咨询与建议

限定检索结果

文献类型

  • 2,317 篇 会议
  • 46 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,393 篇 工学
    • 1,180 篇 计算机科学与技术...
    • 600 篇 软件工程
    • 296 篇 信息与通信工程
    • 175 篇 电气工程
    • 101 篇 控制科学与工程
    • 97 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 55 篇 机械工程
    • 41 篇 仪器科学与技术
    • 31 篇 生物工程
    • 26 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 21 篇 建筑学
    • 16 篇 环境科学与工程(可...
    • 16 篇 安全科学与工程
    • 15 篇 光学工程
    • 15 篇 土木工程
  • 357 篇 管理学
    • 290 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 327 篇 理学
    • 195 篇 数学
    • 63 篇 物理学
    • 63 篇 系统科学
    • 44 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 15 篇 化学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 23 篇 法学
    • 18 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 15 篇 医学
    • 14 篇 临床医学
  • 10 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 275 篇 peer to peer com...
  • 237 篇 distributed comp...
  • 203 篇 computer network...
  • 176 篇 wireless sensor ...
  • 132 篇 protocols
  • 131 篇 grid computing
  • 120 篇 cloud computing
  • 107 篇 computational mo...
  • 102 篇 routing
  • 91 篇 delay
  • 89 篇 computer archite...
  • 88 篇 mobile computing
  • 87 篇 servers
  • 81 篇 algorithm design...
  • 79 篇 ad hoc networks
  • 78 篇 mobile communica...
  • 77 篇 bandwidth
  • 75 篇 concurrent compu...
  • 75 篇 network topology
  • 68 篇 computer science

机构

  • 22 篇 institute of com...
  • 16 篇 institute of com...
  • 10 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 graduate univers...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 national laborat...
  • 7 篇 seikei universit...
  • 7 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 rissho universit...
  • 6 篇 national laborat...
  • 6 篇 chinese academy ...
  • 5 篇 key laboratory o...
  • 5 篇 graduate univers...
  • 4 篇 inria
  • 4 篇 department of ma...
  • 4 篇 nokia research c...

作者

  • 8 篇 kurt rothermel
  • 7 篇 zhang desheng
  • 7 篇 makoto takizawa
  • 7 篇 valentin cristea
  • 7 篇 rothermel kurt
  • 6 篇 zomaya albert y.
  • 6 篇 li jinbao
  • 6 篇 ailixier aikebai...
  • 6 篇 frank dürr
  • 5 篇 wei liu
  • 5 篇 tang tao
  • 5 篇 lin yisong
  • 5 篇 min geyong
  • 5 篇 tomoya enokido
  • 5 篇 jin hai
  • 5 篇 guo longjiang
  • 5 篇 kai xiang
  • 5 篇 jiannong cao
  • 4 篇 qishi wu
  • 4 篇 zhang lei

语言

  • 2,386 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"任意字段=2010 International Conference on Parallel and Distributed Computing and Networks, PDCN 2010"
2393 条 记 录,以下是2251-2260 订阅
排序:
Prolonging network operation lifetime with new maximum battery capacity routing in wireless mesh network
Prolonging network operation lifetime with new maximum batte...
收藏 引用
international conference on Computer and Automation Engineering, ICCAE
作者: Afsane Saee Arezoomand Mohammadali Pourmina Department of Electronic and Communication Science and Research Branch Islamic Azad University Tehran Iran
The wireless mesh network is a novel wireless network architecture that supports clients to communicate with different types of networks, Internet etc. It consists of mesh routers and mesh clients. These mesh routers ... 详细信息
来源: 评论
ECC-based distributed Trust Security System for VANET
ECC-based Distributed Trust Security System for VANET
收藏 引用
2010 international conference on Computational Intelligence and Vehicular System (CIVS2010)
作者: Chao Wang,IEEE Senior Member Department of Communication Shanghai University Box 160.No.149,Yanchang Road,Shanghai P.R.China ZhenHua Zhang Department of Communication Shanghai University No.149,Yanchang Road,Shanghai P.R.China Qiang Lin Department of Communication Shanghai University No.149,Yanchang Road,Shanghai P.R.China
Vehicular networks develop rapidly,and the security attacks of VANET were *** we propose an ECC-based distributed trust security system which distributes the function of CA to some nodes in ***,a single node which man... 详细信息
来源: 评论
Content Distribution Technique with in Virtual Organization(VO) based peering CONTENT Delivery Network
Content Distribution Technique with in Virtual Organization(...
收藏 引用
international conference on Advanced Communication Technology (ICACT)
作者: Tanjil Hossain Jamil Ahmed Khan Syed Tanvir Fayez Department of Computer Science and Information Technology IUT Gazipur Bangladesh
Content Delivery Network (CDN) is a system where computers networked together across the Internet. Contents (especially large media content) are replicated from the origin server to cache servers scattered over the wo... 详细信息
来源: 评论
Hierarchical Bidirectional Chord
Hierarchical Bidirectional Chord
收藏 引用
international conference on Educational and Information Technology (ICEIT)
作者: Minghui Ji School of Communication and Information Engineering Beijing University of Posts and Telecommunications Beijing China
In peer-to-peer (P2P) networks, how to effective locate data on distributed hash tables is challenging and has attracted much research attention in recent years. Two measurements are usually considered when discussing... 详细信息
来源: 评论
Criticality-driven QoS adaptive dynamic resource management for distributed and embedded safety & mission critical systems
Criticality-driven QoS adaptive dynamic resource management ...
收藏 引用
international conference on New Trends in Information and Service Science, NISS
作者: Yi Zhang Wan-dong Cai School of Computer Science and Technology Northwestern Polytechnical University Xi'an Shaanxi China
distributed and embedded safety & mission critical systems (DESMCS) execute in open environments which have different dependability requirements. This paper presents a novel criticality-driven QoS adaptive dynamic... 详细信息
来源: 评论
Effective acquaintance management for Collaborative Intrusion Detection networks
Effective acquaintance management for Collaborative Intrusio...
收藏 引用
international conference on Network and Service Management
作者: Carol J Fung Jie Zhang Raouf Boutaba School of Computer Science University of Waterloo Canada School of Computer Engineering Nanyang Technological University Singapore
An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions about intrusions, to enhance the overall accur... 详细信息
来源: 评论
Pricing and distributed Power Control for Relay networks
Pricing and Distributed Power Control for Relay Networks
收藏 引用
IEEE international conference on Communications (ICC)
作者: S. Ren M. van der Schaar Electrical Engineering Department University of California Los Angeles CA USA
In this paper, we consider a wireless amplify-and- forward relay network with one relay node and multiple source-destination pairs/users and propose a compensation framework such that the relay has incentives to forwa... 详细信息
来源: 评论
Gossip-based supervision for wireless autonomic networks and services
Gossip-based supervision for wireless autonomic networks and...
收藏 引用
international conference on Emerging Technologies, ICET
作者: Fiaz Gul Khan Moiso Corrado Bartolomeo Montrucchio Aamir Saeed Department of Control and Computer Engineering Politecnico di Torino Turin Italy Telecom Italia Research Laboratories Laboratory Turin Italy COMSATS Institute of Information Technology - Attock Campus Attock Punjab PK
Free riding is among the fundamental issue that P2P systems are facing. Large populations, high turnover, asymmetry of interest, collusion, zero-cost identities, and traitors; makes this issue further challenging. To ... 详细信息
来源: 评论
Resilient Suppressor Mechanism against Illegal Content Redistribution on Peer-to-Peer Video Sharing networks
Resilient Suppressor Mechanism against Illegal Content Redis...
收藏 引用
IEEE international conference on Communications (ICC)
作者: Y. Kawahara L. Wang T. Asami Graduate School of Information Science and Technology University of Tokyo Bunkyo Tokyo Japan
This paper presents a simple but resilient method to suppress copyright violations among the content uploaded onto peer-to-peer (P2P) video sharing services, and is especially designed for consumer generated media (CG... 详细信息
来源: 评论
Empirical evaluation of data transformations for network infrastructure applications
Empirical evaluation of data transformations for network inf...
收藏 引用
international conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS)
作者: Damon Fenacci Björn Franke Institute of Computing Systems Architecture School of Information University of Edinburgh UK
It is estimated that the amount of data coming out of an optical fibre is doubling every nine months and, thus, the growth rate in network bandwidth by far exceeds that of transistor density stated by Moore's law.... 详细信息
来源: 评论