咨询与建议

限定检索结果

文献类型

  • 284 篇 会议
  • 10 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 208 篇 工学
    • 188 篇 计算机科学与技术...
    • 92 篇 软件工程
    • 48 篇 电气工程
    • 46 篇 信息与通信工程
    • 28 篇 控制科学与工程
    • 16 篇 生物工程
    • 13 篇 动力工程及工程热...
    • 11 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 7 篇 石油与天然气工程
    • 6 篇 交通运输工程
    • 6 篇 环境科学与工程(可...
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 4 篇 农业工程
  • 43 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 15 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 42 篇 理学
    • 21 篇 数学
    • 16 篇 生物学
    • 5 篇 物理学
    • 4 篇 大气科学
    • 3 篇 化学
    • 3 篇 系统科学
  • 11 篇 法学
    • 10 篇 法学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 4 篇 农学
    • 4 篇 作物学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 50 篇 internet of thin...
  • 47 篇 cloud computing
  • 17 篇 edge computing
  • 15 篇 blockchain
  • 11 篇 internet
  • 10 篇 security
  • 10 篇 distributed comp...
  • 9 篇 information syst...
  • 8 篇 peer to peer com...
  • 8 篇 computer communi...
  • 8 篇 web services
  • 7 篇 computer archite...
  • 7 篇 data mining
  • 6 篇 iot
  • 6 篇 servers
  • 6 篇 computational mo...
  • 6 篇 real-time system...
  • 6 篇 mobile communica...
  • 6 篇 mobile computing
  • 6 篇 web and internet...

机构

  • 3 篇 state key labora...
  • 2 篇 university of sc...
  • 2 篇 vienna universit...
  • 2 篇 college of infor...
  • 2 篇 tu münchen garch...
  • 2 篇 school of comput...
  • 2 篇 nokia research c...
  • 2 篇 ptu jalandhar pu...
  • 2 篇 distributed & ub...
  • 2 篇 fujian provincia...
  • 2 篇 shanghai jiao to...
  • 2 篇 department of co...
  • 2 篇 university of pi...
  • 2 篇 nanjing univ sta...
  • 2 篇 the first resear...
  • 2 篇 department of el...
  • 2 篇 isislab - dipart...
  • 2 篇 technical univer...
  • 2 篇 department of el...
  • 2 篇 srm institute of...

作者

  • 2 篇 ganesan geetha
  • 2 篇 zhang lei
  • 2 篇 decker christian
  • 2 篇 sun yan
  • 2 篇 michael alexande...
  • 2 篇 manish parashar
  • 2 篇 roberto g. casce...
  • 2 篇 zomaya albert y.
  • 2 篇 boumediene kamel
  • 2 篇 alexandru costan
  • 2 篇 berchtold martin
  • 2 篇 luís lopes
  • 2 篇 emmanuel jeannot
  • 2 篇 vittorio scarano
  • 2 篇 muthanna ammar
  • 2 篇 stephen l. scott
  • 2 篇 ammar muthanna
  • 2 篇 chunshao ren
  • 2 篇 nikolov emil
  • 2 篇 mohanty subhadar...

语言

  • 295 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=5th International Conference on Distributed Computing and Internet Technology, ICDCIT 2008"
299 条 记 录,以下是31-40 订阅
排序:
Implementation of distributed Crawler System Based on Spark for Massive Data Mining  5
Implementation of Distributed Crawler System Based on Spark ...
收藏 引用
IEEE 5th international conference on Computer and Communication Systems (ICCCS)
作者: Liu, Feng Xin, Wang Hebei GEO Univ Shijiazhuang Hebei Peoples R China Hebei Software Testing Ctr Shijiazhuang Hebei Peoples R China
In the era of rapid development of internet technology and increasing social needs of people, web crawlers have been maturely applied to major search engines and search fields. By using Spark's RDD elastic computi... 详细信息
来源: 评论
Detection and Analysis Framework of Anomalous internet Crime Data Based on Edge computing  5
Detection and Analysis Framework of Anomalous Internet Crime...
收藏 引用
5th international conference on Inventive Computation Technologies (ICICT)
作者: Cai, Yijun Li, Dian Wang, Yuyue Shanghai Univ Polit Sci & Law Shanghai 201701 Peoples R China Jiaxing Univ Fac Literature & Law Jiaxing 314033 Zhejiang Peoples R China Autodesk Software China Co Ltd Shanghai 200122 Peoples R China
Detection and analysis framework of anomalous internet crime data based on edge computing is designed in this paper. the edge server is both the edge data processing center and the data storage center. the edge server... 详细信息
来源: 评论
A Survey of RDMA distributed Storage  24
A Survey of RDMA Distributed Storage
收藏 引用
5th international conference on computing, Networks and internet of things (CNIOT)
作者: Wang, Ziqi Liu, Yaping Zhang, Shuo Hu, Jinrui Liu, Xinyi Guangzhou Univ Sch Cyberspace Inst Adv Technol Guangzhou Peoples R China Peng Cheng Lab Shenzhen Shenzhen 518000 Peoples R China
With the evolution of networking technology, RDMA (Remote Direct Memory Access) has become an increasingly critical component in data centers. Its zero-copy and kernel-bypass capabilities significantly boost network t... 详细信息
来源: 评论
A Computational Evaluation of distributed Machine Learning Algorithms  5
A Computational Evaluation of Distributed Machine Learning A...
收藏 引用
IEEE 5th international conference for Convergence in technology (I2CT)
作者: Magdum, Junaid Ghorse, Ritesh Chaku, Chetan Barhate, Rahul Deshmukh, Shyam PICT Dept Informat Technol Pune Maharashtra India MIT Coll Engn Dept Informat Technol Pune Maharashtra India
Over the past few years, availability of data throughout the internet has scaled to petabytes. Processing this data demands a strong computing mechanism rather than usual machine learning techniques. distributed machi... 详细信息
来源: 评论
On Performance Study of the Global Arrays Toolkit on Cluster and Grid computing Environments
On Performance Study of The Global Arrays Toolkit on Cluster...
收藏 引用
5th international conference on Electrical Engineering/Electronics, Computer Telecommunications and Information technology
作者: Sirisup, Sirod U-ruekolan, Suriya NECTEC Large Scale Simulat Res Lab Klongluang 12120 Pathumthani Thailand
the Global Arrays toolkit is a library that allows programmers to write parallel programs that use large arrays distributed across processing nodes. the toolkit provides advantage of one-sided communication operations... 详细信息
来源: 评论
Hierarchical self-destruction method and case study on distributed computing system
Hierarchical self-destruction method and case study on distr...
收藏 引用
5th international conference on internet computing for Science and Engineering, ICICSE 2010
作者: Lin, Junyu Wang, Huiqiang Qiu, Zhitao Feng, Guangsheng College of Computer Science and Technology Harbin Engineering University Harbin China
Self-destruction technology is very important to protect privacy information and is the ultimate means for information security. To achieve self-destruction of distributed system, a hierarchical self-destruction syste... 详细信息
来源: 评论
Privacy in internet of things: A Model and Protection Framework  6th
Privacy in Internet of Things: A Model and Protection Framew...
收藏 引用
6th international conference on Ambient Systems, Networks and Technologies (ANT) / 5th international conference on Sustainable Energy Information technology (SEIT)
作者: Samani, Afshan Ghenniwa, Hamada H. Wahaishi, Abdulmutalib Univ Western Ontario Elect & Comp Engn London ON Canada United Arab Emirates Univ Coll Informat Technol Al Ain U Arab Emirates
A new form of computation is being evolved to include massive number of diverse set of conventional computing systems, sensors, devices, equipments, software and information services and apps. this new form of computi... 详细信息
来源: 评论
distributed Semantic Reasoning enabled by Fog computing  12
Distributed Semantic Reasoning enabled by Fog Computing
收藏 引用
IEEE Int Congr on Cybermat / 12th IEEE Int Conf on Cyber, Phys and Social Comp (CPSCom) / 15th IEEE Int Conf on Green computing and Communications (GreenCom) / 12th IEEE Int Conf on internet of things (ithings) / 5th IEEE Int Conf on Smart Data
作者: Chien, Yu Hsiang Lin, Fuchun Joseph Natl Chiao Tung Univ Coll Comp Sci Dept Comp Sci Hsinchu Taiwan
the emergence of various internet of things (IoT) applications has hastened the introduction of Semantics Interoperability (SI). Instead of storing enormous raw data, SI attempts to annotate these data with semantic i... 详细信息
来源: 评论
A novel algorithm for distributed data mining in HDFS  5
A novel algorithm for distributed data mining in HDFS
收藏 引用
5th international conference on Advanced computing, ICoAC 2013
作者: Natarajan, Surendar Sehar, Sountharrajan Bannari Amman Institute of Technology Sathyamangalam India
Evolution of Cloud computing technology over the internet and drastic increase in data size and intensity (Big Data) persuade Map Reduce and distributed file systems like HDFS (Hadoop distributed File System) as the p... 详细信息
来源: 评论
Securing Firmware in internet of things using Blockchain  5
Securing Firmware in Internet of Things using Blockchain
收藏 引用
5th international conference on Advanced computing and Communication Systems (ICACCS)
作者: Pillai, Akshay Sindhu, M. Lakshmy, K., V Amrita Vishwa Vidyapeetham Amrita Sch Engn TIFAC CORE Cyber Secur Coimbatore Tamil Nadu India
As of today, most of the internet of things (IoT) devices work in a centralized environment. With IoT devices having to execute thousands of operations per second, it has become difficult for centralized systems to ha... 详细信息
来源: 评论