咨询与建议

限定检索结果

文献类型

  • 1,032 篇 会议
  • 19 册 图书
  • 8 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 626 篇 工学
    • 576 篇 计算机科学与技术...
    • 291 篇 软件工程
    • 229 篇 电气工程
    • 225 篇 信息与通信工程
    • 80 篇 控制科学与工程
    • 41 篇 仪器科学与技术
    • 38 篇 动力工程及工程热...
    • 37 篇 网络空间安全
    • 36 篇 交通运输工程
    • 36 篇 安全科学与工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 11 篇 生物工程
    • 7 篇 建筑学
    • 7 篇 环境科学与工程(可...
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
  • 122 篇 理学
    • 62 篇 数学
    • 36 篇 化学
    • 13 篇 系统科学
    • 12 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 6 篇 物理学
  • 111 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 军事学

主题

  • 121 篇 distributed comp...
  • 73 篇 computer science
  • 57 篇 protocols
  • 56 篇 distributed comp...
  • 55 篇 cloud computing
  • 53 篇 mobile computing
  • 49 篇 middleware
  • 47 篇 computer archite...
  • 46 篇 costs
  • 42 篇 scalability
  • 41 篇 application soft...
  • 41 篇 computer network...
  • 40 篇 computational mo...
  • 39 篇 intelligent netw...
  • 38 篇 bandwidth
  • 36 篇 real time system...
  • 35 篇 peer to peer com...
  • 33 篇 monitoring
  • 31 篇 network servers
  • 31 篇 internet

机构

  • 4 篇 university of st...
  • 4 篇 school of scienc...
  • 3 篇 college of compu...
  • 3 篇 department of co...
  • 3 篇 ibm thomas j. wa...
  • 3 篇 school of comput...
  • 3 篇 brown univ dept ...
  • 3 篇 dept. of cs geor...
  • 3 篇 department of el...
  • 3 篇 univ chicago il ...
  • 3 篇 nppd tehran
  • 3 篇 georgia institut...
  • 3 篇 institute of com...
  • 3 篇 natl univ def te...
  • 3 篇 distributed syst...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 univ nevada dept...
  • 2 篇 department of co...
  • 2 篇 the chinese univ...

作者

  • 5 篇 yi pan
  • 4 篇 uwe breitenbüche...
  • 4 篇 frank leymann
  • 3 篇 y. shibata
  • 3 篇 jianhua sun
  • 3 篇 dustdar schahram
  • 3 篇 nong xiao
  • 3 篇 hai jin
  • 3 篇 takizawa hiroyuk...
  • 3 篇 jiannong cao
  • 2 篇 j.a. stankovic
  • 2 篇 posdorfer wolf
  • 2 篇 miremadi seyed g...
  • 2 篇 datskova olga
  • 2 篇 m. ito
  • 2 篇 garcia jordi
  • 2 篇 li j
  • 2 篇 jukan admela
  • 2 篇 souissi samia
  • 2 篇 cheng yijun

语言

  • 1,059 篇 英文
检索条件"任意字段=23rd International Conference on Distributed Computing Systems Workshops"
1059 条 记 录,以下是1041-1050 订阅
排序:
ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in distributed Clusters
ClusterX: Adaptive Collaborative Scheduling of Layered User-...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Jianbo Lin Lin Yan Zhi Lin Zan Zhou Shujie Yang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
In the contemporary digital landscape, distributed Denial of Service (DDoS) attacks pose a significant threat to the availability and integrity of online services. As cloud services and network infrastructures increas... 详细信息
来源: 评论
CVchain: A Cross-Voting-Based Low Latency Parallel Chain System
CVchain: A Cross-Voting-Based Low Latency Parallel Chain Sys...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Jianrong Wang Yacong Ren Dengcheng Hu Qi Li Sen Li Xuewei Li Xiulong Liu College of Intelligence and Computing Tianjin University China School of Electrical and Information Engineering Tianjin University China School of Future Technology Tianjin University China
Despite existing parallel chain systems improving blockchain throughput by allowing concurrent blocks to be appended, challenges such as the excessive number of waiting blocks before confirmation and the inconsistency... 详细信息
来源: 评论
Guest Editorial: Cooperative Information systems in the Digital Age
收藏 引用
international Journal of Cooperative Information systems 2016年 第4期25卷
作者: Rosemann, Michael School of Information Systems Faculty of Science and Engineering Queensland University of Technology Science and Engineering Centre Brisbane QLD Australia
Cooperative information systems (CIS) are at the core of a digital economy that is dedicated to providing hyper-connected citizens with access to intuitive and sophisticated technology. No longer are commercial applic... 详细信息
来源: 评论
STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network
STGCN-Based Link Flooding Attack Detection and Mitigation in...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yue Li Runcheng Fang Qipeng Song Xilei Yang School of Cyber Engineering Xidian University Xi’an China
Link Flooding Attacks (LFA) are increasingly challenging the availability and stability of Software-Defined Networks (SDN), leveraging their distributed and covert nature to escape detection. Existing methods such as ... 详细信息
来源: 评论
A review of data security research in energy storage systems
A review of data security research in energy storage systems
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Meiqi Liu Yongqiang Chen Chaoyang Zhu Shuang Yao Jingfeng Rong Xiaolong Zhao Xijuan Si Guang Yang Yuqing Zhang College of Information Science and Engineering Yanshan University Qinhuangdao China China Electric Power Research Institute Beijing China College of Cyberspace Security Hainan University Haikou China College of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Beijing HyperStrong Technology Co. Ltd Beijing China
Energy storage is an important part of the new power system, responsible for ensuring stable power output and balancing loads. At the same time, it is also a national critical infrastructure. As the country gradually ... 详细信息
来源: 评论
Quantitative Performance Evaluation of distributed Video Coding
Quantitative Performance Evaluation of Distributed Video Cod...
收藏 引用
international conference on Inventive computing and Informatics
作者: Vijay Kumar Kodavalla Semiconductors and Systems Division Product Engineering Services Wipro Technologies
distributed Video Coding (DVC) is evolving as next generation video coding method for certain emerging applications and services including mobile video, wireless camera, wireless surveillance networks etc. On the cont... 详细信息
来源: 评论
Balansing: Fast and scalable generation of realistic signed networks  23
Balansing: Fast and scalable generation of realistic signed ...
收藏 引用
23rd international conference on Extending Database Technology, EDBT 2020
作者: Jung, Jinhong Park, Ha-Myung Kang, U. Seoul National University Korea Republic of Kookmin University Korea Republic of
How can we efficiently generate large-scale signed networks following real-world properties? Due to its rich modeling capability of representing trust relations as positive and negative edges, signed networks have spu... 详细信息
来源: 评论
Holonic Learning: A Flexible Agent-based distributed Machine Learning Framework  24
Holonic Learning: A Flexible Agent-based Distributed Machine...
收藏 引用
Proceedings of the 23rd international conference on Autonomous Agents and Multiagent systems
作者: Ahmad Esmaeili Zahra Ghorrati Eric T. Matson Purdue University West Lafayette IN USA
Ever-increasing ubiquity of data and computational resources in the last decade have propelled a notable transition in the machine learning paradigm towards more distributed approaches. Such a transition seeks to not ... 详细信息
来源: 评论
Collaborative defense as a pervasive service Architectural insights and validation methodologies of a trial deployment
Collaborative defense as a pervasive service Architectural i...
收藏 引用
international conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM)
作者: Eve M. Schooler Carl Livadas Joohwan Kim Prashant Gandhi Pablo R. Passera Jaideep Chandrashekar Steve Orrin Martin Koyabe Fadi El-Moussa Gogobada Daa Dabibi Corporate Technology Intel Corporation Santa Clara CA USA British Telecommunications Public Limited Company Centre for Information Security and Systems Research Ipswich UK
Network defense is an elusive art. The arsenal to defend our devices from attack is constantly lagging behind the latest methods used by attackers to break into them and subsequently into our networks. To counteract t... 详细信息
来源: 评论
Tibetan microblogging user data analysis and topic identification
Tibetan microblogging user data analysis and topic identific...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Guixian Xu Wenhui Gao School of Information Engineering Minzu University of China Beijing China
The digital era accelerates the construction of information technology, and the Internet penetration rate and the number of Internet users in Tibetan areas have surged, and the value of their online text data is highl... 详细信息
来源: 评论