咨询与建议

限定检索结果

文献类型

  • 8,397 篇 会议
  • 212 册 图书
  • 145 篇 期刊文献

馆藏范围

  • 8,754 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,975 篇 工学
    • 5,328 篇 计算机科学与技术...
    • 3,031 篇 软件工程
    • 1,624 篇 信息与通信工程
    • 1,049 篇 电气工程
    • 524 篇 控制科学与工程
    • 278 篇 生物工程
    • 254 篇 动力工程及工程热...
    • 236 篇 机械工程
    • 189 篇 安全科学与工程
    • 186 篇 网络空间安全
    • 181 篇 电子科学与技术(可...
    • 145 篇 交通运输工程
    • 127 篇 仪器科学与技术
    • 124 篇 环境科学与工程(可...
    • 121 篇 生物医学工程(可授...
    • 104 篇 建筑学
  • 1,189 篇 理学
    • 619 篇 数学
    • 302 篇 生物学
    • 167 篇 物理学
    • 151 篇 系统科学
    • 151 篇 统计学(可授理学、...
  • 1,132 篇 管理学
    • 836 篇 管理科学与工程(可...
    • 426 篇 图书情报与档案管...
    • 421 篇 工商管理
  • 244 篇 医学
    • 220 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 114 篇 公共卫生与预防医...
  • 221 篇 法学
    • 131 篇 社会学
    • 93 篇 法学
  • 130 篇 经济学
    • 128 篇 应用经济学
  • 80 篇 教育学
  • 75 篇 农学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学

主题

  • 1,237 篇 internet of thin...
  • 869 篇 cloud computing
  • 579 篇 internet
  • 255 篇 distributed comp...
  • 250 篇 protocols
  • 245 篇 security
  • 221 篇 computational mo...
  • 216 篇 servers
  • 212 篇 computer archite...
  • 197 篇 edge computing
  • 191 篇 blockchain
  • 153 篇 information syst...
  • 149 篇 scalability
  • 147 篇 peer to peer com...
  • 144 篇 big data
  • 142 篇 wireless sensor ...
  • 141 篇 resource managem...
  • 136 篇 quality of servi...
  • 135 篇 monitoring
  • 126 篇 iot

机构

  • 40 篇 institute of com...
  • 20 篇 beijing universi...
  • 14 篇 state key labora...
  • 13 篇 key laboratory o...
  • 12 篇 university of ch...
  • 12 篇 graduate univers...
  • 11 篇 beijing univ pos...
  • 11 篇 school of comput...
  • 11 篇 distributed syst...
  • 10 篇 department of co...
  • 10 篇 school of cybers...
  • 9 篇 univ chinese aca...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 8 篇 department of ph...
  • 8 篇 dept. of astrono...
  • 8 篇 dept. of physics...
  • 8 篇 dept. of physics...
  • 8 篇 iii. physikalisc...
  • 8 篇 school of comput...

作者

  • 21 篇 dustdar schahram
  • 15 篇 yang yang
  • 13 篇 jara antonio j.
  • 12 篇 muthanna ammar
  • 10 篇 zhang lei
  • 10 篇 fortino giancarl...
  • 10 篇 liu yang
  • 9 篇 di fatta giusepp...
  • 9 篇 ling liu
  • 9 篇 schahram dustdar
  • 9 篇 hai jin
  • 8 篇 li yang
  • 8 篇 yang yun
  • 8 篇 wang tao
  • 8 篇 wang wei
  • 8 篇 barolli leonard
  • 8 篇 li jun
  • 8 篇 cao jiannong
  • 7 篇 hong-linh truong
  • 7 篇 haungs a.

语言

  • 8,101 篇 英文
  • 621 篇 其他
  • 50 篇 中文
  • 7 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"任意字段=6th International Conference on Distributed Computing and Internet Technology"
8754 条 记 录,以下是41-50 订阅
排序:
Research on Data Mining technology of internet Privacy Protection Based on Local Differential Privacy  6
Research on Data Mining Technology of Internet Privacy Prote...
收藏 引用
6th international conference on Communications, Information System and Computer Engineering, CISCE 2024
作者: Yu, Juan School of Computer and Information Engineering Maanshan Teacher's College Maanshan China
With the rapid development of social economy and science and technology, data sharing and analysis technology is one of the contents widely used in the internet field. Collecting and distributing terminal data and min... 详细信息
来源: 评论
Mitigating VM Sprawl: Strategies for Effective Resource Management in Cloud Environments  6
Mitigating VM Sprawl: Strategies for Effective Resource Mana...
收藏 引用
6th international conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Swathi, T. Swathi, B. Sunanda, P. G. Pulla Reddy Engineering College Department of Cse Andhra Pradesh Kurnool518007 India
the technology of the cloud is rapidly developing, and it is unquestionably the next big thing that people will use wherever, at any time. the use of clouds is becoming more and more popular in today's internet-dr... 详细信息
来源: 评论
Configuring the Parallel Committees Database Architecture through Bayesian Optimization  6
Configuring the Parallel Committees Database Architecture th...
收藏 引用
6th international conference on Blockchain computing and Applications, BCCA 2024
作者: Solat, Siamak Mabrouk, Ahmed Paris France CSAI Lab CRIGEN ENGIE Group Stains France
distributed databases are often used when scalability, fault tolerance, and high availability are crucial. they excel in scenarios where traditional, centralized databases may struggle to handle the increasing volume ... 详细信息
来源: 评论
Design and Implementation of Centralized Timesensitive Network Controller Cluster System  6
Design and Implementation of Centralized Timesensitive Netwo...
收藏 引用
6th international conference on Electronics and Communication, Network and Computer technology, ECNCT 2024
作者: Zhao, Xuyang Zhu, Jun Yang, Wenjiao Lu, Donghui Zhejiang Lab Research Center for Intelligent Manufacturing Computing Hangzhou China
With the development of the new generation of information network technology and the massive data integration generated by the internet of Everything, the management planning of data is becoming more and more reasonab... 详细信息
来源: 评论
Joint Optimization of Task Offloading and Resource Allocation in Heterogeneous Edge Networks  6
Joint Optimization of Task Offloading and Resource Allocatio...
收藏 引用
6th international conference on Data-Driven Optimization of Complex Systems (DOCS)
作者: Mei, Zhixin Du, Hebing He, Pan Dong, Aofei Feng, Kuiyuan Xu, Jinkun Chongqing Normal Univ Chongqing Peoples R China
With the development of intelligent transportation systems (ITS), powerful vehicular applications are gaining popularity, which brings significant challenges to resource-constrained vehicles. the emergence of edge com... 详细信息
来源: 评论
DisPOSE: Demonstrating Opportunistic Multi-tenant Fog Orchestration  26
DisPOSE: Demonstrating Opportunistic Multi-tenant Fog Orches...
收藏 引用
26th conference on Innovation in Clouds, internet and Networks and Workshops (ICIN) - distributed Intelligence across Network and Edge-to-Cloud Continuum
作者: Verdot, Vincent Peloso, Pierre Boussard, Mathieu Douville, Richard Varloot, Remi Nokia Bell Labs Nokia Networks France Nozay France
this demonstration illustrates our vision of open, collaborative fog computing environments where owners are ready to provide their information and communications technology resources to opportunistic service requeste... 详细信息
来源: 评论
Design and Realization of Electrical Power Management System Based on Secure Transport  24
Design and Realization of Electrical Power Management System...
收藏 引用
6th international conference on Telecommunications and Communication Engineering
作者: Lin, Jie Qin, JingTao Sichuan Railway Coll Chengdu Sichuan Peoples R China Chengdu Univ Informat Technol Coll Commun Engn Chengdu Sichuan Peoples R China
with the development of science and technology, new application scenarios have new demands for power distribution management system. the purpose of the research is to use the internet of'Ihings technology and clou... 详细信息
来源: 评论
Machine Learning Based Detection System for Identifying Deepfake Images and Social Bots  6
Machine Learning Based Detection System for Identifying Deep...
收藏 引用
6th international conference on Advancements in computing, ICAC 2024
作者: Liyanage, Chamath Dematgoda, Hirushini Harindi, Dewmini Perera, Nirmal Fernando, Harinda Rathnayake, Samadhi Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
this paper presents a machine learning-based approach to detect two major forms of misinformation on social media platforms: deepfake images and social bots. For deepfake image detection, we propose a novel hybrid mod... 详细信息
来源: 评论
Blockchain-Enhanced Federated Learning for internet of Vehicles  6
Blockchain-Enhanced Federated Learning for Internet of Vehic...
收藏 引用
6th international conference on Blockchain computing and Applications, BCCA 2024
作者: Asad, Muhammad Otoum, Safa College of Technological Innovation Zayed University Abu Dhabi United Arab Emirates
the integration of the internet of Vehicles (IoV) into urban environments introduces significant data security and network efficiency challenges. As vehicular networks expand, their susceptibility to cyber-attacks inc... 详细信息
来源: 评论
Machine Learning and Browser Fingerprinting Based Approach for Web Bot Detection  6
Machine Learning and Browser Fingerprinting Based Approach f...
收藏 引用
6th international conference on Advancements in computing, ICAC 2024
作者: Pathirage, Gihan Saminda Manathunga, Kalpani Sri Lanka Institute of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Software Engineering Malabe Sri Lanka
Web bots are becoming increasingly sophisticated, posing a serious threat to internet security and integrity. In response to this growing issue, this study proposes a novel bot detection method based on browser finger... 详细信息
来源: 评论