咨询与建议

限定检索结果

文献类型

  • 284 篇 会议
  • 10 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 208 篇 工学
    • 188 篇 计算机科学与技术...
    • 92 篇 软件工程
    • 48 篇 电气工程
    • 46 篇 信息与通信工程
    • 28 篇 控制科学与工程
    • 16 篇 生物工程
    • 13 篇 动力工程及工程热...
    • 11 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 7 篇 石油与天然气工程
    • 6 篇 交通运输工程
    • 6 篇 环境科学与工程(可...
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 4 篇 农业工程
  • 43 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 15 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 42 篇 理学
    • 21 篇 数学
    • 16 篇 生物学
    • 5 篇 物理学
    • 4 篇 大气科学
    • 3 篇 化学
    • 3 篇 系统科学
  • 11 篇 法学
    • 10 篇 法学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 4 篇 农学
    • 4 篇 作物学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 50 篇 internet of thin...
  • 47 篇 cloud computing
  • 17 篇 edge computing
  • 15 篇 blockchain
  • 11 篇 internet
  • 10 篇 security
  • 10 篇 distributed comp...
  • 9 篇 information syst...
  • 8 篇 peer to peer com...
  • 8 篇 computer communi...
  • 8 篇 web services
  • 7 篇 computer archite...
  • 7 篇 data mining
  • 6 篇 iot
  • 6 篇 servers
  • 6 篇 computational mo...
  • 6 篇 real-time system...
  • 6 篇 mobile communica...
  • 6 篇 mobile computing
  • 6 篇 web and internet...

机构

  • 3 篇 state key labora...
  • 2 篇 university of sc...
  • 2 篇 vienna universit...
  • 2 篇 college of infor...
  • 2 篇 tu münchen garch...
  • 2 篇 school of comput...
  • 2 篇 nokia research c...
  • 2 篇 ptu jalandhar pu...
  • 2 篇 distributed & ub...
  • 2 篇 fujian provincia...
  • 2 篇 shanghai jiao to...
  • 2 篇 department of co...
  • 2 篇 university of pi...
  • 2 篇 nanjing univ sta...
  • 2 篇 the first resear...
  • 2 篇 department of el...
  • 2 篇 isislab - dipart...
  • 2 篇 technical univer...
  • 2 篇 department of el...
  • 2 篇 srm institute of...

作者

  • 2 篇 ganesan geetha
  • 2 篇 zhang lei
  • 2 篇 decker christian
  • 2 篇 sun yan
  • 2 篇 michael alexande...
  • 2 篇 manish parashar
  • 2 篇 roberto g. casce...
  • 2 篇 zomaya albert y.
  • 2 篇 boumediene kamel
  • 2 篇 alexandru costan
  • 2 篇 berchtold martin
  • 2 篇 luís lopes
  • 2 篇 emmanuel jeannot
  • 2 篇 vittorio scarano
  • 2 篇 muthanna ammar
  • 2 篇 stephen l. scott
  • 2 篇 ammar muthanna
  • 2 篇 chunshao ren
  • 2 篇 nikolov emil
  • 2 篇 mohanty subhadar...

语言

  • 288 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"任意字段=5th International Conference on Distributed Computing and Internet Technology, ICDCIT 2008"
299 条 记 录,以下是51-60 订阅
排序:
Up-Link/Down-Link Availability Calculation in Cloud Using Ford Fulkerson Algorithm  5th
Up-Link/Down-Link Availability Calculation in Cloud Using Fo...
收藏 引用
5th international conference on Computational Intelligence, Cyber Security and Computational Models, ICC3 2021
作者: Devi, R. Gopalakrishnan, V. Government College of Technology Tamil Nadu Coimbatore641013 India
In recent days Cloud plays a vital role in Information technology. Many customers and organization are moving towards the cloud computing environment for effective utilization of the resources. Availability of Interne... 详细信息
来源: 评论
distributed Data Sharing and Access Control in Industrial IoT Using Blockchain technology
Distributed Data Sharing and Access Control in Industrial Io...
收藏 引用
Computer Engineering and Intelligent Control (ICCEIC) international conference on
作者: Rui Li Yan Sun Caiyun Liu Ying Wen Yitong Liu Fujian Provincial Industrial and Information Industry Development Research Center Fuzhou Fujian China China Industrial Control Systems Cyber Emergency Reponse Team Beijing China
With the rapid development of the Industrial internet of things (IIoT), secure and efficient data sharing has become crucial for enabling industrial automation and smart transformation. However, existing centralized s... 详细信息
来源: 评论
Exploring Robust DDoS Detection: A Machine Learning Analysis with the CICDDoS2019 Dataset
Exploring Robust DDoS Detection: A Machine Learning Analysis...
收藏 引用
India Council international Subsections conference (INDISCON), IEEE
作者: Kamal Saluja Susama Bagchi Vikas Solanki Muhammad Numan Ali Khan Esha Dhamija Sanjoy Kumar Debnath Chitkara University Institite of Engineering and Technology Chitkara University Punjab India College of Computing and Information Sciences University of Technology and Applied sciences Shinas Sultanate of Oman
the ever-present threat posed by distributed Denial of Service attack is highlighted. the significance of building robust cybersecurity measures that are not just inventive but also flexible. the purpose of this study... 详细信息
来源: 评论
three-Dimensional Data Security Architecture of Agricultural Supply Chain Driven by Blockchain  5
Three-Dimensional Data Security Architecture of Agricultural...
收藏 引用
5th international conference on High Performance Big Data and Intelligent Systems, HDIS 2023
作者: Chen, Xiao Zhang, Guofeng Zhao, Chuan Wang, Bingbing Feng, Bin Wang, Peng Li, Qiuling Li, Songhe Shen, Cong School of Economics and Management Taishan University Taian China School of Information Science and Technology Taishan University Taian China School of Information Science and Engineering Shandong Provincial Key Laboratory of Network-based Intelligent Computing University of Jinan Jinan China School of Information Science and Engineering University of Jinan Jinan China College of Physics and Electronic Engineering Taishan University Taian China
Agricultural supply chain systems mainly focus on technological applications, but do not pay enough attention to the privacy protection and data security guarantee of the entire supply chain entities. they face practi... 详细信息
来源: 评论
5th international Symposium on Mobile internet Security, MobiSec 2021
5th International Symposium on Mobile Internet Security, Mob...
收藏 引用
5th international Symposium on Mobile internet Security, MobiSec 2021
the proceedings contain 28 papers. the special focus in this conference is on Mobile internet Security. the topics include: Smart Contract-Based Personal Data Protection Framework: In Cross-App Advertising;a Blockchai...
来源: 评论
Extended johnson's sequencing for load balancing in edge computing  5
Extended johnson's sequencing for load balancing in edge com...
收藏 引用
5th international conference on Intelligent computing and Control Systems, ICICCS 2021
作者: Herbert Raj, P.
Mobile / Multi-Access Edge computing (MEC) arose as an important technology in order to facilitate lowlatency data processing at the edge of mobile networks. this empowers MEC to reduce congestion in the network, incr... 详细信息
来源: 评论
Research on internet of things Signals Acquisition and Processing based on Edge Computation
Research on Internet of Things Signals Acquisition and Proce...
收藏 引用
Computer Engineering and Intelligent Control (ICCEIC) international conference on
作者: Xiaolong Zhang Wenheng Qiu Huaping Yang Aohua Hou College of Electrical Engineering and New Energy China Three Gorges University Hubei Yichang China Faculty of Automotive and Traffic Engineering Hubei University of Arts and Sciences Hubei Xiangyang China
the proliferation of internet of things (IoT) devices has led to the generation of vast quantities of data, placing considerable strain on conventional cloud computing infrastructure. Edge computing has emerged as a v... 详细信息
来源: 评论
Deep reinforcement learning based delay-Aware task offloading for UAV-Assisted edge computing  5
Deep reinforcement learning based delay-Aware task offloadin...
收藏 引用
5th international conference on Algorithms, computing and Artificial Intelligence, ACAI 2022
作者: Huang, Mingxuan Sun, Kaixuan Hou, Yunpeng Ye, Zhicheng Wan, Yuanlong He, Huasen University of Science and Technology of China Hefei China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei China
Multi-Access edge computing has been widely used in various internet of things (IoT) devices because of its excellent computing and fast interaction abilities. How to improve the service extensibility of edge computin... 详细信息
来源: 评论
EdgeGuard: Real-Time Rule-Based Spam Detection for IOTA Tangle on Edge Devices
EdgeGuard: Real-Time Rule-Based Spam Detection for IOTA Tang...
收藏 引用
Emerging technology (INCET), international conference for
作者: Arunodhai V Leena P Susan Jinesh M. Kannimoola Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
Our research paper addresses the pressing security challenges emerging within the rapidly expanding internet of things (IoT) landscape, with a specific focus on the IOTA Tangle—a distributed ledger based on Directed ... 详细信息
来源: 评论
An Intelligent Security Systems in Cloud computing using Cryptography Techniques
An Intelligent Security Systems in Cloud Computing using Cry...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 international conference on
作者: V Srilakshmi V Lakshmi Chetana Raghunadha Reddi Dornala S Parvathi Vallabaneni Ganji Ramanjaiah School of Computer Science and Engineering VIT -AP University Amaravati Andhra Pradesh India Department of Computer Science and Engineering School of Computing Amrita Vishwa Vidyapeetham India Walgreens USA Department of IT PVP Siddhartha Institute of Technology Vijayawada INDIA Dept.of CSE R V Institute of Technology GUNTUR
Delivering computing resources over the internet has seen a paradigm shift towards cloud computing. However, there are serious security risks because cloud environments are distributed and shared. Intelligent Security... 详细信息
来源: 评论