咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 14 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 228 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 159 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 62 篇 信息与通信工程
    • 53 篇 电气工程
    • 25 篇 控制科学与工程
    • 17 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 14 篇 电子科学与技术(可...
    • 14 篇 网络空间安全
    • 13 篇 环境科学与工程(可...
    • 9 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 测绘科学与技术
    • 3 篇 安全科学与工程
  • 30 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 22 篇 理学
    • 16 篇 数学
    • 9 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 20 篇 法学
    • 16 篇 社会学
    • 4 篇 法学
  • 12 篇 文学
    • 12 篇 新闻传播学
  • 7 篇 教育学
    • 4 篇 心理学(可授教育学...
    • 3 篇 教育学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 25 篇 internet of thin...
  • 25 篇 cloud computing
  • 19 篇 internet
  • 10 篇 blockchain
  • 8 篇 servers
  • 7 篇 big data
  • 6 篇 information syst...
  • 6 篇 quality of servi...
  • 6 篇 ip networks
  • 5 篇 peer to peer com...
  • 5 篇 software enginee...
  • 5 篇 iot
  • 5 篇 security
  • 5 篇 mobile communica...
  • 5 篇 distributed comp...
  • 5 篇 artificial intel...
  • 5 篇 collaboration
  • 4 篇 monitoring
  • 4 篇 protocols
  • 4 篇 edge computing

机构

  • 4 篇 beijing univ pos...
  • 3 篇 beijing univ pos...
  • 3 篇 nanjing univ sta...
  • 3 篇 st francis xavie...
  • 3 篇 poznan supercomp...
  • 3 篇 university of ex...
  • 3 篇 tongji universit...
  • 3 篇 southwest forest...
  • 3 篇 institute of inf...
  • 3 篇 nanjing univ inf...
  • 2 篇 poznan supercomp...
  • 2 篇 beijing univ pos...
  • 2 篇 graduate school ...
  • 2 篇 school of inform...
  • 2 篇 dalian universit...
  • 2 篇 college of mecha...
  • 2 篇 school of comput...
  • 2 篇 institute of tel...
  • 2 篇 national institu...
  • 2 篇 wuhan university

作者

  • 4 篇 yao wenbin
  • 4 篇 wang dongbin
  • 3 篇 dai fei
  • 3 篇 yang yang
  • 3 篇 yang laurence t.
  • 3 篇 dou wanchun
  • 3 篇 xu xiaolong
  • 3 篇 khatua sunirmal
  • 2 篇 yin zhenyu
  • 2 篇 lu lu
  • 2 篇 de-shuang huang
  • 2 篇 yla-jaaski antti
  • 2 篇 yang feng
  • 2 篇 motoi iwashita
  • 2 篇 ye juanjuan
  • 2 篇 ding lianghui
  • 2 篇 qi lianyong
  • 2 篇 chen yan
  • 2 篇 yang yiwei
  • 2 篇 qian liang

语言

  • 223 篇 英文
  • 5 篇 中文
检索条件"任意字段=13th International Conference on Distributed Computing and Internet Technology, ICDCIT 2017"
228 条 记 录,以下是41-50 订阅
排序:
Design ideas and Empirical Analysis of Building Equipment Monitoring System Based on Cloud computing technology  45
Design ideas and Empirical Analysis of Building Equipment Mo...
收藏 引用
45th IEEE Annual Computers, Software, and Applications conference, COMPSAC 2021
作者: Wenjie, Wang Jiangsu Vocational Institute of Architectural Technology Xuzhou221116 China
In this paper, a complete monitoring platform based on distributed application system is designed for cloud computing environment, which is used to capture the resource utilization and load capacity of distributed app... 详细信息
来源: 评论
An Request Offloading and Scheduling Approach Base on Particle Swarm Optimization Algorithm in IoT-Fog Networks  13
An Request Offloading and Scheduling Approach Base on Partic...
收藏 引用
13th IEEE international conference on Communication Software and Networks (ICCSN)
作者: Ju, Chengen Ma, Yue Yin, Zhenyu Zhang, Feiqing Chinese Acad Sci Shenyang Inst Comp Technol Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China Liaoning Key Lab Domest Ind Control Platform Tech Shenyang 110168 Peoples R China
In Industrial internet of things environment, the requests from the terminal devices are usually processed by the fog servers. However, due to the limited hardware resources and software resources, the fog server may ... 详细信息
来源: 评论
Vulnerability Classification for Detecting threats in Cloud Environments Against DDoS Attacks
Vulnerability Classification for Detecting Threats in Cloud ...
收藏 引用
international conference on Communication Systems and Network Technologies (CSNT)
作者: V. Esther Jyothi N. Sampreeth Chowdary Department of Computer Applications Velagapudi Ramakrishna Siddhartha Engineering College Vijayawada India Department of Computer Science and Engineering P.V.P. Siddhartha Institute of Technology Vijayawada India
In order to secure data, infrastructure, and services from potential attacks, cloud security is a wide issue that includes any combination of policies, technologies, and procedures. the cloud has substantially differe... 详细信息
来源: 评论
FDO-ABE: A Fully Decentralized Lightweight Access Control Architecture for Mobile Edge computing  6
FDO-ABE: A Fully Decentralized Lightweight Access Control Ar...
收藏 引用
6th IEEE international conference on Computer and Communication Systems, ICCCS 2021
作者: Zhang, Zhishuo Huang, Guanjie Hu, Sunqiang Zhang, Wei Wu, Yi Qin, Zhiguang Chengdu China Canberra Australia
Attribute-based encryption (ABE) is an emergent cryptographic primitive introduced in recent years. Due to its fine-grained access policy, ABE has been widely used in cloud security to build an attribute-based access ... 详细信息
来源: 评论
Path planning and model design for internet plus technology innovation and entrepreneurship training  4
Path planning and model design for internet plus technology ...
收藏 引用
4th international conference on Advanced Electronic Materials, Computers and Software Engineering, AEMCSE 2021
作者: Zeng, Wenying Li, Binning Zhuhai China Guangdong Polytechnic of Science and Technology School of Management Engineering Guangzhou China
Technological development and industrial upgrading need innovation, and internet plus technology provides the carrier for entrepreneurship. Talent is still the key factor, and the improvement of innovation and entrepr... 详细信息
来源: 评论
Resource Scheduling for Tasks of a Workflow in Cloud Environment  16th
Resource Scheduling for Tasks of a Workflow in Cloud Environ...
收藏 引用
16th international conference on distributed computing and internet technology (icdcit)
作者: Karmakar, Kamalesh Das, Rajib K. Khatua, Sunirmal Univ Calcutta Comp Sci & Engn Kolkata India
In recent days most of the enterprises and communities adopt cloud services to deploy their workflow-based applications due to the inherent benefits of cloud-based services. these workflow-based applications are mainl... 详细信息
来源: 评论
AttentionFunc: Balancing FaaS Compute across Edge-Cloud Continuum with Reinforcement Learning  23
AttentionFunc: Balancing FaaS Compute across Edge-Cloud Cont...
收藏 引用
Proceedings of the 13th international conference on the internet of things
作者: Kexin Li Stefan Nastic Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China China Distributed System Group TU Wien Austria
Serverless computing is emerging as a promising paradigm to manage compute in Edge-Cloud continuum. However, distributing and balancing the computational load (serverless functions) across the continuum remains a sign... 详细信息
来源: 评论
Dynamic Task Offloading with Minority Game for internet of Vehicles in Cloud-Edge computing  13
Dynamic Task Offloading with Minority Game for Internet of V...
收藏 引用
13th IEEE international conference on Services computing (SCC) / 13th IEEE international conference on Web Services (ICWS)
作者: Shen, Bowen Xu, Xiaolong Dai, Fei Qi, Lianyong Zhang, Xuyun Dou, Wanchun Nanjing Univ Informat Sci & Technol Sch Comp & Software Nanjing Peoples R China Southwest Forestry Univ Sch Big Data & Intelligence Engn Kunming Yunnan Peoples R China Qufu Normal Univ Sch Informat Sci & Engn Jining Shandong Peoples R China Macquarie Univ Dept Comp Sydney NSW Australia Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China
With the advent of the internet of Vehicles (IoV), drivers are now provided with diverse time-sensitive vehicular services that usually require a large scale of computation. As civilian vehicles are generally insuffic... 详细信息
来源: 评论
A Large Scale IoT Botnet Attack Detection Using Ensemble Learning  14th
A Large Scale IoT Botnet Attack Detection Using Ensemble Lea...
收藏 引用
12th international Advanced computing conference, IACC 2022
作者: Jwalin, B. Saravanan, S. Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham Banglore India
the escalation of the newer technology called internet of things (IoT), introduced numerous benefits to people. However, it has also raised the risk of cybercriminal attacks. For instance, it has allowed criminals to ... 详细信息
来源: 评论
distributed Packets Scheduling Technique for Cognitive Radio internet of things Based on Discrete Permutation Particle Swarm Optimization  13
Distributed Packets Scheduling Technique for Cognitive Radio...
收藏 引用
2020 IEEE Congress on Cybermatics: 13th IEEE international conferences on internet of things, ithings 2020, 16th IEEE international conference on Green computing and Communications, GreenCom 2020, 13th IEEE international conference on Cyber, Physical and Social computing, CPSCom 2020 and 6th IEEE international conference on Smart Data, SmartData 2020
作者: Tarek, Dina Benslimane, Abderrahim Darwish, M. Kotb, Amira M. Faculty of Computers and Information Cairo University Information Technology Department Cairo Egypt LIA/CERI University of Avignon Avignon France
Integrating Cognitive Radio Networks with internet of things, which is called Cognitive Radio internet of things (CRIoT), is considered to be a breakthrough for the IoT spectrum scarcity problem. Some IoT applications... 详细信息
来源: 评论