咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 14 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 228 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 159 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 62 篇 信息与通信工程
    • 53 篇 电气工程
    • 25 篇 控制科学与工程
    • 17 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 14 篇 电子科学与技术(可...
    • 14 篇 网络空间安全
    • 13 篇 环境科学与工程(可...
    • 9 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 测绘科学与技术
    • 3 篇 安全科学与工程
  • 30 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 22 篇 理学
    • 16 篇 数学
    • 9 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 20 篇 法学
    • 16 篇 社会学
    • 4 篇 法学
  • 12 篇 文学
    • 12 篇 新闻传播学
  • 7 篇 教育学
    • 4 篇 心理学(可授教育学...
    • 3 篇 教育学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 25 篇 internet of thin...
  • 25 篇 cloud computing
  • 19 篇 internet
  • 10 篇 blockchain
  • 8 篇 servers
  • 7 篇 big data
  • 6 篇 information syst...
  • 6 篇 quality of servi...
  • 6 篇 ip networks
  • 5 篇 peer to peer com...
  • 5 篇 software enginee...
  • 5 篇 iot
  • 5 篇 security
  • 5 篇 mobile communica...
  • 5 篇 distributed comp...
  • 5 篇 artificial intel...
  • 5 篇 collaboration
  • 4 篇 monitoring
  • 4 篇 protocols
  • 4 篇 edge computing

机构

  • 4 篇 beijing univ pos...
  • 3 篇 beijing univ pos...
  • 3 篇 nanjing univ sta...
  • 3 篇 st francis xavie...
  • 3 篇 poznan supercomp...
  • 3 篇 university of ex...
  • 3 篇 tongji universit...
  • 3 篇 southwest forest...
  • 3 篇 institute of inf...
  • 3 篇 nanjing univ inf...
  • 2 篇 poznan supercomp...
  • 2 篇 beijing univ pos...
  • 2 篇 graduate school ...
  • 2 篇 school of inform...
  • 2 篇 dalian universit...
  • 2 篇 college of mecha...
  • 2 篇 school of comput...
  • 2 篇 institute of tel...
  • 2 篇 national institu...
  • 2 篇 wuhan university

作者

  • 4 篇 yao wenbin
  • 4 篇 wang dongbin
  • 3 篇 dai fei
  • 3 篇 yang yang
  • 3 篇 yang laurence t.
  • 3 篇 dou wanchun
  • 3 篇 xu xiaolong
  • 3 篇 khatua sunirmal
  • 2 篇 yin zhenyu
  • 2 篇 lu lu
  • 2 篇 de-shuang huang
  • 2 篇 yla-jaaski antti
  • 2 篇 yang feng
  • 2 篇 motoi iwashita
  • 2 篇 ye juanjuan
  • 2 篇 ding lianghui
  • 2 篇 qi lianyong
  • 2 篇 chen yan
  • 2 篇 yang yiwei
  • 2 篇 qian liang

语言

  • 223 篇 英文
  • 5 篇 中文
检索条件"任意字段=13th International Conference on Distributed Computing and Internet Technology, ICDCIT 2017"
228 条 记 录,以下是141-150 订阅
排序:
Intelligent Optimal Lifecycle Planning in Agricultural Products Supply Chains Using Cloud computing and RFID Data  13
Intelligent Optimal Lifecycle Planning in Agricultural Produ...
收藏 引用
13th international conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)
作者: Tao, Qian Wang, Zhenyu Gu, Chunqin Zhan, Yizu Xu, Junying Tang, Ziqi South China Univ Technol Sch Software Engn Guangzhou Guangdong Peoples R China
internet of things devices, namely, radio frequency identification (RFID) tags and sensors deliver the massive lifecycle data of agriculture products to the database in the cloud platform for a supply chain system. th... 详细信息
来源: 评论
Blockchain-based Payment Collection Supervision System using Pervasive Bitcoin Digital Wallet  13
Blockchain-based Payment Collection Supervision System using...
收藏 引用
13th IEEE international conference on Wireless and Mobile computing, Networking and Communications (WiMob)
作者: Chen, Po-Wei Jiang, Bo-Sian Wang, Chia-Hui Peking Univ Sch Software & Microelect 24th Jinyuan Rd Beijing 102600 Peoples R China Ming Chuan Univ Dept Comp Sci & Informat Engn 5 De Ming Rd Taoyuan 333 Taiwan
After years of tremendous development and research in digital currency, the most famous Bitcoin industry chain has been gradually completed including mining, exchange, currency exchange, ATM, pervasive digital wallet ... 详细信息
来源: 评论
Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling  13th
Improved Cryptanalysis of an ISO Standard Lightweight Block ...
收藏 引用
13th international conference on Information Securityand Cryptology, Inscrypt 2017
作者: Yin, Jun Ma, Chuyan Lyu, Lijun Song, Jian Zeng, Guang Ma, Chuangui Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China National University of Defense Technology Changsha410073 China Army Aviation Institute Beijing101116 China
Differential and linear cryptanalysis are two of the most effective attacks on block ciphers. Searching for (near) optimal differential or linear trails is not only useful for the security evaluation of block ciphers ... 详细信息
来源: 评论
the Feedback of the Completion Time Distribution to the Teaching Effect Based on the Remote Hardware Experiment System
The Feedback of the Completion Time Distribution to the Teac...
收藏 引用
international conference on Computer Science & Education (ICCSE)
作者: Chen Yongqiang Quan Chengbin Lishanshan Sun Shaofeng Department of Computer Science and Technology Tsinghua University Beijing China Ministry of Environmental Protection solid waste and chemicals management center Beijing China
We have developed a new experimental device to support online experimentation of hardware experiments. After many years of computer education practice and the rapid development of computers, there are many problems wi... 详细信息
来源: 评论
Research on the Interaction between the Series Inverters of distributed Power Flow Controller  3
Research on the Interaction between the Series Inverters of ...
收藏 引用
3rd international conference on Industrial Informatics - computing technology, Intelligent technology, Industrial Information Integration, ICIICII 2017
作者: Gao, Menglu Tang, Aihong Huang, Yong Xu, Qiushi Zhao, Hongsheng Zheng, Xu School of Automation Wuhan University of Technology Wuhan China State Grid Electric Power Company of Hubei Province Research Institute of Economics and Technology Wuhan China
To research the interaction and factors of the series inverters of the distributed power flow controller, the structure and the control principle of the series inverters are discussed in detail. the simulation is cond... 详细信息
来源: 评论
Analysis and Design of TCM Health Management System for Treating End-disease
Analysis and Design of TCM Health Management System for Trea...
收藏 引用
2018 2nd international conference on Systems,computing,and Applications(SYSTCA 2018)
作者: Gan Xinyan Gao Xiang Lan Tianying Guangxi university of chinese medicine
the 13th Five-Year Plan of the State proposed that by 2020, 30 percent of maternal and child health institutions will provide end-care services and 50 percent of village health clinics will carry out health interventi... 详细信息
来源: 评论
Proactive and Hybrid Wireless Network Access Strategy for Vehicle Cloud Networks: An Evolutionary Game Approach  13
Proactive and Hybrid Wireless Network Access Strategy for Ve...
收藏 引用
13th international Wireless Communications and Mobile computing conference (IWCMC)
作者: Mekki, Tesnim Jabri, Issam Rachedi, Abderrezak Ben Jemaa, Maher Natl Sch Engn Sfax REDCAD Lab Sfax Tunisia Natl Sch Engn Gabes Hatem Bettaher IResCoMath Unit Gabes Tunisia Univ Paris Est Marne La Vallee CNRS ENPC UPEMLIGMUMR8049 F-77454 Champs Sur Marne France
Vehicular cloud computing is a new paradigm that integrates VANET and cloud computing. It refers to the vehicles' use of outside resources: they access to the conventional cloud or cooperate with other vehicles by... 详细信息
来源: 评论
Strengthening Security and Privacy in an Ultra-Dense Green 5G Radio Access Network for the Industrial and Tactile internet of things  13
Strengthening Security and Privacy in an Ultra-Dense Green 5...
收藏 引用
13th international Wireless Communications and Mobile computing conference (IWCMC)
作者: Szymanski, T. H. McMaster Univ Dept ECE Hamilton ON Canada
the design of exceptionally-strong security and privacy in an ultra-dense green 5G Deterministic Radio Access Network (DRAN) for the internet of things (IoT) is proposed. the ultra-dense DRAN exploits fiber-optics and... 详细信息
来源: 评论
A Comprehensive and Effective Mechanism for DDoS Detection in SDN  13
A Comprehensive and Effective Mechanism for DDoS Detection i...
收藏 引用
13th IEEE international conference on Wireless and Mobile computing, Networking and Communications (WiMob)
作者: Conti, Mauro Gangwal, Ankit Gaur, Manoj Singh Univ Padua Dept Math Padua Italy Malaviya Natl Inst Technol Dept Comp Sci & Engn Jaipur Rajasthan India
DDoS attack is one of the major concerns for network and cloud service providers, due to its substantial impact on revenue/cost and especially on their reputation. Also, network administrators are looking for solution... 详细信息
来源: 评论
Collaborative Reuse of Streaming Dataflows in IoT Applications  13
Collaborative Reuse of Streaming Dataflows in IoT Applicatio...
收藏 引用
13th Annual IEEE international conference on e-Science (e-Science)
作者: Chaturvedi, Shilpa Tyagi, Sahil Simmhan, Yogesh Indian Inst Sci Dept Computat & Data Sci Bangalore Karnataka India
distributed Stream Processing Systems (DSPS) like Apache Storm and Spark Streaming enable composition of continuous dataflows that execute persistently over data streams. they are used by internet of things (IoT) appl... 详细信息
来源: 评论