咨询与建议

限定检索结果

文献类型

  • 2,317 篇 会议
  • 46 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,393 篇 工学
    • 1,180 篇 计算机科学与技术...
    • 600 篇 软件工程
    • 296 篇 信息与通信工程
    • 175 篇 电气工程
    • 101 篇 控制科学与工程
    • 97 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 55 篇 机械工程
    • 41 篇 仪器科学与技术
    • 31 篇 生物工程
    • 26 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 21 篇 建筑学
    • 16 篇 环境科学与工程(可...
    • 16 篇 安全科学与工程
    • 15 篇 光学工程
    • 15 篇 土木工程
  • 357 篇 管理学
    • 290 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 327 篇 理学
    • 195 篇 数学
    • 63 篇 物理学
    • 63 篇 系统科学
    • 44 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 15 篇 化学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 23 篇 法学
    • 18 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 15 篇 医学
    • 14 篇 临床医学
  • 10 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 275 篇 peer to peer com...
  • 237 篇 distributed comp...
  • 203 篇 computer network...
  • 176 篇 wireless sensor ...
  • 132 篇 protocols
  • 131 篇 grid computing
  • 120 篇 cloud computing
  • 107 篇 computational mo...
  • 102 篇 routing
  • 91 篇 delay
  • 89 篇 computer archite...
  • 88 篇 mobile computing
  • 87 篇 servers
  • 81 篇 algorithm design...
  • 79 篇 ad hoc networks
  • 78 篇 mobile communica...
  • 77 篇 bandwidth
  • 75 篇 concurrent compu...
  • 75 篇 network topology
  • 68 篇 computer science

机构

  • 22 篇 institute of com...
  • 16 篇 institute of com...
  • 10 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 graduate univers...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 national laborat...
  • 7 篇 seikei universit...
  • 7 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 rissho universit...
  • 6 篇 national laborat...
  • 6 篇 chinese academy ...
  • 5 篇 key laboratory o...
  • 5 篇 graduate univers...
  • 4 篇 inria
  • 4 篇 department of ma...
  • 4 篇 nokia research c...

作者

  • 8 篇 kurt rothermel
  • 7 篇 zhang desheng
  • 7 篇 makoto takizawa
  • 7 篇 valentin cristea
  • 7 篇 rothermel kurt
  • 6 篇 zomaya albert y.
  • 6 篇 li jinbao
  • 6 篇 ailixier aikebai...
  • 6 篇 frank dürr
  • 5 篇 wei liu
  • 5 篇 tang tao
  • 5 篇 lin yisong
  • 5 篇 min geyong
  • 5 篇 tomoya enokido
  • 5 篇 jin hai
  • 5 篇 guo longjiang
  • 5 篇 kai xiang
  • 5 篇 jiannong cao
  • 4 篇 qishi wu
  • 4 篇 zhang lei

语言

  • 2,386 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"任意字段=2010 International Conference on Parallel and Distributed Computing and Networks, PDCN 2010"
2393 条 记 录,以下是2251-2260 订阅
排序:
FEED: Fault tolerant, energy efficient, distributed Clustering for WSN
FEED: Fault tolerant, energy efficient, distributed Clusteri...
收藏 引用
international conference on Advanced Communication Technology (ICACT)
作者: Mohammad Mehrani Jamshid Shanbehzadeh Abdolhossein Sarrafzadeh Seyed Javad Mirabedini Chris Manford Islamic Azad University Dezful Iran Department of computer Tarbiat Moalem University Tehran Iran Department of Computing UNITEC Auckland New Zealand Islamic Azad University Tehran Iran
Increasing network lifetime, scalability and load balancing are important factors for wireless sensor networks. Clustering is a useful technique through which we can effect these factors. In this paper, we propose a n... 详细信息
来源: 评论
An Overhearing-based Scheme for Improving Data Persistence in Wireless Sensor networks
An Overhearing-based Scheme for Improving Data Persistence i...
收藏 引用
IEEE international conference on Communications
作者: Junbin Liang Jianxin Wang Jianer Chen School of Computer and Electronic Information Guangxi University Nanning China School of Information Science and Engineering Central South University Changsha China Department of Computer Science College Station Texas A and M University TX USA
How to improve the data persistence, i.e., the availability of all source data, is an important issue in wireless sensor networks. The issue requires that each source node can disseminate its data (packet) to a subset... 详细信息
来源: 评论
A distributed hierarchical key management scheme for mobile Ad hoc networks
A distributed hierarchical key management scheme for mobile ...
收藏 引用
international conference on Information Networking and Automation (ICINA)
作者: Saju P John Philip Samuel Department of Computer Science Thejus Engineering College Thrissur India School of Engineering Cochin University of Science and Technology India
In MANET, when a node is compromised it tends to reveal the other node's key information and corrupts the whole network. The scalable method of cryptographic key management (SMOCK) proposes a method to deal with s... 详细信息
来源: 评论
Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor networks
Dynamic TinyOS: Modular and Transparent Incremental Code-Upd...
收藏 引用
IEEE international conference on Communications
作者: Waqaas Munawar Muhammad Hamad Alizai Olaf Landsiedel Klaus Wehrle Computer Systems and Telematics Freie Universität Berlin Germany Distributed Systems Group RWTH Aachen University Germany
Long-term deployments of sensor networks in physically inaccessible environments make remote re-programmability of sensor nodes a necessity. Ranging from full image replacement to virtual machines, a variety of mechan... 详细信息
来源: 评论
An Architecture for Distributing Scalable Content over Peer-to-Peer networks
An Architecture for Distributing Scalable Content over Peer-...
收藏 引用
international conference on Advances in Multimedia, MMEDIA
作者: Nicola Capovilla Michael Eberhard Silvano Mignanti Riccardo Petrocco Janne Vehkaperä STMicroelectronics Milan Italy Klagenfurt University Klagenfurt Austria University of Rome ‘Sapienza’ Rome Italy Technische Universiteit Delft Delft Netherlands VTT Technical Research Centre Oulu Finland
Peer-to-Peer systems are nowadays a very popular solution for multimedia distribution, as they provide significant cost benefits compared with traditional server-client distribution. Additionally, the distribution of ... 详细信息
来源: 评论
Dynamic Power Conservation Routing in MANETs: A New Approach
Dynamic Power Conservation Routing in MANETs: A New Approach
收藏 引用
international conference on Emerging Trends in Engineering and Technology, ICETET
作者: Vijay Borges Sanil Borkar Chinmay Sardesai Ankeeta Kamat Purva Kamat Department of Information Technology Goa College of Engineering Goa India Computer Engineering Goa College of Engineering Goa India
In mobile ad-hoc wireless networks (MANETs), a node is expected to forward packets from the source to the destination (on the behalf of the source), over multiple hops, for the benefit of other nodes. The residual bat... 详细信息
来源: 评论
Storage Access Optimization with Virtual Machine Migration During Execution of parallel Data Processing on a Virtual Machine PC Cluster
Storage Access Optimization with Virtual Machine Migration D...
收藏 引用
international conference on Advanced Information Networking and Applications Workshops (AINAW)
作者: Shiori Toyoshima Saneyasu Yamaguchi Masato Oguchi Ochanomizu University Bunkyo Tokyo Japan Kogakuin University Shinjuku Tokyo Japan
We have constructed a virtual machine PC cluster that uses a virtual machine as worker nodes, and proposed a method that acquires insufficient resources dynamically from cloud computing systems while basic computation... 详细信息
来源: 评论
Real-time interactive object extraction system for high resolution remote sensing images based on parallel computing architecture
Real-time interactive object extraction system for high reso...
收藏 引用
international conference on Geoinformatics
作者: Yan Li Manchun Li Feixue Li Xiaogu Sun Wei Liu School of Geographic and Oceanographic Science Nanjing University Nanjing China Department of Electronic Science and Technology University of Science and Technology Hefei China
Random Walks has less interaction, better accuracy and higher computing independency. We introduce local intensity entropy to modify the weight function in Random Walks, in order to consider not only the intensity cha... 详细信息
来源: 评论
Achieving Fair Throughput for TCP Flows in Multi-Hop Wireless Backhaul networks
Achieving Fair Throughput for TCP Flows in Multi-Hop Wireles...
收藏 引用
IEEE international conference on Communications (ICC)
作者: C.-W. Hsu T.-C. Hou Department of Electrical Engineering & Department of Communications Engineering National Chung Cheng University Chiayi Taiwan
The use of multihop wireless networks based on the 802.11 technology has been growing. The primary advantages of this approach are mature technology and ease of deployment. However, the fairness property provided by t... 详细信息
来源: 评论
Consensus in Anonymous distributed Systems: Is There a Weakest Failure Detector?
Consensus in Anonymous Distributed Systems: Is There a Weake...
收藏 引用
international conference on Advanced Information Networking and Applications (AINA)
作者: François Bonnet Michel Raynal IRISA Université de Rennes 1 Rennes France
This paper is on failure detectors to solve the consensus problem in asynchronous systems made up of anonymous processes prone to crash and connected by asynchronous reliable channels. Anonymity means that any two pro... 详细信息
来源: 评论