咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,720 篇 英文
  • 28 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是501-510 订阅
排序:
A multi-criteria decision-making approach for selection of brand ambassadors using machine learning algorithm
A multi-criteria decision-making approach for selection of b...
收藏 引用
international conference on Confluence the Next Generation Information Technology Summit (Confluence)
作者: Siva Shanmugam Isha Padmanaban Loyola Institute of Business Administration Chennai India College of Engineering Guindy Anna University Chennai India
Brands are introduced by the companies to create an identity for their products or services. Brand ambassadors play a vital role in creating reach and awareness among the customers about the brand. the ambassadors are... 详细信息
来源: 评论
Docker Image Sharing in distributed Fog Infrastructures  11
Docker Image Sharing in Distributed Fog Infrastructures
收藏 引用
11th IEEE Int Conf on Cloud Comp Technol and Sci (CloudCom) / 19th IEEE Int Conf Comp and Informat Technol (CIT) / 2019 Int Workshop on Resource Brokering with Blockchain (RBchain) / Asia-Pacific Serv Comp Conf (APSCC)
作者: Ahmed, Arif Pierre, Guillaume Univ Rennes INRIA CNRS IRISA Rennes France
Fog computing platforms offer virtualized resources located in the vicinity of their end users. their broad geographical distribution force them to split physical resources in large numbers of relatively weak machines... 详细信息
来源: 评论
Benchmarking distributed Stream Processing Frameworks for Real Time Classical Machine Learning Applications
Benchmarking Distributed Stream Processing Frameworks for Re...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Merlin Sundar Sriram Kailasam Timothy A. Gonsalves IIT Mandi Kamand India
As the volume of data generated is growing at an unprecedented rate, it becomes important to analyze this data in real-time. To handle the huge volume of data streaming at a high velocity, we not only require powerful... 详细信息
来源: 评论
An optimization method for resource allocation in fog computing  13
An optimization method for resource allocation in fog comput...
收藏 引用
2020 IEEE Congress on Cybermatics: 13th IEEE international conferences on Internet of things, ithings 2020, 16th IEEE international conference on Green computing and Communications, GreenCom 2020, 13th IEEE international conference on Cyber, Physical and Social computing, CPSCom 2020 and 6th IEEE international conference on Smart Data, SmartData 2020
作者: Yin, Chao Li, Tongfang Qu, Xiaoping Yuan, Sihao School of Information Science and Technology Jiujiang University Jiujiang332005 China
With the rapid development of the network, a huge amount of data will be generated. Existing technologies usually use cloud computing to process data. However, when all the data of users need to be transferred to the ... 详细信息
来源: 评论
DF-VLAD: Deepfake Video Detection based on Feature Aggregation
DF-VLAD: Deepfake Video Detection based on Feature Aggregati...
收藏 引用
IEEE international Symposium on Information (IT) in Medicine and Education, ITME
作者: Yun Huang Zhiming Luo Miaohui Zhang Wei Liu Shaozi Li Xiamen University Xiamen China Institute of Energy Research Jiangxi Academy of Sciences Nanchang China School of Software East China Jiaotong University Nanchang China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Wuyi University Nanping China
With the rapid development of Deepfake technology, face video forgery can produce highly deceptive video content and bring serious security threats. the detection of this kind of fake video is more urgent and challeng... 详细信息
来源: 评论
distributed Artificial Neural Network Model for Neutron Flux Mapping in Nuclear Reactors
Distributed Artificial Neural Network Model for Neutron Flux...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: S. K. Bahuguna S. Mukhopadhyay A.P. Tiwari Bhabha Atomic Research Centre Homi Bhabha National Institute Mumbai
Neutron flux distribution inside the core of large size nuclear reactors is a function of space and time. An online Flux Mapping System (FMS) is needed to monitor the core during the reactor operation. FMS estimates t...
来源: 评论
Research on Heterogeneous Terminal Security Access Technology in Edge computing Scenario  11
Research on Heterogeneous Terminal Security Access Technolog...
收藏 引用
11th international conference on Measuring Technology and Mechatronics Automation (ICMTMA)
作者: Chen, Lu Liu, Zhoubin Wang, Zixiang Global Energy Interconnect Res Inst Inst Informat & Commun Nanjing 210003 Jiangsu Peoples R China State Grid Key Lab Informat & Network Secur Nanjing 210003 Jiangsu Peoples R China State Grid Zhejiang Elect Power Res Inst Hangzhou 310000 Zhejiang Peoples R China
Edge computing real-time processing of requests for massive amounts of terminal equipment brought a feasible solution, but the edge of the distributed calculation, real time characteristics as well as information secu... 详细信息
来源: 评论
Proceedings of the 11th international conference on Advanced computing, ICoAC 2019
Proceedings of the 11th International Conference on Advanced...
收藏 引用
11th international conference on Advanced computing, ICoAC 2019
the proceedings contain 75 papers. the topics discussed include: an intelligent computational model to predict target genes for infectious disease;adaptive cross layer scheme for multimedia transmission over wireless ...
来源: 评论
A Microservices Oriented Edge computing Framework for LVC Simulation in the IoT Era  19
A Microservices Oriented Edge Computing Framework for LVC Si...
收藏 引用
11th international conference on Computer Modeling and Simulation (ICCMS) / 8th international conference on Intelligent computing and Applications (ICICA)
作者: Sun, Wenxin Zhai, Yanlong Bao, Tianhong Mudassar, Muhammad Shen, Jun Yang, Kai Beijing Inst Technol Sch Comp Sci Beijing Peoples R China Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia Beijing Simulat Ctr Sci & Technol Special Syst Simulat Lab Beijing Peoples R China
Modeling and simulation are essential methods to better understand a complex system in the real world. Many simulation systems have strong demand for involving physical devices or equipment in the system to improve th... 详细信息
来源: 评论
Integrating consortium blockchain into edge server to defense against ransomware attack  11
Integrating consortium blockchain into edge server to defens...
收藏 引用
11th international conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN 2020
作者: Lei, In-San Tang, Su-Kit Tse, Rita School of Applied Sciences Macao Polytechnic Institute China
An edge server acts as a data gateway in an IoT network between IoT devices and backend servers. If the edge server is under the ransomware attack, the server's operation would be interfered by locking its critica... 详细信息
来源: 评论