咨询与建议

限定检索结果

文献类型

  • 340 篇 会议
  • 10 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 356 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 245 篇 工学
    • 228 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 108 篇 信息与通信工程
    • 38 篇 电气工程
    • 15 篇 控制科学与工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 生物工程
    • 3 篇 仪器科学与技术
    • 2 篇 光学工程
    • 2 篇 化学工程与技术
    • 2 篇 核科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 冶金工程
    • 1 篇 建筑学
  • 38 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 34 篇 理学
    • 21 篇 数学
    • 8 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 6 篇 生物学
    • 4 篇 系统科学
    • 3 篇 化学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 28 篇 distributed comp...
  • 22 篇 distributed comp...
  • 17 篇 cloud computing
  • 14 篇 grid computing
  • 13 篇 computer archite...
  • 11 篇 resource managem...
  • 11 篇 computer network...
  • 10 篇 peer to peer com...
  • 10 篇 mobile computing
  • 9 篇 pervasive comput...
  • 9 篇 middleware
  • 8 篇 servers
  • 8 篇 wireless sensor ...
  • 8 篇 computational mo...
  • 8 篇 protocols
  • 8 篇 ubiquitous compu...
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 internet
  • 7 篇 mobile communica...

机构

  • 4 篇 institute of com...
  • 3 篇 electronics and ...
  • 3 篇 graduate univers...
  • 3 篇 department of au...
  • 2 篇 rice univ dept e...
  • 2 篇 univ sci & techn...
  • 2 篇 huazhong univ sc...
  • 2 篇 eth ch-8093 zuri...
  • 2 篇 paul scherrer in...
  • 2 篇 north china elec...
  • 2 篇 department of co...
  • 2 篇 school of manage...
  • 2 篇 budapest univ te...
  • 2 篇 mta-bme informat...
  • 2 篇 information and ...
  • 2 篇 agh univ sci & t...
  • 2 篇 univ waterloo de...
  • 2 篇 communication an...
  • 2 篇 univ klagenfurt ...
  • 2 篇 anhui institute ...

作者

  • 2 篇 huang tao
  • 2 篇 zhenghua wang
  • 2 篇 chuanyao yang
  • 2 篇 afzal muhammad t...
  • 2 篇 ren yuzheng
  • 2 篇 wehrle klaus
  • 2 篇 troyer m
  • 2 篇 lászló toka
  • 2 篇 dustdar schahram
  • 2 篇 hakchol hwang
  • 2 篇 yuqin li
  • 2 篇 yuzheng ren
  • 2 篇 yang xiao
  • 2 篇 dehler mm
  • 2 篇 zhenghuan zhang
  • 2 篇 james ha
  • 2 篇 lucchi roberto
  • 2 篇 huang jing
  • 2 篇 hongsheng xi
  • 2 篇 tao huang

语言

  • 348 篇 英文
  • 6 篇 中文
  • 2 篇 其他
检索条件"任意字段=8th International Conference on Distributed Computing and Networking, ICDCN 2006"
356 条 记 录,以下是31-40 订阅
排序:
Securing distributed SDN Controller Network from Induced DoS Attacks  8
Securing Distributed SDN Controller Network from Induced DoS...
收藏 引用
8th IEEE international conference on Cloud computing in Emerging Markets, CCEM 2019
作者: Shravanya, G. Swati, N.H. Rustagi, Ram P. Sharma, Oshin Department of Computer Science and Engineering PES University Bengaluru India Department of Computer Science and Engineering KS Institute of Technology Bengaluru India
With the escalation in security breaches on organizations and institutions that store, maintain and work with critical data, there is a need for a security-enhancing and risk-mitigating solution that works on the fly ... 详细信息
来源: 评论
HPC as a Service: A naive model  8
HPC as a Service: A naive model
收藏 引用
8th international conference on Information and Communication Technologies (ICICT)
作者: Imran, Hamza Ali Wazir, Saad Ikram, Ahmed Jamal Ikram, Ataul Aziz Ullah, Hanif Ehsan, Maryam FAST Natl Univ Comp & Emerging Sci EPIC Lab Islamabad Pakistan Riphah Int Univ Islamabad Pakistan Univ Gujrat Informat Technol Dept Gujrat Pakistan
Applications like Big Data, Machine Learning, Deep Learning and even other Engineering and Scientific research requires a lot of computing power;making High-Performance computing (HPC) an important field. But access t... 详细信息
来源: 评论
A Survey of Emerging Network Virtualization Frameworks and Cloud computing  8
A Survey of Emerging Network Virtualization Frameworks and C...
收藏 引用
8th IEEE international conference on Cloud computing, Data Science and Engineering (Confluence) / Global Technology, Innovation and Enterpreneurship Summit
作者: Gupta, Tushar Ganatra, Jaydeep Samdani, Krishna Mukesh Patel Sch Technol Management & Engn Bengaluru India Mukesh Patel Sch Technol Management & Engn Dept Comp Engn Bengaluru India
Network virtualization has distinguished itself as a clear forerunner when it comes to being the catalyst in enabling cloud computing and satisfying the needs of future data growth. In the field of mobile broadband ne... 详细信息
来源: 评论
Intelligent Resource Allocation in Dynamic Fog computing Environments
Intelligent Resource Allocation in Dynamic Fog Computing Env...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Amina Mseddi Wael Jaafar Halima Elbiaze Wessam Ajib Université du Québec À Montréal QC Canada Carleton University Ottawa ON Canada
Fog computing emerged as a new paradigm that pushes cloud applications to the network edge. the fog infrastructure contains mainly distributed and heterogeneous fog nodes that are characterized by their complex distri... 详细信息
来源: 评论
Resource provisioning for highly reliable and ultra-responsive edge applications
Resource provisioning for highly reliable and ultra-responsi...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: László Toka Dávid Haja Attila Kőrösi Balázs Sonkoly MTA-BME Information Systems Research Group Budapest University of Technology and Economics Hungary
Edge and fog computing are emerging concepts extending traditional cloud computing by deploying compute resources closer to the users. this approach, closely integrated with carrier-networks, enables several future se... 详细信息
来源: 评论
Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services
Selectivity and Autoscaling as Complementary Defenses for DD...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: João Henrique G. M. Corrêa Epaminondas A. Sousa Junior Iguatemi E. Fonseca Vivek Nigam Moisés R. N. Ribeiro Rodolfo S. Villaça Federal University of Espírito Santo Vitória Brazil Federal University of Paraiba João Pessoa Brazil
distributed Denial-of-Service (DDoS) is becoming an even more complex problem with the migration of these services and applications to shared and centralized cloud infrastructures. Application layer Denial-of-Service ... 详细信息
来源: 评论
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies  8th
Access Domain-Based Approach for Anomaly Detection and Resol...
收藏 引用
8th international conference on Innovations in Bio-Inspired computing and Applications (IBICA)
作者: El Hadj, Maryem Ait Benkaouz, Yahya Khoumsi, Ahmed Erradi, Mohammed Mohammed V Univ Rabat ENSIAS ITM Team Networking & Distributed Syst Res Grp Rabat Morocco Mohammed V Univ Rabat Concept & Syst Lab FSR Rabat Morocco Univ Sherbrooke Dept Elect & Comp Engn Sherbrooke PQ Canada
Access control protects systems' resources against unauthorized access via a set of policy rules. In distributed environments, access control policies might be aggregated from multiple tenants and could be managed... 详细信息
来源: 评论
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge computing
Building Dynamic Mapping with CUPS for Next Generation Autom...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Zhaoxia Sun Ping Du Akihiro Nakao Lei Zhong Ryokichi Onishi The University of Tokyo Japan Toyota Motor Corporation Japan
With the development of IoT and 5G networks, the demand for the next-generation intelligent transportation system has been growing at a rapid pace. Dynamic mapping has been considered one of the key technologies to re... 详细信息
来源: 评论
Minimizing state access delay for cloud-native network functions
Minimizing state access delay for cloud-native network funct...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Márk Szalay Péter Mátray László Toka Budapest University of Technology and Economics Ericsson Research MTA-BME Information Systems Research Group
In the era of cloud services, there is a strong desire to improve the elasticity and reliability of applications in the cloud. the standard way of achieving these goals is to decouple the life-cycle of important appli... 详细信息
来源: 评论
PERFORMANCE ANALYSIS OF RANDOMIZED ALGORIthM FOR OPTIMAL QUERY PLAN GENERATION IN distributed ENVIRONMENT.  8
PERFORMANCE ANALYSIS OF RANDOMIZED ALGORITHM FOR OPTIMAL QUE...
收藏 引用
8th international conference on computing, Communication and networking Technologies (ICCCNT)
作者: Yadav, Pramod Kumar Rizvi, Syed Afzal Murtaza KIET Grp Inst Dept Comp Sci & Engg Ghaziabad India Jamia Millia Islamia Dept Comp Sci New Delhi India
the method of finding the optimal processing method to answer a query is called Query optimization, whereas a collection of various sites, distributed over a computer network is called distributed database. In Distrib... 详细信息
来源: 评论