咨询与建议

限定检索结果

文献类型

  • 2,317 篇 会议
  • 46 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,393 篇 工学
    • 1,180 篇 计算机科学与技术...
    • 600 篇 软件工程
    • 296 篇 信息与通信工程
    • 175 篇 电气工程
    • 101 篇 控制科学与工程
    • 97 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 55 篇 机械工程
    • 41 篇 仪器科学与技术
    • 31 篇 生物工程
    • 26 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 21 篇 建筑学
    • 16 篇 环境科学与工程(可...
    • 16 篇 安全科学与工程
    • 15 篇 光学工程
    • 15 篇 土木工程
  • 357 篇 管理学
    • 290 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 327 篇 理学
    • 195 篇 数学
    • 63 篇 物理学
    • 63 篇 系统科学
    • 44 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 15 篇 化学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 23 篇 法学
    • 18 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 15 篇 医学
    • 14 篇 临床医学
  • 10 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 275 篇 peer to peer com...
  • 237 篇 distributed comp...
  • 203 篇 computer network...
  • 176 篇 wireless sensor ...
  • 132 篇 protocols
  • 131 篇 grid computing
  • 120 篇 cloud computing
  • 107 篇 computational mo...
  • 102 篇 routing
  • 91 篇 delay
  • 89 篇 computer archite...
  • 88 篇 mobile computing
  • 87 篇 servers
  • 81 篇 algorithm design...
  • 79 篇 ad hoc networks
  • 78 篇 mobile communica...
  • 77 篇 bandwidth
  • 75 篇 concurrent compu...
  • 75 篇 network topology
  • 68 篇 computer science

机构

  • 22 篇 institute of com...
  • 16 篇 institute of com...
  • 10 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 graduate univers...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 national laborat...
  • 7 篇 seikei universit...
  • 7 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 rissho universit...
  • 6 篇 national laborat...
  • 6 篇 chinese academy ...
  • 5 篇 key laboratory o...
  • 5 篇 graduate univers...
  • 4 篇 inria
  • 4 篇 department of ma...
  • 4 篇 nokia research c...

作者

  • 8 篇 kurt rothermel
  • 7 篇 zhang desheng
  • 7 篇 makoto takizawa
  • 7 篇 valentin cristea
  • 7 篇 rothermel kurt
  • 6 篇 zomaya albert y.
  • 6 篇 li jinbao
  • 6 篇 ailixier aikebai...
  • 6 篇 frank dürr
  • 5 篇 wei liu
  • 5 篇 tang tao
  • 5 篇 lin yisong
  • 5 篇 min geyong
  • 5 篇 tomoya enokido
  • 5 篇 jin hai
  • 5 篇 guo longjiang
  • 5 篇 kai xiang
  • 5 篇 jiannong cao
  • 4 篇 qishi wu
  • 4 篇 zhang lei

语言

  • 2,386 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"任意字段=2010 International Conference on Parallel and Distributed Computing and Networks, PDCN 2010"
2393 条 记 录,以下是2171-2180 订阅
排序:
Behavioural Correlation for Detecting P2P Bots
Behavioural Correlation for Detecting P2P Bots
收藏 引用
international conference on Future networks, ICFN
作者: Yousof Al-Hammadi Uwe Aickelin The Intelligent Modelling & Analysis Research (IMA) School of Computer Science and Information Technology University of Nottingham Nottingham UK
In the past few years, IRC bots, malicious programs which are remotely controlled by attackers through IRC servers, have become a major threat to the Internet and for users. These bots can be used in different malicio... 详细信息
来源: 评论
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory
Mitigating selfish misbehavior in multi-hop networks using s...
收藏 引用
conference on Local Computer networks (LCN)
作者: A. Kamhoua Charles Niki Pissinou Florida International University Miami FL US Electrical and Computer Engineering Department Florida International University Miami Florida USA
Cooperation is a critical issue in autonomous multi-hop networks due to their lack of infrastructure. Each node in the network is at the same time a terminal and a router. As such, cooperation often involves forwardin... 详细信息
来源: 评论
The effects of motion on distributed detection in mobile ad-hoc sensor networks
The effects of motion on distributed detection in mobile ad-...
收藏 引用
international conference on Information Fusion
作者: Xusheng Sun Edward J. Coyle School of Electrical and Computer Engineering Georgia Institute of Technology GA USA
A set of mobile wireless sensors observe their environment as they move about. We consider the subset of these sensors that each made observations when they were all at approximately the same time/location. As they co... 详细信息
来源: 评论
DISTRIBUTER - The distributed system for efficient execution of parallel programs
DISTRIBUTER - The distributed system for efficient execution...
收藏 引用
Proceedings of the international Convention MIPRO
作者: Domagoj Matijević Petar Taler Goran Martinović Department of Mathematics J. J. Strossmayer University of Osijek Osijek Croatia Faculty of Electrical Engineering J. J. Strossmayer University of Osijek Osijek Croatia
We developed the distributed system called “Distributer” in order to make use of millions of unused CPU cycles inside the LAN. The system is based on server-client architecture and the interaction with the system is... 详细信息
来源: 评论
An E-Ambulatory Healthcare System Using Mobile Network
An E-Ambulatory Healthcare System Using Mobile Network
收藏 引用
international conference on Information Technology: New Generations (ITNG)
作者: Afsaneh Rahbar Computer Engineering Department Islamic Azad University슠 Iran
Delivering healthcare is a large distributed process. The advent of modern IT systems and communications networks has seen an explosion in the market for systems that monitor disease and deliver healthcare services in... 详细信息
来源: 评论
Non-fragile control for a class of networked switched fuzzy time-delay systems
Non-fragile control for a class of networked switched fuzzy ...
收藏 引用
international conference on Machine Learning and Cybernetics (ICMLC)
作者: Yi Liu Li-Ying Sun Computing Center Liaoning University of Technology Jinzhou China Electric Engineering College Liaoning University of Technology Jinzhou China
The stabilization problem of a class of networked switched fuzzy time-delay systems is investigated under the assumption that the controller gain to be designed has variations, single-packet transmission, and network-... 详细信息
来源: 评论
RMADV-Hop: An Improved DV-Hop Localization Algorithm
RMADV-Hop: An Improved DV-Hop Localization Algorithm
收藏 引用
international conference on Information Technology: New Generations (ITNG)
作者: Tingting Yi Zhiyi Fang Ruixue Li Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun China
In recent years, with the development of the wireless sensor networks, the localization method receives the attention of many researchers. However, due to the network cost and characteristics of sensor nodes, most of ... 详细信息
来源: 评论
Enabling Scalable RFID Traceability networks
Enabling Scalable RFID Traceability Networks
收藏 引用
international conference on Advanced Information Networking and Applications (AINA)
作者: Quan Z. Sheng Yanbo Wu Damith Ranasinghe School of Computer Science University of Adelaide Adelaide SA Australia
The ability to track individual objects is essential to many aspects of our modern life such as product recalls and anti-counterfeiting. As a non-line-of-sight technology, radio-frequency identification (RFID) provide... 详细信息
来源: 评论
Two-layer P2P system based on location
Two-layer P2P system based on location
收藏 引用
international conference on Communication System networks and Applications (ICCSNA)
作者: Shen Xin-peng Zeng Lei-jie Zhao Xiao-nan Computer Science and Engineering College Xi''an Technological University Xi'an China College of Computer Northwestern Polytechnical University Xi'an China
Structured peer-to-peer network organize nodes into an overlay network. The distributed hash table is used to lookup the resource. In these systems, data is associated with keys and each node is responsible for a subs... 详细信息
来源: 评论
Implications of misbehaving attacks on probabilistic quorum system for MANETs
Implications of misbehaving attacks on probabilistic quorum ...
收藏 引用
international conference on Security and Cryptography (SECRYPT)
作者: Elisa Mannes Eduardo Silva Michele Nogueira Aldri Santos Department of Informatics Federal University of Paraná (UFPR) Curitiba Brazil
Reliable storage supports different data sharing services, such as mobility and cryptographic key management and distributed naming. Mobile Ad hoc networks (MANETs) present issues in guaranteeing the consistency of da... 详细信息
来源: 评论