咨询与建议

限定检索结果

文献类型

  • 8,397 篇 会议
  • 212 册 图书
  • 146 篇 期刊文献

馆藏范围

  • 8,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,976 篇 工学
    • 5,329 篇 计算机科学与技术...
    • 3,031 篇 软件工程
    • 1,625 篇 信息与通信工程
    • 1,049 篇 电气工程
    • 524 篇 控制科学与工程
    • 278 篇 生物工程
    • 254 篇 动力工程及工程热...
    • 236 篇 机械工程
    • 189 篇 安全科学与工程
    • 186 篇 网络空间安全
    • 181 篇 电子科学与技术(可...
    • 145 篇 交通运输工程
    • 127 篇 仪器科学与技术
    • 124 篇 环境科学与工程(可...
    • 121 篇 生物医学工程(可授...
    • 104 篇 建筑学
  • 1,189 篇 理学
    • 619 篇 数学
    • 302 篇 生物学
    • 167 篇 物理学
    • 151 篇 系统科学
    • 151 篇 统计学(可授理学、...
  • 1,132 篇 管理学
    • 836 篇 管理科学与工程(可...
    • 426 篇 图书情报与档案管...
    • 421 篇 工商管理
  • 244 篇 医学
    • 220 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 114 篇 公共卫生与预防医...
  • 221 篇 法学
    • 131 篇 社会学
    • 93 篇 法学
  • 130 篇 经济学
    • 128 篇 应用经济学
  • 80 篇 教育学
  • 75 篇 农学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学

主题

  • 1,238 篇 internet of thin...
  • 860 篇 cloud computing
  • 577 篇 internet
  • 249 篇 distributed comp...
  • 243 篇 protocols
  • 242 篇 security
  • 220 篇 computational mo...
  • 216 篇 servers
  • 212 篇 computer archite...
  • 201 篇 edge computing
  • 188 篇 blockchain
  • 153 篇 information syst...
  • 149 篇 scalability
  • 147 篇 peer to peer com...
  • 144 篇 big data
  • 142 篇 wireless sensor ...
  • 141 篇 resource managem...
  • 136 篇 quality of servi...
  • 135 篇 monitoring
  • 126 篇 iot

机构

  • 40 篇 institute of com...
  • 18 篇 beijing universi...
  • 14 篇 state key labora...
  • 13 篇 key laboratory o...
  • 12 篇 university of ch...
  • 12 篇 graduate univers...
  • 11 篇 beijing univ pos...
  • 11 篇 school of comput...
  • 11 篇 distributed syst...
  • 10 篇 department of co...
  • 10 篇 school of comput...
  • 9 篇 univ chinese aca...
  • 9 篇 state key labora...
  • 9 篇 school of cybers...
  • 8 篇 department of ph...
  • 8 篇 dept. of astrono...
  • 8 篇 dept. of physics...
  • 8 篇 dept. of physics...
  • 8 篇 iii. physikalisc...
  • 8 篇 school of comput...

作者

  • 21 篇 dustdar schahram
  • 15 篇 yang yang
  • 13 篇 jara antonio j.
  • 13 篇 muthanna ammar
  • 10 篇 zhang lei
  • 10 篇 fortino giancarl...
  • 10 篇 liu yang
  • 10 篇 schahram dustdar
  • 9 篇 di fatta giusepp...
  • 9 篇 ling liu
  • 8 篇 li yang
  • 8 篇 yang yun
  • 8 篇 wang tao
  • 8 篇 wang wei
  • 8 篇 barolli leonard
  • 8 篇 hai jin
  • 8 篇 lei zhang
  • 8 篇 cao jiannong
  • 7 篇 hong-linh truong
  • 7 篇 haungs a.

语言

  • 8,102 篇 英文
  • 621 篇 其他
  • 50 篇 中文
  • 7 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"任意字段=6th International Conference on Distributed Computing and Internet Technology"
8755 条 记 录,以下是251-260 订阅
排序:
Research on Intelligent Scheduling Algorithm Based on Cloud computing  15
Research on Intelligent Scheduling Algorithm Based on Cloud ...
收藏 引用
15th international conference on Computer Research and Development, ICCRD 2023
作者: Yan, Xiaofeng Zhao, Jie Han, Jianchao Chongqing Medical and Pharmaceutical College Chongqing China
With the rapid development of the information age, computer technology and network technology are more and more mature, and the application of internet technology is more and more extensive. On the basis of the gradua... 详细信息
来源: 评论
Intent-Driven distributed Applications Management Over Compute and Network Resources in the computing Continuum  19
Intent-Driven Distributed Applications Management Over Compu...
收藏 引用
19th Annual international conference on distributed computing in Smart Systems and the internet of things, DCOSS-IoT 2023
作者: Zafeiropoulos, Anastasios Fotopoulou, Eleni Vassilakis, Constantinos Tzanettis, Ioannis Lombardo, Chiara Carrega, Alesssandro Bruschi, Roberto National Technical University of Athens Institute of Communication and Computer Systems Athens Greece School of Electrical and Computer Engineering National Technical University of Athens Athens Greece Cnit S2N National Laboratory Genoa Italy
Intent-driven orchestration enables organizations to achieve greater automation, integration, and intelligence of their compute and network resources by defining their objectives and policies in a more abstract and ho... 详细信息
来源: 评论
Cryptography and Adversarial Analysis for Cloud Data Security  5
Cryptography and Adversarial Analysis for Cloud Data Securit...
收藏 引用
5th international conference on Innovative Trends in Information technology (ICITIIT)
作者: Manjula, S. Valarmathi, K. Sudha, M. Swarna Ramco Inst Technol Dept Comp Sci & Engn Rajapalayam 626117 Tamil Nadu India PSR Engn Coll Dept Elect & Commun Engn Sivakasi 626140 Tamil Nadu India
Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over the internet. the prevalence of Software-as-a-Service has r... 详细信息
来源: 评论
Privacy computing technology in the context of energy internet  5
Privacy computing technology in the context of energy Intern...
收藏 引用
5th international conference on Communications, Information System and Computer Engineering, CISCE 2023
作者: Gong, Yue Chen, Cuiyun Liu, Zhiyu The First Research Institute of the Ministry of Public Security of P.R.C Beijing China
the power system and other energy systems are constantly cross-integrated, and a new development direction of multi-subject collaboration is gradually formed. Starting from the typical mode of energy internet collabor... 详细信息
来源: 评论
Intelligent DWC Reservation and Trip Planning of CAEV and UAV for 6G ITS  20
Intelligent DWC Reservation and Trip Planning of CAEV and UA...
收藏 引用
20th IEEE international Wireless Communications and Mobile computing (IEEE IWCMC) - Green and Intelligent Communications
作者: Shaikh, Palwasha Waheed Mouftah, Hussein T. Univ Ottawa Sch Elect Engn & Comp Sci Ottawa ON Canada
In the 6G era, addressing charging challenges for electric vehicles is paramount. this paper focuses on mitigating concerns for both Connected Autonomous Electric Vehicles (CAEVs) and Unmanned Aerial Vehicles (UAVs). ... 详细信息
来源: 评论
Exploring Robust DDoS Detection: A Machine Learning Analysis with the CICDDoS2019 Dataset  5
Exploring Robust DDoS Detection: A Machine Learning Analysis...
收藏 引用
5th IEEE India Council international Subsections conference, INDISCON 2024
作者: Saluja, Kamal Bagchi, Susama Solanki, Vikas Khan, Muhammad Numan Ali Dhamija, Esha Debnath, Sanjoy Kumar Chitkara University Institite of Engineering and Technology Chitkara University Punjab India University of Technology and Applied Sciences College of Computing and Information Sciences Shinas Oman
the ever-present threat posed by distributed Denial of Service attack is highlighted. the significance of building robust cybersecurity measures that are not just inventive but also flexible. the purpose of this study... 详细信息
来源: 评论
Application Research of Vertical Federated Learning technology in Banking Risk Control Model Strategy  21
Application Research of Vertical Federated Learning Technolo...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Luo, Yong Lu, Zhi Yin, Xiaofei Lu, Songfeng Weng, Yiting Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
this study centers on the application of vertical federated learning technology in the context of internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm... 详细信息
来源: 评论
Enhanced DDoS Defense in SDN: Double-Layered Strategy with Blockchain Integration  13
Enhanced DDoS Defense in SDN: Double-Layered Strategy with B...
收藏 引用
13th IEEE international conference on Communications, Circuits and Systems (ICCCAS)
作者: Tian, Jialin Shu, Zhaogang Chen, Shuwu Xie, Haihui Liu, Xiaolong Qiu, Caiyu Fujian Agr & Forestry Univ Comp & Informat Coll Fuzhou Peoples R China
With the development of technologies such as cloud computing, big data, and the internet of things (IoT), Software-Defined Networking (SDN) has emerged as a novel network architecture in today's internet era. It c... 详细信息
来源: 评论
Prototype of Iot-Based Keyless Security System For Motorcycle  6
Prototype of Iot-Based Keyless Security System For Motorcycl...
收藏 引用
6th international conference on Information and Communications technology, ICOIACT 2023
作者: Saputra, Adika Akbar Suryani, Vera Rakhmatsyah, Andrian Telkom University School of Computing Bandung Indonesia
Today the motorcycle theft cases in Indonesia are in a very high rate and it has been continuing to increase in every year. For this, there is a need for a security system for motorcycle to minimize the risk of motorc... 详细信息
来源: 评论
Blockchain-based Intrusion Detection Scheme for Cloud-computing  6
Blockchain-based Intrusion Detection Scheme for Cloud-comput...
收藏 引用
2021 6th international conference on Information Science, Computer technology and Transportation, ISCTT 2021
作者: Guo, Wei Xie, Linjiang Hang, Feilu Lv, Yao Luo, Zhenyu Information Center Yunnan Power Grid Co. Ltd. Kunming China
With the rapid development of cloud computing technology, more and more businesses are based on cloud services. In this context, people should pay more attention to the security issues of cloud computing platform. Bec... 详细信息
来源: 评论