咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,731 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是2581-2590 订阅
排序:
Mobile distributed information retrieval for highly-partitioned networks
Mobile distributed information retrieval for highly-partitio...
收藏 引用
international conference on Network Protocols
作者: K.M. Hanna B.N. Levine R. Manmatha Department of Computer Science University of Massachusetts Amherst MA USA
We propose and evaluate a mobile, peer-to-peer information retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large collections of medical literature. In our s... 详细信息
来源: 评论
Ulysses: a robust, low-diameter, low-latency peer-to-peer network
Ulysses: a robust, low-diameter, low-latency peer-to-peer ne...
收藏 引用
international conference on Network Protocols
作者: A. Kumar S. Merugu Jun Xu Xingxing Yu College of Computing Georgia Institute of Technology USA School of Mathematics Georgia Institute of Technology USA
A number of distributed hash table (DHT)-based protocols have been proposed to address the issue of scalability in peer-to-peer networks. In this paper, we present Ulysses, a peer-to-peer network based on the butterfl... 详细信息
来源: 评论
On the topology of overlay-networks
On the topology of overlay-networks
收藏 引用
IEEE international conference on Networks
作者: T. Fuhrmann Institut für Telematik Universität Karlsruhe Germany
Random-graph models are about to become an important tool in the study of wireless ad-hoc and sensor-networks, peer-to-peer networks, and, generally, overlay-networks. Such models provide a theoretical basis to assess... 详细信息
来源: 评论
Evaluation of content-access QoS for various dissemination strategies in peer to peer networks
Evaluation of content-access QoS for various dissemination s...
收藏 引用
IEEE international conference on Networks
作者: L. Lancerica L. Dairaine J. Lacan Ecole Nationale Supérieure dIngénieurs de Construction Aéronautique ENSICA Toulouse France
Peer to peer (P2P) Network is a high level logical network architecture build over end-user nodes interconnected by a physical network infrastructure. the main interest of their distributed structure is to avoid any c... 详细信息
来源: 评论
On the utility of distributed cryptography in P2P and MANETs: the case of membership control
On the utility of distributed cryptography in P2P and MANETs...
收藏 引用
international conference on Network Protocols
作者: M. Narasimha G. Tsudik Jeong Hyun Yi School of Information and Computer Science University of California Irvine USA
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related chal... 详细信息
来源: 评论
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach
Establishing pairwise keys for secure communication in ad ho...
收藏 引用
international conference on Network Protocols
作者: Sencun Zhu Shouhuai Xu Sanjeev Setia Sushil Jajodia Center for Secure Information Systems George Mason University Fairfax VA USA Department of Computer Science University of Texas San Antonio San Antonio TX USA University of California Irvine USA
A prerequisite for a secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a scalable and distributed protocol that ... 详细信息
来源: 评论
A comparison of TCP automatic tuning techniques for distributed computing
A comparison of TCP automatic tuning techniques for distribu...
收藏 引用
11th IEEE international Symposium on High Performance distributed computing (HPDC-11)
作者: Weigle, E Feng, WC Los Alamos Natl Lab Comp & Computat Sci Div Los Alamos NM 87545 USA
Rather than painful, manual, static, per-connection optimization of TCP buffer sizes simply to achieve acceptable performance for distributed applications [8, 10], many researchers have proposed techniques to perform ... 详细信息
来源: 评论
Dynamic right-sizing in FTP (drsFTP): Enhancing grid performance in user-space  11
Dynamic right-sizing in FTP (drsFTP): Enhancing grid perform...
收藏 引用
11th IEEE international Symposium on High Performance distributed computing (HPDC-11)
作者: Gardner, MK Feng, WC Fisk, M Los Alamos Natl Lab Comp & Comp Sci Div Res & Dev Adv Network Technol Los Alamos NM 87545 USA
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many, high-performance grid applications only ... 详细信息
来源: 评论
Multigrain parallelism for eigenvalue computations on networks of clusters  11
Multigrain parallelism for eigenvalue computations on networ...
收藏 引用
11th IEEE international Symposium on High Performance distributed computing (HPDC-11)
作者: McCombs, JR Stathopoulos, A Coll William & Mary Dept Comp Sci Williamsburg VA 23187 USA
Clusters of workstations have become a cost-effective means of performing scientific computations. However, large network latencies, resource sharing, and heterogeneity found in networks of clusters and Grids can impe... 详细信息
来源: 评论
Protecting electronic commerce from distributed denial-of-service attacks  02
Protecting electronic commerce from distributed denial-of-se...
收藏 引用
11th international conference on World Wide Web, WWW '02
作者: Brustoloni, José Networking Software Research Department Bell Laboratories Lucent Technologies 101 Crawfords Corner Rd. Holmdel NJ 07733 United States
It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to be mostly unavailable. We describe and ... 详细信息
来源: 评论