咨询与建议

限定检索结果

文献类型

  • 8,430 篇 会议
  • 212 册 图书
  • 149 篇 期刊文献

馆藏范围

  • 8,791 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,003 篇 工学
    • 5,347 篇 计算机科学与技术...
    • 3,041 篇 软件工程
    • 1,641 篇 信息与通信工程
    • 1,061 篇 电气工程
    • 539 篇 控制科学与工程
    • 278 篇 生物工程
    • 261 篇 动力工程及工程热...
    • 246 篇 机械工程
    • 193 篇 网络空间安全
    • 191 篇 安全科学与工程
    • 186 篇 电子科学与技术(可...
    • 147 篇 交通运输工程
    • 133 篇 仪器科学与技术
    • 126 篇 环境科学与工程(可...
    • 121 篇 生物医学工程(可授...
    • 104 篇 建筑学
  • 1,198 篇 理学
    • 622 篇 数学
    • 303 篇 生物学
    • 168 篇 物理学
    • 152 篇 统计学(可授理学、...
    • 151 篇 系统科学
  • 1,139 篇 管理学
    • 842 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 421 篇 工商管理
  • 247 篇 医学
    • 221 篇 临床医学
    • 161 篇 基础医学(可授医学...
    • 116 篇 公共卫生与预防医...
  • 221 篇 法学
    • 131 篇 社会学
    • 93 篇 法学
  • 130 篇 经济学
    • 128 篇 应用经济学
  • 80 篇 教育学
  • 75 篇 农学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学

主题

  • 1,246 篇 internet of thin...
  • 862 篇 cloud computing
  • 577 篇 internet
  • 249 篇 distributed comp...
  • 244 篇 security
  • 244 篇 protocols
  • 221 篇 computational mo...
  • 218 篇 servers
  • 213 篇 computer archite...
  • 204 篇 edge computing
  • 187 篇 blockchain
  • 153 篇 information syst...
  • 151 篇 scalability
  • 147 篇 peer to peer com...
  • 144 篇 big data
  • 143 篇 resource managem...
  • 142 篇 wireless sensor ...
  • 137 篇 quality of servi...
  • 135 篇 monitoring
  • 126 篇 iot

机构

  • 40 篇 institute of com...
  • 18 篇 beijing universi...
  • 14 篇 state key labora...
  • 13 篇 university of ch...
  • 13 篇 key laboratory o...
  • 12 篇 graduate univers...
  • 11 篇 beijing univ pos...
  • 11 篇 school of comput...
  • 11 篇 distributed syst...
  • 10 篇 department of co...
  • 10 篇 school of comput...
  • 9 篇 univ chinese aca...
  • 9 篇 state key labora...
  • 9 篇 school of cybers...
  • 8 篇 department of ph...
  • 8 篇 dept. of astrono...
  • 8 篇 dept. of physics...
  • 8 篇 dept. of physics...
  • 8 篇 iii. physikalisc...
  • 8 篇 school of comput...

作者

  • 21 篇 dustdar schahram
  • 15 篇 yang yang
  • 13 篇 jara antonio j.
  • 13 篇 muthanna ammar
  • 10 篇 zhang lei
  • 10 篇 fortino giancarl...
  • 10 篇 liu yang
  • 10 篇 schahram dustdar
  • 9 篇 di fatta giusepp...
  • 9 篇 ling liu
  • 8 篇 li yang
  • 8 篇 yang yun
  • 8 篇 wang tao
  • 8 篇 wang wei
  • 8 篇 barolli leonard
  • 8 篇 hai jin
  • 8 篇 cao jiannong
  • 7 篇 hong-linh truong
  • 7 篇 haungs a.
  • 7 篇 fürst p.

语言

  • 7,968 篇 英文
  • 791 篇 其他
  • 50 篇 中文
  • 7 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"任意字段=6th International Conference on Distributed Computing and Internet Technology"
8791 条 记 录,以下是261-270 订阅
排序:
the Use of LDAP for Query Operation in Trader Service  6
The Use of LDAP for Query Operation in Trader Service
收藏 引用
6th international conference on Futuristic Trends in Networks and computing Technologies, FTNCT 2024
作者: Muchtar, Farkhana Binti Mohd Sidek, Mohd Kufaisal Bin Bin Isnin, Ismail Fauzi Degan, Kiran Sanjay Fattah, Salmah Binti Muhammad Zaly Shah, Muhammad Zafran Bin Fairos Binti Ismail, Nor Anita Binti Ali Shah, Zuraini Faculty of Computing Universiti Teknologi Malaysia Johor Johor Bahru81310 Malaysia Faculty of Computing and Informatics Universiti Malaysia Sabah Jalan UMS Sabah Kota Kinabalu88400 Malaysia Symbiosis International University India
this research investigates the potential of the Lightweight Directory Access Protocol (LDAP) to optimize query operations in the Object Management Group (OMG) trading service, emphasizing the need for swift query resp... 详细信息
来源: 评论
EdgeShield: Hybrid Real-Time Attack Detection in IOTA Tangle via Edge Devices  15
EdgeShield: Hybrid Real-Time Attack Detection in IOTA Tangle...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Arunodhai, V. Susan, Leena P. Kannimoola, Jinesh M. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Applications Amritapuri India
the internet of things (IoT) revolutionizes technology interaction by enabling seamless connectivity and automation, but it introduces significant security challenges. A distributed ledger technology (DLT) called IOTA... 详细信息
来源: 评论
Fine-grained Calculation Method of Accepting distributed Generation Capacity in Distribution Network for Virtual Power Plant  6
Fine-grained Calculation Method of Accepting Distributed Gen...
收藏 引用
6th IEEE international Electrical and Energy conference, CIEEC 2023
作者: Zhong, Yongjie Ji, Ling Jiang, Yanjun Li, Jingxia Wang, Zidong Wang, Yong Guodian Nanjing Automation Co. Ltd Nanjing211153 China
the fine-grained calculation method of accepting distributed generation capacity in distribution network for virtual power plant is proposed in this paper. Firstly, a distributed generation capacity model including ph... 详细信息
来源: 评论
An Efficient DDoS Attacks Detection and Mitigation Approach in SDN-IoT Network  6
An Efficient DDoS Attacks Detection and Mitigation Approach ...
收藏 引用
6th international conference on Futuristic Trends in Networks and computing Technologies, FTNCT 2024
作者: Singh, Chandrapal Jain, Ankit Kumar Department of Computer Engineering National Institute of Technology Kurukshetra India
the internet of things (IoT) has revolutionized modern life by introducing advanced solutions and enhancing processing power. However, managing IoT networks can be challenging due to the multitude of devices and commu... 详细信息
来源: 评论
A Review on Smart Secure Collaborative Framework Learning for Consequent computing  14
A Review on Smart Secure Collaborative Framework Learning fo...
收藏 引用
14th international conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2023
作者: Shukla, Priti Rawat, Manoj Kumar SAGE University CSE Indore India
Blockchain technology plays supreme role in current era technology, where is uses contemporary technology and distributed system in transaction. the main Component of blockchain is crypto-currency which implement vari... 详细信息
来源: 评论
Intent-Driven distributed Applications Management Over Compute and Network Resources in the computing Continuum  19
Intent-Driven Distributed Applications Management Over Compu...
收藏 引用
19th Annual international conference on distributed computing in Smart Systems and the internet of things, DCOSS-IoT 2023
作者: Zafeiropoulos, Anastasios Fotopoulou, Eleni Vassilakis, Constantinos Tzanettis, Ioannis Lombardo, Chiara Carrega, Alesssandro Bruschi, Roberto National Technical University of Athens Institute of Communication and Computer Systems Athens Greece School of Electrical and Computer Engineering National Technical University of Athens Athens Greece Cnit S2N National Laboratory Genoa Italy
Intent-driven orchestration enables organizations to achieve greater automation, integration, and intelligence of their compute and network resources by defining their objectives and policies in a more abstract and ho... 详细信息
来源: 评论
Cryptography and Adversarial Analysis for Cloud Data Security  5
Cryptography and Adversarial Analysis for Cloud Data Securit...
收藏 引用
5th international conference on Innovative Trends in Information technology (ICITIIT)
作者: Manjula, S. Valarmathi, K. Sudha, M. Swarna Ramco Inst Technol Dept Comp Sci & Engn Rajapalayam 626117 Tamil Nadu India PSR Engn Coll Dept Elect & Commun Engn Sivakasi 626140 Tamil Nadu India
Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over the internet. the prevalence of Software-as-a-Service has r... 详细信息
来源: 评论
Application of Cloud computing and Speech Recognition technology in University Golf Smart Guidance  6
Application of Cloud Computing and Speech Recognition Techno...
收藏 引用
6th international conference on computing Methodologies and Communication, ICCMC 2022
作者: Zhu, Sanqiang Nanjing Institute of Visual Arts Jiangsu Nanjing210000 China
Golf teaching plays a key role in promoting the development of golf and promoting the development of students' physical and mental health. therefore, it is of great significance for undergraduate colleges to devel... 详细信息
来源: 评论
Research on Intelligent Scheduling Algorithm Based on Cloud computing  15
Research on Intelligent Scheduling Algorithm Based on Cloud ...
收藏 引用
15th international conference on Computer Research and Development, ICCRD 2023
作者: Yan, Xiaofeng Zhao, Jie Han, Jianchao Chongqing Medical and Pharmaceutical College Chongqing China
With the rapid development of the information age, computer technology and network technology are more and more mature, and the application of internet technology is more and more extensive. On the basis of the gradua... 详细信息
来源: 评论
Exploring Robust DDoS Detection: A Machine Learning Analysis with the CICDDoS2019 Dataset  5
Exploring Robust DDoS Detection: A Machine Learning Analysis...
收藏 引用
5th IEEE India Council international Subsections conference, INDISCON 2024
作者: Saluja, Kamal Bagchi, Susama Solanki, Vikas Khan, Muhammad Numan Ali Dhamija, Esha Debnath, Sanjoy Kumar Chitkara University Institite of Engineering and Technology Chitkara University Punjab India University of Technology and Applied Sciences College of Computing and Information Sciences Shinas Oman
the ever-present threat posed by distributed Denial of Service attack is highlighted. the significance of building robust cybersecurity measures that are not just inventive but also flexible. the purpose of this study... 详细信息
来源: 评论