咨询与建议

限定检索结果

文献类型

  • 7,969 篇 会议
  • 155 册 图书
  • 90 篇 期刊文献

馆藏范围

  • 8,214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,678 篇 工学
    • 5,067 篇 计算机科学与技术...
    • 2,815 篇 软件工程
    • 1,384 篇 信息与通信工程
    • 1,158 篇 电气工程
    • 564 篇 控制科学与工程
    • 262 篇 生物工程
    • 251 篇 机械工程
    • 231 篇 动力工程及工程热...
    • 208 篇 电子科学与技术(可...
    • 184 篇 仪器科学与技术
    • 168 篇 安全科学与工程
    • 154 篇 生物医学工程(可授...
    • 130 篇 网络空间安全
    • 122 篇 环境科学与工程(可...
    • 110 篇 交通运输工程
    • 98 篇 建筑学
  • 1,185 篇 理学
    • 588 篇 数学
    • 295 篇 生物学
    • 171 篇 系统科学
    • 170 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 93 篇 化学
  • 1,040 篇 管理学
    • 739 篇 管理科学与工程(可...
    • 407 篇 工商管理
    • 356 篇 图书情报与档案管...
  • 234 篇 医学
    • 205 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 134 篇 公共卫生与预防医...
  • 214 篇 法学
    • 132 篇 社会学
  • 147 篇 经济学
    • 146 篇 应用经济学
  • 83 篇 教育学
  • 80 篇 农学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 1,197 篇 internet of thin...
  • 833 篇 cloud computing
  • 407 篇 internet
  • 208 篇 distributed comp...
  • 205 篇 security
  • 196 篇 computer archite...
  • 171 篇 protocols
  • 165 篇 servers
  • 165 篇 computational mo...
  • 155 篇 edge computing
  • 151 篇 grid computing
  • 149 篇 real-time system...
  • 131 篇 big data
  • 119 篇 artificial intel...
  • 118 篇 information syst...
  • 118 篇 monitoring
  • 110 篇 mobile computing
  • 108 篇 computer science
  • 108 篇 blockchain
  • 103 篇 wireless sensor ...

机构

  • 28 篇 department of co...
  • 22 篇 uttaranchal inst...
  • 19 篇 chitkara univers...
  • 14 篇 department of co...
  • 13 篇 uttaranchal univ...
  • 13 篇 institute of com...
  • 12 篇 college of techn...
  • 12 篇 beijing universi...
  • 11 篇 shanghai jiao to...
  • 11 篇 school of comput...
  • 10 篇 sr university de...
  • 10 篇 beijing univ pos...
  • 9 篇 china electric p...
  • 9 篇 department of co...
  • 9 篇 beijing univ pos...
  • 9 篇 tu wien distribu...
  • 9 篇 distributed syst...
  • 8 篇 beijing univ tec...
  • 8 篇 school of comput...
  • 8 篇 hannam universit...

作者

  • 13 篇 dustdar schahram
  • 12 篇 yang yang
  • 12 篇 tai-hoon kim
  • 12 篇 barolli leonard
  • 11 篇 meena belwal
  • 11 篇 shinu m rajagopa...
  • 11 篇 rajagopal shinu ...
  • 10 篇 liu yang
  • 9 篇 takizawa makoto
  • 8 篇 buyya rajkumar
  • 8 篇 radha d.
  • 7 篇 wang wei
  • 7 篇 schulte stefan
  • 7 篇 dominik ślęzak
  • 7 篇 li bo
  • 7 篇 barolli admir
  • 7 篇 gehlot anita
  • 7 篇 kirthika devi v....
  • 7 篇 liu wei
  • 7 篇 ramakrishnan ram...

语言

  • 7,896 篇 英文
  • 294 篇 其他
  • 43 篇 中文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=3rd International Conference on Distributed Computing and Internet Technology"
8214 条 记 录,以下是4481-4490 订阅
排序:
Analysis of security algorithms in cloud computing
Analysis of security algorithms in cloud computing
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Tanvi Agrawal S. K. Singh Amity University Lucknow INDIA
Cloud computing is a collection of distributed services, application, information and infrastructure. Cloud computing may be defined as the set of services that provide infrastructure resources using internet and data... 详细信息
来源: 评论
Mining Crowdsourcing Photos for Recognizing Landmark Areas  10
Mining Crowdsourcing Photos for Recognizing Landmark Areas
收藏 引用
10th international conference on Innovative Mobile and internet Services in Ubiquitous computing (IMIS)
作者: Liu, Yi-Hau Lin, Shian-Hua Lai, Chun-Ku Huang, Chun-Che Lu, Cheng-Yu Natl Chi Nan Univ Dept Comp Sci & Info Engn 1 Univ Rd Puli 545 Nantou County Taiwan Natl Chi Nan Univ Dept Info Management 1 Univ Rd Puli 545 Nantou County Taiwan PIXNET Media ~! Inc 3FSec 2Mingsheng E Rd Taipei 104 Taiwan
To solve the problem of automatically drawing landmark areas for nice vista points, in this paper, photos metadata of popular urban landmarks or natural landscapes are collected and extracted from Flickr and Google Ma... 详细信息
来源: 评论
Software Technologies: Applications and Foundations, STAF 2016 Collocated Workshops: 5th international Symposium on Data to Models and Back, DataMod 2016, 7th international Workshop on Graph Computation Models, GCM 2016, 3rd international Workshop on Human-Oriented Formal Methods, HOFM 2016, 2nd international Workshop on Model-Driven Engineering, Logic and Optimization, MELO 2016, 3rd international Workshop on Software Engineering Methods in Spreadsheets, SEMS 2016 and 1st international Workshop on Formal to Practical Software Verification and Composition, VeryComp 2016
Software Technologies: Applications and Foundations, STAF 20...
收藏 引用
Software Technologies: Applications and Foundations, STAF 2016 Collocated Workshops: 5th international Symposium on Data to Models and Back, DataMod 2016, 7th international Workshop on Graph Computation Models, GCM 2016, 3rd international Workshop on Human-Oriented Formal Methods, HOFM 2016, 2nd international Workshop on Model-Driven Engineering, Logic and Optimization, MELO 2016, 3rd international Workshop on Software Engineering Methods in Spreadsheets, SEMS 2016 and 1st international Workshop on Formal to Practical Software Verification and Composition, VeryComp 2016
The proceedings contain 36 papers. The special focus in this conference is on DataMod, GCM, HOFM, MELO, SEMS and VeryComp. The topics include: Separating topological noise from features using persistent entropy;an acc...
来源: 评论
Reliable Coordination Patterns in Cyber-Physical-Social Systems  3
Reliable Coordination Patterns in Cyber-Physical-Social Syst...
收藏 引用
3rd international conference on Data and Software Engineering (ICoDSE)
作者: Candra, Muhammad Z. C. Truong, Hong-Linh Inst Teknologi Bandung Knowledge & Software Engn Grp Bandung Indonesia TU Wien Distributed Syst Grp Vienna Austria
Human's computation power can be harnessed using the so-called Cyber-Physical-Social System (CPSS), which contains a mix of human-based and machine-based compute units. The inherent problem of human-based computat... 详细信息
来源: 评论
A security scheme to minimize information loss during big data transmission over the internet  3
A security scheme to minimize information loss during big da...
收藏 引用
3rd international conference on Computer and Information Sciences, ICCOINS 2016
作者: Bhattacharjee, Shiladitya Rahim, Lukman Bin A. Aziz, Izzatdin B. A. Department of Computer and Information Science Universiti Teknologi PETRONAS Bandar Seri Iskandar Malaysia
During big data transmission, information loss occurs due to distinct single or multiple bits discrete or continuous transportation errors. The other causes are extra overhead and delays, triggered by diverse highly c... 详细信息
来源: 评论
Instance type selection in proactive horizontal auto-scaling  8
Instance type selection in proactive horizontal auto-scaling
收藏 引用
8th IEEE international conference on Cloud computing technology and Science, CloudCom 2016
作者: Morais, Fabio Jorge Almeida Lopes, Raquel Brasileiro, Francisco Universidade Federal de Campina Grande Distributed System Laboratory Campina Grande PB Brazil
Horizontally scalable applications can potentially run very efficiently over IaaS environments. For that, application providers need to appropriately plan the resource capacity that is to be acquired from the cloud pr... 详细信息
来源: 评论
Three Phase Security System for Vehicles Using Face Recognition on distributed Systems  3rd
Three Phase Security System for Vehicles Using Face Recognit...
收藏 引用
3rd international conference on Information System Design and Intelligent Applications (INDIA)
作者: Rajeshwari, J. Karibasappa, K. Gopalakrishna, M. T. Dayananda Sagar Coll Engn Bangalore Karnataka India Oxford Coll Engn Bangalore Karnataka India KS Sch Engn & Management Bangalore Karnataka India
There is a continuing problem of automobile theft which is a greater challenge that needs to be solved. Traditional security system needs many sensors and it is costlier. Modern security system needs to be implemented... 详细信息
来源: 评论
Logistics Vehicle Travel Preference of Interest Points Based on Speed and Accessory State  9th
Logistics Vehicle Travel Preference of Interest Points Based...
收藏 引用
9th international conference on internet and distributed computing Systems (IDCS)
作者: Xiong, Shengwu Kuang, Li Duan, Pengfei Shi, Wei Wuhan Univ Technol Sch Comp Sci & Technol Wuhan Peoples R China Hubei Key Lab Transportat Internet Things Wuhan Peoples R China
In a crowded city, directions and speed of vehicles are usually changed arbitrarily. Analyzing travel preferences of vehicle has become a focus of research as it helps to classify region of interest in city and can be... 详细信息
来源: 评论
Load balancing in cloud computing using a local search technique-Tabu Search  3rd
Load balancing in cloud computing using a local search techn...
收藏 引用
3rd international conference on Foundations and Frontiers in Computer, Communication and Electrical Engineering (C2E2)
作者: Mondal, Brototi Das, Madhuchanda Mukherjee, Chayanti Das, Oishika Supreme Knowledge Fdn Grp Inst Hooghly W Bengal India
Cloud computing offers distributed, virtualized, and elastic resources as utilities to end users, which has the potential to support full realization of "computing as a utility" in the near future. Cloud com... 详细信息
来源: 评论
An improved approach of cloud service brokerage model in multi-cloud environment  3rd
An improved approach of cloud service brokerage model in mul...
收藏 引用
3rd international conference on Foundations and Frontiers in Computer, Communication and Electrical Engineering (C2E2)
作者: Bhabani, Bidisha Supreme Knowledge Fdn Grp Inst Comp Sci Engn Dept Hooghly W Bengal India
Cloud computing has emerged as one of the most promising and challenging technologies at present. Cloud Service Broker (CSB) creates a governed and secure cloud management platform to simplify the delivery of complex ... 详细信息
来源: 评论