咨询与建议

限定检索结果

文献类型

  • 2,317 篇 会议
  • 46 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,393 篇 工学
    • 1,180 篇 计算机科学与技术...
    • 600 篇 软件工程
    • 296 篇 信息与通信工程
    • 175 篇 电气工程
    • 101 篇 控制科学与工程
    • 97 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 55 篇 机械工程
    • 41 篇 仪器科学与技术
    • 31 篇 生物工程
    • 26 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 21 篇 建筑学
    • 16 篇 环境科学与工程(可...
    • 16 篇 安全科学与工程
    • 15 篇 光学工程
    • 15 篇 土木工程
  • 357 篇 管理学
    • 290 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 327 篇 理学
    • 195 篇 数学
    • 63 篇 物理学
    • 63 篇 系统科学
    • 44 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 15 篇 化学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 23 篇 法学
    • 18 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 15 篇 医学
    • 14 篇 临床医学
  • 10 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 275 篇 peer to peer com...
  • 237 篇 distributed comp...
  • 203 篇 computer network...
  • 176 篇 wireless sensor ...
  • 132 篇 protocols
  • 131 篇 grid computing
  • 120 篇 cloud computing
  • 107 篇 computational mo...
  • 102 篇 routing
  • 91 篇 delay
  • 89 篇 computer archite...
  • 88 篇 mobile computing
  • 87 篇 servers
  • 81 篇 algorithm design...
  • 79 篇 ad hoc networks
  • 78 篇 mobile communica...
  • 77 篇 bandwidth
  • 75 篇 concurrent compu...
  • 75 篇 network topology
  • 68 篇 computer science

机构

  • 22 篇 institute of com...
  • 16 篇 institute of com...
  • 10 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 graduate univers...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 national laborat...
  • 7 篇 seikei universit...
  • 7 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 rissho universit...
  • 6 篇 national laborat...
  • 6 篇 chinese academy ...
  • 5 篇 key laboratory o...
  • 5 篇 graduate univers...
  • 4 篇 inria
  • 4 篇 department of ma...
  • 4 篇 nokia research c...

作者

  • 8 篇 kurt rothermel
  • 7 篇 zhang desheng
  • 7 篇 makoto takizawa
  • 7 篇 valentin cristea
  • 7 篇 rothermel kurt
  • 6 篇 zomaya albert y.
  • 6 篇 li jinbao
  • 6 篇 ailixier aikebai...
  • 6 篇 frank dürr
  • 5 篇 wei liu
  • 5 篇 tang tao
  • 5 篇 lin yisong
  • 5 篇 min geyong
  • 5 篇 tomoya enokido
  • 5 篇 jin hai
  • 5 篇 guo longjiang
  • 5 篇 kai xiang
  • 5 篇 jiannong cao
  • 4 篇 qishi wu
  • 4 篇 zhang lei

语言

  • 2,386 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"任意字段=2010 International Conference on Parallel and Distributed Computing and Networks, PDCN 2010"
2393 条 记 录,以下是2131-2140 订阅
排序:
Grounding Mobility Research – Ideas for a Research Agenda
Grounding Mobility Research – Ideas for a Research Agenda
收藏 引用
international conference on Mobile Business and Global Mobility Roundtable (ICMB-GMR)
作者: Hans Lehmann Eusebio Scornavacca School of Information Management Victoria University of Wellington Wellington New Zealand
Research into mobile business has grown significantly over the last decade, but seemingly in a haphazard and not always rigorous fashion. This was first observed in 2003 and then borne out by an in-depth analysis of h... 详细信息
来源: 评论
The Geographic Structure Query Language Based on the Peer to Peer and Cooperating computing Hybrid Discovering Model
The Geographic Structure Query Language Based on the Peer to...
收藏 引用
international conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Z. L. Chen L. Wu Z. Xie Faculty of Information Engineering China University of Geoscience Wuhan China
The management of the magnanimous spatial data needs the distributed cooperative GIS platform. This paper proposed the Peer To Peer and Cooperating computing Hybrid Discovering Model of distributed Geospatial Informat... 详细信息
来源: 评论
Security issues in MANET: A review
Security issues in MANET: A review
收藏 引用
IFIP international conference on Wireless and Optical Communications networks (WOCN)
作者: Rashid Sheikh Mahakal Singh Chande Durgesh Kumar Mishra Acropolis Institute of Technology and Research Indore India Arjun Institute of Advanced Studies and Research Centre Indore India
Sometimes the physically distributed computing devices in a network may be interested in computing some function of their private inputs without disclosing these inputs to one another. This type of computation falls u... 详细信息
来源: 评论
A Hybrid and Secure Mechanism to Execute Parameter Survey Applications on Local and Public Cloud Resources
A Hybrid and Secure Mechanism to Execute Parameter Survey Ap...
收藏 引用
IEEE international conference on Cloud computing Technology and Science (CloudCom)
作者: Hao Sun Kento Aida Department of Information Processing Tokyo Institute of Technology Yokohama Japan Information Systems Architecture Research Division National Institute of Information Tokyo Japan
A parameter survey application (PSA) is a typical application running on high-performance computing (HPC) systems. A PSA consists of a lot of independent tasks with different input parameters that are executed in para... 详细信息
来源: 评论
Improving simulation through advanced computing techniques: Grid computing and simulation interoperability  10
Improving simulation through advanced computing techniques: ...
收藏 引用
Simulation Winter conference
作者: Simon J. E. Taylor Navonil Mustafee Shane Kite Chris Wood Stephen J. Turner Steffen Straßburger ICT Innovation Group School of Information Systems Computing and Mathematics Uxbridge UK School of Business and Economics Swansea University Swansea UK Saker Solutions Upper Courtyard Alcester UK Saker Solutions Alcester UK Swansea University School of Business and Economics Wales UK Nanyang Technological University Parallel & Distributed Computing Centre School of Computer Engineering Singapore SINGAPORE Technische Universitat Ilmenau Ilmenau Thüringen DE
Today, due to exciting developments in advanced computing techniques and technologies, many scientists can now make use of dedicated high speed networks and high performance computing. This so-called `e-Science' i... 详细信息
来源: 评论
Dual-Phase Just-in-Time Workflow Scheduling in P2P Grid Systems
Dual-Phase Just-in-Time Workflow Scheduling in P2P Grid Syst...
收藏 引用
international conference on parallel Processing (ICPP)
作者: Sheng Di Cho-Li Wang Department of Computer Science University of Hong Kong Hong Kong China
This paper presents a fully decentralized just-in-time workflow scheduling method in a P2P Grid system. The proposed solution allows each peer node to autonomously dispatch inter-dependent tasks of workflows to run on... 详细信息
来源: 评论
Sim-spm: A SimpleScalar-Based Simulator for Multi-level SPM Memory Hierarchy Architecture
Sim-spm: A SimpleScalar-Based Simulator for Multi-level SPM ...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Xiaoguang Ren Yuhua Tang Tao Tang Sen Ye Huiquan Wang Jing Zhou National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
As a fast on-chip SRAM managed by software (the application and/or compiler), Scratchpad Memory (SPM) is widely used in many fields. This paper presents a Simple Scalar-based multi-level SPM memory hierarchy architect... 详细信息
来源: 评论
D-DOG: Securing Sensitive Data in distributed Storage Space by Data Division and Out-Of-Order Keystream Generation
D-DOG: Securing Sensitive Data in Distributed Storage Space ...
收藏 引用
IEEE international conference on Communications (ICC)
作者: J. Feng Y. Chen W.-S. Ku Z. Su Department of Electrical & Computer Engineering State University of New York Binghamton Binghamton NY USA Department of Computer Science & Software Engineering Aubum University Auburn AL USA Department of Computer Science Waseda University Shinjuku Tokyo Japan
Migrating from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. Particularly it is a challenge on top of insecure networks or unreliable ... 详细信息
来源: 评论
Consistency Aware Dead Reckoning Threshold Tuning with Server Assistance in Client-Server-Based DVEs
Consistency Aware Dead Reckoning Threshold Tuning with Serve...
收藏 引用
international conference on Computer and Information Technology (CIT)
作者: Yusen Li Wentong Cai Parallel and Distributed Computing Center School of Computer Engineering Nanyang Technological University Singapore
In distributed virtual environments (DVEs), maintaining a consistent view of the virtual world among all users is a primary task. Due to the resource limitations such as network capacity and computational power, the c... 详细信息
来源: 评论
A Secure distributed Key Management Scheme for AD Hoc Network
A Secure Distributed Key Management Scheme for AD Hoc Networ...
收藏 引用
2010 IEEE international conference on Information Theory and Information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Xianping Yuan Yan Xu Hong Zhong Jia Yu Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui Univers College of Information Engineering Qingdao University Qingdao China
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b... 详细信息
来源: 评论