咨询与建议

限定检索结果

文献类型

  • 2,698 篇 会议
  • 32 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,739 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,681 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 489 篇 信息与通信工程
    • 354 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 322 篇 理学
    • 191 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 28 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 82 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 edge computing

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,715 篇 英文
  • 17 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2739 条 记 录,以下是81-90 订阅
排序:
distributed Machine Learning through Transceiver Competitive Connectivity of Remote computing Systems  11
Distributed Machine Learning through Transceiver Competitive...
收藏 引用
11th international Scientific conference on Computer Science, COMSCI 2023
作者: Slavov, Danail Hristov, Vladimir Slavova, Anastasiya Technical University of Sofia Faculty of Automatics Department of Electrical Motion Automation Systems Sofia Bulgaria
An architecture is built for sequential data transmission among individual machines participating in a decentralized distributed machine learning of a convolutional neural network for image classification. Simultaneou... 详细信息
来源: 评论
Adapting to Evasive Tactics through Resilient Adversarial Machine Learning for Malware Detection  18
Adapting to Evasive Tactics through Resilient Adversarial Ma...
收藏 引用
18th INDIAcom;11th international conference on computing for Sustainable Global Development, INDIACom 2024
作者: Krishna, G. Bala Sravan Kumar, G. Ramachandra, Mummadi Sampurnima Pattem, K. Rani, D. Sandhya Kakarla, Geeta Cvr College of Engineering Department of Computer Science Engg. Rangareddy Ibrahimpatnam India Cvr College of Engineering Department of Computer Science Engg.-Cyber Security Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Hyderabad India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Cyber Security Hyderabad India
this paper presents the Adaptive Resilience-based Convolutional Network (ARCNet), a sophisticated machine learning framework specifically designed to detect advanced, evasive malware. ARCNet combines convolutional and... 详细信息
来源: 评论
Workload Prediction for Edge computing  24
Workload Prediction for Edge Computing
收藏 引用
25th international conference on distributed computing and networking, ICDCN 2024
作者: Shah, Kavish Gandhi, Ayush Gandhi, Kalgi Bhise, Minal Distributed Database Group Gujarat Gandhinagar India
In large-scale edge systems, along with the number of edge devices, the amount of data that needs to be processed has been increasing. Edge systems have limited processing power, memory, and network bandwidth. For suc... 详细信息
来源: 评论
DDoS Attack Detection on MQTT Protocol Using Semi-supervised DBSCAN and Support Vector Machine Model  11
DDoS Attack Detection on MQTT Protocol Using Semi-supervised...
收藏 引用
11th international conference on Information and Communication Technology, ICoICT 2023
作者: Ikhsanudin, Muhammad Suryani, Vera Pahlevi, Rizka Reza Telkom University School of Computing Bandung Indonesia
Internet of things (IoT) is a system of connected objects with sensors, software, control systems and protocols. One of the protocols widely used in IoT is Message Queue Telemetry Transport (MQTT). Considering that us... 详细信息
来源: 评论
A Cloud-Agnostic Serverless Architecture for distributed Machine Learning  11
A Cloud-Agnostic Serverless Architecture for Distributed Mac...
收藏 引用
11th IEEE/ACM international conference on Big Data computing, Applications and Technologies, BDCAT 2024
作者: Predoaia, Ionut Garcia-Lopez, Pedro University of York United Kingdom Universitat Rovira i Virgili Spain
Serverless computing has shown vast potential for big data analytics applications, especially involving machine learning algorithms. Nevertheless, little consideration has been given in the literature to cloud-agnosti... 详细信息
来源: 评论
Comparative Analysis of the Quality of *** and Traveloka Applications Using the E-Servqual Method on User Satisfaction  11
Comparative Analysis of the Quality of *** and Traveloka App...
收藏 引用
11th international conference on Information and Communication Technology, ICoICT 2023
作者: Al-Fajri, Fathoni Utomo, Rio Guntur Al Makky, Muhammad Telkom University School of Computing Bandung Indonesia
Currently, with the development of online ticket booking technology, there is a higher demand for it among the Indonesian people. therefore, the authors are interested in examining the quality comparison of two online... 详细信息
来源: 评论
CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services  11
CMSec: A Vulnerability Prevention Tool for Supporting Migrat...
收藏 引用
11th IEEE international conference on Cloud networking (CloudNet)
作者: Oulaaffart, Mohamed Badonnel, Remi Festor, Olivier Univ Lorraine CNRS RESIST Res Team LORIAINRIA Nancy Grand Est F-54600 Villers Les Nancy France
the growing maturity of orchestration languages, such as the Topology and Orchestration Specification for Cloud Applications (TOSCA) language, and the continuous improvement of virtualization techniques contribute to ... 详细信息
来源: 评论
An Energy Consumption Optimization Strategy for Mobile Edge Networks  11
An Energy Consumption Optimization Strategy for Mobile Edge ...
收藏 引用
11th international conference on Information Technology - IoT and Smart City (ITIoTSC)
作者: Qu, Hua Zhao, Jihong Li, Xing Xue, Yucheng Gao, Qian Xi An Jiao Tong Univ Sch Software Engn Xian Peoples R China Xi An Jiao Tong Univ Sch Elect & Informat Engn Xian Peoples R China Xia Univ Posts & Telecomminicat Sch Commun & Informat Engn Xian Peoples R China
Edge computing involves shifting computational and storage capabilities from centralized cloud computing centers to the edge of the network, allowing edge servers deployed at the edge to respond to user requests. this... 详细信息
来源: 评论
the Influence of Users' Perception of Security, Privacy, and Trust in Using Online Dating Applications  11
The Influence of Users' Perception of Security, Privacy, and...
收藏 引用
11th international conference on Information and Communication Technology, ICoICT 2023
作者: Panjaitan, Agnes Gabriella Guntur Utomo, Rio Telkom University School of Computing Bandung Indonesia
Users of online dating applications have been widely used by the public, especially young people, to find relationships or partners online. the purpose of this study is to describe the perceptions of security, privacy... 详细信息
来源: 评论
Nonlinear Coupled PDE-ODE Model of a distributed Cuk Converter  11
Nonlinear Coupled PDE-ODE Model of a Distributed Cuk Convert...
收藏 引用
11th Vienna international conference on Mathematical Modelling (MAthMOD)
作者: Roebenack, Klaus Gerbet, Daniel TUD Dresden Univ Technol Inst Control Theory D-01062 Dresden Germany
the Cuk converter is a particularly interesting converter, as it can be used to generate voltages which could be above or below the supply voltage. the chokes take up the most space when setting up such a converter. I... 详细信息
来源: 评论