咨询与建议

限定检索结果

文献类型

  • 7,969 篇 会议
  • 155 册 图书
  • 90 篇 期刊文献

馆藏范围

  • 8,214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,678 篇 工学
    • 5,067 篇 计算机科学与技术...
    • 2,815 篇 软件工程
    • 1,384 篇 信息与通信工程
    • 1,158 篇 电气工程
    • 564 篇 控制科学与工程
    • 262 篇 生物工程
    • 251 篇 机械工程
    • 231 篇 动力工程及工程热...
    • 208 篇 电子科学与技术(可...
    • 184 篇 仪器科学与技术
    • 168 篇 安全科学与工程
    • 154 篇 生物医学工程(可授...
    • 130 篇 网络空间安全
    • 122 篇 环境科学与工程(可...
    • 110 篇 交通运输工程
    • 98 篇 建筑学
  • 1,185 篇 理学
    • 588 篇 数学
    • 295 篇 生物学
    • 171 篇 系统科学
    • 170 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 93 篇 化学
  • 1,040 篇 管理学
    • 739 篇 管理科学与工程(可...
    • 407 篇 工商管理
    • 356 篇 图书情报与档案管...
  • 234 篇 医学
    • 205 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 134 篇 公共卫生与预防医...
  • 214 篇 法学
    • 132 篇 社会学
  • 147 篇 经济学
    • 146 篇 应用经济学
  • 83 篇 教育学
  • 80 篇 农学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 1,197 篇 internet of thin...
  • 833 篇 cloud computing
  • 407 篇 internet
  • 208 篇 distributed comp...
  • 205 篇 security
  • 196 篇 computer archite...
  • 171 篇 protocols
  • 165 篇 servers
  • 165 篇 computational mo...
  • 155 篇 edge computing
  • 151 篇 grid computing
  • 149 篇 real-time system...
  • 131 篇 big data
  • 119 篇 artificial intel...
  • 118 篇 information syst...
  • 118 篇 monitoring
  • 110 篇 mobile computing
  • 108 篇 computer science
  • 108 篇 blockchain
  • 103 篇 wireless sensor ...

机构

  • 28 篇 department of co...
  • 22 篇 uttaranchal inst...
  • 19 篇 chitkara univers...
  • 14 篇 department of co...
  • 13 篇 uttaranchal univ...
  • 13 篇 institute of com...
  • 12 篇 college of techn...
  • 12 篇 beijing universi...
  • 11 篇 shanghai jiao to...
  • 11 篇 school of comput...
  • 10 篇 sr university de...
  • 10 篇 beijing univ pos...
  • 9 篇 china electric p...
  • 9 篇 department of co...
  • 9 篇 beijing univ pos...
  • 9 篇 tu wien distribu...
  • 9 篇 distributed syst...
  • 8 篇 beijing univ tec...
  • 8 篇 school of comput...
  • 8 篇 hannam universit...

作者

  • 13 篇 dustdar schahram
  • 12 篇 yang yang
  • 12 篇 tai-hoon kim
  • 12 篇 barolli leonard
  • 11 篇 meena belwal
  • 11 篇 shinu m rajagopa...
  • 11 篇 rajagopal shinu ...
  • 10 篇 liu yang
  • 9 篇 takizawa makoto
  • 8 篇 buyya rajkumar
  • 8 篇 radha d.
  • 7 篇 wang wei
  • 7 篇 schulte stefan
  • 7 篇 dominik ślęzak
  • 7 篇 li bo
  • 7 篇 barolli admir
  • 7 篇 gehlot anita
  • 7 篇 kirthika devi v....
  • 7 篇 liu wei
  • 7 篇 ramakrishnan ram...

语言

  • 7,896 篇 英文
  • 294 篇 其他
  • 43 篇 中文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=3rd International Conference on Distributed Computing and Internet Technology"
8214 条 记 录,以下是4451-4460 订阅
排序:
3rd international conference on Advanced computing, Networking and Informatics, ICACNI 2015
收藏 引用
3rd international conference on Advanced computing, Networking, and Informatics, ICACNI 2015
The proceedings contain 66 papers. The special focus in this conference is on distributed Systems, Social Networks, and Applications. The topics include: An algorithm for partitioning community graph into sub-communit...
来源: 评论
Minimal Start Time Heuristics for Scheduling Workflows in Heterogeneous computing Systems  12th
Minimal Start Time Heuristics for Scheduling Workflows in He...
收藏 引用
12th international conference on distributed computing and internet technology (ICDCIT)
作者: Sirisha, D. VijayaKumari, G. Pragati Engn Coll Dept CSE Surampalem India JNTUH Dept CSE Hyderabad Andhra Pradesh India
Heterogeneous computing systems require efficient task-to-processor mapping for attaining high performance. Scheduling workflows on heterogeneous environments is shown to be NP-Complete. Several heuristics were develo... 详细信息
来源: 评论
New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve  3
New approach for securing communication over MQTT protocol A...
收藏 引用
3rd international conference on Systems of Collaboration, SysCo 2016
作者: Mektoubi, Abdessamad Hassani, Hicham Lalaoui Belhadaoui, Hicham Rifi, Mounir Zakari, Abdelouahed RITM Laboratory CED Science de l'ingénieur ESTC Hassan II University Casablanca Morocco ITA Université de Lorraine Metz France
The internet of things (IoT) is the interconnection of physical objects with the internet network using existing technologies and communication protocols. The speed up and massive uses of this network's type in a ... 详细信息
来源: 评论
Performance Analysis of Object Store Systems in a Fog/Edge computing Infrastructures  8
Performance Analysis of Object Store Systems in a Fog/Edge C...
收藏 引用
8th IEEE international conference on Cloud computing technology and Science (CloudCom)
作者: Confais, Bastien Lebre, Adrien Parrein, Benoit CNRS IRCCyN UMR 6597 1 Rue NoeBP 92101 F-44321 Nantes 3 France INRIA LINA UMR 6241 Mines Nantes 4 Rue Alfred Kastler F-44300 Nantes France Univ Nantes IRCCyN UMR 6597 Polytech Nantes Rue Christian PaucBP 50609 F-44306 Nantes 3 France
Fog/Edge computing infrastructures have been proposed as an alternative of current Cloud computing facilities to address the latency issue that prevents the development of several applications. The main idea is to dep... 详细信息
来源: 评论
A Study on Anonymous Communication technology in MANET  1
收藏 引用
3rd international conference on High-Performance computing and Applications (HPCA)
作者: Fang, Weidong Wang, Jianping Shi, Zhidong Li, Fengrong Shan, Lianhai Shanghai Univ Key Lab Specialty Fiber Opt & Opt Access Networks Shanghai 200444 Peoples R China Chinese Acad Sci Shanghai Inst Microsyst & Informat Technol Key Lab Wireless Sensor Network & Commun Shanghai 201899 Peoples R China Shanghai Internet Things Co Ltd Shanghai Res Ctr Wireless Commun Shanghai 201800 Peoples R China
This paper addresses the anonymous communications technology. Multiple hops, self-organization, no fixed facilities and limited computing resources of wireless ad hoc networks (MANET) make it hard to apply high comple... 详细信息
来源: 评论
3-D array pattern distortion analysis  1
收藏 引用
3rd international conference on Innovations in Computer Science and Engineering, ICICSE 2015
作者: Dinesh Kumar, N. Vignan Institute of Technology & Science Deshmukhi India
Indian MST Radar antenna comprises of 1024 three-component Yagi-Uda receiving antennas masterminded in a 32 × 32 matrix over a territory of 130 m × 130 m. The antenna array is fed by 32 distributed transmitt... 详细信息
来源: 评论
Framework Model and Algorithm of Request based One Time Passkey (ROTP) Mechanism to Authenticate Cloud Users in Secured Way  3
Framework Model and Algorithm of Request based One Time Pass...
收藏 引用
3rd international conference on computing for Sustainable Global Development (INDIACom)
作者: Boopathy, D. Sundaresan, M. Bharathiar Univ Dept Informat Technol Coimbatore 641046 Tamil Nadu India
One Time Password (OTP) is widely used by many online service providers to authenticate the users at the account log-in time. The username and password are fixed;this may be vulnerable for users. To avoid the fake log... 详细信息
来源: 评论
SenseQ: Creating relationships between objects to answer questions of humans by using Social Networks  2016
SenseQ: Creating relationships between objects to answer que...
收藏 引用
3rd Multidisciplinary international Social Networks conference, MISNC 2016, 5th ASE international conference on Social Informatics, SocialInformatics 2016 and 7th ASE international conference on Data Science, DS 2016
作者: Meana-Llorián, Daniel García, Cristian González García-Díaz, Vicente Cristina Pelayo G-Bustelo, B. Lovelle, Juan Manuel Cueva University of Oviedo Department of Computer Science Oviedo Asturias Spain
Social Networks are a source of information very use to know what happen around us. While, the internet of Things is a world that tries to measure everything by gathering data from sensors and interconnect different o... 详细信息
来源: 评论
Towards distributed Solution to the State Explosion Problem  3rd
Towards Distributed Solution to the State Explosion Problem
收藏 引用
3rd international conference on Information System Design and Intelligent Applications (INDIA)
作者: Allal, Lamia Belalem, Ghalem Dhaussy, Philippe Univ Oran 1 Ahmed Ben Bella Fac Exact & Appl Sci Dept Comp Sci Oran Algeria ENSTA Bretagne CNRS UMR 6285 Lab STICC Brest France
In the life cycle of any software system, a crucial phase formalization and validation through verification or testing induces an identification of errors infiltrated during its design. This is achieved through verifi... 详细信息
来源: 评论
The Implementation of Air Pollution Monitoring Service Using Hybrid Database Converter  7
The Implementation of Air Pollution Monitoring Service Using...
收藏 引用
7th international conference on Cloud computing and Big Data (CCBD)
作者: Sun, Pei-Lun Weng, Jia-Yow Yang, Chao-Tung Chen, Shuo-Tsung Liu, Jung-Chun Tunghai Univ Dept Comp Sci Taichung 40704 Taiwan
In this work, the proposed Intelligent Indoor Environment Monitoring System in Cloud (iDEMS) combines environmental sensors with ZigBee wireless sensor network technology to store and process environmental data in HBa... 详细信息
来源: 评论