咨询与建议

限定检索结果

文献类型

  • 2,699 篇 会议
  • 32 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 2,756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,682 篇 工学
    • 1,477 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 490 篇 信息与通信工程
    • 355 篇 电气工程
    • 93 篇 控制科学与工程
    • 82 篇 网络空间安全
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 33 篇 机械工程
    • 28 篇 建筑学
    • 26 篇 交通运输工程
    • 26 篇 安全科学与工程
    • 25 篇 环境科学与工程(可...
    • 24 篇 光学工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 材料科学与工程(可...
  • 323 篇 理学
    • 192 篇 数学
    • 67 篇 生物学
    • 46 篇 系统科学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
  • 216 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 50 篇 法学
    • 34 篇 社会学
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 6 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 285 篇 distributed comp...
  • 267 篇 cloud computing
  • 135 篇 social networkin...
  • 103 篇 computer archite...
  • 93 篇 protocols
  • 91 篇 computer network...
  • 88 篇 computer science
  • 87 篇 peer to peer com...
  • 83 篇 computational mo...
  • 75 篇 security
  • 69 篇 mobile computing
  • 66 篇 routing
  • 66 篇 servers
  • 61 篇 resource managem...
  • 60 篇 peer-to-peer com...
  • 59 篇 internet of thin...
  • 59 篇 grid computing
  • 57 篇 application soft...
  • 56 篇 quality of servi...
  • 51 篇 software enginee...

机构

  • 29 篇 daffodil interna...
  • 21 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 12 篇 daffodil interna...
  • 10 篇 daffodil interna...
  • 10 篇 shandong provinc...
  • 8 篇 institute of com...
  • 8 篇 school of inform...
  • 5 篇 shenyang institu...
  • 5 篇 tokyo denki univ...
  • 5 篇 rissho universit...
  • 5 篇 department of co...
  • 4 篇 univ chinese aca...
  • 4 篇 nokia research c...
  • 4 篇 beijing univ pos...
  • 4 篇 center for compu...
  • 4 篇 university of ch...
  • 4 篇 hosei univ
  • 4 篇 department of co...
  • 4 篇 department of co...

作者

  • 12 篇 abujar sheikh
  • 12 篇 hossain syed akh...
  • 12 篇 sheikh abujar
  • 11 篇 syed akhter hoss...
  • 8 篇 masum abu kaisar...
  • 8 篇 abu kaisar moham...
  • 7 篇 wehrle klaus
  • 7 篇 dustdar schahram
  • 7 篇 kao odej
  • 7 篇 buyya rajkumar
  • 6 篇 m. takizawa
  • 6 篇 yang yang
  • 6 篇 t. enokido
  • 6 篇 wang ying
  • 6 篇 rothermel kurt
  • 5 篇 wu budan
  • 5 篇 wirtz hanno
  • 5 篇 truong hong-linh
  • 5 篇 ramachandran k.i...
  • 5 篇 bhuiyan md. rafi...

语言

  • 2,687 篇 英文
  • 62 篇 其他
  • 6 篇 中文
  • 2 篇 法文
检索条件"任意字段=11th International Conference on Distributed Computing and Networking"
2756 条 记 录,以下是951-960 订阅
排序:
Design and Analysis of a Modified Remote Attestation Protocol  16
Design and Analysis of a Modified Remote Attestation Protoco...
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on Embedded Software and Systems
作者: Santra, Monika Peddoju, Sateesh K. Bhattacharjee, A. K. Khan, Arindam Indian Inst Technol Roorkee Dept Comp Sci & Engn Roorkee 247667 Uttar Pradesh India Bhabha Atom Res Ctr Reactor Control Div Mumbai Maharashtra India
Secure interaction amongst system components is inherent to ensure the trustworthiness of the applications. In a distributed system, the attester should know whether the communicating client as well as the user who is... 详细信息
来源: 评论
PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT
PU-ABE: Lightweight Attribute-Based Encryption Supporting Ac...
收藏 引用
IEEE international conference on Cloud computing, CLOUD
作者: Sana Belguith Nesrine Kaaniche Giovanni Russello Cyber Security Foundry The University of Auckland New Zealand Telecom SudParis Univ. Paris-Saclay France
Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing... 详细信息
来源: 评论
distributed Deep Convolutional Neural Network For Smart Camera Image Recognition  2017
Distributed Deep Convolutional Neural Network For Smart Came...
收藏 引用
11th international conference on distributed Smart Cameras (ICDSC)
作者: Castillo, Emmanuel Ayuyao Ahmadinia, Ali Calif State Univ San Marcos Dept Comp Sci 333 S Twin Oaks Valley Rd San Marcos TX 92069 USA
Smart Cameras brought sight to the idea of cameras as sensors for visual data rather than strictly for taking pictures. One set of applications that leverages this idea are image recognition applications. Unfortunatel... 详细信息
来源: 评论
Adaptive distributed energy-saving data gathering technique for wireless sensor networks  13
Adaptive distributed energy-saving data gathering technique ...
收藏 引用
13th IEEE international conference on Wireless and Mobile computing, networking and Communications, WiMob 2017
作者: Idrees, Ali Kadhum Harb, Hassan Jaber, Ali Zahwe, Oussama Taam, Mohamad Abou Department of Computer Science University of Babylon Babylon Iraq Nabatiyeh/Tyre Lebanon Computer Science Department Faculty of Sciences Lebanese University Beirut Lebanon
Popularity of wireless sensor networks (WSNs) is increasing day a day where hundreds or thousands of applications are explored. In most of such applications, the need of gathering data periodically about the monitored... 详细信息
来源: 评论
Corruption-Resistant Privacy Preserving distributed EM Algorithm for Model-Based Clustering  16
Corruption-Resistant Privacy Preserving Distributed EM Algor...
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on Embedded Software and Systems
作者: Leemaqz, Kaleb L. Lee, Sharon X. McLachlan, Geoffrey J. Univ Queensland Sch Math & Phys Brisbane Qld Australia
Statistical clustering plays an important role in data analysis and is one of the most widely used data mining methods. Concerns about the security and privacy of analyzing modern-day massive data across distributed n... 详细信息
来源: 评论
Anonymous CoinJoin Transactions with Arbitrary Values  16
Anonymous CoinJoin Transactions with Arbitrary Values
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on Embedded Software and Systems
作者: Maurer, Felix Konstantin Neudecker, Till Florian, Martin Rhein Westfal TH Aachen Commun & Distributed Syst Aachen Germany Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany
Bitcoin, the arguably most popular cryptocurrency to date, allows users to perform transactions using freely chosen pseudonymous addresses. Previous research, however, suggests that these pseudonyms can easily be link... 详细信息
来源: 评论
Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment  11th
Balanced Iterative Reducing and Clustering Using Hierarchies...
收藏 引用
11th international conference on Security, Privacy and Anonymity in Computation, Communication, and Storage (SpaCCS)
作者: Peng, Kai Zheng, Lixin Xu, Xiaolong Lin, Tao Leung, Victor C. M. Huaqiao Univ Coll Engn Quanzhou 362021 Fujian Peoples R China Univ British Columbia Dept Elect & Comp Engn Vancouver BC V6T 1Z4 Canada Fujian Prov Acad Engn Res Ctr Ind Intellectual Te Quanzhou 362021 Fujian Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software Nanjing 210044 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
With the development of big data, mobile cloud computing, cyber security issues have become more and more critical. thus, enabling an intrusion detection method over big data in mobile cloud environment is of paramoun... 详细信息
来源: 评论
One-Round Provably Secure Yoking-Proof for RFID Applications  16
One-Round Provably Secure Yoking-Proof for RFID Applications
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on Embedded Software and Systems
作者: Sun, Da-Zhi Xu, Guang-Quan Tianjin Univ Sch Comp Sci & Technol Tianjin Key Lab Adv Networking TANK Tianjin Peoples R China Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia
Under the Internet of things (IoT), the coexistence proof of multiple RFID tagged objects becomes a very useful mechanism in many application areas such as health care, evidences in court, and stores. the yoking-proof... 详细信息
来源: 评论
PacketSkip: Skip Graph for Multidimensional Search in Structured Peer-to-Peer Systems  11
PacketSkip: Skip Graph for Multidimensional Search in Struct...
收藏 引用
11th IEEE international conference on Self-Adaptive and Self-Organizing Systems (SASO)
作者: Disterhoeft, Andreas Funke, Andreas Graffi, Kalman Heinrich Heine Univ Dusseldorf Technol Social Networks Univ Str 1 D-40225 Dusseldorf Germany
(T)he Internet is ubiquitous and nodes participating in it are becoming increasingly diverse and heterogeneous. Especially is this true in decentralized, overlay-based networks, which traditionally build upon the infr... 详细信息
来源: 评论
Xor-overlay Topology Management Beyond Kademlia  11
Xor-overlay Topology Management Beyond Kademlia
收藏 引用
11th IEEE international conference on Self-Adaptive and Self-Organizing Systems (SASO)
作者: Lavoie, Erick Hendren, Laurie Correia, Miguel McGill Univ Montreal PQ Canada Univ Lisbon Inst Super Tecn INESC ID Lisbon Portugal
Kademlia is a widely successful distributed Hash Table (ma) implementation, better known for its use in the BitTorrent protocol. In this paper, we revisit its overlay management separately from the MIT operations to a... 详细信息
来源: 评论