咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,720 篇 英文
  • 28 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是541-550 订阅
排序:
the Weakest Failure Detector to Solve the Mutual Exclusion Problem in an Unknown Dynamic Environment  19
The Weakest Failure Detector to Solve the Mutual Exclusion P...
收藏 引用
20th international conference on distributed computing and networking (ICDCN)
作者: Mauffret, Etienne Jeanneau, Denis Arantes, Luciana Sens, Pierre Univ Savoie Mt Blanc LISTIC Chambery France Sorbonne Univ CNRS INRIA LIP6 Paris France
Mutual exclusion is one of the fundamental problems in distributed computing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g.... 详细信息
来源: 评论
Identifying the Writing Style of Bangla Language Using Natural Language Processing
Identifying the Writing Style of Bangla Language Using Natur...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Syeda Farjana Shetu Mohd. Saifuzzaman Masuma Parvin Nazmun Nessa Moon Ridwanullah Yousuf Sharmin Sultana Daffodil International University Dhaka Bangladesh
Bangla is one of the 8th major spoken languages around the world and like other widely spoken languages, it is a very morphologically rich language. It has two styles, one is standard literary style, known as Sadhu Bh... 详细信息
来源: 评论
Foreword
ICETE 2020 - Proceedings of the 17th International Joint Con...
收藏 引用
ICETE 2020 - Proceedings of the 17th international Joint conference on e-Business and Telecommunications 2020年 XI-XII页
作者: Callegari, Christian Ng, Soon Xin Sarigiannidis, Panagiotis Battiato, Sebastiano de León, Ángel Serrano Sánchez Ksentini, Adlen Lorenz, Pascal Obaidat, Mohammad Ben-Othman, Jalel Italy University of Southampton United Kingdom University of Western Macedonia Greece University of Catania Italy Universidad Rey Juan Carlos Spain Eurecom France University of Haute Alsace France College of Computing and Informatics University of Sharjah United Arab Emirates University of Jordan Jordan and University of Science and Technology Beijing China University of Paris 13 France
来源: 评论
Review on Deep Fake: A looming Technological threat
Review on Deep Fake: A looming Technological Threat
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: S M Abrar Kabir Chowdhury Jahanara Islam Lubna Faculty of Computer Science and Information Technology University Malaysia Sarawak Kuching Malaysia
the misuse of technologies increases with the increase in technology development. Due to the recent progress that has met the face of social media, tools for editing videos and audios, and Generative Adversarial Netwo... 详细信息
来源: 评论
Sentiment Analysis from Bengali Depression Dataset using Machine Learning
Sentiment Analysis from Bengali Depression Dataset using Mac...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Md. Rafidul Hasan Khan Umme Sunzida Afroz Abu Kaisar Mohammad Masum Sheikh Abujar Syed Akhter Hossain Daffodil International University Dhaka Bangladesh
Nowadays, Sentiment Analysis is one of the advanced matters of natural language processing. Sentiment analysis determines a particular pole of a paragraph. Our purpose is to find the sentiment from the Bengali paragra... 详细信息
来源: 评论
Numerical Studyof an Octagonal Photonic Crystal Fiber: An Improved Design
Numerical Studyof an Octagonal Photonic Crystal Fiber: An Im...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Mohammad Mahmudul Alam Mia Delowar Hossain Himel Shovasis Kumar Biswas Sylhet International University Bangladesh Independent University Bangladesh
We numerically demonstrate an improved photonic crystal fiber using octagonal structure due to its achievement in ultra-high negative dispersion value and large nonlinearity simultaneously. For analysis and inspection... 详细信息
来源: 评论
Video Game DRM: Analysis and Paradigm Solution
Video Game DRM: Analysis and Paradigm Solution
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: J Karthik P P Amritha M Sethumadhavan TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India
Video game piracy is the illegal downloading and sharing of video game content, a type of copyright infringement. It is a major problem faced by video game publishers when selling their games, owing to the ease of dow... 详细信息
来源: 评论
Event-Driven Data Pipeline for Network Management Systems
Event-Driven Data Pipeline for Network Management Systems
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Ganesan Ponnuswami Sriram Kailasam Dileep Aroor Dinesh School of Computing and Electrical Engineering Indian Institute of Technology Mandi Himachal Pradesh India
Developing an event-driven applications for network management systems(NMS) requires data-wrangling operations to be performed in a data pipeline with low latency and high throughput. Data stream processing engines(SP... 详细信息
来源: 评论
Geo-Cloudlet: Time and Power Efficient Geospatial Query Resolution using Cloudlet  11
Geo-Cloudlet: Time and Power Efficient Geospatial Query Reso...
收藏 引用
11th international conference on Advanced computing (ICoAC)
作者: Das, Jaydeep Mukherjee, Anwesha Ghosh, Soumya K. Buyya, Rajkumar Indian Inst Technol Kharagpur Adv Technol Dev Ctr Kharagpur 721302 W Bengal India Mahishadal Raj Coll Dept Comp Sci Purba Medinipur 721628 W Bengal India Indian Inst Technol Kharagpur Dept Comp Sci & Engn Kharagpur 721302 W Bengal India Univ Melbourne Sch Comp & Informat Syst Cloud Comp & Distributed Syst CLOUDS Lab Melbourne Vic 3010 Australia
Geospatial data analysis is an emerging area of research today due to the potential to enable varied location-aware services. the existing centralized cloud-based analysis becomes time and computing-intensive for huge... 详细信息
来源: 评论
Behavioural Analysis of Multi-Source Social Network Data Using Object-Centric Behavioural Constraints and Data Mining Technique
Behavioural Analysis of Multi-Source Social Network Data Usi...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Priyam Das Dhananjay Kalbande Sardar Patel Institute of Technology Mumbai India
Social media data or social data is the data generated by users of a social media platform. this significant amount of data produced by users shows their behavior on a particular platform, for example, Twitter, Facebo... 详细信息
来源: 评论