咨询与建议

限定检索结果

文献类型

  • 291 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 190 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 51 篇 信息与通信工程
    • 41 篇 电气工程
    • 23 篇 控制科学与工程
    • 10 篇 动力工程及工程热...
    • 7 篇 机械工程
    • 7 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 安全科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 72 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 31 篇 理学
    • 22 篇 数学
    • 7 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 2 篇 系统科学
    • 1 篇 化学
  • 9 篇 教育学
    • 8 篇 心理学(可授教育学...
    • 1 篇 教育学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 32 篇 cloud computing
  • 20 篇 distributed comp...
  • 12 篇 software enginee...
  • 12 篇 artificial intel...
  • 11 篇 computational mo...
  • 10 篇 servers
  • 9 篇 peer to peer com...
  • 9 篇 mobile communica...
  • 8 篇 routing
  • 7 篇 educational inst...
  • 7 篇 quality of servi...
  • 6 篇 optimization
  • 6 篇 protocols
  • 6 篇 mobile computing
  • 6 篇 distributed data...
  • 5 篇 scalability
  • 5 篇 next generation ...
  • 5 篇 computer archite...
  • 5 篇 throughput
  • 5 篇 mapreduce

机构

  • 6 篇 beijing univ pos...
  • 5 篇 graduate school ...
  • 4 篇 beijing univ pos...
  • 3 篇 graduate school ...
  • 3 篇 beijing univ pos...
  • 3 篇 beijing jiaotong...
  • 3 篇 graduate univers...
  • 3 篇 department of in...
  • 3 篇 school of comput...
  • 3 篇 huazhong univers...
  • 3 篇 institute of inf...
  • 3 篇 institute of com...
  • 2 篇 univ sydney sch ...
  • 2 篇 key laboratory o...
  • 2 篇 beijing univ pos...
  • 2 篇 institute of par...
  • 2 篇 the university o...
  • 2 篇 school of comput...
  • 2 篇 state key labora...
  • 2 篇 huazhong univers...

作者

  • 6 篇 teruhisa hochin
  • 5 篇 hiroki nomiya
  • 4 篇 yao wenbin
  • 4 篇 wang dongbin
  • 3 篇 zomaya albert y.
  • 3 篇 albert y. zomaya
  • 2 篇 zhou xinlei
  • 2 篇 zhang lei
  • 2 篇 guo songtao
  • 2 篇 nie xin
  • 2 篇 lu lu
  • 2 篇 yi yuanyuan
  • 2 篇 bo cheng
  • 2 篇 carlos lübbe
  • 2 篇 zhou gefei
  • 2 篇 yang yiwei
  • 2 篇 wang wei
  • 2 篇 javid taheri
  • 2 篇 moraveji reza
  • 2 篇 xiao limin

语言

  • 296 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"任意字段=13th International Conference on Distributed Computing and Networking, ICDCN 2012"
299 条 记 录,以下是21-30 订阅
排序:
Ranking on Heterogeneous Manifold for Multimodal Information Retrieval  21
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Wan, Xingshi Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science & Technology Wuhan China
In light of recent advancements in Internet of Multimedia things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS... 详细信息
来源: 评论
PE-FedAvg: A Privacy-Enhanced Federated Learning for distributed Android Malware Detection  21
PE-FedAvg: A Privacy-Enhanced Federated Learning for Distrib...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tang, Junwei Xu, Zilong Ye, Luyao Peng, Tao He, Ruhan Hu, Xinrong Tian, Wenlong Wuhan Textile University Hubei Provincial Engineering Research Center for Intelligent Textile and Fashion China Wuhan Textile University School of Computer Science and Artificial Intelligence China University of South China School of Computer Science China Nanyang Technological University School of Physical and Mathematical Sciences Singapore
Android malware detection has become research hotspot in mobile security. When security service providers obtain feature information from target samples, they may involve user privacy information such as identity and ... 详细信息
来源: 评论
Time Fairness-Based Application Offloading in Mobile Edge computing with Individual QoS Guarantee  21
Time Fairness-Based Application Offloading in Mobile Edge Co...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Xie, Mengwei Cui, Lizhen Liu, Jianxiong Guo, Wei Li, Feng Shandong University School of Computer Science and Technology Qindao China Shandong University School of Software Jinan China Aerospace Science & Industry Network Information Development Co. Ltd. Beijing China
In the area of Mobile Edge computing (MEC), how to offload applications with QoS and fairness guarantees has been attracting increasing attention. Most existing application offloading strategies focus on reducing the ... 详细信息
来源: 评论
Joint Resource Placement and Service Replica Placement Scheme in Mobile Edge computing  21
Joint Resource Placement and Service Replica Placement Schem...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Woldeyes, Surafel Kifetew Zhang, Yongmin Wang, Wei Li, Zhaohui Central South University School of Computer Science and Engineering Changsha410083 China
Optimal resource placement and service placement are key factors for resource utilization and service availability in mobile edge computing (MEC) systems. However, efficiently utilizing the resources of MEC servers fo... 详细信息
来源: 评论
Deep Reinforcement Learning based Dynamic Channel Bonding for Wi-Fi Networks  21
Deep Reinforcement Learning based Dynamic Channel Bonding fo...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Chen, Hao Liu, Peng You, Lizhao Guo, Ziyang Luo, Jiajun Sun, Xinghua Wang, Taotao Fu, Liqun Xiamen University Department of Information and Communication Engineering China Shenzhen Research Institute of Xiamen University Shenzhen China Huawei Technologies Co. Ltd. Wireless Technology Lab 2012 Laboratories China Sun Yat-sen University School of Electronics and Communication Engineering China Shenzhen University College of Electronics and Information Engineering Shenzhen China
this paper presents a decentralized Deep Reinforcement Learning (DRL)-based dynamic channel bonding (DCB) algorithm (i.e., drlDCB) for Wi-Fi networks. Most existing RL-based channel bonding algorithms either are centr... 详细信息
来源: 评论
A Firmware Vulnerability Detection Method Based on Feature Filtering  21
A Firmware Vulnerability Detection Method Based on Feature F...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Xia, Bing Tang, Chongjun Liu, Wenbo Chu, Shihao Dong, Yu ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Dept Zhengzhou China ZhongYuan University of Technology Henan Key Laboratory on Public Opinion Intelligent Analysis Dept Zhengzhou China ZhongYuan University of Technology Dept Zhengzhou China
Open source code reuse and code cross-platform deployment accelerate the spread of software vulnerabilities, and pose challenges for accurate detection of cross-platform vulnerabilities. the binary vulnerability simil... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage Systems  21
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tian, Yi Xu, Guangping Yang, Hongzhang Ni, Yue Cao, JiaXin Yang, Lei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Novel Software Technology Tianjin Key Laboratory of Intelligence Computing Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Information Technology Co. Ltd. China
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi... 详细信息
来源: 评论
Enhanced DDoS Defense in SDN: Double-Layered Strategy with Blockchain Integration  13
Enhanced DDoS Defense in SDN: Double-Layered Strategy with B...
收藏 引用
13th IEEE international conference on Communications, Circuits and Systems (ICCCAS)
作者: Tian, Jialin Shu, Zhaogang Chen, Shuwu Xie, Haihui Liu, Xiaolong Qiu, Caiyu Fujian Agr & Forestry Univ Comp & Informat Coll Fuzhou Peoples R China
With the development of technologies such as cloud computing, big data, and the Internet of things (IoT), Software-Defined networking (SDN) has emerged as a novel network architecture in today's Internet era. It c... 详细信息
来源: 评论
Keynote Talk: Deployment and Management of Edge Microservices  23
Keynote Talk: Deployment and Management of Edge Microservice...
收藏 引用
24th international conference on distributed computing and networking (icdcn)
作者: Chiasserini, Carla Fabiana Politecn Torino Turin Italy
Edge computing is an emerging technology for present and next generation mobile networks, which, unlike the cloud, can meet the low latency or bandwidth consumption requirements of time- and mission-critical services.... 详细信息
来源: 评论
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography  21
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Liao, Wei Han, Lansheng Chen, Peng Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r... 详细信息
来源: 评论