IEEE international conference on Application of Information and Communication Technologies (AICT)
作者: Demidov, Alexander Polovinkin, Daniil Potlova, Tatyana Shateev, Roman Sopina, Eugenia Orel State Univ Oryol Russia
this paper suggests algorithms to be used in a distributed information computing environment for authentication and authorization, which both are delegated to a proxy server. the server receives all the requests to th... 详细信息
来源: 评论
Multicore Asynchronous Simulation of Spiking Neural Networks on the Grid
Multicore Asynchronous Simulation of Spiking Neural Networks...
收藏 引用
11th RoEduNet international conference - networking in Education and Research
作者: Joldos, Marius Muntean, Ioan Lucian Tech Univ Cluj Napoca Dept Comp Sci Cluj Napoca Romania
Dynamics analysis studies of spiking neural network behavior entails the computation of a large number of simulation scenarios. Moreover, when the simulated neural microcircuits are fairly large, the use of multiple c... 详细信息
来源: 评论
High-performance, Energy-efficient Mobile Wireless networking in 802.11 Infrastructure Mode  11
High-performance, Energy-efficient Mobile Wireless Networkin...
收藏 引用
11th IEEE international conference on Mobile Ad Hoc and Sensor Systems
作者: Wirtz, Hanno Kunz, Georg Laudenberg, Johannes Backhaus, Robert Wehrle, Klaus Rhein Westfal TH Aachen Chair Commun & Distributed Syst Aachen Germany
A plethora of mobile wireless networking approaches, from multi-hop infrastructure-less networking to mobile offloading and crowd sourcing, relies on establishing communication directly between devices. However, the 8... 详细信息
来源: 评论