咨询与建议

限定检索结果

文献类型

  • 4,147 篇 会议
  • 63 册 图书
  • 37 篇 期刊文献

馆藏范围

  • 4,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,027 篇 工学
    • 2,558 篇 计算机科学与技术...
    • 1,586 篇 软件工程
    • 631 篇 信息与通信工程
    • 504 篇 电气工程
    • 427 篇 控制科学与工程
    • 207 篇 生物工程
    • 162 篇 机械工程
    • 148 篇 生物医学工程(可授...
    • 142 篇 交通运输工程
    • 133 篇 动力工程及工程热...
    • 113 篇 电子科学与技术(可...
    • 97 篇 仪器科学与技术
    • 85 篇 安全科学与工程
    • 84 篇 建筑学
    • 82 篇 化学工程与技术
    • 68 篇 光学工程
    • 60 篇 土木工程
  • 903 篇 理学
    • 534 篇 数学
    • 219 篇 生物学
    • 142 篇 统计学(可授理学、...
    • 140 篇 物理学
    • 110 篇 系统科学
    • 98 篇 化学
  • 711 篇 管理学
    • 485 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
    • 242 篇 工商管理
  • 115 篇 法学
    • 68 篇 社会学
  • 111 篇 医学
    • 98 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 78 篇 经济学
    • 78 篇 应用经济学
  • 61 篇 教育学
  • 43 篇 农学
  • 9 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 205 篇 cloud computing
  • 149 篇 distributed comp...
  • 117 篇 blockchain
  • 107 篇 internet of thin...
  • 101 篇 intelligent netw...
  • 95 篇 computational mo...
  • 94 篇 artificial intel...
  • 90 篇 edge computing
  • 86 篇 computer archite...
  • 73 篇 distributed data...
  • 71 篇 big data
  • 69 篇 servers
  • 62 篇 monitoring
  • 59 篇 wireless sensor ...
  • 54 篇 data models
  • 53 篇 intelligent syst...
  • 52 篇 data mining
  • 51 篇 protocols
  • 50 篇 computer network...
  • 48 篇 security

机构

  • 18 篇 university of ch...
  • 15 篇 key laboratory o...
  • 11 篇 state key labora...
  • 11 篇 institute of com...
  • 10 篇 wuhan university...
  • 10 篇 college of compu...
  • 10 篇 school of inform...
  • 9 篇 huazhong univers...
  • 9 篇 college of compu...
  • 9 篇 wuhan univ sci &...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 institutes for r...
  • 8 篇 hubei province k...
  • 8 篇 national univers...
  • 8 篇 hubei prov key l...
  • 7 篇 shandong provinc...
  • 7 篇 school of automa...
  • 7 篇 chitkara univers...
  • 7 篇 school of comput...

作者

  • 14 篇 hu rong
  • 12 篇 qian bin
  • 12 篇 shi zhongzhi
  • 9 篇 zhang tao
  • 9 篇 li peng
  • 9 篇 wang wei
  • 8 篇 liu yang
  • 8 篇 yang yang
  • 8 篇 pan linqiang
  • 8 篇 wu hongjie
  • 8 篇 wang chen
  • 8 篇 hu wei
  • 7 篇 yao wenbin
  • 7 篇 barolli leonard
  • 7 篇 xu xiaolong
  • 7 篇 chen yuehui
  • 7 篇 wang lihui
  • 7 篇 xin wang
  • 7 篇 li wei
  • 7 篇 bao wenzheng

语言

  • 4,185 篇 英文
  • 47 篇 其他
  • 30 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=17th International Conference on Distributed Computing and Intelligent Technology"
4247 条 记 录,以下是61-70 订阅
排序:
Digital Twin-based Dynamic Resource Provisioning Using Deep Q-Network on 6G-enabled Mobile Edge Networks
Digital Twin-based Dynamic Resource Provisioning Using Deep ...
收藏 引用
international Communication Systems and Networks and Workshops, COMSNETS
作者: Suja A. Alex Neha Singh Mainak Adhikari Department of Information Technology St. Xavier’s Catholic College of Engineering Nagercoil India Department of Computer Science Indian Institute of Information Technology Lucknow Lucknow India School of Data Science Indian Institute of Science Education and Research Thiruvananthapuram Thiruvananthapuram India
the advancement of Digital Twin (DT) technology has enabled the creation of digital replicas of physical entitics, significantly enhancing the functionality and performance of mobile networks. However, this innovative... 详细信息
来源: 评论
ZTAAC : Zero Trust Adaptive Authorization with CP-ABE for Context-Aware Data Protection
ZTAAC : Zero Trust Adaptive Authorization with CP-ABE for Co...
收藏 引用
international Communication Systems and Networks and Workshops, COMSNETS
作者: Kasturi Routray Padmalochan Bera Indian Institute of Technology Bhubaneswar India
In modern dynamic and distributed computing environments, secure and adaptive access control for sensitive data is essential. Traditional access control models often fail to address the complexities of evolving and he... 详细信息
来源: 评论
Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology  18th
Dynamic Staleness Control for Asynchronous Federated Learni...
收藏 引用
18th international conference on Wireless Artificial intelligent computing Systems and Applications, WASA 2024
作者: Ma, Qianpiao Liu, Jianchun Jia, Qingmin Zhou, Xiaomao Hu, Yujiao Xie, Renchao Purple Mountain Laboratories Jiangsu Nanjing China School of Computer Science and Technology University of Science and Technology of China Anhui Hefei China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Decentralized federated learning (DFL) has emerged as a promising paradigm for distributed machine learning over edge nodes (i.e., workers) without relying on a centralized parameter server. Most existing DFL research... 详细信息
来源: 评论
Achieving time-critical control in Edge Robotics Systems over 5G
Achieving time-critical control in Edge Robotics Systems ove...
收藏 引用
international Communication Systems and Networks and Workshops, COMSNETS
作者: Amit Baxi Vincent Mageshkumar Girish S Murthy Arvind Merwaday Arvind Raju Gowtham Hosamane Sugnan Prabhu Venkat Natarajan Susruth Sudhakaran Dave Cavalcanti Atul N Hatalkar Christian Maciocco Ravishankar Iyer Rath Vannithamby Intel Technology India Private Limited Bangalore India Intel Corporation Hillsboro OR USA
In this paper, we present the challenges and solutions to achieve time-critical robot control in an Edge computing System, when the sensing-computing-control functions are distributed and connected over a 5G network. ... 详细信息
来源: 评论
Attend, Distill, Detect: Attention-Aware Entropy Distillation for Anomaly Detection  27th
Attend, Distill, Detect: Attention-Aware Entropy Distillatio...
收藏 引用
27th international conference on Pattern Recognition, ICPR 2024
作者: Jena, Sushovan Saini, Vishwas Shaw, Ujjwal Jain, Pavitra Raihal, Abhay Singh Banerjee, Anoushka Joshi, Sharad Ganesh, Ananth Bhavsar, Arnav School of Computing and Electrical Engineering Indian Institute of Technology Mandi Himachal Pradesh Mandi175005 India R&D Center Hitachi India Pvt. Ltd. Bengaluru560055 India
Unsupervised anomaly detection encompasses diverse applications in industrial settings where a high-throughput and precision is imperative. Early works were centered around one-class-one-model paradigm, which poses si... 详细信息
来源: 评论
Scaling-Up Jenkins with a Single Node Instance in DevOps  12th
Scaling-Up Jenkins with a Single Node Instance in DevOps
收藏 引用
12th international conference on Frontiers of intelligent computing: theory and Applications, FICTA 2024
作者: Jagannadha Rao, D.B. Harinatha Reddy, Yanamala Polepally, Vijayakumar Malla Reddy University Hyderabad India Research Schalar Department of CSE Malla Reddy University Hyderabad India Kakatiya Institute of Technology &Science Warangal India
DevOps is a set of procedures and instruments that streamlines and automates IT operations (Ops) and software development (Dev) tasks in order to accelerate and enhance the systems development life cycle. the goal of ... 详细信息
来源: 评论
Hybrid Sine-Cosine Chimp Optimization of Adaptive distributed Denial-of-Service Detection and Classification for Blockchain  12th
Hybrid Sine-Cosine Chimp Optimization of Adaptive Distribute...
收藏 引用
12th international conference on Frontiers of intelligent computing: theory and Applications, FICTA 2024
作者: Mrunalini, G. Vijaya Babu, K. Kesava Reddy, V. Sudha Pavani, K. Ranjith, Jinugu Uday Kishore, G. CMR Engineering College Telangana Hyderabad India Department of Computer Science and Engineering CMR Engineering College Telangana Hyderabad India Department of Humanities & Science CMR Technical Campus Telangana Hyderabad India CMR Technical Campus Telangana Hyderabad India Department of Computer Science and Engineering CMR College of Engineering & Technology Telangana Hyderabad India
Because of its decentralized, transparent, and secure characteristics, blockchain technology is becoming more and more popular. therefore, it is imperative to make sure that it is resilient to network threat, particul... 详细信息
来源: 评论
A Meta-reinforcement Learning Framework for Adaptive Quadrotor UAV Attitude Control  25th
A Meta-reinforcement Learning Framework for Adaptive Quadro...
收藏 引用
25th international conference on Parallel and distributed computing, Applications and Technologies, PDCAT 2024
作者: Zhao, Kaidong Li, Yanjie Liu, Zihan Guangdong Key Laboratory of Intelligent Morphing Mechanisms and Adaptive Robotics Shenzhen China School of Mechanical Engineering and Automation The Harbin Institute of Technology Shenzhen Shenzhen518055 China
this paper presents a meta-reinforcement learning approach for quadrotor UAV attitude control, addressing the limitations of traditional control methods in complex, dynamic, and uncertain environments. Our method inte... 详细信息
来源: 评论
distributed Event-Triggering Secondary Frequency Control of Islanded Microgrids Under DoS Attacks  8th
Distributed Event-Triggering Secondary Frequency Control of...
收藏 引用
8th international conference on Life System Modeling and Simulation, LSMS 2024 and 8th international conference on intelligent computing for Sustainable Energy and Environment, ICSEE 2024
作者: Zhou, Lihua Zhang, Changda Du, Dajun Fei, Minrui Shanghai Key Laboratory of Power Station Automation Technology School of Mechatronic Engineering and Automation Shanghai University Shanghai China School of Electrical Engineering Hebei University of Science and Technology Hebei China
High reliability and efficiency of microgrids are being threatened by cyber attacks. this paper investigates a Secondary Frequency Control Scheme (SFCS) for an islanded microgrid with Event-Triggering Mechanism (ETM) ... 详细信息
来源: 评论
Intrusion Detection at the Edge computing: A Deep Learning Approach Using the UNSW-NB15 Dataset
Intrusion Detection at the Edge Computing: A Deep Learning A...
收藏 引用
international conference on Communication Systems and Network Technologies (CSNT)
作者: Vipin Kumar Vivek Kumar Abhay Pratap Singh Bhadauria Jay Dixit Amit Kumar Department of Computer Science Gurukula Kangri (Deemed to be University) Haridwar India Department of Computer Engineering & Applications GLA University Mathura Department of Computer Engineering & Applications GLA University Mathura UP
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci... 详细信息
来源: 评论