咨询与建议

限定检索结果

文献类型

  • 4,163 篇 会议
  • 59 册 图书
  • 37 篇 期刊文献

馆藏范围

  • 4,259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,036 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,587 篇 软件工程
    • 635 篇 信息与通信工程
    • 508 篇 电气工程
    • 427 篇 控制科学与工程
    • 207 篇 生物工程
    • 161 篇 机械工程
    • 148 篇 生物医学工程(可授...
    • 143 篇 交通运输工程
    • 133 篇 动力工程及工程热...
    • 115 篇 电子科学与技术(可...
    • 97 篇 仪器科学与技术
    • 86 篇 安全科学与工程
    • 85 篇 建筑学
    • 82 篇 化学工程与技术
    • 70 篇 光学工程
    • 61 篇 土木工程
  • 904 篇 理学
    • 534 篇 数学
    • 219 篇 生物学
    • 142 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 110 篇 系统科学
    • 98 篇 化学
  • 712 篇 管理学
    • 486 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 114 篇 法学
    • 68 篇 社会学
  • 111 篇 医学
    • 98 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 78 篇 经济学
    • 78 篇 应用经济学
  • 61 篇 教育学
  • 43 篇 农学
  • 9 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 206 篇 cloud computing
  • 149 篇 distributed comp...
  • 118 篇 blockchain
  • 108 篇 internet of thin...
  • 101 篇 intelligent netw...
  • 95 篇 computational mo...
  • 93 篇 edge computing
  • 90 篇 artificial intel...
  • 86 篇 computer archite...
  • 73 篇 distributed data...
  • 71 篇 big data
  • 69 篇 servers
  • 62 篇 monitoring
  • 59 篇 wireless sensor ...
  • 55 篇 data models
  • 53 篇 intelligent syst...
  • 52 篇 data mining
  • 52 篇 protocols
  • 50 篇 computer network...
  • 49 篇 security

机构

  • 18 篇 university of ch...
  • 15 篇 key laboratory o...
  • 11 篇 state key labora...
  • 11 篇 institute of com...
  • 10 篇 wuhan university...
  • 10 篇 college of compu...
  • 10 篇 school of inform...
  • 9 篇 huazhong univers...
  • 9 篇 college of compu...
  • 9 篇 wuhan univ sci &...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 institutes for r...
  • 8 篇 hubei province k...
  • 8 篇 national univers...
  • 8 篇 hubei prov key l...
  • 7 篇 shandong provinc...
  • 7 篇 school of automa...
  • 7 篇 chitkara univers...
  • 7 篇 school of comput...

作者

  • 14 篇 hu rong
  • 12 篇 qian bin
  • 12 篇 shi zhongzhi
  • 9 篇 zhang tao
  • 9 篇 li peng
  • 9 篇 wang wei
  • 8 篇 liu yang
  • 8 篇 yang yang
  • 8 篇 pan linqiang
  • 8 篇 wu hongjie
  • 8 篇 wang chen
  • 8 篇 hu wei
  • 7 篇 yao wenbin
  • 7 篇 barolli leonard
  • 7 篇 xu xiaolong
  • 7 篇 chen yuehui
  • 7 篇 wang lihui
  • 7 篇 li wei
  • 7 篇 bao wenzheng
  • 6 篇 corchado juan m.

语言

  • 4,192 篇 英文
  • 52 篇 其他
  • 25 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=17th International Conference on Distributed Computing and Intelligent Technology"
4259 条 记 录,以下是3951-3960 订阅
排序:
A Weighted Moving Average-based Approach for Cleaning Sensor Data
A Weighted Moving Average-based Approach for Cleaning Sensor...
收藏 引用
international conference on distributed computing Systems
作者: Yongzhen Zhuang Lei Chen X. Sean Wang Jie Lian Hong Kong University of Science and Technology Hong Kong University of Vermont Burlington Vermont USA University of Waterloo Waterloo Canada
Nowadays, wireless sensor networks have been widely used in many monitoring applications. Due to the low quality of sensors and random effects of the environments, however, it is well known that the collected sensor d... 详细信息
来源: 评论
Utility Grid computing and Body Area Network as Enabler for Ubiquitous Rural e-Healthcare Service Provisioning
Utility Grid Computing and Body Area Network as Enabler for ...
收藏 引用
international conference on e-health Networking, Applications and Services (HealthCom)
作者: O.O. Olugbara M.O. Adigun S.O. Ojo P. Mudali Department of Computer Science University of Zululand KwaDlangezwa South Africa
Body area network (BAN) has the potential to revolutionalize healthcare management by allowing the use of innovative smart sensors for remote diagnosis, treatment and continuous monitoring of a patient's body cond... 详细信息
来源: 评论
the Ranking Peer for Hybrid Peer-to-Peer Real Time Video Streaming
The Ranking Peer for Hybrid Peer-to-Peer Real Time Video Str...
收藏 引用
international conference on Advanced Communication technology (ICACT)
作者: Ahmad Tajuddin Samsudin Nanna Suryana Herman Mat Kamil Awang Security Intelligent Application and Multimedia Program Research Division Telekom Research and Development Serdang Selangor Malaysia Faculty of Information Technology and Communication National Technical University College of Malaysia Ayer Keroh Malacca Japan
We present the design of a hybrid P2P system called BisinLUMS. In previous P2P systems, they are commonly recognized as a file sharing system that utilizes a download/upload mechanism to distribute content. In our P2P... 详细信息
来源: 评论
A Computational Framework for the Analysis of Biological Models
A Computational Framework for the Analysis of Biological Mod...
收藏 引用
Annual international conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Stefanos Konstantinos D. Petsios Dimitrios I. Fotiadis Unit of Medical Technology and Intelligent Information Systems Department of Computer Science University of Ioannina (UoI) Ioannina Greece
We present a computational framework for the visualization of large datasets produced from simulated multidimensional biological cell and tissue models. In this work we present a subsystem of a complete biological sim... 详细信息
来源: 评论
JadeEE: an Enterprise-class MAS Application Development Framework
JadeEE: an Enterprise-class MAS Application Development Fram...
收藏 引用
international conference on Computer Supported Cooperative Work in Design
作者: Chaozhen Guo Zhihong Lin College of Mathematics and Computer Science Department of Computer Science and Technology Fuzhou University Fuzhou Fujian China
this paper analyzes the architectures of JADE and J2EE: J2EE advances in developing enterprise-class applications, but it doesn't support Agent-oriented programming. JADE is suitable as a MAS development framework... 详细信息
来源: 评论
Measuring Network-Aware Worm Spreading Ability
Measuring Network-Aware Worm Spreading Ability
收藏 引用
IEEE Annual Joint conference: INFOCOM, IEEE Computer and Communications Societies
作者: Z. Chen C. Ji School of Electrical & Computer Engineering Georgia Institute of Technology Atlanta GA USA
this work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent worms that exploit such a vulnerability, and (c) defense, i.e., challen... 详细信息
来源: 评论
Learning and assessment using pervasive computing for web based engineering education
Learning and assessment using pervasive computing for web ba...
收藏 引用
7th international conference on Information technology Based Higher Education and Training
作者: Balasundaram, S. R. Ramadoss, B. Natl Inst Technol Dept Comp Applicat Tiruchirappalli India
the advances taking place in Information and Communication Technologies promise educators, administrators and learners to transform the education and training to be defined in ways previously unimaginable. Some of the... 详细信息
来源: 评论
Particle swarm approach to scheduling work-flow applications in distributed data-intensive computing environments
Particle swarm approach to scheduling work-flow applications...
收藏 引用
6th international conference on intelligent Systems Design and Applications (ISDA 2006)
作者: Liu, Hongbo Sun, Shichang Abraham, Ajith Dalian Maritime Univ Sch Comp Sci Dalian 116024 Peoples R China Dalian Univ Technol Dept Comp Sci Dalian 116023 Peoples R China Chung Ang Univ Sch Comp Sci & Engn Seoul 156756 South Korea
the scheduling problem in distributed data-intensive computing environments has been an active research topic due to immense practical applications. In this paper, we model the scheduling problem for work-Flow applica... 详细信息
来源: 评论
A graph alorithm based approach to recovery and failover in tactical MANETs
A graph alorithm based approach to recovery and failover in ...
收藏 引用
7th ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and Parallel and distributed computing/7th ACIS international Workshop on Self-Assembling Networks
作者: Watkins, Damian Scott, Craig Randle, Darryn Morgan State Univ KIMCOE Sch Engn 5200 Perring Pkwy Baltimore MD 21251 USA Smart Innovat Solut Columbia MD 21046 USA
the objective of the attack recognition effort is to develop inference and correlation technologies that can detect complex multi-stage attacks in Mobile Adhoc Networks (MANET) environments where the reliance on centr... 详细信息
来源: 评论
Data policy for intelligent systems
Data policy for intelligent systems
收藏 引用
INES 2006: 10th international conference on intelligent Engineering Systems 2006
作者: Welzer, Tatjana Hölbl, Marko Kamišalic, Aida Družovec, Marjan Brumen, Boštjan Jaakkola, Hannu University of Maribor Faculty of Electrical Engineering and Computer Science Smetanova 17 Si-2000 Maribor Slovenia Tampere University of Technology Pori Po Box 300 Fi-28101 Pori Finland
Use of data in various areas and their electronic availability has put importance of data to higher level. In many cases data come from different sources, which are distributed across enterprise and are at different q... 详细信息
来源: 评论