咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 6 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 278 篇 工学
    • 255 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 77 篇 信息与通信工程
    • 29 篇 电气工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 建筑学
    • 5 篇 光学工程
  • 72 篇 理学
    • 34 篇 数学
    • 19 篇 生物学
    • 11 篇 系统科学
    • 10 篇 大气科学
    • 9 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 化学
  • 58 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 24 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 19 篇 法学
    • 16 篇 法学
  • 11 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 57 篇 cloud computing
  • 45 篇 internet of thin...
  • 31 篇 internet
  • 21 篇 distributed comp...
  • 15 篇 grid computing
  • 13 篇 computer archite...
  • 13 篇 blockchain
  • 12 篇 distributed comp...
  • 10 篇 big data
  • 10 篇 servers
  • 10 篇 protocols
  • 10 篇 computer network...
  • 9 篇 peer to peer com...
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 security
  • 9 篇 fog computing
  • 8 篇 scalability
  • 8 篇 wireless sensor ...
  • 8 篇 denial-of-servic...

机构

  • 6 篇 hainan universit...
  • 4 篇 chitkara univers...
  • 3 篇 school of human ...
  • 3 篇 state key labora...
  • 2 篇 department of ma...
  • 2 篇 srm institute of...
  • 2 篇 china academy of...
  • 2 篇 college of compu...
  • 2 篇 artificial intel...
  • 2 篇 computer science...
  • 2 篇 kpr institute of...
  • 2 篇 department of co...
  • 2 篇 dept. of compute...
  • 2 篇 shanwei institut...
  • 2 篇 college of elect...
  • 2 篇 electronics & co...
  • 2 篇 bennett universi...
  • 2 篇 zhengzhou univer...
  • 2 篇 school of comput...
  • 2 篇 computer science...

作者

  • 6 篇 ye jun
  • 3 篇 ahmad yasmin
  • 3 篇 kaur nikita
  • 3 篇 xinlin zhang
  • 2 篇 xiaodong yan
  • 2 篇 bellini pierfran...
  • 2 篇 yang yi
  • 2 篇 xiangdong yin
  • 2 篇 maya rosalinda
  • 2 篇 nesi paolo
  • 2 篇 jyotsna c.
  • 2 篇 shivashankar
  • 2 篇 jin jin
  • 2 篇 lalem farid
  • 2 篇 bruno ivan
  • 2 篇 jun ni
  • 2 篇 abouzarjomehri
  • 2 篇 huimin xu
  • 2 篇 liu li
  • 2 篇 bounceur ahcene

语言

  • 382 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"任意字段=2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005"
386 条 记 录,以下是71-80 订阅
排序:
Research on the Security of Data Cross-border Circulation in Cyberspace  2
Research on the Security of Data Cross-border Circulation in...
收藏 引用
2nd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Lu, Shoulei Ye, Jun Tan, Yuyin Hainan University Key Laboratory of Internet Information Retrieval of Hainan Province School of Cyberspace Security Haikou China
The arrival of the 5G era has promoted the innovation of people's production and lifestyle and promoted the circulation of data among enterprises, networks, and countries. However, promoting data circulation secur... 详细信息
来源: 评论
LUFlow: Attack Detection in the internet of Things Using Machine Learning Approaches  2
LUFlow: Attack Detection in the Internet of Things Using Mac...
收藏 引用
2nd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Sharma, Anshika Babbar, Himanshi Chitkara University Institute of Engineering and Technology Chitkara University Rajpura India
The number of internet of Things (IoT) equipment and the data those devices produce have both increased significantly over the past few years. Due to their resource limitations, IoT network participants can be problem... 详细信息
来源: 评论
Integrated Security Framework for Healthcare Using Blockchain and Fog computing  2
Integrated Security Framework for Healthcare Using Blockchai...
收藏 引用
2nd international conference on Power Electronics and IoT Applications in Renewable Energy and its Control, PARC 2022
作者: Sivasangari, A. Sonti, V J K Kishor Ajitha, P. Deepa, D. Vignesh, R. Sathyabama Institute of Science and Technology School of Computing Chennai India
Edge computing is a promising paradigm that enhances the capabilities of cloud computing in healthcare. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from ... 详细信息
来源: 评论
Demo abstract: Fog computing for improving user application interaction and context awareness  2
Demo abstract: Fog computing for improving user application ...
收藏 引用
2nd IEEE/ACM international conference on internet-of-Things Design and Implementation, IoTDI 2017
作者: Saurez, Enrique Gupta, Harshit Ramachandran, Umakishore Mayer, Ruben Georgia Institute of Technology AtlantaGA United States Institute for Parallel and Distributed Systems University of Stuttgart Stuttgart Germany
Newgenerations of cloud applications are increasingly complex and pose lower latency requirements. The latter is forcing the industry to reduce network latency by adding computation nodes near the edge of the network,... 详细信息
来源: 评论
RDF Class Collection from distributed LOD  3
RDF Class Collection from Distributed LOD
收藏 引用
3rd international conference on Applied computing and Information technology (ACIT 2015) 2nd international conference on Computational Science and Intelligence (CSI 2015)
作者: Otani, Seiki Fujimoto, Ryoya Toshioka, Kohichi Iwahori, Yuji Chubu Univ Grad Sch Engn Dept Comp Sci 1200 Matsumoto Cho Kasugai Aichi 4878501 Japan
For information on the internet, by using concepts defined in the format that can be processed by machine, various researches have been made so that a computer understands the Web contents. This is called the Semantic... 详细信息
来源: 评论
Study on the development of mobile learning promoted by cloud computing
Study on the development of mobile learning promoted by clou...
收藏 引用
international conference on Information Engineering and Computer Science
作者: Li, Jian Department of Educational Science and Media Engineering Weifang University Weifang261061 China
Cloud computing which is regarded as the next revolution of science and technology is the development of distributed processing, parallel computing and grid computing. It is an internet-based super computing model and... 详细信息
来源: 评论
Research on Virtual Simulation Algorithm for internet of Things Intelligent Manufacturing Based on Mixed Reality technology  2
Research on Virtual Simulation Algorithm for Internet of Thi...
收藏 引用
2nd international conference on distributed computing and Optimization Techniques, ICDCOT 2024
作者: Rao, Junhua Wang, Xin Shandong Institute of Commerce and Technology Jinan China
This paper aims to study the virtual simulation algorithm for internet of Things intelligent manufacturing based on mixed reality technology. With the rapid development of the internet of Things and intelligent manufa... 详细信息
来源: 评论
Advancements and Applications of Blind Channel Decoding Techniques  2
Advancements and Applications of Blind Channel Decoding Tech...
收藏 引用
2nd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Chen, Bangyan Ye, Jun Hainan University Key Laboratory of Internet Information Retrieval of Hainan Province School of Cyberspace Security Haikou China
The recognition of channel coding methods and the estimate of channel coding parameters is important in different fields like information interception and analysis. However, the modes and parameters of coding are usua... 详细信息
来源: 评论
VM Migration and Resource Management using Meta Heuristic Technique in Cloud computing Services  2
VM Migration and Resource Management using Meta Heuristic Te...
收藏 引用
2nd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Kumar, Abhijit Devi, Runumi Noida Institute of Engineering and Technology Department of Cs Greater Noida India Galgotias University Department of Computer Science and Engineering Greater Noida India
An increasingly important component in the development of Cloud computing, an internet-based technology, is the optimization of its resources. To make the most of available resources, cloud data centre models need a r... 详细信息
来源: 评论
JSERNET UDP53 port traffic analysis
JSERNET UDP53 port traffic analysis
收藏 引用
2nd international conference on Networking and distributed computing, ICndC 2011
作者: Su, Yanjun Ding, Wei Dong, Shi Department of Computer Sciences and Engineering Southeast University Nanjing 211100 China
As the well known port for DNS service, the 53 port won't be shielded by most of firewalls or network services. This defect can be used to send packets through firewalls without being detected. For comprehensive u... 详细信息
来源: 评论