咨询与建议

限定检索结果

文献类型

  • 8,397 篇 会议
  • 212 册 图书
  • 146 篇 期刊文献

馆藏范围

  • 8,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,976 篇 工学
    • 5,329 篇 计算机科学与技术...
    • 3,031 篇 软件工程
    • 1,625 篇 信息与通信工程
    • 1,049 篇 电气工程
    • 524 篇 控制科学与工程
    • 278 篇 生物工程
    • 254 篇 动力工程及工程热...
    • 236 篇 机械工程
    • 189 篇 安全科学与工程
    • 186 篇 网络空间安全
    • 181 篇 电子科学与技术(可...
    • 145 篇 交通运输工程
    • 127 篇 仪器科学与技术
    • 124 篇 环境科学与工程(可...
    • 121 篇 生物医学工程(可授...
    • 104 篇 建筑学
  • 1,189 篇 理学
    • 619 篇 数学
    • 302 篇 生物学
    • 167 篇 物理学
    • 151 篇 系统科学
    • 151 篇 统计学(可授理学、...
  • 1,132 篇 管理学
    • 836 篇 管理科学与工程(可...
    • 426 篇 图书情报与档案管...
    • 421 篇 工商管理
  • 244 篇 医学
    • 220 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 114 篇 公共卫生与预防医...
  • 221 篇 法学
    • 131 篇 社会学
    • 93 篇 法学
  • 130 篇 经济学
    • 128 篇 应用经济学
  • 80 篇 教育学
  • 75 篇 农学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学

主题

  • 1,238 篇 internet of thin...
  • 860 篇 cloud computing
  • 577 篇 internet
  • 249 篇 distributed comp...
  • 243 篇 protocols
  • 242 篇 security
  • 220 篇 computational mo...
  • 216 篇 servers
  • 212 篇 computer archite...
  • 201 篇 edge computing
  • 188 篇 blockchain
  • 153 篇 information syst...
  • 149 篇 scalability
  • 147 篇 peer to peer com...
  • 144 篇 big data
  • 142 篇 wireless sensor ...
  • 141 篇 resource managem...
  • 136 篇 quality of servi...
  • 135 篇 monitoring
  • 126 篇 iot

机构

  • 40 篇 institute of com...
  • 18 篇 beijing universi...
  • 14 篇 state key labora...
  • 13 篇 key laboratory o...
  • 12 篇 university of ch...
  • 12 篇 graduate univers...
  • 11 篇 beijing univ pos...
  • 11 篇 school of comput...
  • 11 篇 distributed syst...
  • 10 篇 department of co...
  • 10 篇 school of comput...
  • 9 篇 univ chinese aca...
  • 9 篇 state key labora...
  • 9 篇 school of cybers...
  • 8 篇 department of ph...
  • 8 篇 dept. of astrono...
  • 8 篇 dept. of physics...
  • 8 篇 dept. of physics...
  • 8 篇 iii. physikalisc...
  • 8 篇 school of comput...

作者

  • 21 篇 dustdar schahram
  • 15 篇 yang yang
  • 13 篇 jara antonio j.
  • 13 篇 muthanna ammar
  • 10 篇 zhang lei
  • 10 篇 fortino giancarl...
  • 10 篇 liu yang
  • 10 篇 schahram dustdar
  • 9 篇 di fatta giusepp...
  • 9 篇 ling liu
  • 8 篇 li yang
  • 8 篇 yang yun
  • 8 篇 wang tao
  • 8 篇 wang wei
  • 8 篇 barolli leonard
  • 8 篇 hai jin
  • 8 篇 lei zhang
  • 8 篇 cao jiannong
  • 7 篇 hong-linh truong
  • 7 篇 haungs a.

语言

  • 8,102 篇 英文
  • 621 篇 其他
  • 50 篇 中文
  • 7 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"任意字段=6th International Conference on Distributed Computing and Internet Technology"
8755 条 记 录,以下是141-150 订阅
排序:
Enhancing IoT Security through IOTA-Based Identity Management and Machine Learning  6th
Enhancing IoT Security Through IOTA-Based Identity Managemen...
收藏 引用
6th international Congress on Blockchain and Applications, BLOCKCHAIN 2024
作者: Alsolami, Reem Mostafa Monowar, Muhammad Attiah, Afraa Cherif, Asma Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Center of Excellence in Smart Environment Research King Abdulaziz University Jeddah21589 Saudi Arabia
the internet of things (IoT) is a vast network of diverse devices that has expanded into various aspects of our daily lives. However, its growth comes with increased security challenges, particularly in developing eff... 详细信息
来源: 评论
A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud computing Topology  6
A Risk Assessment Study: Encircling Docker Container Assets ...
收藏 引用
6th conference on Cloud and internet of things (CIoT)
作者: Hersyah, Mohammad Hafiz Hossain, Md Delwar Taenaka, Yuzo Kadobayashi, Youki Nara Inst Sci & Technol Div Informat Sci Nara Japan
the articulate utilization of docker container assets in Cloud computing is one strategic pivotal aspect of the underlying rationale for customers to conjecture on their ventures. It can be standardized under the orga... 详细信息
来源: 评论
BESTDiNER: Blockchain-Enabled System for Tackling distributed Networking and Extracting Rainbow-tables  6
BESTDiNER: Blockchain-Enabled System for Tackling Distribute...
收藏 引用
6th international conference on Blockchain computing and Applications, BCCA 2024
作者: Tokunaga, Junpei Ebara, Hiroyuki Kansai University Osaka Japan
Proof-of-Work (PoW) quickly became one of the most well-known algorithms as the consensus-building method powering the blockchain. However, consensus-building algorithms based on PoW have the issue of wasting a substa... 详细信息
来源: 评论
Practical research of IoT technology in the safety management of special equipment  6
Practical research of IoT technology in the safety managemen...
收藏 引用
6th international conference on Intelligent computing, Communication, and Devices, ICCD 2023
作者: Li, Zerang China University of Geosciences Wuhan China
Special equipment safety is an important part of the public safety system, which is related to the healthy development of the economy and society and the well-being of people's lives. In recent years, with the rap... 详细信息
来源: 评论
Decentralized Energy Using IoT and Cloud computing for Enhancing Grid Resilience through Microgrid Integration  6
Decentralized Energy Using IoT and Cloud Computing for Enhan...
收藏 引用
6th international conference on Energy, Power and Environment, ICEPE 2024
作者: Solainayagi, P. Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
Climate change, cyberattacks, and renewable energy integration threaten the contemporary electrical system. this paper proposes integrating decentralized energy production, the internet of things (IoT), microgrids, an... 详细信息
来源: 评论
A Visualization Platform for the Influence of the internet and Big Data on Social Governance Research and Practice
A Visualization Platform for the Influence of the Internet a...
收藏 引用
6th international conference on Intelligent computing and Control Systems, ICICCS 2022
作者: Gao, Feng Hubei University of Police Department of Investigation Wuhan 430034 China
this article studies the influence of the internet and big data on social governance research and practice. With the continuous development and application of big data technology, big data can also be developed and ut... 详细信息
来源: 评论
Factors affecting college students' deep learning in the internet environment: an empirical study  6
Factors affecting college students' deep learning in the int...
收藏 引用
6th international conference on Intelligent computing, Communication, and Devices, ICCD 2023
作者: Bo, Xiao Guangdong University of Science and Technology Guangdong Dongguan523330 China
At present, internet technology is profoundly affecting various domestic industries, not only promoting industry innovation, but also changing various fields of economy and society. Educational services are no excepti... 详细信息
来源: 评论
Emerging Technologies for V2X Communication and Vehicular Edge computing in the 6G era: Challenges and Opportunities for Sustainable IoV  19
Emerging Technologies for V2X Communication and Vehicular Ed...
收藏 引用
19th Annual international conference on distributed computing in Smart Systems and the internet of things, DCOSS-IoT 2023
作者: Georgiades, Michael Poullas, Marios S. Neapolis University of Pafos ISLab Department of Computer Science Pafos Cyprus Imperial College London Department of Mathematics London United Kingdom University College London Cell and Developmental Biology London United Kingdom
this paper presents a comprehensive review of emerging technologies in V2X communication and Vehicular Edge computing (VEC) for sustainable internet of Vehicles (IoV) in the 6G era. the paper employs the PRISMA method... 详细信息
来源: 评论
Scenario-based synthetic traffic generation for web applications using workload patterns  24
Scenario-based synthetic traffic generation for web applicat...
收藏 引用
6th Asia Pacific Information technology conference (APIT)
作者: Khurram, Sana Sabau, Alex R. Lichter, Horst Tanachutiwat, Sansiri King Mongkuts Univ Technol North Bangkok Sirindhorn Int Thai German Grad Sch Engn Bangkok Thailand Rhein Westfal TH Aachen Res Grp Software Construct Aachen Germany
Due to the growing number of internet users, Web applications face increasing challenges in providing constant availability, resilience to software failures, and rapid responses to user requests. therefore, performanc... 详细信息
来源: 评论
Multi-authority Attribute Encryption Scheme based on Cloud computing Verifiable Outsourcing Decryption  6
Multi-authority Attribute Encryption Scheme based on Cloud C...
收藏 引用
6th international conference on Artificial Intelligence and Advanced Manufacturing, AIAM 2024
作者: Mao, Jingyu Lanzhou Vocational Technical College Lanzhou China
With the advancement of mobile device technology, network communication has become more common and convenient. However, due to the limitations of mobile terminals in terms of processing power and storage space, the pe... 详细信息
来源: 评论