咨询与建议

限定检索结果

文献类型

  • 909 篇 会议
  • 16 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 929 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 451 篇 计算机科学与技术...
    • 285 篇 软件工程
    • 135 篇 信息与通信工程
    • 134 篇 控制科学与工程
    • 62 篇 电气工程
    • 54 篇 交通运输工程
    • 46 篇 安全科学与工程
    • 43 篇 生物工程
    • 32 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 27 篇 动力工程及工程热...
    • 27 篇 石油与天然气工程
    • 24 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 20 篇 仪器科学与技术
    • 18 篇 光学工程
  • 228 篇 理学
    • 139 篇 数学
    • 51 篇 生物学
    • 31 篇 物理学
    • 28 篇 系统科学
    • 28 篇 统计学(可授理学、...
    • 16 篇 化学
  • 161 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 82 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 30 篇 教育学
    • 30 篇 教育学
  • 29 篇 法学
    • 25 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 7 篇 农学
  • 4 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 36 篇 computer science
  • 26 篇 control systems
  • 21 篇 machine learning
  • 16 篇 artificial intel...
  • 13 篇 access control
  • 13 篇 reinforcement le...
  • 13 篇 computational mo...
  • 13 篇 real-time system...
  • 13 篇 costs
  • 12 篇 traffic control
  • 12 篇 bandwidth
  • 11 篇 deep learning
  • 11 篇 computer archite...
  • 11 篇 protocols
  • 10 篇 quality of servi...
  • 9 篇 automation
  • 9 篇 neural networks
  • 9 篇 hardware
  • 8 篇 mobile ad hoc ne...
  • 8 篇 computer communi...

机构

  • 7 篇 university polit...
  • 7 篇 faculty of autom...
  • 6 篇 national institu...
  • 6 篇 university polit...
  • 6 篇 computer science...
  • 5 篇 pazhou lab
  • 5 篇 chinese acad sci...
  • 4 篇 al-balqa applied...
  • 4 篇 faculty of autom...
  • 4 篇 university polit...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 guangdong univ t...
  • 3 篇 college of compu...
  • 3 篇 college of infor...
  • 3 篇 univ chinese aca...
  • 3 篇 univ jinan sch m...
  • 3 篇 department of gr...
  • 3 篇 department of co...
  • 3 篇 university polit...

作者

  • 7 篇 li hui
  • 5 篇 florea adina mag...
  • 5 篇 fagarasan ioana
  • 4 篇 adina magda flor...
  • 4 篇 min-chul lee
  • 4 篇 ghassan samara
  • 4 篇 myungjin cho
  • 4 篇 samara ghassan
  • 4 篇 mocanu stefan
  • 4 篇 liu derong
  • 4 篇 mustata alexandr...
  • 4 篇 hyun-woo kim
  • 4 篇 teng luyao
  • 4 篇 ştefan mocanu
  • 3 篇 bogdan-costel mo...
  • 3 篇 giorgian neculoi...
  • 3 篇 mihnea alexandru...
  • 3 篇 stamatescu grigo...
  • 3 篇 ding naikan
  • 3 篇 grigore stamates...

语言

  • 916 篇 英文
  • 11 篇 其他
  • 4 篇 中文
检索条件"任意字段=24th International Conference on Control Systems and Computer Science, CSCS 2023"
929 条 记 录,以下是871-880 订阅
排序:
Location management & message delivery protocol in multi-region mobile agent computing environment
Location management & message delivery protocol in multi-reg...
收藏 引用
international conference on Distributed Computing systems
作者: SungJin Choi MaengSoon Baik ChongSun Hwang Department of Computer Science & Engineering Korea University Seoul South Korea
Location management and message delivery protocol is fundamental to the further development of mobile agent systems in a multiregion mobile agent computing environment in order to control mobile agents and guarantee m... 详细信息
来源: 评论
End-to-end utilization control in distributed real-time systems
End-to-end utilization control in distributed real-time syst...
收藏 引用
international conference on Distributed Computing systems
作者: C. Lu X. Wang X. Koutsoukos Department of Computer Science and Engineering Washington University of Saint Louis Saint Louis MO USA Department of Electrical Engineering and Computer Science Vanderbilt University Nashville TN USA
An increasing number of distributed real-time systems face the critical challenge of providing end-to-end quality of service (QoS) guarantees in open and unpredictable environments. In particular, such systems often n... 详细信息
来源: 评论
Using lock-based checking protocol for efficient data broadcast in mobile environments
Using lock-based checking protocol for efficient data broadc...
收藏 引用
international conference on Distributed Computing systems Workshop
作者: A.C.S. Wong Kwok-Wa Lam K.K.M. Ho V.C.S. Lee Department of Computer Science City University of Hong Kong Hong Kong China
We address, the issue of reading the entire database by the broadcast transaction for data broadcasting in mobile environments. the broadcast transaction is a long-lived read-only transaction which creates significant... 详细信息
来源: 评论
AODV routing protocol implementation design
AODV routing protocol implementation design
收藏 引用
international conference on Distributed Computing systems Workshop
作者: I.D. Chakeres E.M. Belding-Royer Department of Electrical & Computer Engineering University of California Santa Barbara USA Department of Computer Science University of California Santa Barbara USA
To date, the majority of ad hoc routing protocol research has been done using simulation only. One of the most motivating reasons to use simulation is the difficulty of creating a real implementation. In a simulator, ... 详细信息
来源: 评论
iPass: an incentive compatible auction scheme to enable packet forwarding service in MANET
iPass: an incentive compatible auction scheme to enable pack...
收藏 引用
international conference on Distributed Computing systems
作者: K. Chen K. Nahrstedt Computer Science Department University of Illinois at Urbana-Champaign Urbana Illinois U.S.A.
In a public mobile ad hoc network (MANET), users may be selfish and refuse to forward packets for other users. therefore, an incentive mechanism must be in place. We adopt the "pay for service" model of coop... 详细信息
来源: 评论
A feasible region for meeting aperiodic end-to-end deadlines in resource pipelines
A feasible region for meeting aperiodic end-to-end deadlines...
收藏 引用
international conference on Distributed Computing systems
作者: T. Abdelzaher G. thaker P. Lardieri Department of Computer Science University of Virginia Charlottesville VA USA Advanced Technology Laboratories Inc. Cherry Hill NJ USA
this paper generalizes the notion of utilization bounds for schedulability of aperiodic tasks to the case of distributed resource systems. In the basic model, aperiodically arriving tasks are processed by multiple sta... 详细信息
来源: 评论
Incorporating timeliness in atomic write of shared data for distributed embedded systems
Incorporating timeliness in atomic write of shared data for ...
收藏 引用
international conference on Distributed Computing systems Workshop
作者: K. Ravindran A. Sabbir K.A. Kwiat Department of Computer Science City University of New York New York NY USA Information Directorate Air Force Research Laboratory Rome NY USA
In a distributed embedded system, data items may be moved from one set of functional modules to another through a common buffer that is interposed between them over a network. Here, the computation modules disseminati... 详细信息
来源: 评论
A new QoS point coordination function for multimedia wireless LANs
A new QoS point coordination function for multimedia wireles...
收藏 引用
international conference on Distributed Computing systems
作者: Zi-Tsan Chou Shih-Lin Wu Institute for Information Industry Taipei Taiwan Department of Computer Science and Information Engineering Chang Gung University Taoyuan Taiwan
We propose a new MAC protocol, named Q-PCF (quality-of-service PCF), which provides QoS guarantees to real-time multimedia applications for WLANs. Specifically, Q-PCF has the following attractive features. First, it s... 详细信息
来源: 评论
Roaming honeypots for mitigating service-level denial-of-service attacks
Roaming honeypots for mitigating service-level denial-of-ser...
收藏 引用
international conference on Distributed Computing systems
作者: S.M. Khattab C. Sangpachatanaruk D. Mosse R. Melhem T. Znati Department of Computer Science University of Pittsburgh PA USA Department of Information Science and Telecommunications University of Pittsburgh PA USA
Honeypots have been proposed to act as traps for malicious attackers. However, because of their deployment at fixed (thus detectable) locations and on machines other than the ones they are supposed to protect, honeypo... 详细信息
来源: 评论
Trust- and clustering-based authentication services in mobile ad hoc networks
Trust- and clustering-based authentication services in mobil...
收藏 引用
international conference on Distributed Computing systems Workshop
作者: E.C.H. Ngai M.R. Lyu Department of Computer Science and Engineering Chinese University of Hong Kong Sha Tin Hong Kong China
A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. these characteristics make it vulnerable to security attack, so ... 详细信息
来源: 评论