咨询与建议

限定检索结果

文献类型

  • 4,480 篇 会议
  • 123 册 图书
  • 90 篇 期刊文献

馆藏范围

  • 4,692 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 3,057 篇 工学
    • 2,520 篇 计算机科学与技术...
    • 1,143 篇 软件工程
    • 640 篇 电气工程
    • 593 篇 信息与通信工程
    • 371 篇 控制科学与工程
    • 101 篇 机械工程
    • 97 篇 电子科学与技术(可...
    • 92 篇 生物工程
    • 77 篇 交通运输工程
    • 73 篇 生物医学工程(可授...
    • 73 篇 网络空间安全
    • 60 篇 动力工程及工程热...
    • 55 篇 安全科学与工程
    • 52 篇 光学工程
    • 48 篇 仪器科学与技术
    • 43 篇 建筑学
    • 36 篇 石油与天然气工程
  • 642 篇 理学
    • 369 篇 数学
    • 132 篇 物理学
    • 121 篇 生物学
    • 96 篇 系统科学
    • 79 篇 统计学(可授理学、...
  • 518 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 181 篇 工商管理
  • 91 篇 医学
    • 83 篇 临床医学
    • 67 篇 基础医学(可授医学...
  • 69 篇 法学
    • 52 篇 社会学
  • 59 篇 经济学
    • 53 篇 应用经济学
  • 45 篇 教育学
    • 45 篇 教育学
  • 24 篇 农学
  • 12 篇 文学
  • 7 篇 艺术学
  • 2 篇 军事学

主题

  • 357 篇 cloud computing
  • 242 篇 distributed comp...
  • 140 篇 computer archite...
  • 126 篇 computational mo...
  • 99 篇 application soft...
  • 96 篇 mobile computing
  • 93 篇 computer science
  • 90 篇 concurrent compu...
  • 90 篇 protocols
  • 83 篇 distributed comp...
  • 80 篇 peer to peer com...
  • 77 篇 security
  • 77 篇 edge computing
  • 75 篇 monitoring
  • 74 篇 computer network...
  • 73 篇 grid computing
  • 71 篇 hardware
  • 70 篇 fault tolerance
  • 66 篇 artificial intel...
  • 64 篇 resource managem...

机构

  • 11 篇 institute of com...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 faculty of elect...
  • 6 篇 federal universi...
  • 6 篇 department of co...
  • 6 篇 tianjin key labo...
  • 6 篇 school of automa...
  • 6 篇 tu wien distribu...
  • 5 篇 academy of cyber
  • 5 篇 department of co...
  • 5 篇 faculty of compu...
  • 5 篇 mit cambridge ma...
  • 5 篇 irisa rennes
  • 5 篇 university of tr...
  • 5 篇 natl univ def te...
  • 5 篇 chinese academy ...
  • 5 篇 cern geneva
  • 4 篇 inria

作者

  • 9 篇 dustdar schahram
  • 8 篇 jiannong cao
  • 7 篇 elhadj benkhelif...
  • 7 篇 benkhelifa elhad...
  • 7 篇 buyya rajkumar
  • 7 篇 yemelyanov dmitr...
  • 6 篇 wehrle klaus
  • 6 篇 wang wei
  • 6 篇 toporkov victor
  • 6 篇 viroli mirko
  • 5 篇 kashif nisar
  • 5 篇 liu lei
  • 5 篇 pianini danilo
  • 5 篇 i. foster
  • 5 篇 imran muhammad
  • 4 篇 mario fedrizzi
  • 4 篇 manfred opper
  • 4 篇 slowiński roman
  • 4 篇 mi ningfang
  • 4 篇 chu xiaowen

语言

  • 4,588 篇 英文
  • 73 篇 其他
  • 33 篇 中文
  • 3 篇 俄文
  • 2 篇 葡萄牙文
  • 1 篇 德文
  • 1 篇 法文
检索条件"任意字段=14th International Conference on Distributed Computing Systems"
4693 条 记 录,以下是71-80 订阅
排序:
A Domain-Aware Data Fusion Scheme for Cold Start Problem in Early-Stage IoT systems
A Domain-Aware Data Fusion Scheme for Cold Start Problem in ...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Manish Kumar Maurya Aswin Raut Manoj Kumar Satakshi Manish Kumar IT Department IIIT Allahabad Prayagraj India
In recent years, edge computing has become increasingly popular, and edge intelligence is one of the key components of this paradigm. However, in the early phases of deployment, edge-based models frequently face an is... 详细信息
来源: 评论
Mitigating Security Vulnerabilities in Cloud-Based Home Automation through Advanced Edge computing: A Comprehensive Framework for Privacy Enhancement and Data Protection
Mitigating Security Vulnerabilities in Cloud-Based Home Auto...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Biresh Kumar Shreya Kumari Ritesh Kumar Vineet Kumar Singh Binod Kumar Sharma Kamaldeep Gupta Amity Institute of Information Technology Amity University Jharkhand Ranchi Jharkhand India Cambridge Institute of Technology Tatisilwai Ranchi Jharkhand India Dept Of IT Dr. R.M.L. Avadh University Ayodhya UP Dept. of Computer Sci. & Engg. BIT Mesra Ranchi Jharkhand St. Xavier’s College Ranchi Jharkhand India
With the soaring adoption of cloud-constructed home automation systems with CAGR of 8.5% from 2023 to 2030, security and privacy concerns have become critical considerations. this paper examines the security risks in ... 详细信息
来源: 评论
Privacy-Preserving Model for Cyber threat Intelligence, Sharing Across Multi-Organizational Platforms
Privacy-Preserving Model for Cyber Threat Intelligence, Shar...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Shridhar Pandey H. Azath Rizwan Ur Rahman Hemraj Lamkuche School of Computing Science Engineering and Artificial Intelligence (SCAI) VIT Bhopal University Bhopal India
the research presents a privacy-preserving structure for secure Cyber threat Intelligence (CTI) exchanging, using cutting-edge AI techniques to increase cooperative IT delicacy while keeping secret information safe. W... 详细信息
来源: 评论
Decentralised Cloud Architecture: Blockchain Driven Integrity and Raptor Codes for Enhanced Data Transmission
Decentralised Cloud Architecture: Blockchain Driven Integrit...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Preethi M Ayush Kale Pooja Satheesh Harshitha R Rohith Vaidya K Department of Computer Science PES University Bangalore India
Ensuring data integrity and security has become integral in the digital era. Blockchain, an immutable ledger can be leveraged to provide data integrity to the cloud system. Centralised cloud systems present challenges... 详细信息
来源: 评论
the Security Verification and Analysis of Information Nodes in Cyberspace by Deep Spiking Algorithm
The Security Verification and Analysis of Information Nodes ...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Yuxin Zhai Zhehong Zhou Yanchao Li School of Computing Guangdong University of Science and Technology Dongguan China
In the research on the security verification technology of information nodes in cyberspace, the balance accuracy and operational stability are very important for the security of the entire Internet enterprise. In this... 详细信息
来源: 评论
the Evolution of Cloud computing: A Study of Aspirational Technologies and Practical Achievements
The Evolution of Cloud Computing: A Study of Aspirational Te...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Kamal Upreti Rituraj Jain Raj Kumar Kamal Goyal Deepika Komal Gupta Dept. of Computer Sciecne CHRIST University DelhiNCR India Dept. of IT Marwadi University Rajkot Gujarat India Gautam Buddha University Gautam Budh Nagar U.P India Pimpri Chinchwad University Pune India Dept. of Computer Science & Engg. Maharishi MM-Ambala Haryana India Accenture Bangalore India
Cloud computing has transformed the digital landscape, providing scalability, cost efficiency, and seamless access to computing resources. Yet, there is a gap between its theoretical aspirations and real-world achieve... 详细信息
来源: 评论
Proceedings - 16th IEEE international conference on Trust, Security and Privacy in computing and Communications, 11th IEEE international conference on Big Data Science and Engineering and 14th IEEE international conference on Embedded Software and systems, Trustcom/BigDataSE/ICESS 2017
Proceedings - 16th IEEE International Conference on Trust, S...
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications, 11th IEEE international conference on Big Data Science and Engineering and 14th IEEE international conference on Embedded Software and systems, Trustcom/BigDataSE/ICESS 2017
the proceedings contain 153 papers. the topics discussed include: evolution of publicly disclosed information in facebook profiles;practical application-level dynamic taint analysis of android apps;authenticating comp...
来源: 评论
Proceedings of the 14th IADIS international conference Computer Graphics, Visualization, Computer Vision and Image Processing 2020, CGVCVIP 2020 and Proceedings of the 5th IADIS international conference Big Data Analytics, Data Mining and Computational Intelligence 2020, BigDaCI 2020 and Proceedings of the 9th IADIS international conference theory and Practice in Modern computing 2020, TPMC 2020 - Part of the 14th Multi conference on Computer Science and Information systems, MCCSIS 2020
Proceedings of the 14th IADIS International Conference Compu...
收藏 引用
14th IADIS international conference Computer Graphics, Visualization, Computer Vision and Image Processing 2020, CGVCVIP 2020 and 5th IADIS international conference Big Data Analytics, Data Mining and Computational Intelligence 2020, BigDaCI 2020 and 9th IADIS international conference theory and Practice in Modern computing 2020, TPMC 2020, Part of the 14th Multi conference on Computer Science and Information systems, MCCSIS 2020
the proceedings contain 35 papers. the topics discussed include: data-driven approach for generating colormaps of scientific simulation data;a 3D-shockwave volume rendering algorithm based on feature boundary detectio...
来源: 评论
A Hardware Trojan Detection using Machine Learning Technique
A Hardware Trojan Detection using Machine Learning Technique
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Yashasvi Jaiswal S. Harihara Sitaraman School of Computing and Artificial Intelligence (SCAI) VIT Bhopal University Bhopal India
Hardware Trojan is a major vulnerability in the security of the system. Various researchers have worked on the hardware Trojan detection and prevention techniques as solutions that are based on traditional methods suc... 详细信息
来源: 评论
Proceedings - 14th IEEE international conference on Computational Science and Engineering, CSE 2011 and 11th international Symposium on Pervasive systems, Algorithms, and Networks, I-SPAN 2011 and 10th IEEE international conference on Ubiquitous computing and Communications, IUCC 2011
Proceedings - 14th IEEE International Conference on Computat...
收藏 引用
14th IEEE Int. Conf. on Computational Science and Engineering, CSE 2011, the 11th international Symposium on Pervasive systems, Algorithms, and Networks, I-SPAN 2011, and the 10th IEEE Int. Conf. on Ubiquitous computing and Communications, IUCC 2011
the proceedings contain 105 papers. the topics discussed include: authentication of online authorship or article based on hypothesis testing model;the study of hierarchical branch prediction architecture;fast, accurat...
来源: 评论