咨询与建议

限定检索结果

文献类型

  • 2,317 篇 会议
  • 46 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,393 篇 工学
    • 1,180 篇 计算机科学与技术...
    • 600 篇 软件工程
    • 296 篇 信息与通信工程
    • 175 篇 电气工程
    • 101 篇 控制科学与工程
    • 97 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 55 篇 机械工程
    • 41 篇 仪器科学与技术
    • 31 篇 生物工程
    • 26 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 21 篇 建筑学
    • 16 篇 环境科学与工程(可...
    • 16 篇 安全科学与工程
    • 15 篇 光学工程
    • 15 篇 土木工程
  • 357 篇 管理学
    • 290 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 327 篇 理学
    • 195 篇 数学
    • 63 篇 物理学
    • 63 篇 系统科学
    • 44 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 15 篇 化学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 23 篇 法学
    • 18 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 15 篇 医学
    • 14 篇 临床医学
  • 10 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 275 篇 peer to peer com...
  • 237 篇 distributed comp...
  • 203 篇 computer network...
  • 176 篇 wireless sensor ...
  • 132 篇 protocols
  • 131 篇 grid computing
  • 120 篇 cloud computing
  • 107 篇 computational mo...
  • 102 篇 routing
  • 91 篇 delay
  • 89 篇 computer archite...
  • 88 篇 mobile computing
  • 87 篇 servers
  • 81 篇 algorithm design...
  • 79 篇 ad hoc networks
  • 78 篇 mobile communica...
  • 77 篇 bandwidth
  • 75 篇 concurrent compu...
  • 75 篇 network topology
  • 68 篇 computer science

机构

  • 22 篇 institute of com...
  • 16 篇 institute of com...
  • 10 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 graduate univers...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 national laborat...
  • 7 篇 seikei universit...
  • 7 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 rissho universit...
  • 6 篇 national laborat...
  • 6 篇 chinese academy ...
  • 5 篇 key laboratory o...
  • 5 篇 graduate univers...
  • 4 篇 inria
  • 4 篇 department of ma...
  • 4 篇 nokia research c...

作者

  • 8 篇 kurt rothermel
  • 7 篇 zhang desheng
  • 7 篇 makoto takizawa
  • 7 篇 valentin cristea
  • 7 篇 rothermel kurt
  • 6 篇 zomaya albert y.
  • 6 篇 li jinbao
  • 6 篇 ailixier aikebai...
  • 6 篇 frank dürr
  • 5 篇 wei liu
  • 5 篇 tang tao
  • 5 篇 lin yisong
  • 5 篇 min geyong
  • 5 篇 tomoya enokido
  • 5 篇 jin hai
  • 5 篇 guo longjiang
  • 5 篇 kai xiang
  • 5 篇 jiannong cao
  • 4 篇 qishi wu
  • 4 篇 zhang lei

语言

  • 2,386 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"任意字段=2010 International Conference on Parallel and Distributed Computing and Networks, PDCN 2010"
2393 条 记 录,以下是111-120 订阅
排序:
A high-level interpreted MPI library for parallel computing in volunteer environments  10
A high-level interpreted MPI library for parallel computing ...
收藏 引用
10th IEEE/ACM international Symposium on Cluster, Cloud, and Grid computing, CCGrid 2010
作者: LeBlanc, Troy P. Subhlok, Jaspal Gabriel, Edgar Department of Computer Science University of Houston Houston TX 77204 United States
Idle desktops have been successfully used to run sequential and master-slave task parallel codes on a large scale in the context of volunteer computing. However, execution of message passing parallel programs in such ... 详细信息
来源: 评论
Communicating While computing [distributed mobile cloud computing over 5G heterogeneous networks]
收藏 引用
IEEE SIGNAL PROCESSING MAGAZINE 2014年 第6期31卷 45-55页
作者: Barbarossa, Sergio Sardellitti, Stefania Di Lorenzo, Paolo Univ Roma La Sapienza Rome Italy IEEE New York NY USA
Current estimates of mobile data traffic in the years to come foresee a 1,000 increase of mobile data traffic in 2020 with respect to 2010, or, equivalently, a doubling of mobile data traffic every year. This unpreced... 详细信息
来源: 评论
A cooperative intrusion detection system framework for cloud computing networks
A cooperative intrusion detection system framework for cloud...
收藏 引用
international Workshop on Scheduling and Resource Management for parallel and distributed Systems
作者: Lo, Chi-Chun Huang, Chun-Chieh Ku, Joy Institute of Information Management National Chiao Tung University Hsinchu Taiwan
Cloud computing provides a framework for supporting end users easily attaching powerful services and applications through Internet. To provide secure and reliable services in cloud computing environment is an importan... 详细信息
来源: 评论
Efficient Strategies for Many-task Frequent Pattern Mining in Cloud computing Environments
Efficient Strategies for Many-task Frequent Pattern Mining i...
收藏 引用
IEEE international conference on Systems, Man and Cybernetics
作者: Lin, Kawuu W. Luo, Yu-Chin Natl Kaohsiung Univ Appl Sci Dept Comp Sci & Informat Engn Kaohsiung 807 Taiwan
The goal of data mining is to discover the hidden useful information from large databases. Mining frequent patterns from transaction databases is an important problem in data mining field. As the size of database incr... 详细信息
来源: 评论
VON/KVM: A high performance virtual overlay network integrated with KVM
VON/KVM: A high performance virtual overlay network integrat...
收藏 引用
2010 international conference on Apperceiving computing and Intelligence Analysis, ICACIA 2010
作者: Tang, Yuan Li, Jian-Ping School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China International Centre for Wavelet Analysis and Its Applications Logistical Engineering University Chongqing 400016 China
The virtual computing environments integrated with virtual machines (VMs) and virtual overlay ne tworks play an important role in distributed computing and cloud computing. Overlay network with a layer 2 abstraction p... 详细信息
来源: 评论
Rupeas: Ruby powered event analysis DSL
Rupeas: Ruby powered event analysis DSL
收藏 引用
international conference on Networked Sensing Systems
作者: Woehrle, Matthias Plessl, Christian Thiele, Lothar Computer Engineering and Networks Lab ETH Zurich Switzerland Paderborn Center for Parallel Computing University of Paderborn Germany
Wireless Sensor networks (WSNs) are unique embedded computer systems for distributed sensing of a dispersed phenomenon. As WSNs are deployed in remote locations for longterm unattended operation, assurance of correct ... 详细信息
来源: 评论
parallel sorting on Recursive Dual-Nets
Parallel sorting on Recursive Dual-Nets
收藏 引用
11th international conference on parallel and distributed computing, Applications and Technologies, PDCAT 2010
作者: Li, Yamin Peng, Shietung Chu, Wanming Department of Computer Science Hosei University Tokyo 184-8584 Japan Department of Computer Hardware University of Aizu Aizu-Wakamatsu 965-8580 Japan
In this paper, we propose an algorithm for parallel sorting on Recursive Dual-Net with an m-cube (Qm) as its base network. The Recursive Dual-Net RDNκ(Qm) for k > 0 has 2 2κm+2κ-1 nodes and m+ κ links per node.... 详细信息
来源: 评论
High resolution program flow visualization of hardware accelerated hybrid multi-core applications  10
High resolution program flow visualization of hardware accel...
收藏 引用
10th IEEE/ACM international Symposium on Cluster, Cloud, and Grid computing, CCGrid 2010
作者: Hackenberg, Daniel Juckeland, Guido Brunst, Holger Technische Universität Dresden 01062 Dresden Germany
The advent of multi-core processors has made parallel computing techniques mandatory on main stream systems. With the recent rise of hardware accelerators, hybrid parallelism adds yet another dimension of complexity t... 详细信息
来源: 评论
An algorithm to construct FP-Tree on VODCA
An algorithm to construct FP-Tree on VODCA
收藏 引用
2010 international conference on Intelligent Computation Technology and Automation, ICICTA 2010
作者: Tong, Yongmu Zheng, Xiaoyan Tianjin University of Technology and Education Tianjin 300222 China
To construct FP-Tree in mining frequent pattern, we propose a parallel algorithm CFPV (Construct FP-Tree on VODCA) for construct FP-Tree. This method is based on a new parallel computing environment on the distributed... 详细信息
来源: 评论
A robust and fault-tolerant distributed intrusion detection system
A robust and fault-tolerant distributed intrusion detection ...
收藏 引用
international conference on parallel distributed and Grid computing
作者: Sen, Jaydip Innovation Lab. Tata Consultancy Services Ltd. Kolkata India
Since it is impossible to predict and identify all the vulnerabilities of a network, and penetration into a system by malicious intruders cannot always be prevented, intrusion detection systems (IDSs) are essential en... 详细信息
来源: 评论