咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 6 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 278 篇 工学
    • 255 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 77 篇 信息与通信工程
    • 29 篇 电气工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 建筑学
    • 5 篇 光学工程
  • 72 篇 理学
    • 34 篇 数学
    • 19 篇 生物学
    • 11 篇 系统科学
    • 10 篇 大气科学
    • 9 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 化学
  • 58 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 24 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 19 篇 法学
    • 16 篇 法学
  • 11 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 57 篇 cloud computing
  • 45 篇 internet of thin...
  • 31 篇 internet
  • 21 篇 distributed comp...
  • 15 篇 grid computing
  • 13 篇 computer archite...
  • 13 篇 blockchain
  • 12 篇 distributed comp...
  • 10 篇 big data
  • 10 篇 servers
  • 10 篇 protocols
  • 10 篇 computer network...
  • 9 篇 peer to peer com...
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 security
  • 9 篇 fog computing
  • 8 篇 scalability
  • 8 篇 wireless sensor ...
  • 8 篇 denial-of-servic...

机构

  • 6 篇 hainan universit...
  • 4 篇 chitkara univers...
  • 3 篇 school of human ...
  • 3 篇 state key labora...
  • 2 篇 department of ma...
  • 2 篇 srm institute of...
  • 2 篇 china academy of...
  • 2 篇 college of compu...
  • 2 篇 artificial intel...
  • 2 篇 computer science...
  • 2 篇 kpr institute of...
  • 2 篇 department of co...
  • 2 篇 dept. of compute...
  • 2 篇 shanwei institut...
  • 2 篇 college of elect...
  • 2 篇 electronics & co...
  • 2 篇 bennett universi...
  • 2 篇 zhengzhou univer...
  • 2 篇 school of comput...
  • 2 篇 computer science...

作者

  • 6 篇 ye jun
  • 3 篇 ahmad yasmin
  • 3 篇 kaur nikita
  • 3 篇 xinlin zhang
  • 2 篇 xiaodong yan
  • 2 篇 bellini pierfran...
  • 2 篇 yang yi
  • 2 篇 xiangdong yin
  • 2 篇 maya rosalinda
  • 2 篇 nesi paolo
  • 2 篇 jyotsna c.
  • 2 篇 shivashankar
  • 2 篇 jin jin
  • 2 篇 lalem farid
  • 2 篇 bruno ivan
  • 2 篇 jun ni
  • 2 篇 abouzarjomehri
  • 2 篇 huimin xu
  • 2 篇 liu li
  • 2 篇 bounceur ahcene

语言

  • 382 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"任意字段=2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005"
386 条 记 录,以下是11-20 订阅
排序:
GDP: A paradigm for intertask communication in grid computing through distributed pipes
收藏 引用
2nd international conference on distributed computing and internet technology, icdcit 2005
作者: Janakiram, D. Reddy, M. Venkateswara Srinivas, A. Vijay Mohamed, M. A. Maluk Kumar, S. Santosh Distributed and Object Systems Lab. Dept. of Computer Science and Engg. Indian Institute of Technology Madras Chennai India
Existing grid models target purely data parallel applications without inter-task communication. This paper proposes a transparent programming model to support communicating parallel tasks in a wide area grid. The prop... 详细信息
来源: 评论
Analyzing loop paths for execution time estimation
收藏 引用
2nd international conference on distributed computing and internet technology, icdcit 2005
作者: Roychoudhury, Abhik Mitra, Tulika Negi, Hemendra Singh School of Computing National University of Singapore
Statically estimating the worst case execution time of a program is important for real-time embedded software. This is difficult even in the programming language level due to the inherent difficulty in detecting infea... 详细信息
来源: 评论
distributed time slot assignment in wireless ad hoc networks for STDMA
收藏 引用
2nd international conference on distributed computing and internet technology
作者: Bhattacharjee, S Das, N Indian Stat Inst Adv Comp & Microelect Univ Kolkata 700108 W Bengal India
In this paper, a distributed technique is proposed to assign time slots to the nodes of an ad hoc network for Spatial Time Division Media Access (STDMA) to facilitate collision-free communication. An upper bound is es... 详细信息
来源: 评论
CompuP2P: A Light-Weight Architecture for internet computing
CompuP2P: A Light-Weight Architecture for Internet Computing
收藏 引用
2nd international conference on Broadband Networks (BroadNets 05)
作者: Sekhri, Varun Gupta, Rohit Somani, Arun K. Iowa State Univ Dept Elect & Comp Engn Dependable Comp & Networking Lab Ames IA 50011 USA
internet computing is emerging as an important new paradigm in which resource intensive computing is integrated over internet-scale networks. Over these large networks, different users and organizations share their co... 详细信息
来源: 评论
distributed clustering algorithm for finding virtual backbone in ad hoc networks
收藏 引用
2nd international conference on distributed computing and internet technology
作者: Paul, B Rao, SV Indian Inst Technol Dept Comp Sci & Engn Gauhati 781039 Assam India
An important objective in designing a protocol is to save scarce resources like energy and bandwidth, and avoid the broadcast storm problem [1]. One way of addressing these problems is by forming a small virtual backb... 详细信息
来源: 评论
Analysis of interval-based global state detection
收藏 引用
2nd international conference on distributed computing and internet technology, icdcit 2005
作者: Chandra, Punit Kshemkalyani, Ajay D. Computer Science Department Univ. of Illinois at Chicago Chicago IL 60607 United States
The problem of global state observation is fundamental to distributed systems. All interactions in distributed systems can be analyzed in terms of the building block formed by the pairwise interactions of intervals be... 详细信息
来源: 评论
The distributed sensor networks - An emerging technology
收藏 引用
2nd international conference on distributed computing and internet technology
作者: Iyengar, SS Louisiana State Univ Baton Rouge LA 70803 USA
distributed Sensor networks have a wide range of real-time applications in aerospace, automation, defense, medical imaging, robotics, and weather prediction. Over the past several years, scientists, engineers, and res... 详细信息
来源: 评论
Validation of policy integration using alloy
收藏 引用
2nd international conference on distributed computing and internet technology
作者: Toahchoodee, M Ray, I Colorado State Univ Dept Comp Sci Ft Collins CO 80523 USA
Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired security requirements. Validating this integra... 详细信息
来源: 评论
Worm detection using the analysis of behavior
收藏 引用
2nd international conference on distributed computing and internet technology, icdcit 2005
作者: Jiang, Tao Kim, Wonil Lhee, Kyungsuk Hong, Manpyo Digital Vaccine and Internet Immune System Laboratory Graduate School of Information and Communication Ajou University Suwon Korea Republic of College of Electronics and Information Engineering Sejong University Seoul Korea Republic of
With the appearance of a number of e-mail worms in recent years, we urgently need a solution to detect unknown e-mail worms rather than using the traditional solution: signature-based scanning which does not deal with... 详细信息
来源: 评论
Detecting DDoS attacks in cloud computing using ANN and black hole optimization  2
Detecting DDoS attacks in cloud computing using ANN and blac...
收藏 引用
2nd international conference on Telecommunication and Networks (TEL-NET)
作者: Kushwah, Gopal Singh Ali, Syed Taqi NIT Kurukshetra Dept Comp Engn Kurukshetra Haryana India
Cloud computing is now a widely accepted technology, as it provides on-demand services on pay-as-you-use basis. These services are provided over internet, worldwide. Availability is a major concern in this technology.... 详细信息
来源: 评论