咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 6 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 278 篇 工学
    • 255 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 77 篇 信息与通信工程
    • 29 篇 电气工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 建筑学
    • 5 篇 光学工程
  • 72 篇 理学
    • 34 篇 数学
    • 19 篇 生物学
    • 11 篇 系统科学
    • 10 篇 大气科学
    • 9 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 化学
  • 58 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 24 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 19 篇 法学
    • 16 篇 法学
  • 11 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 57 篇 cloud computing
  • 45 篇 internet of thin...
  • 31 篇 internet
  • 21 篇 distributed comp...
  • 15 篇 grid computing
  • 13 篇 computer archite...
  • 13 篇 blockchain
  • 12 篇 distributed comp...
  • 10 篇 big data
  • 10 篇 servers
  • 10 篇 protocols
  • 10 篇 computer network...
  • 9 篇 peer to peer com...
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 security
  • 9 篇 fog computing
  • 8 篇 scalability
  • 8 篇 wireless sensor ...
  • 8 篇 denial-of-servic...

机构

  • 6 篇 hainan universit...
  • 4 篇 chitkara univers...
  • 3 篇 school of human ...
  • 3 篇 state key labora...
  • 2 篇 department of ma...
  • 2 篇 srm institute of...
  • 2 篇 china academy of...
  • 2 篇 college of compu...
  • 2 篇 artificial intel...
  • 2 篇 computer science...
  • 2 篇 kpr institute of...
  • 2 篇 department of co...
  • 2 篇 dept. of compute...
  • 2 篇 shanwei institut...
  • 2 篇 college of elect...
  • 2 篇 electronics & co...
  • 2 篇 bennett universi...
  • 2 篇 zhengzhou univer...
  • 2 篇 school of comput...
  • 2 篇 computer science...

作者

  • 6 篇 ye jun
  • 3 篇 ahmad yasmin
  • 3 篇 kaur nikita
  • 3 篇 xinlin zhang
  • 2 篇 xiaodong yan
  • 2 篇 bellini pierfran...
  • 2 篇 yang yi
  • 2 篇 xiangdong yin
  • 2 篇 maya rosalinda
  • 2 篇 nesi paolo
  • 2 篇 jyotsna c.
  • 2 篇 shivashankar
  • 2 篇 jin jin
  • 2 篇 lalem farid
  • 2 篇 bruno ivan
  • 2 篇 jun ni
  • 2 篇 abouzarjomehri
  • 2 篇 huimin xu
  • 2 篇 liu li
  • 2 篇 bounceur ahcene

语言

  • 339 篇 英文
  • 45 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005"
386 条 记 录,以下是331-340 订阅
排序:
Off-line micro-payment system for content sharing in P2P networks
收藏 引用
2nd international conference on distributed computing and internet technology
作者: Dai, XL Grundy, J Univ S Pacific Dept Math & Comp Sci Suva Fiji Univ Auckland Dept Elect & Comp Engn Auckland 1 New Zealand Univ Auckland Dept Comp Sci Auckland 1 New Zealand
Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment pr... 详细信息
来源: 评论
On high-precision measurement of network performance in grid environments
On high-precision measurement of network performance in grid...
收藏 引用
2nd IASTED international Multi-conference on Automation, Control, and Information technology
作者: Siemens, E Grimm, C Univ Hannover Reg Sci Comp Ctr Lower Saxony D-30167 Hannover Germany
In this paper we present our approach of a distributed environment for high-precision and high bitrate network measurements. These measurements can be performed on a standard PC system without changes in the kernel of... 详细信息
来源: 评论
IEEE 802.11 DCF based MAC protocols for multiple beam antennas and their limitations
IEEE 802.11 DCF based MAC protocols for multiple beam antenn...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
作者: Jain, Vivek Gupta, Anurag Lalf, Dhananjay Agrawal, Dharma P. OBR Center for Distributed and Mobile Computing Department of ECECS University of Cincinnati Research and Technology Center Robert Bosch Corporation
Multiple beam antennas can receive (or transmit) data on multiple beams simultaneously. The aim of this paper is to show the limitations of using IEEE 802.11 distributed coordination function (DCF) based schemes for m... 详细信息
来源: 评论
Framework for statistical filtering against DDoS attacks in MANETs
Framework for statistical filtering against DDoS attacks in ...
收藏 引用
ICESS 2005 - 2nd international conference on Embedded Software and Systems
作者: Tan, Hwee-Xian Seah, Winston K. G. Department of Computer Science School of Computing National University of Singapore A STAR Singapore Singapore
A DDoS (distributed Denial-Of-Service) attack is a distributed, large-scale attempt by malicious users to flood the victim network with an enormous number of packets. This exhausts the victim network of resources such... 详细信息
来源: 评论
An actucity completion duration based checkpoint selection strategy for dynamic verification of fixed-time constraints in grid workflow systems
An actucity completion duration based checkpoint selection s...
收藏 引用
2nd international conference on Grid Service Engineering and Management, GSEM 2005 - Co-located with the 6th international conference on Net.ObjectDays 2005, NODe 2005
作者: Chen, Jinjun Yang, Yun CICEC - Centre for Internet Computing and E-Commerce Faculty of Information and Communication Technologies Swinburne University of Technology PO Box 218 Hawthorn 3122 Australia
In grid workflow systems, to verify fixed-time constraints efficiently at the run-time execution stage, some checkpoints are often selected so that we only need to conduct the fixed-time constraint verification at suc...
来源: 评论
distributed parallel migration computing based on mobile agents
Distributed parallel migration computing based on mobile age...
收藏 引用
IEE Mobility conference 2005 - The Second international conference on Mobile technology, Applications and Systems
作者: Qicheng, Liu Xiaohong, Chen School of Natural Resources and Information Technology China University of Petroleum-Beijing Beijing 102249 China School of Computer Science and Technology Yantai University Yantai Shandong Province 264005 China
Mobile agents provide a new method for the distributed parallel computation. This paper presents the advantages of using mobile agents in a distributed parallel seismic data migration system, and describes the archite... 详细信息
来源: 评论
distributed stream management using utility-driven self-adaptive middleware
Distributed stream management using utility-driven self-adap...
收藏 引用
2nd international conference on Autonomic computing, ICAC 2005
作者: Kumar, Vibhore Cooper, Brian F. Schwan, Karsten Center for Experimental Research in Computer Science Georgia Institute of Technology Atlanta GA 30332
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an implicit business-value. Middleware that ... 详细信息
来源: 评论
An analysis of current computational emotion models and systems
An analysis of current computational emotion models and syst...
收藏 引用
2nd Indian international conference on Artificial Intelligence, IICAI 2005
作者: Zhan, Donglei Cao, Cungen Pan, Yu Wang, Haitao Yong, Xi Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences 10080 Beijing China Graduate School Chinese Academy of Sciences 100039 Beijing China
Emotion study is a multi-disciplinary research subject. In the past three decades, a number of theoretical models of emotion and computer applications have been proposed from different perspectives including psycholog... 详细信息
来源: 评论
Knowledge technology through functional layered intelligence
Knowledge technology through functional layered intelligence
收藏 引用
1st international conference on Semantics, Knowledge and Grid, SKG 2005
作者: Dimkovski, Martin Deeb, Kevin Barry University 11300 NE 2nd Ave. Miami Shores FL 33161 United States
The internet and other various networks are growing into an interconnection environment of information pools that are often overwhelming. Knowledge technology has been developing intensely, however with limited succes... 详细信息
来源: 评论
It application downtime, executive visibility and disaster tolerant computing
It application downtime, executive visibility and disaster t...
收藏 引用
2nd international conference on Cybernetics and Information Technologies, Systems and Applications, CITSA 2005, Jointly with the 11th international conference on Information Systems Analysis and Synthesis, ISAS 2005
作者: Harper, Michael A. Lawler, Chad M. Thornton, Mitchell A. Critical Infrastructure Protection Center SPAWAR Systems Center Charleston Department of the Navy North Charleston SC 29419 United States Engineering Management Information and Systems Department Southern Methodist University Dallas TX 75275 United States Department of Computer Science and Engineering Southern Methodist University Dallas TX 75275 United States
This paper examines the relationship among disaster tolerant systems, Information technology (IT) application operation and availability, and the executive level management visibility necessary for system operational ... 详细信息
来源: 评论