咨询与建议

限定检索结果

文献类型

  • 7,969 篇 会议
  • 155 册 图书
  • 90 篇 期刊文献

馆藏范围

  • 8,214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,678 篇 工学
    • 5,067 篇 计算机科学与技术...
    • 2,815 篇 软件工程
    • 1,384 篇 信息与通信工程
    • 1,158 篇 电气工程
    • 564 篇 控制科学与工程
    • 262 篇 生物工程
    • 251 篇 机械工程
    • 231 篇 动力工程及工程热...
    • 208 篇 电子科学与技术(可...
    • 184 篇 仪器科学与技术
    • 168 篇 安全科学与工程
    • 154 篇 生物医学工程(可授...
    • 130 篇 网络空间安全
    • 122 篇 环境科学与工程(可...
    • 110 篇 交通运输工程
    • 98 篇 建筑学
  • 1,185 篇 理学
    • 588 篇 数学
    • 295 篇 生物学
    • 171 篇 系统科学
    • 170 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 93 篇 化学
  • 1,040 篇 管理学
    • 739 篇 管理科学与工程(可...
    • 407 篇 工商管理
    • 356 篇 图书情报与档案管...
  • 234 篇 医学
    • 205 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 134 篇 公共卫生与预防医...
  • 214 篇 法学
    • 132 篇 社会学
  • 147 篇 经济学
    • 146 篇 应用经济学
  • 83 篇 教育学
  • 80 篇 农学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 1,197 篇 internet of thin...
  • 833 篇 cloud computing
  • 407 篇 internet
  • 208 篇 distributed comp...
  • 205 篇 security
  • 196 篇 computer archite...
  • 171 篇 protocols
  • 165 篇 servers
  • 165 篇 computational mo...
  • 155 篇 edge computing
  • 151 篇 grid computing
  • 149 篇 real-time system...
  • 131 篇 big data
  • 119 篇 artificial intel...
  • 118 篇 information syst...
  • 118 篇 monitoring
  • 110 篇 mobile computing
  • 108 篇 computer science
  • 108 篇 blockchain
  • 103 篇 wireless sensor ...

机构

  • 28 篇 department of co...
  • 22 篇 uttaranchal inst...
  • 19 篇 chitkara univers...
  • 14 篇 department of co...
  • 13 篇 uttaranchal univ...
  • 13 篇 institute of com...
  • 12 篇 college of techn...
  • 12 篇 beijing universi...
  • 11 篇 shanghai jiao to...
  • 11 篇 school of comput...
  • 10 篇 sr university de...
  • 10 篇 beijing univ pos...
  • 9 篇 china electric p...
  • 9 篇 department of co...
  • 9 篇 beijing univ pos...
  • 9 篇 tu wien distribu...
  • 9 篇 distributed syst...
  • 8 篇 beijing univ tec...
  • 8 篇 school of comput...
  • 8 篇 hannam universit...

作者

  • 13 篇 dustdar schahram
  • 12 篇 yang yang
  • 12 篇 tai-hoon kim
  • 12 篇 barolli leonard
  • 11 篇 meena belwal
  • 11 篇 shinu m rajagopa...
  • 11 篇 rajagopal shinu ...
  • 10 篇 liu yang
  • 9 篇 takizawa makoto
  • 8 篇 buyya rajkumar
  • 8 篇 radha d.
  • 7 篇 wang wei
  • 7 篇 schulte stefan
  • 7 篇 dominik ślęzak
  • 7 篇 li bo
  • 7 篇 barolli admir
  • 7 篇 gehlot anita
  • 7 篇 kirthika devi v....
  • 7 篇 liu wei
  • 7 篇 ramakrishnan ram...

语言

  • 7,896 篇 英文
  • 294 篇 其他
  • 43 篇 中文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=3rd International Conference on Distributed Computing and Internet Technology"
8214 条 记 录,以下是4591-4600 订阅
排序:
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System
Sequence-Based Analysis of Static Probe Instrumentation Data...
收藏 引用
IEEE international conference on Cyber Security and Cloud computing (CSCloud)
作者: Ady Wahyudi Paundu Takeshi Okuda Youki Kadobayashi Suguru Yamaguchi Internet Engineering Laboratory Nara Institute of Science and Technology Ikoma Nara Japan
In this work, we propose a framework for a Virtual Machine Monitor (VMM)-based Anomaly Detection System (ADS). This framework uses a sequence-based analysis Hidden Markov Model (HMM) on static probe instrumentation da... 详细信息
来源: 评论
Analyzing Twitter sentiments through big data
Analyzing Twitter sentiments through big data
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Monu Kumar Anju Bala Department of Computer Science and Engg Thapar University Patiala INDIA
The rise of social media has generated tremendous interest among internet users today. Data from these social networking sites can be used for a number of purposes, like prediction, marketing or sentiment analysis. Tw... 详细信息
来源: 评论
Network forensics: Methodical literature review
Network forensics: Methodical literature review
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Gulshan Shrivastava School of Computer Science of Engineering Galgotias University Greater Noida India
Nowadays network grow explosively and crime related to the network is increasing. Network Forensics is a sub-division of digital forensics and it mainly focus on the analysis of network traffic and monitors the intrus... 详细信息
来源: 评论
DNS Protection against Spoofing and Poisoning Attacks
DNS Protection against Spoofing and Poisoning Attacks
收藏 引用
international conference on Information Science and Control Engineering (ICISCE)
作者: Mohammed Abdulridha Hussain Hai Jin Zaid Alaa Hussien Zaid Ameen Abduljabbar Salah H. Abbdal Ayad Ibrahim Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China University of Basrah Basrah Iraq Southern Technical University Basrah Iraq
Domain name system is among the core part of TCP/IP protocol suite and the standard protocol used by the internet. The domain name system consists of mapped website names with internet protocol, which facilitates brow... 详细信息
来源: 评论
Analysis on the Legal Regulation of Personal Information Commercialization in the Era of Cloud computing
Analysis on the Legal Regulation of Personal Information Com...
收藏 引用
3rd international conference on Applied Social Science Research(ICASSR 2015)
作者: Rui Zhao Ben-zhuo Fu Hai-cheng Zhang Department of Business Qinhuangdao Institute of Technology Department of Sports Qinhuangdao Institute of Technology Dean's Office Qinhuangdao Institute of Technology
With the development of internet and electronic business in the era of cloud computing, the commercialization of personal information is inevitable. The protection of the traditional right of privacy for the personal ... 详细信息
来源: 评论
Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment
Saphena: An Approach for Analyzing Similarity of Heterogeneo...
收藏 引用
IEEE international conference on Cyber Security and Cloud computing (CSCloud)
作者: Li Lin Jian Hu Xinya Mao Jianbiao Zhang National Engineering Laboratory for Classified Information Security Protection Beijing China College of Computer Science Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China
Analyzing similarity of access control policies is very important in many application sceneries, for example, conducting similarity analysis to reduce policy scale in cloud services composition, or through similar pol... 详细信息
来源: 评论
Design and Development of Integrated, Secured and Intelligent Architecture for internet of Things and Cloud computing  3
Design and Development of Integrated, Secured and Intelligen...
收藏 引用
3rd international conference on Future internet of Things and Cloud (FiCloud) / international conference on Open and Big Data (OBD)
作者: Bai, T. Daisy Premila Rabara, S. Albert St Josephs Coll Autonomous Dept Comp Sci Tiruchirappalli India
internet of Things (IoT) and Cloud computing paradigm is a next wave in the era of computing and it has been identified as one of the emerging technologies in the field of Computer Science and Information technology. ... 详细信息
来源: 评论
16th international conference on Computational Science and Its Applications, ICCSA 2016
16th International Conference on Computational Science and I...
收藏 引用
16th international conference on Computational Science and Its Applications, ICCSA 2016
The proceedings contain 51 papers. The special focus in this conference is on High Performance computing, Networks, Geometric Modeling, Graphics and Visualization. The topics include: Parallel sparse matrix-vector mul...
来源: 评论
The Synchronized Updating technology Research of Spatio-temporal Supervision Data Model About Organizing of Construction Landuse Data in distributed Environment  9th
The Synchronized Updating Technology Research of Spatio-temp...
收藏 引用
9th IFIP WG 5.14 international conference on Computer and computing Technologies in Agriculture (CCTA)
作者: Li, Xiaolan Gao, Bingbo Pan, Yuchun Zhou, Yanbing Hao, Xingyao Beijing Res Ctr Informat Technol Agr Beijing 100097 Peoples R China Natl Engn Res Ctr Informat Technol Agr Beijing 100097 Peoples R China Minist Agr Key Lab Agriinformat Beijing 100097 Peoples R China Beijing Engn Res Ctr Agr Internet Things Beijing 100097 Peoples R China
As China advances toward urbanization, the relation between supply and demand of land use is growing acutely. Effective supervision of various land use has become necessary to achieve reasonable and lawful use of land... 详细信息
来源: 评论
international Workshops on Financial Cryptography and Data Security, FC 2016
International Workshops on Financial Cryptography and Data S...
收藏 引用
international Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted computing and Applied Homomorphic Cryptography, WAHC 2016
The proceedings contain 22 papers. The special focus in this conference is on Homomorphic Encryption and Secure Multiparty Computation. The topics include: Stressing out;why buy when you can rent;automated verificatio...
来源: 评论