咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 14 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 228 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 159 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 62 篇 信息与通信工程
    • 53 篇 电气工程
    • 25 篇 控制科学与工程
    • 17 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 14 篇 电子科学与技术(可...
    • 14 篇 网络空间安全
    • 13 篇 环境科学与工程(可...
    • 9 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 测绘科学与技术
    • 3 篇 安全科学与工程
  • 30 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 22 篇 理学
    • 16 篇 数学
    • 9 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 20 篇 法学
    • 16 篇 社会学
    • 4 篇 法学
  • 12 篇 文学
    • 12 篇 新闻传播学
  • 7 篇 教育学
    • 4 篇 心理学(可授教育学...
    • 3 篇 教育学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 25 篇 internet of thin...
  • 25 篇 cloud computing
  • 19 篇 internet
  • 10 篇 blockchain
  • 8 篇 servers
  • 7 篇 big data
  • 6 篇 information syst...
  • 6 篇 quality of servi...
  • 6 篇 ip networks
  • 5 篇 peer to peer com...
  • 5 篇 software enginee...
  • 5 篇 iot
  • 5 篇 security
  • 5 篇 mobile communica...
  • 5 篇 distributed comp...
  • 5 篇 artificial intel...
  • 5 篇 collaboration
  • 4 篇 monitoring
  • 4 篇 protocols
  • 4 篇 edge computing

机构

  • 4 篇 beijing univ pos...
  • 3 篇 beijing univ pos...
  • 3 篇 nanjing univ sta...
  • 3 篇 st francis xavie...
  • 3 篇 poznan supercomp...
  • 3 篇 university of ex...
  • 3 篇 tongji universit...
  • 3 篇 southwest forest...
  • 3 篇 institute of inf...
  • 3 篇 nanjing univ inf...
  • 2 篇 poznan supercomp...
  • 2 篇 beijing univ pos...
  • 2 篇 graduate school ...
  • 2 篇 school of inform...
  • 2 篇 dalian universit...
  • 2 篇 college of mecha...
  • 2 篇 school of comput...
  • 2 篇 institute of tel...
  • 2 篇 national institu...
  • 2 篇 wuhan university

作者

  • 4 篇 yao wenbin
  • 4 篇 wang dongbin
  • 3 篇 dai fei
  • 3 篇 yang yang
  • 3 篇 yang laurence t.
  • 3 篇 dou wanchun
  • 3 篇 xu xiaolong
  • 3 篇 khatua sunirmal
  • 2 篇 yin zhenyu
  • 2 篇 lu lu
  • 2 篇 de-shuang huang
  • 2 篇 yla-jaaski antti
  • 2 篇 yang feng
  • 2 篇 motoi iwashita
  • 2 篇 ye juanjuan
  • 2 篇 ding lianghui
  • 2 篇 qi lianyong
  • 2 篇 chen yan
  • 2 篇 yang yiwei
  • 2 篇 qian liang

语言

  • 223 篇 英文
  • 5 篇 中文
检索条件"任意字段=13th International Conference on Distributed Computing and Internet Technology, ICDCIT 2017"
228 条 记 录,以下是1-10 订阅
排序:
13th international conference on distributed computing and internet technology, icdcit 2017
13th International Conference on Distributed Computing and I...
收藏 引用
13th international conference on distributed computing and internet technology, icdcit 2017
the proceedings contain 20 papers. the special focus in this conference is on distributed computing and internet technology. the topics include: Gathering multiple robots in a ring and an infinite grid;scalable IQRA_I...
来源: 评论
distributed computing and internet technology: 13th international conference, icdcit 2017 Bhubaneswar, India, January 13–16, 2017 proceedings  13th
Distributed Computing and Internet Technology: 13th Internat...
收藏 引用
13th international conference on distributed computing and internet technology, icdcit 2017
作者: Krishnan, Padmanabhan Krishna, P. Radha Parida, Laxmi Oracle Labs BrisbaneQLD Australia Infosys Limited Hyderabad India IBM Thomas J. Watson Research Center Yorktown HeightsNY United States
来源: 评论
Attribute-based Encryption with Flexible Revocation for IoV  18
Attribute-based Encryption with Flexible Revocation for IoV
收藏 引用
18th international conference on Future Networks and Communications (FNC) / 20th international conference on Mobile Systems and Pervasive computing (MobiSPC) / 13th international conference on Sustainable Energy Information technology (SEIT)
作者: Chen, Ruoyu Li, Yuhong Rahmani, Rahim Beijing Univ Posts & Telecommun Sch Comp Sci Beijing 100876 Peoples R China Stockholm Univ Dept Comp & Syst Sci S-16407 Stockholm Sweden
Attribute-based encryption (ABE) has been used to provide data confidentiality and fine-grained access control in the internet of Vehicles (IoV). However, the attributes of vehicles in IoV might change frequently due ... 详细信息
来源: 评论
Enhanced DDoS Defense in SDN: Double-Layered Strategy with Blockchain Integration  13
Enhanced DDoS Defense in SDN: Double-Layered Strategy with B...
收藏 引用
13th IEEE international conference on Communications, Circuits and Systems (ICCCAS)
作者: Tian, Jialin Shu, Zhaogang Chen, Shuwu Xie, Haihui Liu, Xiaolong Qiu, Caiyu Fujian Agr & Forestry Univ Comp & Informat Coll Fuzhou Peoples R China
With the development of technologies such as cloud computing, big data, and the internet of things (IoT), Software-Defined Networking (SDN) has emerged as a novel network architecture in today's internet era. It c... 详细信息
来源: 评论
Big Data Framework Deployment and Solution Design of Agricultural internet of things  13
Big Data Framework Deployment and Solution Design of Agricul...
收藏 引用
13th international conference on Information technology in Medicine and Education, ITME 2023
作者: Kang, Lihui Xie, Dong Peng, Gang Yue, Kejuan Wang, Jiayue Wang, Mingming School of Information Hunan University of Humanities Science and Technology Loudi China School of Computer Science Hunan First Normal University Changsha China
this paper introduces the overall design scheme of agricultural internet of thing (IoT) system and the design framework of software functional modules. By analyzing the MapReduce computing framework of Hadoop, HDFS di... 详细信息
来源: 评论
Evaluating Indicator Weights for Satellite internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis  21
Evaluating Indicator Weights for Satellite Internet Security...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Lu, Yuming Li, Fenghua Wen, Yitong Fang, Liang Guo, Shoukun Li, Zifu Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
In order to reduce the impact of increasingly sophisticated cyberattacks on the satellite internet security, it is necessary to assess the satellite internet security. Most of existing assessment schemes for network s... 详细信息
来源: 评论
Fog-enabled Intelligent Network Intrusion Detection Framework for internet of things Applications  13
Fog-enabled Intelligent Network Intrusion Detection Framewor...
收藏 引用
13th international conference on Cloud computing, Data Science and Engineering, Confluence 2023
作者: Bebortta, Sujit Das, Saneev Kumar Chakravarty, Sujata Ravenshaw University Department of Computer Science Cuttack India Centurion University of Technology and Management Department of Computer Science and Engineering Bhubaneswar India
With the continual growth in internet of things (IoT), several concerns regarding the security and privacy of the connected IoT devices arise. Attacks like distributed Denial of Service (DDoS) and probing attacks caus... 详细信息
来源: 评论
Partitioning-based Active Trust Mechanism in Cloud-Edge-Device Collaborative Data Collection  21
Partitioning-based Active Trust Mechanism in Cloud-Edge-Devi...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Xia, Zhuoqun Wang, Ziyu Liu, Xiao Changsha University of Science and Technology School of Computer and Communication Engineering Changsha China Guangxi University School of Computer Electronics and Information Nanning China
Since the open character of the internet of things (IoT), IoT devices are vulnerable to various attacks. Compromised devices may maliciously provide unreliable data to the cloud. Furthermore, existing trust evaluation... 详细信息
来源: 评论
Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data  21
Ant: An Efficient Lossless Compression Algorithm for IoT Tim...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Li, Junhui Xu, Guangping Yang, Hongzhang Wu, Yulei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China University of Bristol Faculty of Science and Engineering Bristol United Kingdom
In various applications in internet of things like industrial monitoring, large amounts of floating-point time series data are generated at an unprecedented rate. Efficient compression algorithms can effectively reduc... 详细信息
来源: 评论
Application Research of Vertical Federated Learning technology in Banking Risk Control Model Strategy  21
Application Research of Vertical Federated Learning Technolo...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Luo, Yong Lu, Zhi Yin, Xiaofei Lu, Songfeng Weng, Yiting Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
this study centers on the application of vertical federated learning technology in the context of internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm... 详细信息
来源: 评论