咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,731 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是251-260 订阅
排序:
A Systematic Literature Review of Security and Privacy Solutions for the Metaverse
A Systematic Literature Review of Security and Privacy Solut...
收藏 引用
international conference on Social Networks Analysis, Management and Security (SNAMS)
作者: Suha AlQaruty Reema Al Qaruty Samer Abdel Hadi Khawlah M. Al-Tkhayneh Brighton College Al Ain Al Ain UAE Shariah College University of Jordan Jordan College of Education Humanities and Social Sciences Al Ain University Abu Dhabi UAE
the metaverse is a virtual simulation of the physical world, utilizing advanced technologies like big data, AI, 5G, cloud computing, blockchain, digital twins, and virtual engines. Integrating these into a cohesive ap... 详细信息
来源: 评论
Cloud-Edge Collaboration Based Power IoT Scene Perception Mechanism  11th
Cloud-Edge Collaboration Based Power IoT Scene Perception Me...
收藏 引用
11th European-Alliance-for-Innovation (EAI) international conference on Game theory for Networks (GameNets)
作者: Shao, Sujie Shao, Congzhang Zhong, Cheng Guo, Shaoyong Lu, Pengcheng Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China State Grid Hebei Elect Power Co Ltd Xiongan New Area Power Supply Co Xiongan 071600 Hebei Peoples R China
Fast and high-quality scene perception is an important guarantee for the efficient, stable and reliable operation of the power Internet of things, which can assist the decision-making of upper-level applications. the ... 详细信息
来源: 评论
Line Graph is the Key: An Exploration of Line Graph on Link Prediction with Social Networks
Line Graph is the Key: An Exploration of Line Graph on Link ...
收藏 引用
international conference on Behavior, Economic and Social computing (BESC)
作者: Chen Xing Masoud Makrehchi Dept. of Electrical Computer and Software Engineering Ontario Tech University Oshawa Canada
Network data plays a crucial role in various real-world applications, as connections between entities can be represented and analyzed through graphs. these include various types, such as social, information, and techn... 详细信息
来源: 评论
Sentiment Analysis for Detection of Depressive Users on Social Networks
Sentiment Analysis for Detection of Depressive Users on Soci...
收藏 引用
international conference on Behavior, Economic and Social computing (BESC)
作者: Christopher Wigell Xiaohui Tao Lin Li Grace Y Wang Ji Zhang Yuan Sun School of Mathematics Physics and Computing University of Southern Queensland Australia School of Computer Science and Artificial Intelligence Wuhan University of Technology China School of Psychology and Wellbeing University of Southern Queensland Australia Information and Society Research Division NII Library Japan
Depression affects approximately 121 million people worldwide and has as significant an influence on patients as it does their carers. Until recently, psychologists used paper based psychological batteries for screeni... 详细信息
来源: 评论
Towards business continuity with Edge-Cloud continuum
Towards business continuity with Edge-Cloud continuum
收藏 引用
international conference on Future Internet of things and Cloud (FiCloud)
作者: Carmine Colarusso Ida Falco Eugenio Zimeo Dept. of Engineering University of Sannio Benevento Italy
With the large volume of data produced by IoT applications, a pure Cloud model could not satisfy application requirements. Edge-Cloud continuum is a viable solution since it enables data processing closer to the sourc... 详细信息
来源: 评论
distributed Connected Dominating Set Based Algorithm for Mobile Ad-Hoc Networks
Distributed Connected Dominating Set Based Algorithm for Mob...
收藏 引用
international Conf on Electrical and Electronic Engineering (ICEEE)
作者: Aziz Can Yılmaz Çağatay Berke Erdaş Department of Computer Engineering Faculty of Engineering Başkent University Ankara Turkey
Ad-hoc networks are a communication protocol used in various sectors, particularly in military technologies. Unlike traditional network structures, Ad-hoc networks operate on the principle of peer-to-peer communicatio... 详细信息
来源: 评论
the Impact of Social Engineering Attacks on the Metaverse Platform
The Impact of Social Engineering Attacks on the Metaverse Pl...
收藏 引用
international conference on Future Internet of things and Cloud (FiCloud)
作者: Alameen Jafar Abel Yeboah-Ofori Toluwaloju Abisogun Ian Hilton Oluwole Oguntoyinbo Oyelakin Oyetunji School of Computing and Eng University of West London United Kingdom
the Metaverse environment is the fastest-growing area of interest for augmented and virtual reality space to converge and provide interactive learning and social cohesion. However, existing vulnerabilities in the meta... 详细信息
来源: 评论
Policy Perception During Global Health Emergencies: Text Analysis Based on Weibo Data
Policy Perception During Global Health Emergencies: Text Ana...
收藏 引用
international conference on Behavior, Economic and Social computing (BESC)
作者: Zeyu Li Ying Liu Muran Yu Sijia Zhao School of Economics and Management University of Chinese Academy of Science Beijing China Center for Sustainable Development and Global Competitiveness Stanford University Stanford CA USA China Construction Second Engineering Bureau Co. Ltd Beijing China
the rise of social media platforms has provided a new channel for interaction between the government and the public. By analyzing public reactions on social media through natural language processing technology, scient... 详细信息
来源: 评论
SMDS: Blockchain-Based Sensitive Data Storage for Smart Manufacturing
SMDS: Blockchain-Based Sensitive Data Storage for Smart Manu...
收藏 引用
IEEE international conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Yao Xiao Zikang Chen Lei Xu Keke Gai Liehuang Zhu School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China Hangzhou Ant Love Technology Co. Ltd Hangzhou China
With the arrival of the digital age and the wide adoption of Internet technologies, the manufacturing industry is gradually entering the era of smart manufacturing. It is of great significance to adopt efficient digit... 详细信息
来源: 评论
Exploring the Intent-Behavior Gap in Social Media Advocacy for Gender Equality and Social Inclusion
Exploring the Intent-Behavior Gap in Social Media Advocacy f...
收藏 引用
international conference on Behavior, Economic and Social computing (BESC)
作者: Rabab Ali Abumalloh Osama Halabi Asmaa Alfadala Raian Ali Department of Computer Science and Engineering Qatar University Doha Qatar College of Public Policy Hamad Bin Khalifa University Doha Qatar College of Science and Engineering Hamad Bin Khalifa University Doha Qatar
the concepts of Gender Equality and Social Inclusion (GESI) are crucial for fostering inclusive societies and promoting equal opportunities for all individuals, contributing to social cohesion, economic development, a... 详细信息
来源: 评论