咨询与建议

限定检索结果

文献类型

  • 312 篇 会议
  • 10 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 326 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 210 篇 工学
    • 187 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 65 篇 信息与通信工程
    • 52 篇 电气工程
    • 19 篇 控制科学与工程
    • 15 篇 机械工程
    • 13 篇 动力工程及工程热...
    • 11 篇 生物工程
    • 9 篇 仪器科学与技术
    • 8 篇 环境科学与工程(可...
    • 8 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 交通运输工程
  • 47 篇 理学
    • 22 篇 数学
    • 11 篇 生物学
    • 9 篇 系统科学
    • 8 篇 统计学(可授理学、...
    • 6 篇 化学
    • 4 篇 物理学
    • 4 篇 大气科学
  • 47 篇 管理学
    • 36 篇 管理科学与工程(可...
    • 19 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 9 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 7 篇 教育学
    • 7 篇 教育学
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 43 篇 internet of thin...
  • 41 篇 internet
  • 34 篇 cloud computing
  • 21 篇 protocols
  • 19 篇 servers
  • 18 篇 wireless sensor ...
  • 12 篇 peer to peer com...
  • 12 篇 mobile communica...
  • 12 篇 ip networks
  • 10 篇 educational inst...
  • 10 篇 quality of servi...
  • 9 篇 information syst...
  • 9 篇 routing
  • 9 篇 monitoring
  • 7 篇 computer communi...
  • 7 篇 wireless communi...
  • 7 篇 energy consumpti...
  • 7 篇 authentication
  • 7 篇 computers
  • 7 篇 distributed comp...

机构

  • 4 篇 distributed syst...
  • 3 篇 intelligent inte...
  • 3 篇 universidad pont...
  • 3 篇 institute of com...
  • 2 篇 department of co...
  • 2 篇 vienna universit...
  • 2 篇 electrical and c...
  • 2 篇 school of comput...
  • 2 篇 tu münchen garch...
  • 2 篇 school of comput...
  • 2 篇 university of pi...
  • 2 篇 department of in...
  • 2 篇 faculty of infor...
  • 2 篇 isislab - dipart...
  • 2 篇 networking and d...
  • 2 篇 limos laboratory...
  • 2 篇 chitkara univers...
  • 2 篇 information tech...
  • 2 篇 tennessee tech u...
  • 2 篇 beijing univ pos...

作者

  • 3 篇 dustdar schahram
  • 3 篇 kim dongkyun
  • 3 篇 rubio gustavo ló...
  • 2 篇 bouridane ahmed
  • 2 篇 roedig utz
  • 2 篇 alfredo cuzzocre...
  • 2 篇 yong gan
  • 2 篇 de-shuang huang
  • 2 篇 michael alexande...
  • 2 篇 zhao yan
  • 2 篇 roberto g. casce...
  • 2 篇 alexandru costan
  • 2 篇 luís lopes
  • 2 篇 wood timothy
  • 2 篇 emmanuel jeannot
  • 2 篇 vittorio scarano
  • 2 篇 tzong-jye liu
  • 2 篇 stephen l. scott
  • 2 篇 shenoy prashant
  • 2 篇 leandro navarro

语言

  • 325 篇 英文
  • 1 篇 其他
检索条件"任意字段=7th International Conference on Distributed Computing and Internet Technology, ICDCIT 2011"
326 条 记 录,以下是81-90 订阅
排序:
Application of Ensemble Learning in DDoS Detection
Application of Ensemble Learning in DDoS Detection
收藏 引用
2019 7th international conference on Machinery,Materials and computing technology(ICMMCT 2019)
作者: Yun Feng Fu Kun Jiangnan University Department of Internet of Things Engineering
A growing number of internet of things(IoT) devices are appearing on the *** these devices are facing more and more security risks,such as distributed denial of service(DDoS) *** recent years,the scale of DDoS attacks... 详细信息
来源: 评论
A Preemptive Hybrid Approach to Minimum Spanning Tree Restoration in Large Mesh SDN Networks
A Preemptive Hybrid Approach to Minimum Spanning Tree Restor...
收藏 引用
IEEE international conference on Future internet of things and Cloud Workshops (FiCloudW)
作者: Wayne Collymore School of Computing and Digital Technology Birmingham City University Birmingham UK
Achieving high levels of network resiliency has long been a major objective for data centre and service providers. Recently, Software Defined Networking (SDN) has arrived with the ability to extend centralised program... 详细信息
来源: 评论
CLOSER 2017 - Proceedings of the 7th international conference on Cloud computing and Services Science
CLOSER 2017 - Proceedings of the 7th International Conferenc...
收藏 引用
7th international conference on Cloud computing and Services Science, CLOSER 2017
the proceedings contain 84 papers. the topics discussed include: a CKAN plugin for data harvesting to the Hadoop distributed file system;a computation- and network-aware energy optimization model for virtual machines ...
来源: 评论
A review of cloud computing simulation platforms & related environments  7
A review of cloud computing simulation platforms & related e...
收藏 引用
7th international conference on Cloud computing and Services Science, CLOSER 2017
作者: Byrne, James Svorobej, Sergej Giannoutakis, Konstantinos M. Tzovaras, Dimitrios Byrne, P.J. Östberg, Per-Olov Gourinovitch, Anna Lynn, theo Irish Centre for Cloud Computing and Commerce Dublin City University Glasnevin Dublin 9 Ireland Centre for Research and Technology Hellas Information Technologies Institute 6th km Xarilaou-Thermi Thessaloniki57001 Greece Dept. Computing Science and HPC2N Umeå University UmeaSE-901 87 Sweden
Recent years have seen an increasing trend towards the development of Discrete Event Simulation (DES) platforms to support cloud computing related decision making and research. the complexity of cloud environments is ... 详细信息
来源: 评论
Adapting enterprise security approaches for evolving cloud processing and networking models  7th
Adapting enterprise security approaches for evolving cloud p...
收藏 引用
7th international conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2017
作者: Hutchison, Andrew Department of Computer Science University of Cape Town Cape Town7700 South Africa
With the advent of public cloud services, enterprise are moving to adopt the lower cost, more flexible, scalable public cloud offerings like OTC, AWS and Azure. Simultaneously they are adapting their network models to... 详细信息
来源: 评论
the Research and Application of the Power Big Data  7
The Research and Application of the Power Big Data
收藏 引用
7th international conference on Electronics and Information Engineering (ICEIE)
作者: Zhang, Suxiang Zhang, Dong Zhang, Yaping Cao, Jinping Xu, Huiming State Grid Informat & Telecommun Branch Beijing 100761 Peoples R China State Power Econ Res Inst Beijing 102209 Peoples R China State Grid Corp China Beijing 100031 Peoples R China
Facing the increasing environment crisis, how to improve energy efficiency is the important problem. Power big data is main support tool to realize demand side management and response. With the promotion of smart powe... 详细信息
来源: 评论
the Implementation of Air Pollution Monitoring Service Using Hybrid Database Converter  7
The Implementation of Air Pollution Monitoring Service Using...
收藏 引用
7th international conference on Cloud computing and Big Data (CCBD)
作者: Sun, Pei-Lun Weng, Jia-Yow Yang, Chao-Tung Chen, Shuo-Tsung Liu, Jung-Chun Tunghai Univ Dept Comp Sci Taichung 40704 Taiwan
In this work, the proposed Intelligent Indoor Environment Monitoring System in Cloud (iDEMS) combines environmental sensors with ZigBee wireless sensor network technology to store and process environmental data in HBa... 详细信息
来源: 评论
distributed multi-user, multi-key searchable encryptions resilient fault tolerance  7th
Distributed multi-user, multi-key searchable encryptions res...
收藏 引用
7th international conference on the theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Zhu, Huafei School of Computer and Computing Science Zhejaing University City College Hangzhou310015 China
In this paper, a construction of distributed multi-user, multi-key searchable encryptions is proposed and analyzed. Our scheme leverages a combination of the Shamir’s threshold secret key sharing, the Pohlig-Hellman ... 详细信息
来源: 评论
7th international conference on Trusted Systems, INTRUST 2015
7th International Conference on Trusted Systems, INTRUST 201...
收藏 引用
7th international conference on the theory, Technologies and Applications of Trusted Systems, INTRUST 2015
the proceedings contain 15 papers. the special focus in this conference is on Encryptions, Signatures and Encryptions and Signatures. the topics include: Privacy-preserving anomaly detection across multi-domain for so...
来源: 评论
Public key encryption with distributed keyword search  7th
Public key encryption with distributed keyword search
收藏 引用
7th international conference on the theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Kuchta, Veronika Manulis, Mark Department of Computing University of Surrey Guildford United Kingdom
In this paper we introduce threshold Public Key Encryption with Keyword Search (TPEKS), a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner.... 详细信息
来源: 评论