咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 6 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 278 篇 工学
    • 255 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 77 篇 信息与通信工程
    • 29 篇 电气工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 建筑学
    • 5 篇 光学工程
  • 72 篇 理学
    • 34 篇 数学
    • 19 篇 生物学
    • 11 篇 系统科学
    • 10 篇 大气科学
    • 9 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 化学
  • 58 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 24 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 19 篇 法学
    • 16 篇 法学
  • 11 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 57 篇 cloud computing
  • 45 篇 internet of thin...
  • 31 篇 internet
  • 21 篇 distributed comp...
  • 15 篇 grid computing
  • 13 篇 computer archite...
  • 13 篇 blockchain
  • 12 篇 distributed comp...
  • 10 篇 big data
  • 10 篇 servers
  • 10 篇 protocols
  • 10 篇 computer network...
  • 9 篇 peer to peer com...
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 security
  • 9 篇 fog computing
  • 8 篇 scalability
  • 8 篇 wireless sensor ...
  • 8 篇 denial-of-servic...

机构

  • 6 篇 hainan universit...
  • 4 篇 chitkara univers...
  • 3 篇 school of human ...
  • 3 篇 state key labora...
  • 2 篇 department of ma...
  • 2 篇 srm institute of...
  • 2 篇 china academy of...
  • 2 篇 college of compu...
  • 2 篇 artificial intel...
  • 2 篇 computer science...
  • 2 篇 kpr institute of...
  • 2 篇 department of co...
  • 2 篇 dept. of compute...
  • 2 篇 shanwei institut...
  • 2 篇 college of elect...
  • 2 篇 electronics & co...
  • 2 篇 bennett universi...
  • 2 篇 zhengzhou univer...
  • 2 篇 school of comput...
  • 2 篇 computer science...

作者

  • 6 篇 ye jun
  • 3 篇 ahmad yasmin
  • 3 篇 kaur nikita
  • 3 篇 xinlin zhang
  • 2 篇 xiaodong yan
  • 2 篇 bellini pierfran...
  • 2 篇 yang yi
  • 2 篇 xiangdong yin
  • 2 篇 maya rosalinda
  • 2 篇 nesi paolo
  • 2 篇 jyotsna c.
  • 2 篇 shivashankar
  • 2 篇 jin jin
  • 2 篇 lalem farid
  • 2 篇 bruno ivan
  • 2 篇 jun ni
  • 2 篇 abouzarjomehri
  • 2 篇 huimin xu
  • 2 篇 liu li
  • 2 篇 bounceur ahcene

语言

  • 382 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"任意字段=2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005"
386 条 记 录,以下是61-70 订阅
排序:
2020 2nd international conference on Embedded and distributed Systems, EDiS 2020
2020 2nd International Conference on Embedded and Distribute...
收藏 引用
2nd international conference on Embedded and distributed Systems, EDiS 2020
The proceedings contain 30 papers. The topics discussed include: versatile software framework for the monitoring and control of distributed computing systems;a new levy flight trajectory-based grasshopper optimization...
来源: 评论
On high-precision measurement of network performance in grid environments
On high-precision measurement of network performance in grid...
收藏 引用
2nd IASTED international Multi-conference on Automation, Control, and Information technology
作者: Siemens, E Grimm, C Univ Hannover Reg Sci Comp Ctr Lower Saxony D-30167 Hannover Germany
In this paper we present our approach of a distributed environment for high-precision and high bitrate network measurements. These measurements can be performed on a standard PC system without changes in the kernel of... 详细信息
来源: 评论
Protection and Utilization of Personal Information in the Context of Big Data  2
Protection and Utilization of Personal Information in the Co...
收藏 引用
2nd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Jiang, Yu Ye, Jun Zhang, Zhengqi Hainan University Key Laboratory of Internet Information Retrieval of Hainan Province School of Cyberspace Security Haikou China Shanwei Institute of Technology Shanwei China Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China
With the innovation of technology, the amount of data has doubled and people have entered the era of big data. As one of the important resources, the economic and social value of data is increasing, but in the process... 详细信息
来源: 评论
Offloading Methodologies for Energy consumption in Mobile Edge computing  2
Offloading Methodologies for Energy consumption in Mobile Ed...
收藏 引用
2nd international conference on Smart Electronics and Communication, ICOSEC 2021
作者: Saranya, G. Sasikala, E. SRM Institute of Science and Technology Department of Computer Science and Engineering Ramapuram Chennai India SRM Institute of Science and Technology Department of Computer Science and Engineering Kattankulathur Chennai India
Edge computing is a pioneering network that allows enterprises to clear out from the constraints exploited by standard cloud computing services. Despite the fact that public cloud continues to play a vital role in mod... 详细信息
来源: 评论
On the Application of Privacy computing in the Field of National Cyberspace Security  2
On the Application of Privacy Computing in the Field of Nati...
收藏 引用
2nd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Zhou, Ying Ye, Jun Zhang, Zhengqi Hainan University Key Laboratory of Internet Information Retrieval of Hainan Province School of Cyberspace Security Haikou China Shanwei Institute of Technology Shanwei China Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China
Privacy computing technology means the collection of technologies that realize data analysis and calculation under the premise of protecting the data itself from external leakage, in order to realize the transformatio... 详细信息
来源: 评论
Nature Inspired Load Balancing Algorithms- A Review  2
Nature Inspired Load Balancing Algorithms- A Review
收藏 引用
2nd international conference on Power Energy Environment and Intelligent Control, PEEIC 2019
作者: Khanam, Shaheen Hasan, Muzammil MMMUT Department of Computer Science and Engineering Gorakhpur India
Cloud computing is a new paradigm for distributed large scale computing over internet. It is a constantly developing technology providing innovative drift in computing using virtualization of resources. Thus, along wi... 详细信息
来源: 评论
A Hybrid Clock Synchronization Architecture for Many-core Cluster System Based on GPS and IEEE 1588  2
A Hybrid Clock Synchronization Architecture for Many-core Cl...
收藏 引用
2nd IEEE international conference on Computer and Communications (ICCC)
作者: Gao, Fang Huang, Zhangqin Wang, Shulong Wang, Zheng Beijing Univ Technol Beijing Beijing Adv Innovat Ctr Future Internet Technol Beijing Peoples R China Beijing Univ Technol Beijing Beijing Engn Res Ctr IoT Software & Syst Beijing Peoples R China
Time consistency of each node and each core is one of the kernel problems that must be addressed to promote the development of many-core cluster system that keeps the distributed system in step, and it is the basis of... 详细信息
来源: 评论
A distributed Security Protocol Designed for the Context of internet of Things  18
A Distributed Security Protocol Designed for the Context of ...
收藏 引用
2nd international conference on Future Networks and distributed Systems (ICFndS)
作者: Laouid, Abdelkader AlShaikh, Muath Lalem, Farid Bounceur, Ahcene Euler, Reinhardt Bezoui, Madani Aissaoua, Habib Tari, Abdelkamel Univ El Oued El Oued Algeria Univ Western Brittany UBO Lab STICC UMR CNRS 6285 Brest France Univ Boumerdes Dept Math Boumerdes Algeria Univ Setif Dept Comp Sci Setif Algeria Univ Bejaia Bejaia Algeria
In the field of internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product manageme... 详细信息
来源: 评论
Optimal Task Scheduling in Cloud computing Environment: Meta Heuristic Approaches  2
Optimal Task Scheduling in Cloud Computing Environment: Meta...
收藏 引用
2nd international conference on Electrical Information and Communication technology (EICT 2015)
作者: Mandal, Tripti Acharyya, Sriyankar West Bengal Univ Technol Comp Sci & Engn Kolkata W Bengal India
Cloud computing is the latest continuation of parallel computing, distributed computing and grid computing. In this system, user can make use of different services like storage, servers and other applications. Cloud r... 详细信息
来源: 评论
Detecting IoT Attacks using Multi-Layer Data Through Machine Learning  2
Detecting IoT Attacks using Multi-Layer Data Through Machine...
收藏 引用
2nd international conference on distributed computing and High Performance computing (DCHPC)
作者: Alam, Hina Yaqub, Muhammad Shaharyar Nadir, Ibrahim Univ Management & Technol Lahore Pakistan Lahore Univ Management Sci Lahore Pakistan Natl Univ Comp & Emerging Sci Lahore Pakistan
internet of Things (IoT) devices is being used in countless network applications. However, due to their insecure nature, the wide adoption of these devices has also increased the possibility of cyber-attacks. There is... 详细信息
来源: 评论