咨询与建议

限定检索结果

文献类型

  • 1,133 篇 会议
  • 24 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 976 篇 工学
    • 909 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 228 篇 信息与通信工程
    • 147 篇 电气工程
    • 67 篇 电子科学与技术(可...
    • 42 篇 控制科学与工程
    • 39 篇 生物工程
    • 29 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 24 篇 测绘科学与技术
    • 19 篇 生物医学工程(可授...
    • 15 篇 安全科学与工程
    • 11 篇 光学工程
    • 9 篇 建筑学
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 210 篇 理学
    • 138 篇 数学
    • 42 篇 生物学
    • 35 篇 系统科学
    • 34 篇 统计学(可授理学、...
    • 19 篇 物理学
  • 133 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 62 篇 工商管理
    • 43 篇 图书情报与档案管...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 17 篇 农学
    • 15 篇 作物学
  • 14 篇 法学
    • 10 篇 社会学
  • 13 篇 医学
    • 9 篇 临床医学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 36 篇 cloud computing
  • 33 篇 parallel process...
  • 27 篇 parallel computi...
  • 24 篇 network topology
  • 22 篇 neural networks
  • 19 篇 machine learning
  • 17 篇 deep learning
  • 17 篇 network security
  • 16 篇 grid computing
  • 15 篇 scalability
  • 15 篇 computer archite...
  • 15 篇 cluster computin...
  • 14 篇 parallel program...
  • 14 篇 computational mo...
  • 14 篇 network architec...
  • 14 篇 edge computing
  • 13 篇 mapreduce
  • 13 篇 high performance...
  • 12 篇 monitoring
  • 12 篇 topology

机构

  • 17 篇 university of ch...
  • 14 篇 institute of com...
  • 9 篇 national univers...
  • 6 篇 college of compu...
  • 6 篇 shandong univ in...
  • 5 篇 university of sc...
  • 5 篇 school of comput...
  • 5 篇 services computi...
  • 5 篇 college of intel...
  • 4 篇 college of physi...
  • 4 篇 qingdao univ col...
  • 4 篇 school of comput...
  • 4 篇 univ bologna dei...
  • 4 篇 jilin univ coll ...
  • 4 篇 imperial vision ...
  • 4 篇 institute of com...
  • 3 篇 college of compu...
  • 3 篇 national enginee...
  • 3 篇 tsinghua univers...
  • 3 篇 department of co...

作者

  • 14 篇 jin hai
  • 7 篇 li daxing
  • 6 篇 liu yang
  • 6 篇 dvorsky jiri
  • 6 篇 shi xuanhua
  • 6 篇 hsu ching-hsien
  • 6 篇 vojacek lukas
  • 5 篇 qian depei
  • 5 篇 xiao limin
  • 4 篇 man ka lok
  • 4 篇 liu jie
  • 4 篇 drazdilova pavla
  • 4 篇 rossi davide
  • 4 篇 benini luca
  • 4 篇 tan guangming
  • 4 篇 zhang jie
  • 4 篇 daxing li
  • 4 篇 beferull-lozano ...
  • 4 篇 li wei
  • 4 篇 tong tong

语言

  • 1,170 篇 英文
  • 5 篇 中文
  • 3 篇 其他
检索条件"任意字段=8th IFIP International Conference on Network and Parallel Computing"
1177 条 记 录,以下是451-460 订阅
排序:
WaComM: A parallel Water quality Community Model for pollutant transport and dispersion operational predictions  12
WaComM: A parallel Water quality Community Model for polluta...
收藏 引用
12th international conference on Signal-Image Technology and Internet-Based Systems (SITIS)
作者: Montella, Raffaele Di Luccio, Diana Troiano, Pasquale Riccio, Angelo Brizius, Alison Foster, Ian Univ Napoli Parthenope Dept Sci & Tecnol HPSC SmartLab Naples Italy Univ Chicago Ctr Robust Decisionmaking Climate & Energy Policy RDCEP Computat Intitute Chicago IL 60637 USA
Accurate prediction of trends in marine pollution is strategic, given the negative effects of low water quality on human marine activities. We describe here the computational and functional performance evaluation of a... 详细信息
来源: 评论
A parallel Frequent Item Counting Algorithm
A Parallel Frequent Item Counting Algorithm
收藏 引用
international conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC
作者: Xun Yang Jun Liu Wenli Zhou Center for Data Science Beijing University of Posts and Telecommunications Beijing China HAOHAN Data Technology Co. LTD. Beijing China
Frequent items in high-speed streaming data are important to many applications like network monitoring and anomaly detecting. To deal with high arrival rate of streaming data, it is desirable that such systems be capa... 详细信息
来源: 评论
A Framework for Security Enhancement in SDN-Based Datacenters
A Framework for Security Enhancement in SDN-Based Datacenter...
收藏 引用
New Technologies, Mobility and Security (NTMS)
作者: Moustafa Ammar Mohamed Rizk Ayman Abdel-Hamid Ahmed K. Aboul-Seoud Faculty of Engineering Alexandria University and Arab Academy for Science Technology and Maritime Transport Alexandria Egypt Faculty of Engineering Alexandria University Alexandria Egypt College of Computing and Information Technology Arab Academy for Science Technology and Maritime Transport Alexandria Egypt
A number of challenges are facing the design of secure datacenter environments, such as applications high throughput requirements, low latency applications, scalability, ability to detect Advanced Persistent threats (... 详细信息
来源: 评论
How Playstyles Evolve: Progression Analysis and Profiling in Just Cause 2  15th
How Playstyles Evolve: Progression Analysis and Profiling in...
收藏 引用
15th ifip TC 14 international conference on Entertainment computing (ICEC)
作者: Pirker, Johanna Griesmayr, Simone Drachen, Anders Sifa, Rafet Graz Univ Technol Graz Austria Aalborg Univ Aalborg Denmark Pagonis Network Aalborg Denmark Fraunhofer IAIS St Augustin Germany
Evaluating progression of players in a game can take a variety of forms, but ideally combines playstyle or performance analysis with one or more aspects of progression, e.g. through a level- or mission-based structure... 详细信息
来源: 评论
A Heuristic Approach to Design and Analyze the Hybrid Electric Vehicle Powertrain and Energy Transmission Systems
A Heuristic Approach to Design and Analyze the Hybrid Electr...
收藏 引用
12th international conference on Intelligent computing (ICIC)
作者: Mahmud, Khizir Habibullah, Mohammad Shidujaman, Mohammad Morsalin, Sayidul Kocar, Gunnur Northwestern Polytech Univ Sch Automat Xian Peoples R China Ege Univ Solar Energy Inst Izmir Turkey Tsinghua Univ Dept Mech Engn Beijing Peoples R China Chittagong Univ Engn & Technol Dept Elect & Elect Engn Chittagong Bangladesh
the Hybrid Electric Vehicle (HEV) powertrain, and an efficient power conversion and energy transmission process, are significant factors to reduce conventional fuel consumption and vehicle gas emission. the scale of g... 详细信息
来源: 评论
SenNet: A Programming Toolkit to Develop Wireless Sensor network Applications
SenNet: A Programming Toolkit to Develop Wireless Sensor Net...
收藏 引用
New Technologies, Mobility and Security (NTMS)
作者: Aymen J. Salman Adil Al-Yasiri School of Computing Sciences and Engineering University of Salford Greater Manchester M5 4WT UK
One of the reasons that Wireless Sensor network (WSN) applications are not widely available is the complexity in their development. this is a consequence of the complex nature in low-level details, which a developer m... 详细信息
来源: 评论
Integrated membrane computing framework for modeling intrusion detection systems  11th
Integrated membrane computing framework for modeling intrusi...
收藏 引用
11th international conference on Bio-inspired computingtheories and Applications, BIC-TA 2016
作者: Idowu, Rufai Kazeem Muniyandi, Ravie Chandren Othman, Zulaiha Ali Computer Science Department College of Science and Information Technology IjagunOgun-State Nigeria Bangi Malaysia Bangi Malaysia
Several activities take place within a network environment which include (but not restricted to) movement of traffics (packets) among the nodes. An Intrusion Detection system (IDS) which is primarily concerned with th... 详细信息
来源: 评论
network and parallel computing
收藏 引用
international JOURNAL OF parallel PROGRAMMING 2015年 第3期43卷 311-315页
作者: Hsu, Ching-Hsien Li, Xiaoming Shi, Xuanhua Chung Hua Univ Dept Comp Sci & Informat Engn Hsinchu Taiwan Univ Delaware Dept Elect & Comp Engn Newark DE USA Huazhong Univ Sci & Technol Sch Comp Sci & Technol Wuhan 430074 Peoples R China
It’s our pleasure to bring you this special issue of the international Journal of parallel Programming on the network and parallel computing. Prior to the publication to this special issue, all papers were presented ... 详细信息
来源: 评论
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections
Behavioral Service Graphs: A Big Data Approach for Prompt In...
收藏 引用
New Technologies, Mobility and Security (NTMS)
作者: Elias Bou-Harb Mark Scanlon Claude Fackha Cyber Threat Intelligence Laboratory Florida Atlantic University USA University College Dublin School of Computer Science Ireland Cyber Security Center New York Univ. Abu Dhabi United Arab Emirates
the task of generating network-based evidence to support network forensic investigation is becoming increasingly prominent. Undoubtedly, such evidence is significantly imperative as it not only can be used to diagnose... 详细信息
来源: 评论
network and parallel computing - 11th ifip WG 10.3 international conference, NPC 2014, Proceedings
Network and Parallel Computing - 11th IFIP WG 10.3 Internati...
收藏 引用
11th ifip WG 10.3 international conference on network and parallel computing, NPC 2014
the proceedings contain 66 papers. the topics discussed include: routing and wavelength assignment for exchanged hypercubes in linear array optical networks;page classifier and placer: a scheme of managing hybrid cach...
来源: 评论