咨询与建议

限定检索结果

文献类型

  • 1,380 篇 会议
  • 11 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 937 篇 工学
    • 795 篇 计算机科学与技术...
    • 463 篇 软件工程
    • 183 篇 电气工程
    • 109 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 89 篇 动力工程及工程热...
    • 53 篇 机械工程
    • 49 篇 电子科学与技术(可...
    • 45 篇 环境科学与工程(可...
    • 43 篇 生物工程
    • 29 篇 仪器科学与技术
    • 21 篇 石油与天然气工程
    • 21 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 19 篇 建筑学
    • 19 篇 安全科学与工程
    • 18 篇 材料科学与工程(可...
    • 16 篇 土木工程
  • 275 篇 管理学
    • 227 篇 管理科学与工程(可...
    • 96 篇 工商管理
    • 70 篇 图书情报与档案管...
  • 262 篇 理学
    • 156 篇 数学
    • 47 篇 生物学
    • 35 篇 系统科学
    • 33 篇 物理学
    • 30 篇 大气科学
    • 26 篇 统计学(可授理学、...
  • 32 篇 经济学
    • 31 篇 应用经济学
  • 32 篇 法学
    • 22 篇 社会学
  • 19 篇 医学
    • 18 篇 临床医学
  • 11 篇 教育学
  • 8 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 248 篇 cloud computing
  • 85 篇 grid computing
  • 50 篇 computational mo...
  • 48 篇 distributed comp...
  • 36 篇 servers
  • 34 篇 parallel computi...
  • 32 篇 quality of servi...
  • 31 篇 resource managem...
  • 30 篇 computer archite...
  • 30 篇 distributed data...
  • 29 篇 big data
  • 23 篇 protocols
  • 22 篇 security
  • 19 篇 monitoring
  • 19 篇 fog computing
  • 18 篇 internet of thin...
  • 18 篇 reliability
  • 18 篇 parallel process...
  • 18 篇 scalability
  • 18 篇 processor schedu...

机构

  • 6 篇 china electric p...
  • 6 篇 the islamic univ...
  • 6 篇 department of co...
  • 6 篇 galgotias univer...
  • 6 篇 school of softwa...
  • 5 篇 school of comput...
  • 4 篇 school of electr...
  • 4 篇 state grid energ...
  • 4 篇 department of la...
  • 4 篇 school of electr...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 school of comput...
  • 4 篇 guangdong engine...
  • 4 篇 chitkara univers...
  • 4 篇 department of co...
  • 3 篇 russian acad sci...
  • 3 篇 department of el...
  • 3 篇 college of mathe...
  • 3 篇 school of electr...

作者

  • 6 篇 rong chunming
  • 5 篇 sukumar nandi
  • 5 篇 hui liu
  • 5 篇 liu hui
  • 5 篇 pabitra mohan kh...
  • 4 篇 zhangxin chen
  • 4 篇 awadhesh kumar s...
  • 4 篇 fatos xhafa
  • 3 篇 mo zeyao
  • 3 篇 yang bo
  • 3 篇 akash punhani
  • 3 篇 jiapeng xiu
  • 3 篇 li zheng
  • 3 篇 kumari k. aruna
  • 3 篇 kun wang
  • 3 篇 kawata shigeo
  • 3 篇 xhafa fatos
  • 3 篇 abramson david
  • 3 篇 yidong cui
  • 3 篇 cristea valentin

语言

  • 1,372 篇 英文
  • 16 篇 其他
  • 15 篇 中文
检索条件"任意字段=2nd International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering"
1401 条 记 录,以下是301-310 订阅
排序:
A Secured Multiple Party Key Agreement Protocol Design Over cloud computing Platform by Using Statistical Data Analysis Logic
A Secured Multiple Party Key Agreement Protocol Design Over ...
收藏 引用
Sustainable computing and Smart Systems (ICSCSS), international conference on
作者: Allam Balaram Sajja Suneel P.M. Kavitha Achinta Saikia S. Gopi Y Dileep Kumar Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Department of CSE(Data Science) Institute of Aeronautical Engineering Dundigal Hyderabad Telangana India Department of Computer Science and Applications SRM Institute of Science And Technology Ramapuram Chennai-89 Department of Statistics Mariani College Mariani Jorhat Assam Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai Department of ECE School of Engineering Mohan Babu University Tirupati
In the field of cloud computing, ensuring secure and efficient key agreement among multiple parties has emerged as a paramount challenge. Traditional key agreement protocols often rely on central authorities or truste... 详细信息
来源: 评论
A study of dynamic characteristics of variable cross-section cantilever hollow cylinder under impact load  2
A study of dynamic characteristics of variable cross-section...
收藏 引用
2nd international conference on cloud computing and Mechatronic engineering, I3CME 2022
作者: Yang, Jie Zhang, Hui School of Civil Engineering Lanzhou Jiaotong University Gansu Lanzhou730070 China
A variable cross-section cantilever hollow cylinder is a special structure widely used in engineering. Based on the quasi-static limit analysis and impact dynamics, the dynamic characteristics of a cantilever hollow c... 详细信息
来源: 评论
Enhanced Multi-Objective Evolutionary Algorithm for Workflow Scheduling Problem  2
Enhanced Multi-Objective Evolutionary Algorithm for Workflow...
收藏 引用
2nd international conference on Advanced Algorithms and Signal Image Processing, AASIP 2022
作者: Lin, Chenxi Tian, Bin Wang, Zhen Zhou, Zhengbin School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Electronic Engineering Naval University of Engineering Wuhan China TROY Information Technology Co. Ltd Chengdu China
With the development and application of distributed cloud computing, the problem of assigning workflow tasks to computational resources has become more and more prominent. It involves multiple constraints and optimiza... 详细信息
来源: 评论
Offloading Methodologies for Energy consumption in Mobile Edge computing  2
Offloading Methodologies for Energy consumption in Mobile Ed...
收藏 引用
2nd international conference on Smart Electronics and Communication, ICOSEC 2021
作者: Saranya, G. Sasikala, E. SRM Institute of Science and Technology Department of Computer Science and Engineering Ramapuram Chennai India SRM Institute of Science and Technology Department of Computer Science and Engineering Kattankulathur Chennai India
Edge computing is a pioneering network that allows enterprises to clear out from the constraints exploited by standard cloud computing services. Despite the fact that public cloud continues to play a vital role in mod... 详细信息
来源: 评论
Multi-Task Scheduling Method for Information Security of Heterogeneous Big Data Networks Based on Artificial Intelligence Technology
Multi-Task Scheduling Method for Information Security of Het...
收藏 引用
Sensors, Electronics and Computer engineering (ICSECE), IEEE international conference on
作者: Yiping Chen Yingzi Zheng Department of Computer Science and Engineering Guangzhou Institute of Science and Technology Guangzhou China
Multi-task scheduling of heterogeneous big data network information is proposed to improve the optimal configuration and application ability of network big data resources. A multi-task scheduling method of heterogeneo... 详细信息
来源: 评论
Two-Factor distributed Authentication Scheme for cloud Storage
Two-Factor Distributed Authentication Scheme for Cloud Stora...
收藏 引用
international conference on Computers, Communications, and Systems (ICCCS)
作者: Yunxia Han Chunxiang Xu Shanshan Li Jingjie Lu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
distributed authentication plays a crucial role in cloud storage, requiring users to authenticate their identity to a set of key management servers. This process guarantees that only authenticated users gain access to... 详细信息
来源: 评论
cloud-Enabled Isolation Forest for Anomaly Detection in UAV-Based Power Line Inspection
Cloud-Enabled Isolation Forest for Anomaly Detection in UAV-...
收藏 引用
Networking and Communications (ICNWC), international conference on
作者: Jayabharathi Ramasamy E. Srividhya V. Vaidehi S. Vimaladevi N. Mohankumar S. Murugan Department of Computer Science and Engineering RMK College of Engineering and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science Vinayaka Mission's Kirupananda Variyar Arts and Science College Vinayaka Mission's Research Foundation (DU) Salem Tamil Nadu India Department of Commerce and Business Administration School of Management Veltech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Department of Electronics and Communication Engineering B.V. Raju Institute of Technology Telangana India Department of Biomedical Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamil Nadu India
Unmanned Aerial Vehicles (UAVs) gather data efficiently for power line inspection. Anomaly detection is essential for power infrastructure dependability and security. It proposes a cloud-Enabled Isolation Forest (CEIF... 详细信息
来源: 评论
Preserving Patient Privacy in IoT Based Breast Cancer Monitoring System
Preserving Patient Privacy in IoT Based Breast Cancer Monito...
收藏 引用
international conference on Edge computing and Applications (ICECAA)
作者: Meenakshiammal R Bharathi R P. Krishnakumar Dept of CSE AP Rohini College of Engineering & Technology Kanyakumari India Dept of ECE AP University College of Engineering Nagercoil India Dept of CSE AP Amrita College of Engineering Erachakulam India
Disease detection plays a crucial role in providing right treatment to the patients. Currently, the lack of information on cancer prevention and awareness results in high fatality. Breast cancer is the second most dea...
来源: 评论
Performance Optimization in distributed Multi-Agent Reinforcement Learning on cloud-Based Platforms
Performance Optimization in Distributed Multi-Agent Reinforc...
收藏 引用
international conference on computing and Networking Technology (ICCNT)
作者: Binod Kumar Choudhary Deepak Kumar Seema Sambargi Department of Electrical & Electronics Engineering ARKA JAIN University Jamshedpur Jharkhand India Department of Mathematics Vivekananda Global University Jaipur India Department of Management School of Management - UG JAIN (Deemed to be University) Bangalore Karnataka India
Dispensed multi-agent reinforcement learning (MARL) is an effective tool for tackling tough manage troubles by means of allowing coordination and cooperation among multiple agents. In cloud-based platforms, MARL can b... 详细信息
来源: 评论
A Review Paper on cloud computing
A Review Paper on Cloud Computing
收藏 引用
international conference on Innovative Sustainable Computational Technologies (CISCT)
作者: Neeraj Singla Chahat Nisha Harnoor Chitkara University Institute of ETE Rajpura India
cloud computing has taken its place all over the IT industries. It is an on-demand internet-based computing service that provides the maximum result with minimum resources cloud computing provides a service that does ... 详细信息
来源: 评论