咨询与建议

限定检索结果

文献类型

  • 385 篇 会议
  • 7 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 396 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 265 篇 工学
    • 238 篇 计算机科学与技术...
    • 148 篇 软件工程
    • 67 篇 信息与通信工程
    • 65 篇 电气工程
    • 46 篇 控制科学与工程
    • 15 篇 生物工程
    • 14 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 仪器科学与技术
    • 11 篇 机械工程
    • 10 篇 交通运输工程
    • 10 篇 环境科学与工程(可...
    • 9 篇 电子科学与技术(可...
    • 8 篇 建筑学
    • 7 篇 材料科学与工程(可...
    • 7 篇 生物医学工程(可授...
    • 7 篇 网络空间安全
  • 69 篇 理学
    • 33 篇 数学
    • 17 篇 生物学
    • 13 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 8 篇 大气科学
  • 53 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 19 篇 法学
    • 12 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
  • 8 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 6 篇 经济学
  • 2 篇 教育学

主题

  • 67 篇 internet of thin...
  • 42 篇 cloud computing
  • 24 篇 internet
  • 13 篇 computer archite...
  • 12 篇 distributed comp...
  • 12 篇 edge computing
  • 10 篇 computer science
  • 10 篇 security
  • 10 篇 web and internet...
  • 9 篇 resource managem...
  • 9 篇 real-time system...
  • 9 篇 protocols
  • 9 篇 fog computing
  • 9 篇 distributed data...
  • 8 篇 application soft...
  • 8 篇 costs
  • 8 篇 mobile computing
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 software enginee...

机构

  • 5 篇 college of techn...
  • 5 篇 sr university de...
  • 4 篇 chitkara univers...
  • 4 篇 school of comput...
  • 3 篇 nitte meenakshi ...
  • 3 篇 uttaranchal inst...
  • 3 篇 dept. of cs geor...
  • 3 篇 school of electr...
  • 3 篇 department of co...
  • 2 篇 department of op...
  • 2 篇 department of cs...
  • 2 篇 state grid econo...
  • 2 篇 school of geomat...
  • 2 篇 department of cs...
  • 2 篇 peking univ shen...
  • 2 篇 panimalar engine...
  • 2 篇 college of compu...
  • 2 篇 kiet school of m...
  • 2 篇 international un...
  • 2 篇 graduate school ...

作者

  • 3 篇 pareek piyush ku...
  • 3 篇 yi pan
  • 2 篇 jianhua sun
  • 2 篇 ding runwei
  • 2 篇 shu-ching wang
  • 2 篇 h. le
  • 2 篇 rahul jagtap
  • 2 篇 sonia
  • 2 篇 sudhakar k.
  • 2 篇 himanshu
  • 2 篇 runwei ding
  • 2 篇 a. simmonds
  • 2 篇 chauhan rahul
  • 2 篇 gyankamal chhaje...
  • 2 篇 wang shun-sheng
  • 2 篇 kwei-jay lin
  • 2 篇 dineshkumar r.
  • 2 篇 wang meng
  • 2 篇 yan kuo-qin
  • 2 篇 liu fang

语言

  • 382 篇 英文
  • 14 篇 其他
  • 3 篇 中文
检索条件"任意字段=3rd International Conference on Distributed Computing and Internet Technology, ICDCIT 2006"
396 条 记 录,以下是91-100 订阅
排序:
2006 3rd Annual international conference on Mobile and Ubiquitous Systems, MobiQuitous - Workshops
2006 3rd Annual International Conference on Mobile and Ubiqu...
收藏 引用
2006 3rd Annual international conference on Mobile and Ubiquitous Systems, MobiQuitous
The proceedings contain 73 papers. The topics discussed include: location privacy of users in location-based services;the impact of the context interpretation error on the context prediction accuracy;Pervaho: a develo... 详细信息
来源: 评论
An architecture for delivering broadband video over the internet
An architecture for delivering broadband video over the Inte...
收藏 引用
3rd international conference on Information technology: Coding and computing (ITCC 2002)
作者: Lu, J EnjoyWeb Inc. United States
The emergence of content delivery, networks (CDN) has helped improve the efficiency, of delivering streaming media. In this paper, we argue with evidence that the edge delivery, paradigm behind current CDNs cannot sca... 详细信息
来源: 评论
DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks
收藏 引用
MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS 2017年 第3期23卷 593-611页
作者: Boro, Debojit Bhattacharyya, Dhruba K. Tezpur Univ Dept Comp Sci & Engn Tezpur 784028 India
High-rate distributed denial of service (HDDoS) flooding attacks pose as a major threat to the internet. Most present solutions based on machine learning approach are inept for detecting the attacks in real time due t... 详细信息
来源: 评论
An Analysis of Edge computing with Multi Access in 5-G technology  3
An Analysis of Edge Computing with Multi Access in 5-G Techn...
收藏 引用
3rd international conference on Advance computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Gupta, Sitaram Sonia Vivekananda Global University Department of Computer Science Engineering Jaipur India Chandigarh School of Business Department of Master of Computer Application Jhanjeri India
The demands of the rapidly expanding internet. However, since most end users have confined storage space and limiting computing power, it lately evolved into a natural issue how to execute computationally complex apps... 详细信息
来源: 评论
Optimizing network configurations based on potential profit loss
Optimizing network configurations based on potential profit ...
收藏 引用
8th ACIS international conference on Software Engineering, Artificial Intelligence, Networking and Parallel/distributed computing/3rd ACIS international Workshop on Self-Assembling Wireless Networks
作者: Zhao, Feng Zhu, Peidong Wang, Meng Wang, Baosheng National University of Defense Technology Institute of Logistics Sciences PLA General Logistics Department
IP routing protocols, such as OSPF (Open Shortest Path First) or BGP (Border Gateway Protocol), have many configurable parameters (e.g., timers) and interact with each other in complex ways. Network operators may need... 详细信息
来源: 评论
Express risk assessment through web access to simulation data
Express risk assessment through web access to simulation dat...
收藏 引用
3rd international conference on Information technology - New Generations (ITNG)
作者: Smirnov, Andrei Rowan, Steven W Virginia Univ Morgantown WV 26506 USA
A prototype of an express risk assessment system is proposed and implemented as a combination of a distributed simulator and a web interface. A case of aerosol dispersion in an urban environment is investigated. Fast ... 详细信息
来源: 评论
Pearson Correlation Coefficient based Improved Least Square - Support Vector Machine for Cyber-Attack Detection in internet of Things  3
Pearson Correlation Coefficient based Improved Least Square ...
收藏 引用
3rd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Senthilkumar, A. Joshika, S. Santhi, L. Shashidhara, K.S. Charanarur, Panem School Of Science And Information Technology Skyline University Nigeria Kano State Nigeria Srm Institute Of Science And Technology Department Of Cse With Cyber Security Tamilnadu Trichy India Psgr Krishnammal College For Women Tamilnadu Coimbatore India Nitte Meenakshi Institute Of Technology Dept. Of Ece Bengaluru India Tripura India
The wide utilization of smart devices and enormous weakness of security in networks has maximized a count of cyber-attacks in internet of Things (IoT). The detection and classification of malicious traffic is essentia... 详细信息
来源: 评论
Implementing Blockchain and Smart Encryption for Immutable Purchase and Generates Digital Ownership Certificates  3
Implementing Blockchain and Smart Encryption for Immutable P...
收藏 引用
3rd international conference on Artificial Intelligence For internet of Things, AIIoT 2024
作者: Sodhi, Arshdeep Singh Das, Sanjana Loganathan, Sathyapriya SRM Institute of Science and Technology Kattankulathur School of Computing Department of Computing Technologies Chennai603203 India
Blockchain functions as a decentralized and distributed ledger technology, ensuring the secure recording and verification of transactions across a network of computers. It tackles trust, transparency, and resistance t... 详细信息
来源: 评论
Research on distributed Storage Algorithm for Multi-Source Survey Data in Power Grid Engineering  3
Research on Distributed Storage Algorithm for Multi-Source S...
收藏 引用
3rd international conference on Artificial Intelligence, internet of Things and Cloud computing technology, AIoTC 2024
作者: Zhang, Jiyong Yu, Gao Liu, Donghui Sun, Xiaohu Huang, Jiangqian He, Bangzheng State Grid Economic and Technical Research Institute Co. State Grid Corporation of China Beijing China Economic and Technical Research Institute State Grid Zhejiang Electric Power Co. State Grid Corporation of China Zhejiang China School of Geomatics and Urban Spatial Information Beijing University of Civil Engineering and Architecture Beijing China
With the rapid development of power grid engineering, especially the rapid development of extra-high voltage engineering, the multi-source heterogeneous investigation data is on the increase, and the traditional inves... 详细信息
来源: 评论
Anomaly-Based Intrusion Detection System Using Bidirectional Long Short-Term Memory for internet of Things  3
Anomaly-Based Intrusion Detection System Using Bidirectional...
收藏 引用
3rd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Jagdish Kumar, P. Neduncheliyan, S. Adnan, Myasar Mundher Sudhakar, K. Sudhakar, A.V.V. Bharath Institute Of Higher Education And Research Department Of Cse Tamil Nadu Chennai India School Of Computing Bharath Institute Of Higher Education And Research Tamil Nadu Chennai India College Of Technical Engineering The Islamic University Department Of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute Of Technology Dept. Of Ai & Ds Bengaluru India Sr University Department Of Electrical And Electronics Engineering Warangal India
The developing use of internet of Things (IoT) applications in several aspects created a large number of data which is need the occurrence of existing techniques like fog and cloud computing. The Intrusion Detection S... 详细信息
来源: 评论