咨询与建议

限定检索结果

文献类型

  • 8,430 篇 会议
  • 212 册 图书
  • 149 篇 期刊文献

馆藏范围

  • 8,791 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,003 篇 工学
    • 5,347 篇 计算机科学与技术...
    • 3,041 篇 软件工程
    • 1,641 篇 信息与通信工程
    • 1,061 篇 电气工程
    • 539 篇 控制科学与工程
    • 278 篇 生物工程
    • 261 篇 动力工程及工程热...
    • 246 篇 机械工程
    • 193 篇 网络空间安全
    • 191 篇 安全科学与工程
    • 186 篇 电子科学与技术(可...
    • 147 篇 交通运输工程
    • 133 篇 仪器科学与技术
    • 126 篇 环境科学与工程(可...
    • 121 篇 生物医学工程(可授...
    • 104 篇 建筑学
  • 1,198 篇 理学
    • 622 篇 数学
    • 303 篇 生物学
    • 168 篇 物理学
    • 152 篇 统计学(可授理学、...
    • 151 篇 系统科学
  • 1,139 篇 管理学
    • 842 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 421 篇 工商管理
  • 247 篇 医学
    • 221 篇 临床医学
    • 161 篇 基础医学(可授医学...
    • 116 篇 公共卫生与预防医...
  • 221 篇 法学
    • 131 篇 社会学
    • 93 篇 法学
  • 130 篇 经济学
    • 128 篇 应用经济学
  • 80 篇 教育学
  • 75 篇 农学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学

主题

  • 1,246 篇 internet of thin...
  • 862 篇 cloud computing
  • 577 篇 internet
  • 249 篇 distributed comp...
  • 244 篇 security
  • 244 篇 protocols
  • 221 篇 computational mo...
  • 218 篇 servers
  • 213 篇 computer archite...
  • 204 篇 edge computing
  • 187 篇 blockchain
  • 153 篇 information syst...
  • 151 篇 scalability
  • 147 篇 peer to peer com...
  • 144 篇 big data
  • 143 篇 resource managem...
  • 142 篇 wireless sensor ...
  • 137 篇 quality of servi...
  • 135 篇 monitoring
  • 126 篇 iot

机构

  • 40 篇 institute of com...
  • 18 篇 beijing universi...
  • 14 篇 state key labora...
  • 13 篇 university of ch...
  • 13 篇 key laboratory o...
  • 12 篇 graduate univers...
  • 11 篇 beijing univ pos...
  • 11 篇 school of comput...
  • 11 篇 distributed syst...
  • 10 篇 department of co...
  • 10 篇 school of comput...
  • 9 篇 univ chinese aca...
  • 9 篇 state key labora...
  • 9 篇 school of cybers...
  • 8 篇 department of ph...
  • 8 篇 dept. of astrono...
  • 8 篇 dept. of physics...
  • 8 篇 dept. of physics...
  • 8 篇 iii. physikalisc...
  • 8 篇 school of comput...

作者

  • 21 篇 dustdar schahram
  • 15 篇 yang yang
  • 13 篇 jara antonio j.
  • 13 篇 muthanna ammar
  • 10 篇 zhang lei
  • 10 篇 fortino giancarl...
  • 10 篇 liu yang
  • 10 篇 schahram dustdar
  • 9 篇 di fatta giusepp...
  • 9 篇 ling liu
  • 8 篇 li yang
  • 8 篇 yang yun
  • 8 篇 wang tao
  • 8 篇 wang wei
  • 8 篇 barolli leonard
  • 8 篇 hai jin
  • 8 篇 cao jiannong
  • 7 篇 hong-linh truong
  • 7 篇 haungs a.
  • 7 篇 fürst p.

语言

  • 7,968 篇 英文
  • 791 篇 其他
  • 50 篇 中文
  • 7 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"任意字段=6th International Conference on Distributed Computing and Internet Technology"
8791 条 记 录,以下是271-280 订阅
排序:
Enhanced DDoS Defense in SDN: Double-Layered Strategy with Blockchain Integration  13
Enhanced DDoS Defense in SDN: Double-Layered Strategy with B...
收藏 引用
13th IEEE international conference on Communications, Circuits and Systems (ICCCAS)
作者: Tian, Jialin Shu, Zhaogang Chen, Shuwu Xie, Haihui Liu, Xiaolong Qiu, Caiyu Fujian Agr & Forestry Univ Comp & Informat Coll Fuzhou Peoples R China
With the development of technologies such as cloud computing, big data, and the internet of things (IoT), Software-Defined Networking (SDN) has emerged as a novel network architecture in today's internet era. It c... 详细信息
来源: 评论
Intelligent DWC Reservation and Trip Planning of CAEV and UAV for 6G ITS  20
Intelligent DWC Reservation and Trip Planning of CAEV and UA...
收藏 引用
20th IEEE international Wireless Communications and Mobile computing (IEEE IWCMC) - Green and Intelligent Communications
作者: Shaikh, Palwasha Waheed Mouftah, Hussein T. Univ Ottawa Sch Elect Engn & Comp Sci Ottawa ON Canada
In the 6G era, addressing charging challenges for electric vehicles is paramount. this paper focuses on mitigating concerns for both Connected Autonomous Electric Vehicles (CAEVs) and Unmanned Aerial Vehicles (UAVs). ... 详细信息
来源: 评论
Privacy computing technology in the context of energy internet  5
Privacy computing technology in the context of energy Intern...
收藏 引用
5th international conference on Communications, Information System and Computer Engineering, CISCE 2023
作者: Gong, Yue Chen, Cuiyun Liu, Zhiyu The First Research Institute of the Ministry of Public Security of P.R.C Beijing China
the power system and other energy systems are constantly cross-integrated, and a new development direction of multi-subject collaboration is gradually formed. Starting from the typical mode of energy internet collabor... 详细信息
来源: 评论
Application Research of Vertical Federated Learning technology in Banking Risk Control Model Strategy  21
Application Research of Vertical Federated Learning Technolo...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Luo, Yong Lu, Zhi Yin, Xiaofei Lu, Songfeng Weng, Yiting Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
this study centers on the application of vertical federated learning technology in the context of internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm... 详细信息
来源: 评论
Intrusion Detection at the Edge computing: A Deep Learning Approach Using the UNSW-NB15 Dataset  14
Intrusion Detection at the Edge Computing: A Deep Learning A...
收藏 引用
14th IEEE international conference on Communication Systems and Network Technologies, CSNT 2025
作者: Kumar, Vipin Kumar, Vivek Bhadauria, Abhay Pratap Singh Dixit, Jay Kumar, Amit Haridwar India Department of Computer Engineering & Applications GLA University UP Mathura India
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci... 详细信息
来源: 评论
Prototype of Iot-Based Keyless Security System For Motorcycle  6
Prototype of Iot-Based Keyless Security System For Motorcycl...
收藏 引用
6th international conference on Information and Communications technology, ICOIACT 2023
作者: Saputra, Adika Akbar Suryani, Vera Rakhmatsyah, Andrian Telkom University School of Computing Bandung Indonesia
Today the motorcycle theft cases in Indonesia are in a very high rate and it has been continuing to increase in every year. For this, there is a need for a security system for motorcycle to minimize the risk of motorc... 详细信息
来源: 评论
Ant Colony Optimization Based Multi-Hop Wireless Transmission for Enhanced Network Reliability  6
Ant Colony Optimization Based Multi-Hop Wireless Transmissio...
收藏 引用
6th IEEE international conference on Artificial Intelligence in Engineering and technology, IICAIET 2024
作者: Lim, Kit Guan Bin Sakimin, Mohd Fikry Fazri Wei, Longxin Tan, Min Keng Yang, Soo Siang Teo, Kenneth Tze Kin Universiti Malaysia Sabah Modelling Simulation & Computing Laboratory Faculty of Engineering Kota Kinabalu Malaysia Fujian Polytechnic of Information Technology Faculty of The Internet of Things and Artificial Intelligence Fuzhou China
Wireless multi-hop transmission is a new technology that has been used for data transfer in no internet connectivity and electricity area. Wireless sensor networks are being created for many different purposes, both f... 详细信息
来源: 评论
Blockchain-based Intrusion Detection Scheme for Cloud-computing  6
Blockchain-based Intrusion Detection Scheme for Cloud-comput...
收藏 引用
2021 6th international conference on Information Science, Computer technology and Transportation, ISCTT 2021
作者: Guo, Wei Xie, Linjiang Hang, Feilu Lv, Yao Luo, Zhenyu Information Center Yunnan Power Grid Co. Ltd. Kunming China
With the rapid development of cloud computing technology, more and more businesses are based on cloud services. In this context, people should pay more attention to the security issues of cloud computing platform. Bec... 详细信息
来源: 评论
A Kubernetes-Powered Personalized Federated Learning Platform for Resource-Constrained internet of Medical things
A Kubernetes-Powered Personalized Federated Learning Platfor...
收藏 引用
20th IEEE international Wireless Communications and Mobile computing (IEEE IWCMC) - Green and Intelligent Communications
作者: Lin, Meng-Hsuan Yang, Shun-Ren Chiang, Hsin-Yin Chang, Chu-Chun Lin, Phone Natl Tsing Hua Univ Dept Comp Sci Inst Info Sys & App Hsinchu Taiwan Natl Tsing Hua Univ Inst Commun Engn Hsinchu Taiwan Cephalgo SAS 8 Rue Veaux F-67000 Strasbourg France Natl Taiwan Univ Dept Comp Sci & Info Engn Grad Inst Biomed Elec & Bioinform Grad Inst Net & MMInst Med Device & Imaging Taipei Taiwan Natl Taiwan Univ IoT Res Ctr Taipei Taiwan
Federated Learning (FL) is a distributed machine learning scheme that trains a global model across multiple end devices while protecting user privacy by keeping data locally, which has been shown to be useful for smar... 详细信息
来源: 评论
HessianAuth: An ECC-based distributed and Efficient Authentication Mechanism for 6LoWPAN Networked IoT Devices  23
HessianAuth: An ECC-based Distributed and Efficient Authenti...
收藏 引用
24th international conference on distributed computing and Networking (ICDCN)
作者: Dey, Debasmita Chandra, Saket Ghosh, Nirnay Indian Inst Engn Sci & Technol Dept Comp Sci & Technol Sibpur India Singapore Univ Technol & Design Singapore 487372 Singapore
internet of things (IoT) constitutes an ecosystem of networked resource-constrained devices that mandates light-weighted security solutions. In most IoT applications, co-located and proximal devices are connected in 6... 详细信息
来源: 评论