咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,682 篇 工学
    • 1,477 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 490 篇 信息与通信工程
    • 355 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 323 篇 理学
    • 192 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,720 篇 英文
  • 28 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2755 条 记 录,以下是691-700 订阅
排序:
Combining Heuristics to Optimize and Scale the Placement of IoT Applications in the Fog  11
Combining Heuristics to Optimize and Scale the Placement of ...
收藏 引用
11th IEEE/ACM international conference on Utility and Cloud computing (UCC-Companion) / 5th IEEE/ACM international conference on Big Data computing, Applications and Technologies (BDCAT)
作者: Xia, Ye Etchevers, Xavier Letondeur, Loic Lebre, Adrien Coupaye, thierry Desprez, Frederic Orange Labs Meylan France INRIA IMT Atlantique LS2N Nantes France UGA INRIA CNRS LIG Grenoble France
As fog computing brings processing and storage resources to the edge of the network, there is an increasing need of automated placement (i.e., host selection) to deploy distributed applications. Such a placement must ... 详细信息
来源: 评论
Network Emulation as a Service (NEaaS): Towards a Cloud-Based Network Emulation Platform  11th
Network Emulation as a Service (NEaaS): Towards a Cloud-Base...
收藏 引用
11th EAI international conference on Simulation Tools and Techniques, SIMUTools 2019
作者: Lai, Junyu Tian, Jiaqi Jiang, Dingde Sun, Jiaming Zhang, Ke School of Aeronautics and Astronautics University of Electronic Science and Technologies of China Xiyuan Ave no. 2006 Chengdu China Science and Technology on Communication Networks Laboratory Shijiazhuang China
Network emulation is an essential method to test network architecture, protocol and application software during a network’s entire life-cycle. Compared with simulation and test-bed methods, network emulation possesse... 详细信息
来源: 评论
Performance of 802.11P in VANET at 5G Frequencies for Different Channel Models
Performance of 802.11P in VANET at 5G Frequencies for Differ...
收藏 引用
international conference and Workshop on computing and Communication (IEMCON)
作者: Harsha Puttagunta Dharma P. Agrawal Center for Distributed and Mobile Computing University of Cincinnati Cincinnati USA
A combination of 5G and VANET will result in an intelligent transportation system. Relaying of 5G data from the cellular network to highly underutilized VANET could reduce the load on the mobile network. Dedicated sho... 详细信息
来源: 评论
A Pervasive Community Detection Method through Modular Decomposition of Markov Chain for Social Media Analysis
A Pervasive Community Detection Method Through Modular Decom...
收藏 引用
international Symposium on Soft computing and Intelligent Systems (SCIS)
作者: Takeshi Matsui Antonio O. N. Rene Faculty of Social and Information Studies Gunma University Maebashi Japan Faculty of Engineering Toyama Prefectural University Imizu Japan
In a network structure, a subset with a dense link is called a community. Many networks in the real world are composed of loosely linked multiple communities. Individual communities are compatible with a functional un... 详细信息
来源: 评论
On a class of distributed storage systems with prioritized data sources  3
On a class of distributed storage systems with prioritized d...
收藏 引用
3rd international conference on Computer Science and Artificial Intelligence, CSAI 2019 and its Workshop - the 11th international conference on Information and Multimedia Technology, ICIMT 2019
作者: Li, Congduan Sun Yat-sen University Guangdong China
the rate regions and sufficiency of simple linear codes for a class of distributed storage systems with prioritized data sources are investigated in this paper. the exact repair problem is considered. Different from c... 详细信息
来源: 评论
11th international Symposium on Cyberspace Safety and Security, CSS 2019
11th International Symposium on Cyberspace Safety and Securi...
收藏 引用
11th international Symposium on Cyberspace Safety and Security, CSS 2019
the proceedings contain 101 papers. the special focus in this conference is on Cyberspace Safety and Security. the topics include: A new algorithm for retrieving diffuse attenuation coefficient based on big LiDAR bath...
来源: 评论
Basic Principles of Osmotic computing: Secure and Dependable MicroElements (MELs) Orchestration Leveraging Blockchain Facilities  11
Basic Principles of Osmotic Computing: Secure and Dependable...
收藏 引用
11th IEEE/ACM international conference on Utility and Cloud computing (UCC-Companion) / 5th IEEE/ACM international conference on Big Data computing, Applications and Technologies (BDCAT)
作者: Buzachis, Alina Villari, Massimo Univ Messina Dept Math & Comp Sci Phys & Earth Sci Viale F Stagno DAlcontres 31 I-98166 Messina Italy
In recent years, the rapid development of Cloud, Edge and Internet of things (IoT) technologies has accelerated the advancement trends forcing applications and information systems (IS) to evolve. In this new ecosystem... 详细信息
来源: 评论
A Neural-Network Driven Methodology for Anomaly Detection in Apache Spark  11
A Neural-Network Driven Methodology for Anomaly Detection in...
收藏 引用
11th international conference on the Quality of Information and Communications Technology (QUATIC)
作者: Alnafessah, Ahmad Casale, Giuliano Imperial Coll London Dept Comp London England
In cloud computing services, multiple tenants sharing the same computing resources can cause performance anomalies, either due to normal or malicious user behaviors. When a Big Data application is deployed over a priv... 详细信息
来源: 评论
OpenStack Network Acceleration Scheme for Datacenter Intelligent Applications  11
OpenStack Network Acceleration Scheme for Datacenter Intelli...
收藏 引用
11th IEEE international conference on Cloud computing (CLOUD) Part of the IEEE World Congress on Services
作者: Linh (Paul) Phan Liu, Kaikai San Jose State Univ Dept Comp Engn San Jose CA 95192 USA
Cloud virtualization and multi-tenant networking provide Infrastructure as a Service (IaaS) providers a new and innovative way to offer on-demand services to their customers, such as easy provisioning of new applicati... 详细信息
来源: 评论
Improving System Trustworthyness by Combining Remote Attestation and Root Cause Analysis  11
Improving System Trustworthyness by Combining Remote Attesta...
收藏 引用
11th international conference on the Quality of Information and Communications Technology (QUATIC)
作者: Oliver, Ian Limonta, Gabriela Vigmostad, Borger Nokia Bell Labs Espoo Finland
One particular concern in Telecommunications networks is the provisioning of quality of service despite system failures. Said failure invariably encompass many parts of the system. For example, a simple networking mis... 详细信息
来源: 评论