咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,731 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是351-360 订阅
排序:
Network-driven Multicast Synchronization with TopoSync-SFC  11
Network-driven Multicast Synchronization with TopoSync-SFC
收藏 引用
11th international conference on Networks of the Future
作者: Bachmann, Felix Bauer, Robert Heseding, Hauke Zitterbart, Martina Karlsruhe Inst Technol Karlsruhe Germany
this demo showcases TopoSync-SFC, a network-driven approach for SFC-aware multicast synchronization. Synchronization of SFC-processed multicast traffic is an important requirement for several distributed applications ... 详细信息
来源: 评论
Train throughput Analysis of distributed Reinforcement Learning  11
Train Throughput Analysis of Distributed Reinforcement Learn...
收藏 引用
11th international conference on Information and Communication Technology Convergence (ICTC) - Data, Network, and AI in the age of Untact (ICTC)
作者: Jang, Sooyoung Park, Noh-Sam Elect & Telecommun Res Inst ETRI Intelligence Convergence Res Lab Daejeon South Korea
distributed deep reinforcement learning can increase the train throughput, which is defined as the timesteps per second used for training, easily by just adding computing nodes to a cluster, which makes it an essentia... 详细信息
来源: 评论
A Trust computing Model for Future Generation Networks  11
A Trust Computing Model for Future Generation Networks
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Das, Prodipto Debnath, Somen Assam University Department of Computer Science Silchar Assam India Mizoram University Department of Information Technology Aizawl Mizoram India
Future generation networks are heterogenous in nature due to variety of nodes, terminals, small-sized networks, private networks, virtual networks, IoTs etc. When number of nodes and terminal machines take part in a n... 详细信息
来源: 评论
In-Vehicle Occupancy Detection and Classification Using Machine Learning  11
In-Vehicle Occupancy Detection and Classification Using Mach...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Vamsi, Malneedi Soman, K.P. Electronics and Communication Engineering Amrita Vishwa Vidyapeetham Coimbatore India Centre for Computational Engineering and Networking Amrita Vishwa Vidyapeetham Coimbatore India
Occupancy detection is a difficult problem. there are several mechanisms exists for occupancy detection in vehicles, particularly in Automobiles. Now, safety has become an important and necessary aspect of the automob... 详细信息
来源: 评论
Driver Inattention Monitoring System Based on the Orientation of the Face Using Convolutional Neural Network  11
Driver Inattention Monitoring System Based on the Orientatio...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Manjula, P.M. Adarsh, S. Ramachandran, K.I. Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Electronics and Communication Engineering Coimbatore India Center for Computational Engineering and Networking Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India
Driving inattentively is one of the prime reasons for vehicle accidents worldwide and has significant implications for road safety. A prompt alert to the inattentive driver can mitigate many accidents and save numerou... 详细信息
来源: 评论
A Model for computing Skyline Data Items in Cloud Incomplete Databases  11
A Model for Computing Skyline Data Items in Cloud Incomplete...
收藏 引用
11th international conference on Ambient Systems, Networks and Technologies (ANT) / 3rd international conference on Emerging Data and Industry 4.0 (EDI)
作者: Gulzar, Yonis Alwan, Ali A. Abualkishik, Abedallah Zaid Mehmood, Abid King Faisal Univ Dept Management Informat Syst Al Hasa 31982 Saudi Arabia Int Islamic Univ Malaysia Kulliyyah Informat & Commun Technol Kuala Lumpur 53100 Malaysia Amer Univ Emirates Dubai U Arab Emirates
Skyline queries intend to retrieve the most superior data items in the database that best fit with the user's given preference. However, processing skyline queries are expensive and uneasy when applying on large d... 详细信息
来源: 评论
Comparative Analysis of the Efficiency of Modern Fake Detection Algorithms in Scope of Information Warfare
Comparative Analysis of the Efficiency of Modern Fake Detect...
收藏 引用
IEEE international Workshop on Intelligent Data Acquisition and Advanced computing Systems: Technology and Applications
作者: Yevhenii Shtefaniuk Ivan Opirskyy Lviv Polytechnic National University Lviv Lviv Oblast
the problem of detecting fake (false) information passing through various channels of the Internet is becoming increasingly important task. One of the most dangerous types of such information is targeted propaganda, w... 详细信息
来源: 评论
Sentiment Analysis of Restaurant Reviews using Combined CNN-LSTM  11
Sentiment Analysis of Restaurant Reviews using Combined CNN-...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Hossain, Naimul Bhuiyan, Md. Rafiuzzaman Tumpa, Zerin Nasrin Hossain, Syed Akhter Daffodil International University Dept. Name of CSE Dhaka Bangladesh Daffodil International University Dept. of CSE Dhaka Bangladesh
the combination of machine learning approach and natural language processing is applied to analyze the sentiment of text for particular sentences. In this particular area lots of work done in recent times. Restaurant ... 详细信息
来源: 评论
Internet of things (IoT): Vulnerabilities, Security Concerns and things to Consider  11
Internet of Things (IoT): Vulnerabilities, Security Concerns...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Ahmed, Eshtiak Islam, Ashraful Ashraf, Mohsena Chowdhury, Atiqul Islam Rahman, Mohammad Masudur Daffodil International University Dhaka Bangladesh Ahsanullah University of Science and Technology Dhaka Bangladesh United International University Dhaka Bangladesh Bangladesh University of Engineering and Technology Dhaka Bangladesh
In recent years, Internet of things (IoT) is rapidly gaining popularity as it has a vast potential. But without proper security and privacy measures, IoT can facilitate cyberattacks as it possesses some serious issues... 详细信息
来源: 评论
Fog Services Provider Architecture for IoT  11
Fog Services Provider Architecture for IoT
收藏 引用
11th international conference on Networks of the Future
作者: Le, Hoan Achir, Nadjib Boussetta, Khaled Univ Sorbonne Paris Nord L2TI Villetaneuse France
the prominence of Internet of things (IoT) devices is characterized by a wide diversity of network access technologies, including Wi-Fi, Cellular, Lo-Ra, ZigBee, or Bluetooth. Dealing with such heterogeneity is still ... 详细信息
来源: 评论