咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,720 篇 英文
  • 28 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是521-530 订阅
排序:
On Pending Interest Table in Named Data networking based Edge computing: the Case of Mobile Augmented Reality  11
On Pending Interest Table in Named Data Networking based Edg...
收藏 引用
11th international conference on Ubiquitous and Future Networks (ICUFN)
作者: Ullah, Rehmat Rehman, Muhammad Atif Ur Kim, Byung-Seo Sonkoly, Balazs Tapolcai, Janos Hongik Univ Dept Elect & Comp Engn Sejong South Korea Hongik Univ Dept Software & Commun Engn Sejong South Korea Budapest Univ Technol & Econ Dept Telecommun & Media Informat Budapest Hungary
Future networks require fast information response time, scalable content distribution, security and mobility. In order to enable future Internet many key enabling technologies have been proposed such as Edge computing... 详细信息
来源: 评论
Legal Protection for Data Security: a Comparative Analysis of the Laws and Regulations of European Union, US, India and UAE
Legal Protection for Data Security: a Comparative Analysis o...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Sagee Geetha Sethu Amity University Dubai
Cyber security is a matter of serious concern when we consider the enormity of data security violations that are occurring across the world. Countries are grappling with the problems faced by newer data security threa... 详细信息
来源: 评论
Decentralized Adaptive Latency-Aware Cloud-Edge-Dew Architecture for Unreliable Network  19
Decentralized Adaptive Latency-Aware Cloud-Edge-Dew Architec...
收藏 引用
11th international conference on Machine Learning and computing (ICMLC)
作者: Tefera, Getenet She, Kun Deeba, Farah Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu Sichuan Peoples R China
Smart end-user devices are connected to the global ecosystem explosively and producing an enormous amount of network traffic at the backhaul. Moreover, Real-time applications such as remote surgery, self-driving cars,... 详细信息
来源: 评论
Physical layer security against cooperative anomaly attack using bivariate data in distributed CRNs  11
Physical layer security against cooperative anomaly attack u...
收藏 引用
11th international conference on Communication Systems & Networks (COMSNETS)
作者: Srinu, Sesham Reddy, M. Kranthi Kumar Temaneh-Nyah, Clement Univ Namibia Dept Elect & Comp Engn Windhoek Namibia Indian Inst Technol Hyderabad Dept Elect Engn Hyderabad India
Wireless communication network (WCN) performance is primarily depends on physical layer security which is critical among all other layers of OSI network model. It is typically prone to anomaly/malicious user's att... 详细信息
来源: 评论
Secured Routing Paradigm for Intelligent Transportation Systems
Secured Routing Paradigm for Intelligent Transportation Syst...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Harish Krishnamoorthy Basundhara Chakrabarty S. Nandakumar Cisco Systems Bengaluru India School of Electronics Engineering Vellore Institute of Technology Vellore India
the advent of rapid technological progression in today's world has paved way to a plethora of research areas in the field of Intelligent Transportation Systems (ITS) and Smart Driver-less vehicles. the need for pr... 详细信息
来源: 评论
Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement  11
Reducing Age-of-Information for Computation-Intensive Messag...
收藏 引用
11th IEEE international conference on Wireless Communications and Signal Processing (WCSP)
作者: Gong, Jie Kuang, Qiaobin Chen, Xiang Ma, Xiao Sun Yat Sen Univ Sch Data & Comp Sci Guangzhou 510006 Peoples R China Sun Yat Sen Univ Sch Elect & Informat Technol Guangzhou 510006 Peoples R China
Freshness of data is an important performance metric for real-time applications, which can be measured by age-of-information. For computation-intensive messages, the embedded information is not available until being c... 详细信息
来源: 评论
EduBlock: Securing Educational Documents using Blockchain Technology
EduBlock: Securing Educational Documents using Blockchain Te...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Pavitra Haveri U.B. Rashmi D.G. Narayan K. Nagaratna K. Shivaraj School of Computer Science & Engineering KLE Technological University Hubballi India
Bitcoin and Cryptocurrencies are the most popular and the earliest applications of Blockchain. A Blockchain is a public ledger that is distributed and decentralized and it is used to carry out transactions online acro... 详细信息
来源: 评论
Factors that Impact Blockchain Scalability  11
Factors that Impact Blockchain Scalability
收藏 引用
11th international conference on Management of Digital EcoSystems (MEDES)
作者: Eklund, Peter W. Beck, Roman Deakin Univ Cyber Secur Res & Innovat Ctr CSRI Geelong Vic Australia IT Univ Copenhagen European Blockchain Ctr Copenhagen Denmark
Blockchain systems (more precisely distributed Ledger Technologies (DLTs)) represent a different digital ecosystem compared with traditional computer systems. One major difference are the performance and scalability f... 详细信息
来源: 评论
Real-Time Detection of Cyber Attacks on the IoT Devices
Real-Time Detection of Cyber Attacks on the IoT Devices
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Jalindar Karande Sarang Joshi Pune Institute of Computer Technology Savitribai Phule Pune University Pune India
Cyber attacks are used to exploit vulnerabilities present in various connected critical systems and the Internet of things(IoT) is no exception to this. the state of art presents many approaches to detect and mitigate... 详细信息
来源: 评论
Link Quality-based Routing Protocol for Underwater Acoustic Sensor Networks
Link Quality-based Routing Protocol for Underwater Acoustic ...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Pradeep Nazareth B. R. Chandavarkar Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
Routing is one of the fundamental tasks in any Underwater Acoustic Sensor Networks (UASNs). there are many UASNs routing protocols, which are designed based on different factors. the link quality is one of the signifi... 详细信息
来源: 评论