咨询与建议

限定检索结果

文献类型

  • 7,951 篇 会议
  • 155 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 8,195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,659 篇 工学
    • 5,052 篇 计算机科学与技术...
    • 2,803 篇 软件工程
    • 1,381 篇 信息与通信工程
    • 1,157 篇 电气工程
    • 561 篇 控制科学与工程
    • 262 篇 生物工程
    • 250 篇 机械工程
    • 231 篇 动力工程及工程热...
    • 208 篇 电子科学与技术(可...
    • 183 篇 仪器科学与技术
    • 167 篇 安全科学与工程
    • 154 篇 生物医学工程(可授...
    • 129 篇 网络空间安全
    • 122 篇 环境科学与工程(可...
    • 109 篇 交通运输工程
    • 98 篇 建筑学
  • 1,181 篇 理学
    • 586 篇 数学
    • 295 篇 生物学
    • 171 篇 系统科学
    • 169 篇 物理学
    • 162 篇 统计学(可授理学、...
    • 92 篇 化学
  • 1,037 篇 管理学
    • 737 篇 管理科学与工程(可...
    • 406 篇 工商管理
    • 355 篇 图书情报与档案管...
  • 234 篇 医学
    • 205 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 134 篇 公共卫生与预防医...
  • 213 篇 法学
    • 131 篇 社会学
  • 147 篇 经济学
    • 146 篇 应用经济学
  • 83 篇 教育学
  • 78 篇 农学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 1,197 篇 internet of thin...
  • 832 篇 cloud computing
  • 407 篇 internet
  • 207 篇 distributed comp...
  • 205 篇 security
  • 196 篇 computer archite...
  • 171 篇 protocols
  • 165 篇 servers
  • 165 篇 computational mo...
  • 154 篇 edge computing
  • 151 篇 grid computing
  • 149 篇 real-time system...
  • 131 篇 big data
  • 119 篇 artificial intel...
  • 118 篇 information syst...
  • 118 篇 monitoring
  • 110 篇 mobile computing
  • 108 篇 computer science
  • 108 篇 blockchain
  • 103 篇 wireless sensor ...

机构

  • 28 篇 department of co...
  • 22 篇 uttaranchal inst...
  • 19 篇 chitkara univers...
  • 14 篇 department of co...
  • 13 篇 uttaranchal univ...
  • 13 篇 institute of com...
  • 12 篇 college of techn...
  • 12 篇 beijing universi...
  • 11 篇 shanghai jiao to...
  • 11 篇 school of comput...
  • 10 篇 sr university de...
  • 10 篇 beijing univ pos...
  • 9 篇 china electric p...
  • 9 篇 department of co...
  • 9 篇 beijing univ pos...
  • 9 篇 tu wien distribu...
  • 9 篇 distributed syst...
  • 8 篇 beijing univ tec...
  • 8 篇 school of comput...
  • 8 篇 hannam universit...

作者

  • 13 篇 dustdar schahram
  • 12 篇 yang yang
  • 12 篇 tai-hoon kim
  • 12 篇 barolli leonard
  • 11 篇 meena belwal
  • 11 篇 shinu m rajagopa...
  • 11 篇 rajagopal shinu ...
  • 10 篇 liu yang
  • 9 篇 takizawa makoto
  • 8 篇 buyya rajkumar
  • 8 篇 radha d.
  • 7 篇 wang wei
  • 7 篇 schulte stefan
  • 7 篇 dominik ślęzak
  • 7 篇 li bo
  • 7 篇 barolli admir
  • 7 篇 gehlot anita
  • 7 篇 kirthika devi v....
  • 7 篇 liu wei
  • 7 篇 wang ying

语言

  • 7,964 篇 英文
  • 207 篇 其他
  • 42 篇 中文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=3rd International Conference on Distributed Computing and Internet Technology"
8195 条 记 录,以下是4981-4990 订阅
排序:
A distributed Control Law for Optimum Sensor Placement for Source Localization  3
A Distributed Control Law for Optimum Sensor Placement for S...
收藏 引用
3rd international conference on Advances in computing, Communications and Informatics (ICACCI)
作者: Achanta, Hema Kumari Dasgupta, Soura Xu, Weiyu Mudumbai, Raghuraman Bai, Erwei Univ Iowa Dept Elect & Comp Engn Iowa City IA 52242 USA
We formulate a nonlinear distributed control law that guides the motion a group of sensors to achieve a configuration that permits them to optimally localize a hazardous source they must keep a prescribed distance fro... 详细信息
来源: 评论
A secure mutual authentication protocol for cloud computing using secret sharing and steganography  3
A secure mutual authentication protocol for cloud computing ...
收藏 引用
3rd IEEE international conference on Cloud computing for Emerging Markets, CCEM 2014
作者: Sarvabhatla, Mrudula Murugan, Giri Vorugunti, Chandra NBKRIST Tirupathi A.P517518 India SITAMS Chitoor A.P India Dhirubhai Ambani Institute of ICT Gandhinagar-Gujarat India
Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information tech... 详细信息
来源: 评论
Exploring local service allocation in community networks  10
Exploring local service allocation in community networks
收藏 引用
2014 10th IEEE international conference on Wireless and Mobile computing, Networking and Communications, WiMob 2014
作者: Vega, Davide Meseguer, Roc Cabrera, Guillem Marquès, Joan Manuel Computer Architecture Department Universitat Politècnica de Catalunya - BarcelonaTech C/ Jordi Girona 1-3 Barcelona08034 Spain Internet Interdisciplinary Institute Universitat Oberta de Catalunya C/ Roc Boronat 117 Barcelona08018 Spain
Community Cloud computing is a new trend on cloud computing that aims to build service infrastructures upon Wireless Community Networks taking advantage of underused community physical resources. Service allocation pr... 详细信息
来源: 评论
Autonomous Formation Control and Target Tracking in distributed Multi-agent System  3
Autonomous Formation Control and Target Tracking in Distribu...
收藏 引用
3rd international conference on Advances in computing, Communications and Informatics (ICACCI)
作者: Barve, Aabha Nene, Manisha J. Def Inst Adv Technol Dept Appl Math Pune Maharashtra India Def Inst Adv Technol Dept Comp Sci & Engn Pune Maharashtra India
A Multi-agent System can be considered as distributed system consisting of multiple interacting intelligent agents acting on a common environment. Agents in multi-agent system achieve the global objective of the syste... 详细信息
来源: 评论
Wireless LAN Security Enhancement through Trusted computing technology
Wireless LAN Security Enhancement through Trusted Computing ...
收藏 引用
3rd international conference on Mechanical, Control, and Electronic Information (ICMCEI)
作者: She, Xinping Xu, Jianming Yangtze Univ Sch Elect & informat Jinzhou 434023 Hubei Peoples R China Wuhan Jingshenghongye Informat Syst Co Ltd Wuhan 430072 Hunan Peoples R China
Wireless communication can provide ubiquitous access to the internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicat... 详细信息
来源: 评论
The research of distributed computer network technology based on web  3
The research of distributed computer network technology base...
收藏 引用
3rd international conference on Information technology and Management Innovation, ICITMI 2014
作者: Wang, Qian Yang, Chun Yan Cui, Chang Qing College of Computer Science Baicheng Normal University Baicheng China College of Mechanical Science and Engineering Jilin University Changchun China College of Mechanical Engineering Baicheng Normal University Baicheng China
With the rapid development of network technology, network scale, the increasing complexity, traditional centralized network data collecting the methods already cannot adapt to this situation, a web-based distributed c... 详细信息
来源: 评论
Research of internet of Things Based on Cloud computing
收藏 引用
3rd international conference on Computer-Aided Design, Manufacturing, Modeling and Simulation(CDMMS 2013)
作者: Xie, Feng Liang, Caizhi Guangdong Ind Tech Coll Dept Comp Engn Guangzhou 510300 Guangdong Peoples R China Guangdong Ind Tech Coll Guangzhou 510300 Guangdong Peoples R China
This paper discusses the application of cloud computing in the logistics information platform, First introduced the basic concept and advantages of cloud computing, cloud computing architecture, cloud computing applic... 详细信息
来源: 评论
The new miracle of Software manufacturing Instrument-"10∧(-17)".  3
The new miracle of Software manufacturing Instrument-"10∧(-...
收藏 引用
3rd international conference on Mechatronics and Control Engineering (ICMCE)
作者: Ying Huaiqiao Shen Song Liu Jinming China Orient Inst Noise & Vibrat Beijing Peoples R China
This article points out the views from "Software manufacturing Instrument" to "Software manufacturing Everything" and to "software rebuilds, rules, and defines the world", as well as show... 详细信息
来源: 评论
The Study on E-Business Authentication Approach in distributed System
收藏 引用
3rd international conference on Computer-Aided Design, Manufacturing, Modeling and Simulation(CDMMS 2013)
作者: Li, Guangya Henan Univ Inst Management Sci & Engn Kaifeng 475000 Henan Peoples R China
The most important and concerned problem with the internet electronic registration is security problem. This contribution uses conic curve method to verify the generating license in servers. In order to ensure the val... 详细信息
来源: 评论
The application of trusted computing technology in the cloud security
The application of trusted computing technology in the cloud...
收藏 引用
3rd international conference on Computer Engineering and Network, CENet 2013
作者: Li, Bo Lv, Shenjuan Zhang, Yongsheng Tian, Ming Academic Affairs Office Shandong Polytechnic Jinan 250104 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
For the lack of safety and reliability of the information in the cloud computing environment, in order to create a more flexible and adaptable security mechanism, the combination of cloud computing and credible concep... 详细信息
来源: 评论