咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,720 篇 英文
  • 28 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是2321-2330 订阅
排序:
Translation Memory Sharing Models in XMCAT
Translation Memory Sharing Models in XMCAT
收藏 引用
international conference on Computer Supported Cooperative Work in Design
作者: Yidong Chen Xiaodong Shi Changle Zhou Tangqiu Li Qingyang Hong Institute of Artificial Intelligence Xiamen University Xiamen Fujian China
In this paper, two Translation Memory (TM) sharing models adopted in XMCAT, a Computer Assisted Translation tool (CAT) supporting cooperated work in machine translation, was described in detail. One is Center-based TM... 详细信息
来源: 评论
Origins of the Grid architectural style
Origins of the Grid architectural style
收藏 引用
11th IEEE international conference on Engineering of Complex Computer Systems
作者: Cakic, Jovan Paige, Richard F. Univ York Dept Comp Sci York YO10 5DD North Yorkshire England
the Grid represents an emerging class of highly complex distributed systems that aims to realize the full potential of the Web services computational and architectural models. Blueprints and recipes for building Grids... 详细信息
来源: 评论
LooM: An anonymity quantification method in pervasive computing environments
LooM: An anonymity quantification method in pervasive comput...
收藏 引用
20th international conference on Advanced Information networking and Applications
作者: Imada, Miyuki Ohta, Masakatsu Yamaguchi, Masayasu NTT Network Innovat Labs Midori Cho 3-9-11 Tokyo 1808585 Japan
We propose a novel anonymity quantification method for privacy protection in pervasive computing environments. Its main feature is that it can quantitatively control anonymity by a single value (disclosure threshold v... 详细信息
来源: 评论
Annotated web as corpus  2
Annotated web as corpus
收藏 引用
2nd international Workshop on Web as Corpus, WAC 2006
作者: Rayson, Paul Fletcher, William H. Walkerdine, James Kilgarriff, Adam Computing Department Lancaster University United Kingdom United States Naval Academy United States Lexical Computing Ltd. United Kingdom
this paper presents a proposal to facilitate the use of the annotated web as corpus by alleviating the annotation bottleneck for corpus data drawn from the web. We describe a framework for large-scale distributed corp...
来源: 评论
MEMOSEN: Multi-radio enabled MObile wireless SEnsor network
MEMOSEN: Multi-radio enabled MObile wireless SEnsor network
收藏 引用
20th international conference on Advanced Information networking and Applications
作者: Canfeng, Chen Jian, Ma Nokia Research Center House 1 No. 11 He Fing Li Dong Jie Beijing 100013 China
the combined and separated research advancement in the fields of sensing, communication, and computing have driven the research efforts in wireless sensor networks (WSN) in recent years. According to the traditional d... 详细信息
来源: 评论
the arbitrated real-time protocol (AR-TP): A ravenscar compliant communication protocol for High-Integrity distributed Systems  06
The arbitrated real-time protocol (AR-TP): A ravenscar compl...
收藏 引用
11th Ada-Europe international conference on Reliable Software Technologies
作者: Uruena, Santiago Zamorano, Juan Berjon, Daniel Pulido, Jos A. de la Puente, Juan A. Tech Univ Madrid UPM Dept Comp Architecture & Technol DATSI E-28660 Boadilla Del Monte Spain Tech Univ Madrid UPM Dept Telemat Syst Engn DIT E-28040 Madrid Spain
A new token-passing algorithm called AR-TP for avoiding the non-determinism of some networking technologies is presented. this protocol-based on RT-EP, a research protocol also based on transmission control techniques... 详细信息
来源: 评论
distributed wisdom: What's wrong with us?
收藏 引用
IEEE distributed Systems Online 2006年 第5期7卷 3-3页
作者: Shapiro, Marc INRIA Rocquencourt LIP6
the efforts of EuroSys, the professional society for European systems community, towards researching distributed systems, are discussed. As far as publishing about distributed systems is concerned European are way beh... 详细信息
来源: 评论
Secure execution of computations in untrusted hosts  06
Secure execution of computations in untrusted hosts
收藏 引用
11th Ada-Europe international conference on Reliable Software Technologies
作者: Narayanan, S. H. K. Kandemir, M. T. Brooks, R. R. Kolcu, I. Penn State Univ Dept Comp Sci & Engn University Pk PA 16802 USA Clemson Univ Dept Elect & Comp Engn Clemson SC 29634 USA Univ Manchester Dept Computat Manchester M60 1QD Lancs England
Proliferation of distributed computing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remo... 详细信息
来源: 评论
An efficient and scalable checkpointing and recovery algorithm for distributed systems
收藏 引用
8th international conference on distributed computing and networking, ICDCN 2006
作者: Krishna Kumar, K.P. Hansdah, R.C. Dept. of Computer Science and Automation Indian Institute of Science Bangalore 560012 India
In this paper, we describe an efficient coordinated checkpointing and recovery algorithm which can work even when the channels are assumed to be non-FIFO, and messages may be lost. Nodes are assumed to be autonomous, ... 详细信息
来源: 评论
Continuous expansion: Efficient processing of continuous range monitoring in mobile environments
收藏 引用
11th international conference on Database Systems for Advanced Applications
作者: Wang, XY Wang, W Fudan Univ Dept Comp & Informat Technol Shanghai 200433 Peoples R China
Continuous range monitoring on moving objects has been increasingly important in mobile environments. With the computational power and memory capacity on the mobile side, the distributed processing could relieve the s... 详细信息
来源: 评论