咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 6 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 279 篇 工学
    • 256 篇 计算机科学与技术...
    • 160 篇 软件工程
    • 77 篇 信息与通信工程
    • 30 篇 电气工程
    • 24 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 建筑学
    • 6 篇 环境科学与工程(可...
  • 72 篇 理学
    • 34 篇 数学
    • 19 篇 生物学
    • 11 篇 系统科学
    • 10 篇 大气科学
    • 9 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 化学
  • 59 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 19 篇 法学
    • 16 篇 法学
  • 11 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 57 篇 cloud computing
  • 45 篇 internet of thin...
  • 31 篇 internet
  • 21 篇 distributed comp...
  • 15 篇 grid computing
  • 13 篇 computer archite...
  • 13 篇 blockchain
  • 12 篇 distributed comp...
  • 10 篇 big data
  • 10 篇 servers
  • 10 篇 protocols
  • 10 篇 computer network...
  • 9 篇 peer to peer com...
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 security
  • 9 篇 fog computing
  • 8 篇 scalability
  • 8 篇 wireless sensor ...
  • 8 篇 denial-of-servic...

机构

  • 6 篇 hainan universit...
  • 4 篇 chitkara univers...
  • 3 篇 school of human ...
  • 3 篇 state key labora...
  • 2 篇 department of ma...
  • 2 篇 srm institute of...
  • 2 篇 china academy of...
  • 2 篇 college of compu...
  • 2 篇 artificial intel...
  • 2 篇 computer science...
  • 2 篇 kpr institute of...
  • 2 篇 department of co...
  • 2 篇 dept. of compute...
  • 2 篇 shanwei institut...
  • 2 篇 college of elect...
  • 2 篇 electronics & co...
  • 2 篇 bennett universi...
  • 2 篇 zhengzhou univer...
  • 2 篇 school of comput...
  • 2 篇 computer science...

作者

  • 6 篇 ye jun
  • 3 篇 ahmad yasmin
  • 3 篇 kaur nikita
  • 3 篇 xinlin zhang
  • 2 篇 xiaodong yan
  • 2 篇 bellini pierfran...
  • 2 篇 yang yi
  • 2 篇 xiangdong yin
  • 2 篇 maya rosalinda
  • 2 篇 nesi paolo
  • 2 篇 jyotsna c.
  • 2 篇 shivashankar
  • 2 篇 jin jin
  • 2 篇 lalem farid
  • 2 篇 bruno ivan
  • 2 篇 jun ni
  • 2 篇 abouzarjomehri
  • 2 篇 huimin xu
  • 2 篇 liu li
  • 2 篇 bounceur ahcene

语言

  • 370 篇 英文
  • 14 篇 其他
  • 3 篇 中文
检索条件"任意字段=2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005"
386 条 记 录,以下是161-170 订阅
排序:
Combating distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud computing Environment  18
Combating Distributed Denial of Service Attacks Using Load B...
收藏 引用
2nd international conference on Digital technology in Education (ICDTE)
作者: Sekaran, Kaushik Vikram, G. Raja Chowdar, B. V. Raju, U. N. P. Gangadhar Vignan Inst Technol & Sci Hyderabad Telangana India
The Security threats in the cloud computing are drastically growing as the number of cloud resource usages are increasing continuously for various services. The analysis is significant as the rate of increase of DDOS ... 详细信息
来源: 评论
An Efficient Privacy Preserving Cryptographic Approach in Cloud computing  18
An Efficient Privacy Preserving Cryptographic Approach in Cl...
收藏 引用
2nd international conference on Future Networks and distributed Systems (ICFndS)
作者: Agarkhed, Jayashree Ashalatha, R. Patil, Siddarama R. PDA Coll Engn Dept CSE Kalaburagi India PDA Coll Engn Dept E&CE Kalaburagi India
Cloud computing belongs to distributed network technology for computing and storage capabilities purpose. It is a kind of cost-effective technology dedicated to information technology. Using the internet, the accessib... 详细信息
来源: 评论
Cache replacement strategy based on association rules in P2P streaming media system  2019
Cache replacement strategy based on association rules in P2P...
收藏 引用
2nd international conference on Data Science and Information technology, DSIT 2019
作者: Gui, Yi-Qi Ju, Shuang-Shuang School of Information Engineering Yangzhou University Yangzhou China
With the development of the internet, people's demand for streaming media has been increasing, and higher requirements have been placed on video servers. The traditional cache replacement strategy in P2P video on ... 详细信息
来源: 评论
A Blockchain Based Access Authentication Scheme of Energy internet  2
A Blockchain Based Access Authentication Scheme of Energy In...
收藏 引用
2nd IEEE conference on Energy internet and Energy System Integration (EI2)
作者: Chen, Xiaolian Hu, Xiao Li, Yang Gao, Xue Li, Dawei Wuxi Power Supply Co Wuxi Peoples R China State Grid Elect Power Res Inst Nanjing Jiangsu Peoples R China Nanjing Inst Technol Nanjing Jiangsu Peoples R China
Energy internet provides important support to power transmission and substation distribution links, security is particularly significant. However, access authentication centralized to the certification center has brou... 详细信息
来源: 评论
A distributed Security Protocol Designed for the Context of internet of Things  18
A Distributed Security Protocol Designed for the Context of ...
收藏 引用
2nd international conference on Future Networks and distributed Systems (ICFndS)
作者: Laouid, Abdelkader AlShaikh, Muath Lalem, Farid Bounceur, Ahcene Euler, Reinhardt Bezoui, Madani Aissaoua, Habib Tari, Abdelkamel Univ El Oued El Oued Algeria Univ Western Brittany UBO Lab STICC UMR CNRS 6285 Brest France Univ Boumerdes Dept Math Boumerdes Algeria Univ Setif Dept Comp Sci Setif Algeria Univ Bejaia Bejaia Algeria
In the field of internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product manageme... 详细信息
来源: 评论
P-Cloud - A cost efficient definitive cloud with user satisfaction using non-cloud resources
P-Cloud - A cost efficient definitive cloud with user satisf...
收藏 引用
international conference on Innovation in Engineering and technology (ICIET)
作者: Shahadat Hossain Sohag Selina Sharmin Tanveer Ahmad Jagannath University
Today is the age of Cloud computing technology in IT Industries. Cloud computing which is built on the internet has the most robust architecture of computation. In this work, we have proposed a cloud infrastructure. P... 详细信息
来源: 评论
"Combat Cloud-Fog" Network Architecture for internet of Battlefield Things and Load Balancing technology
"Combat Cloud-Fog" Network Architecture for Internet of Batt...
收藏 引用
2nd IEEE international conference on Smart internet of Things (SmartIoT)
作者: Wang, Yiming Ren, Zhiyuan Zhang, Hailin Hou, Xiangwang Xiao, Yao Xidian Univ Coll Commun Engn Xian 710071 Shaanxi Peoples R China Sch Telecommun Engn State Key Lab ISN Xian Shaanxi Peoples R China
Recently, the armed forces want to bring the internet of Things technology to improve the effectiveness of military operations in battlefield. So the internet of Battlefield Things (IoBT) has entered our view. And due... 详细信息
来源: 评论
Load Analysis In SDN For distributed Topologies  2
Load Analysis In SDN For Distributed Topologies
收藏 引用
2nd IEEE international conference on Green computing and internet of Things (ICGCIoT)
作者: Raj, Gaurav Sharma, Siddhant Choudhury, Tanupriya Amity Univ Noida Uttar Pradesh India UPES Dehra Dun India
The advent of internet has led to the formation of a totally digitized environment, where each and everything is constantly in connection & can be easily accessed from anywhere. Traditional IP networks are difficu... 详细信息
来源: 评论
Study of load balancing algorithms for Cloud computing  2
Study of load balancing algorithms for Cloud Computing
收藏 引用
2nd IEEE international conference on Green computing and internet of Things (ICGCIoT)
作者: Handur, Vidya S. Belkar, Supriya Deshpande, Santosh Marakumbi, Prakash R. KLE Technol Univ Hubli India KLE Inst Technol Hubli India Visveswaraiah Technol Univ Belgavi India Tontadarya Coll Engn Gadag India
The significance of distributed applications is constantly rising due to technological advancements such as increasing internetworking of various computing devices and widespread usage of smart phones. Cloud computing... 详细信息
来源: 评论
Social Vehicle-To-Everything (V2X) communication model for Intelligent Transportation Systems based on 5G scenario  18
Social Vehicle-To-Everything (V2X) communication model for I...
收藏 引用
2nd international conference on Future Networks and distributed Systems (ICFndS)
作者: Raza, Naeem Jabbar, Sohail Han, Jihun Han, Kijun Natl Text Univ Dept Comp Sci Faisalabad Pakistan Kyungpook Natl Univ Dept Comp Sci & Engn Daegu South Korea
Vehicular-to-Everything (V2X) communications are the emerging paradigm for the Intelligent Transportation System (ITS) used to enhance the traffic efficiency and reliability of timely data delivery by implementing a c... 详细信息
来源: 评论