咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,731 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是2741-2750 订阅
排序:
Novel Algorithmic Recommendation Engine for Diverse Content Discovery
Novel Algorithmic Recommendation Engine for Diverse Content ...
收藏 引用
international conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Ashu Sharma Rakshita Raj B. Yamini Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur Kancheepuram (D.t) Tamil Nadu
In the age of information abundance, discovering personalized content is paramount to engaging users on a variety of topics. the engine goes beyond traditional approaches by not only dynamically adjusting recommendati... 详细信息
来源: 评论
Analysis of Big Data Research Hotspots Based on Keyword Co-occurrence
Analysis of Big Data Research Hotspots Based on Keyword Co-o...
收藏 引用
IEEE international conference on Data Science in Cyberspace (DSC)
作者: Niuniu Zhang Guohe Feng National Key Laboratory of Information Systems Engineering National University of Defense Technology Changsha China College of Economics And Management South China Normal University Guangzhou China
In the era of mobile Internet and cloud computing, the rise of big data has profoundly impacted diverse industries and sectors, drawing significant scholarly attention. the objective of this paper is to delineate an o... 详细信息
来源: 评论
Blockchain-based cooperative autonomous detection of suspicious vehicles
Blockchain-based cooperative autonomous detection of suspici...
收藏 引用
international conference and Workshop on computing and Communication (IEMCON)
作者: Zachary Farr Mohamed Azab Effat Samir Computer and Information Sciences Virginia Military Institute Lexington VA USA Norfolk VA USA
Modern times have brought about increased criminal activity, and in an ever-connected world, numerous crimes go un-rectified. Car theft, while a crime, is also the basis for other crimes to be committed. In the world ... 详细信息
来源: 评论
Prediction of Defaulters using Machine Learning on Azure ML
Prediction of Defaulters using Machine Learning on Azure ML
收藏 引用
international conference and Workshop on computing and Communication (IEMCON)
作者: Abhishek Shivanna Dharma P Agrawal EECS Center for Distributed and Mobile Computing University of Cincinnati Cincinnati USA
Banks and lending institutions take risk in issuing new credit cards and loans to customers. Lending institutions at large need to have their own credit risk assessment system in accordance with Basel II guidelines. M... 详细信息
来源: 评论
A Decentralized Blockchain-Enabled Immutability Mechanism Integrated with Multimodal Biometric
A Decentralized Blockchain-Enabled Immutability Mechanism In...
收藏 引用
IEEE UP Section conference on Electrical Computer and Electronics (UPCON)
作者: Veerpal Kaur Devershi Pallavi Bhatt Sumegh tharewal Pradeep Kumar Tiwari Department of Computer Applications Manipal University Jaipur India School of Advance Computing DBS Global University Dehradun Uttarakhand India Department of Computer Applications Dr. Vishwanath Karad MIT World Peace University Pune India
With biometric authentication becoming more common, protecting personal and sensitive data is crucial in the digital age. this study examines how blockchain and multimodal biometric technologies might improve data sec... 详细信息
来源: 评论
Effectiveness of artificial intelligence, decentralized and distributed systems for prediction and secure channelling for Medical Tourism
Effectiveness of artificial intelligence, decentralized and ...
收藏 引用
international conference and Workshop on computing and Communication (IEMCON)
作者: Madhawa Subasinghe Dulaj Magalage Nethmee Amadoru Lakshani Amarathunga Nilum Bhanupriya Janaka L. Wijekoon Sri Lanka Institute of Information Technology Malabe Sri Lanka
Good health and wellbeing, a sustainable development goal introduced by the United Nations to be achieved by 2030. Sri Lanka is a country that highly depends on tourism. A healthcare system which consists of high qual... 详细信息
来源: 评论
Malayalam Fake News Detection Using Optimized Convolutional Neural Network (OPCNN)
Malayalam Fake News Detection Using Optimized Convolutional ...
收藏 引用
international conference on Advanced Computer Control, ICACC
作者: Aiswarya Mohan Nafla Iqbal Manaal Mashpher Department of Artificial Intelligence and Data Science Rajagiri School of Engineering and Technology Kakkanad India
these days, a range of issues are being caused by fake news, including satirical pieces, fake news, and intentional government propaganda. Because of the blathering social media discourse, the idea of "fake news&... 详细信息
来源: 评论
Solution Recommender for System Failure Recovery via Log Event Pattern Matching on a Knowledge Graph: Demo  17
Solution Recommender for System Failure Recovery via Log Eve...
收藏 引用
Proceedings of the 11th ACM international conference on distributed and Event-based Systems
作者: Miyuru Dayarathna Prabhash Akmeemana Srinath Perera Malith Jayasinghe WSO2 Inc. Mountain View CA USA
System anomalies such as network interruptions, operating system halt, disk crash could result in significant financial losses to organizations. In this demonstration we describe a novel log event analysis framework c... 详细信息
来源: 评论
A Decentralized Approach for Homogenizing Load Distribution: In Cloud Data Center Based on Stable Marriage Matching  19
A Decentralized Approach for Homogenizing Load Distribution:...
收藏 引用
Proceedings of the 11th international conference on Management of Digital EcoSystems
作者: Disha Sangar Hårek Haugerud Anis Yazidi Kyrre Begnum Oslo Metropolitan University (OsloMet) Oslo Norway
Running a sheer virtualized data center with the help of Virtual Machines (VM) is the de facto-standard in modern data centers. Live migration offers immense flexibility opportunities as it endows the system administr... 详细信息
来源: 评论
Enforcing end-to-end application security in the cloud (big ideas paper)  10
Enforcing end-to-end application security in the cloud (big ...
收藏 引用
Proceedings of the ACM/IFIP/USENIX 11th international conference on Middleware
作者: Jean Bacon David Evans David M. Eyers Matteo Migliavacca Peter Pietzuch Brian Shand University of Cambridge Imperial College London CBCU/ECRIC National Health Serivice
Security engineering must be integrated with all stages of application specification and development to be effective. Doing this properly is increasingly critical as organisations rush to offload their software servic... 详细信息
来源: 评论