咨询与建议

限定检索结果

文献类型

  • 2,317 篇 会议
  • 46 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,393 篇 工学
    • 1,180 篇 计算机科学与技术...
    • 600 篇 软件工程
    • 296 篇 信息与通信工程
    • 175 篇 电气工程
    • 101 篇 控制科学与工程
    • 97 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 55 篇 机械工程
    • 41 篇 仪器科学与技术
    • 31 篇 生物工程
    • 26 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 21 篇 建筑学
    • 16 篇 环境科学与工程(可...
    • 16 篇 安全科学与工程
    • 15 篇 光学工程
    • 15 篇 土木工程
  • 357 篇 管理学
    • 290 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 327 篇 理学
    • 195 篇 数学
    • 63 篇 物理学
    • 63 篇 系统科学
    • 44 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 15 篇 化学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 23 篇 法学
    • 18 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 15 篇 医学
    • 14 篇 临床医学
  • 10 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 275 篇 peer to peer com...
  • 237 篇 distributed comp...
  • 203 篇 computer network...
  • 176 篇 wireless sensor ...
  • 132 篇 protocols
  • 131 篇 grid computing
  • 120 篇 cloud computing
  • 107 篇 computational mo...
  • 102 篇 routing
  • 91 篇 delay
  • 89 篇 computer archite...
  • 88 篇 mobile computing
  • 87 篇 servers
  • 81 篇 algorithm design...
  • 79 篇 ad hoc networks
  • 78 篇 mobile communica...
  • 77 篇 bandwidth
  • 75 篇 concurrent compu...
  • 75 篇 network topology
  • 68 篇 computer science

机构

  • 22 篇 institute of com...
  • 16 篇 institute of com...
  • 10 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 graduate univers...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 national laborat...
  • 7 篇 seikei universit...
  • 7 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 rissho universit...
  • 6 篇 national laborat...
  • 6 篇 chinese academy ...
  • 5 篇 key laboratory o...
  • 5 篇 graduate univers...
  • 4 篇 inria
  • 4 篇 department of ma...
  • 4 篇 nokia research c...

作者

  • 8 篇 kurt rothermel
  • 7 篇 zhang desheng
  • 7 篇 makoto takizawa
  • 7 篇 valentin cristea
  • 7 篇 rothermel kurt
  • 6 篇 zomaya albert y.
  • 6 篇 li jinbao
  • 6 篇 ailixier aikebai...
  • 6 篇 frank dürr
  • 5 篇 wei liu
  • 5 篇 tang tao
  • 5 篇 lin yisong
  • 5 篇 min geyong
  • 5 篇 tomoya enokido
  • 5 篇 jin hai
  • 5 篇 guo longjiang
  • 5 篇 kai xiang
  • 5 篇 jiannong cao
  • 4 篇 qishi wu
  • 4 篇 zhang lei

语言

  • 2,386 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"任意字段=2010 International Conference on Parallel and Distributed Computing and Networks, PDCN 2010"
2393 条 记 录,以下是2241-2250 订阅
排序:
A Deep Learning-based Innovative Approach for Enhancing the Precision of Tool Wear Prediction  8
A Deep Learning-based Innovative Approach for Enhancing the ...
收藏 引用
8th international conference on Communication and Electronics Systems, ICCES 2023
作者: Vinod, D. Syed, Karimulla Sampath Kumar, S. Babu, B. Sankara Pandey, Shatrudhan Loganathan, Raja Velur Srm Institute of Science and Technology School of Computing College of Engineering and Technology Department of Computing Technologies SRM Nagar Kattankulathur Chennai India Koneru Lakshmaiah Education Foundation 522501 India Sri Eshwar College of Engineering Computer Science and Engineering Coimbatore India Department of Cse Telangana Bachupally India Birla Institute of Technology Department of Production and Industrial Engineering Mesra Ranchi835215 India Loyola Institute of Technology Department of Mechanical Engineering Chennai India
Throughout the cutting operation, among the most crucial steps is that has a direct impact on machining accuracy and product quality is tool wear. If you can accurately forecast how quickly tools will wear out, you ca... 详细信息
来源: 评论
A Promotion Mechanism for Scalable Stealth DHT
A Promotion Mechanism for Scalable Stealth DHT
收藏 引用
international conference on Internet and Web Applications and Services (ICIW)
作者: Idris A. Rai Department of Networks Makerere University Kampala Uganda
Most distributed Hash Tables (DHTs) inherently assume interconnecting nodes with homogeneous capabilities. Realistically however, capabilities of nodes on a network widely vary, leading traditional DHTs to inevitably ... 详细信息
来源: 评论
Fairness-oriented Overlay VPN topology construction
Fairness-oriented Overlay VPN topology construction
收藏 引用
international conference on Telecommunications (ICT)
作者: A. Detti A. Caricato G. Bianchi Electronic Engineering Department University of Roma Tor Vergata Italy
An important issue in dynamically constructed Virtual Private networks (VPN) is how the overlay topology is created and maintained. Classical VPN topologies, such as hub-and-spoke or full-mesh, fail to remain convenie... 详细信息
来源: 评论
Cooperative Routing Approach for ISP-Provided Content Delivery Service Using Hierarchical DHT
Cooperative Routing Approach for ISP-Provided Content Delive...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Kyounghee Jung Dohyun Kim Younghee Lee Division of Media Technology Media Business Center KT Corporation South Korea Department of Information and Communication Engineering KAIST South Korea Department of Computer Science KAIST South Korea
This paper suggests ISP-provided content delivery service that provides fine-grained locality and exploits network status in content routing to overcome the dilemma from current content delivery technology like P2P. H... 详细信息
来源: 评论
Towards Plugging Privacy Leaks in the Domain Name System
Towards Plugging Privacy Leaks in the Domain Name System
收藏 引用
international conference on Peer-to-Peer computing
作者: Y. Lu G. Tsudik Computer Science Department University of California Irvine USA
Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals -- to one or more DNS servers -- the origin and the target of that query... 详细信息
来源: 评论
A Trust Modeling Framework for Message Propagation and Evaluation in VANETs
A Trust Modeling Framework for Message Propagation and Evalu...
收藏 引用
international conference on Information Technology Convergence and Services (ITCS)
作者: Chen Chen Jie Zhang Robin Cohen Pin-Han Ho David R. Cheriton School of Computer Science University of Waterloo Canada School of Computer Engineering Nanyang Technological University Singapore Department of Electrical and Computer Engineering University of Waterloo Canada
In this paper, we present a trust-based message propagation and evaluation framework in vehicular ad-hoc networks where peers share information regarding road condition or safety and others provide opinions about whet... 详细信息
来源: 评论
Optimization and Implementation of LBM Benchmark on Multithreaded GPU
Optimization and Implementation of LBM Benchmark on Multithr...
收藏 引用
international conference on Data Storage and Data Engineering (DSDE)
作者: Xiaoguang Ren Yuhua Tang Guibin Wang Tao Tang Xudong Fang National Laboratory of Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
With fast development of transistor technology, Graphic Processing Unit(GPU) is increasingly used in the non-graphics applications, and major GPU hardware vendors have introduced software stacks for their own GPUs, su... 详细信息
来源: 评论
Opportunistic Relaying for Multi-Antenna Cooperative Decode-And-Forward Relay networks
Opportunistic Relaying for Multi-Antenna Cooperative Decode-...
收藏 引用
IEEE international conference on Communications (ICC)
作者: W. Zeng C. Xiao Y. Wang J. Lu State Key Laboratory on Microwave and Digital Communications Tsinghua National Laboratory of Information Science and Technology Department of Electronic Engineering Tsinghua University Beijing China Department of Electrical & Computer Engineering Missouri University of Science and Technology MO USA
In this paper, we investigate the relaying scheme for multi-antenna cooperative networks without channel state information at the transmitters. It is shown that the classic opportunistic relaying scheme, which allows ... 详细信息
来源: 评论
Orthogonal vector based network coding against pollution attacks in n-layer combination networks
Orthogonal vector based network coding against pollution att...
收藏 引用
international conference on Communications and Networking in China (CHINACOM)
作者: Bin Dai Shijun Zhang Yipeng Qu Jun Yang Furong Wang Department of Electronic and Information Huazhong University of Science and Technology Wuhan Hubei China
It is proved that combination networks can achieve unbounded network coding gain measured by the ratio of network throughput with network coding to that without network coding in peer-to-peer file sharing system. On t... 详细信息
来源: 评论
Attacker Detection Game in Wireless networks with Channel Uncertainty
Attacker Detection Game in Wireless Networks with Channel Un...
收藏 引用
IEEE international conference on Communications (ICC)
作者: W. Wang M. Chatterjee K. Kwiat Electrical Engineering and Computer Science University of Central Florida Orlando FL USA Air Force Research Laboratory Rome NY USA
Identification and isolation of attackers in a distributed system is a challenging problem. This problem is even more aggravated in a wireless network because the unreliable channel makes the actions of the users (nod... 详细信息
来源: 评论