咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,682 篇 工学
    • 1,477 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 490 篇 信息与通信工程
    • 355 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 323 篇 理学
    • 192 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,720 篇 英文
  • 28 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是551-560 订阅
排序:
Analysis of Post centric suicidal expressions and classification on the Social Media Post: Twitter
Analysis of Post centric suicidal expressions and classifica...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: C. Lalrinmawii Vanlalhruaia Somen Debnath Computer Science and Engineering Mizoram University Aizawl India Computer Engineering Mizoram University Aizawl India Information Technology Mizoram University Aizawl India
Suicide has always been a global issue and the detection of suicidal ideation in the masses that are not under clinical care proves to be a challenge. Fortunately, with the explosion of the internet, studies have been... 详细信息
来源: 评论
Open RnSIR model for Information Spread in Social Networks
Open RnSIR model for Information Spread in Social Networks
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: N. Sumith Manipal Institute of Technology MAHE Manipal India
Mathematical model have long been used to understand several real world processes. they provide sufficient clarification and understanding. One such mathematical model in context of viral spread was epidemic model. Si... 详细信息
来源: 评论
Avoidance of Replay attack in CAN protocol using Authenticated Encryption
Avoidance of Replay attack in CAN protocol using Authenticat...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Selvamani Chandrasekaran K.I. Ramachandran S. Adarsh Ashish Kumar Puranik Amrita School of Engineering Amrita Vishwa Vidyapeetham India Centre for Computational Engineering and Networking Amrita School of Engineering Amrita Vishwa Vidyapeetham India Tata Consultancy Services Pune India
Controller Area Network is the prominent communication protocol in automotive systems. Its salient features of arbitration, message filtering, error detection, data consistency and fault confinement provide robust and... 详细信息
来源: 评论
Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks
Mitigating Localization and Neighbour Spoofing Attacks in Un...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: B. R. Chandavarkar Akhilraj V. Gadagkar Wireless Information Networking Group (WiNG) National Institute of Technology Karnataka Surathkal Mangalore India
the location information of a node is one of the essential attributes used in most underwater communication routing algorithms to identify a candidate forwarding node by any of the sources. the exact location informat... 详细信息
来源: 评论
Analysis of Microstructured Photonic Crystal Fiber: An Improved Design
Analysis of Microstructured Photonic Crystal Fiber: An Impro...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Jarina Akter Md. Nur Uddin Mohosinul Hasan Bipash Kumar Biswas Mohammad Mahmudul Alam Mia Shovasis Kumar Biswas Independent University Bangladesh Sylhet International University Bangladesh
A single-mode defected core hexagonal photonic crystal fiber (H-PCF) is presented for the wide-band dispersion compensation at the wavelength interval 1350 to 1600 nm over the telecommunication windows. Finite element... 详细信息
来源: 评论
Multiagent approach for resource management in Smart Environments
Multiagent approach for resource management in Smart Environ...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Agostino Forestiero Giuseppe Papuzzo Rosaria de Simone Francesco Forestiero Francesca Giordano Institute for High Performance Computing and Networking National Research Council of Italy Via P. Bucci 8-9C Sicur Control System srl
the dynamic nature of Smart Environments, enabled thanks to the Internet of things (IoT) paradigm, requires the application of innovative resource discovery/selection services. Recommender systems provide useful and c... 详细信息
来源: 评论
A Multimedia Platform for Mexican Cultural Heritage Diffusion  11th
A Multimedia Platform for Mexican Cultural Heritage Diffusio...
收藏 引用
11th international conference on Multimedia and Network Information Systems (MISSI)
作者: de Asis Lopez-Fuentes, Francisco Alejandro Ibanez-Ramirez, Juan Univ Autonoma Metropolitana Cuajimalpa Mexico City 04871 DF Mexico
New Web technologies that allow greater interaction among users have emerged in the Internet. In such a way that now it is common for users to participate actively by writing, publishing, exchanging or sharing digital... 详细信息
来源: 评论
Security Assessment in Foggy Era through Analytical Hierarchy Process
Security Assessment in Foggy Era through Analytical Hierarch...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Jasleen Kaur Alka Agrawal Raees Ahmad Khan BBA University (A Central University) Lucknow India
Fog computing provides users with the cloud facilities at the network edge. It may be assumed to be a virtual platform with adequate storage., computation and processing facilities for latency-sensitive applications. ... 详细信息
来源: 评论
SocialEdge: Enabling trusted data processing workflow in smart communities  11
SocialEdge: Enabling trusted data processing workflow in sma...
收藏 引用
11th IEEE Int Conf on Cloud Comp Technol and Sci (CloudCom) / 19th IEEE Int Conf Comp and Informat Technol (CIT) / 2019 Int Workshop on Resource Brokering with Blockchain (RBchain) / Asia-Pacific Serv Comp Conf (APSCC)
作者: Aditya, Saumitra Figueiredo, Renato J. Univ Florida ACIS Lab Elect & Comp Engn Gainesville FL 32611 USA
In typical commercial cloud and edge providers data collection and processing nodes might be owned by a single trusted entity. In contrast, in a voluntary infrastructure, ownership is distributed. In such a setup, whi... 详细信息
来源: 评论
Implementation of composite DIMSE services
Implementation of composite DIMSE services
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: K.R. Vidyashree M.N. Dinesh RV College of Engineering Bengaluru India
Digital Imaging and Communications in Medicine (DICOM) is the basis for the collaboration and processing of information as well as associated data involving medical imaging. All clinical images that are produced from ... 详细信息
来源: 评论