咨询与建议

限定检索结果

文献类型

  • 2,911 篇 会议
  • 40 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 529 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 70 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,915 篇 英文
  • 42 篇 中文
  • 34 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2982 条 记 录,以下是1021-1030 订阅
排序:
Seer: Empowering Software Defined networking with Data Analytics
Seer: Empowering Software Defined Networking with Data Analy...
收藏 引用
15th international conference on Ubiquitous computing and Communications (IUCC) / 8th international Symposium on Cyberspace and Security (CSS)
作者: Sideris, Kyriakos Nejabati, Reza Simeonidou, Dimitra Univ Bristol High Performance Networks Grp Bristol Avon England
Network complexity is increasing, making network control and orchestration a challenging task. the proliferation of network information and tools for data analytics can provide an important insight into resource provi... 详细信息
来源: 评论
A Secure Private Information Retrieval in Cloud Environment  8
A Secure Private Information Retrieval in Cloud Environment
收藏 引用
8th international conference on Intelligent networking and Collaborative Systems (INCoS)
作者: Yang HaiBin Zhang Ling Engn Univ APF Xian 710086 Shanxi Peoples R China Translat Coll Xian Xian 710000 Shanxi Peoples R China
Private information retrieval is an important application of homomorphic encryption. As a hot topic in recent years, homomorphic encryption scheme can operate on the ciphertext and the decryption result is equal to th... 详细信息
来源: 评论
A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in distributed Cloud  8
A Software-Defined Security Strategy for Supporting Autonomi...
收藏 引用
8th IEEE international conference on Cloud computing Technology and Science (CloudCom)
作者: Compastie, Maxime Badonnel, Remi Festor, Olivier He, Ruan Kassi-Lahlou, Mohamed INRIA LORIA MADYNES Res Team Le Chesnay France Orange Labs Meylan Ile De France France
We propose in this paper a software-defined security framework, for supporting the enforcement of security policies in distributed cloud environments. these ones require security mechanisms able to cape with their mul... 详细信息
来源: 评论
Creating Automated Wide-Area Virtual Networks with GTS - Overview and Future Developments  8
Creating Automated Wide-Area Virtual Networks with GTS - Ove...
收藏 引用
8th IEEE international conference on Cloud computing Technology and Science (CloudCom)
作者: Naegele-Jackson, Susanne Sobieski, Jerry Gutkowski, Jakub Hazlinsky, Michal Reg Comp Ctr Erlangen Erlangen Germany NORDUnet Kastrup Denmark Poznan Supercomp & Networking Ctr Poznan Poland CESNET Prague Czech Republic
GTS is a new service in GANT that allows users to set up wide-area virtual networks via a web-based automatic provisioning system. the virtual networks are built within minutes over the underlying physical infrastruct... 详细信息
来源: 评论
EnCIRCLE: Encryption-based access control for information-centric connected vehicles
EnCIRCLE: Encryption-based access control for information-ce...
收藏 引用
international conference on the Network of the Future (NOF)
作者: Dennis Grewe K.P. Pavithra Rao Sebastian Schildt Marco Wagner Dominik Schoop Hannes Frey University Koblenz-Landau Computer Network Group Koblenz Germany Robert Bosch GmbH Corporate Sector Research and Advance Engineering Renningen Germany University of Applied Sciences Esslingen Esslingen Germany
Connectivity of everyday objects is on the rise forming the so-called Internet of things (IoT). Different domains such as vehicular and smart home networks will be linked together requiring new strategies to support i... 详细信息
来源: 评论
distributed processing in vehicular cloud networks
Distributed processing in vehicular cloud networks
收藏 引用
international conference on the Network of the Future (NOF)
作者: Amal A. Alahmadi Ahmed Q. Lawey Taisir E. H. El-Gorashi Jaafar M. H. Elmirghani School of Electronic and Electrical Engineering University of Leeds United Kingdom
Vehicular Clouds processing is a new field of research that aims to exploit the vehicles' onboard computational resources as a part of a cooperative distributed cloud computing environment. In this paper, we propo... 详细信息
来源: 评论
Process Discovery from Event Stream Data in the Cloud - A Scalable, distributed Implementation of the Flexible Heuristics Miner on the Amazon Kinesis Cloud Infrastructure  8
Process Discovery from Event Stream Data in the Cloud - A Sc...
收藏 引用
8th IEEE international conference on Cloud computing Technology and Science (CloudCom)
作者: Evermann, Joerg Rehse, Jana-Rebecca Fettke, Peter Mem Univ Newfoundland St John NF Canada Deutsch Forschungszentrum Kunstliche Intelligenz Saarbrucken Germany Univ Saarland Saarbrucken Germany
Cloud computing offers readily available, scalable infrastructure to tackle problems involving high data volume and velocity. Discovering processes from event streams, especially when the business processes execute in... 详细信息
来源: 评论
WiP Abstract: Cybermanufacturing in the Shared Economy
WiP Abstract: Cybermanufacturing in the Shared Economy
收藏 引用
IEEE/ACM international conference on Cyber-Physical Systems (ICCPS)
作者: Shivakumar Sastry Aniruddha Gokhale Dept of ECE University of Akron Akron Ohio USA Dept of EECS Vanderbilt University Nashville Tennessee USA
the Advanced Manufacturing Program 2.0 envisages a rejuvenationof the manufacturing infrastructure in the USA. Many of therejuvenated plants are not human-labor intensive; rather, thesefacilities have advanced capabil... 详细信息
来源: 评论
A distributed Key Management Approach  8
A Distributed Key Management Approach
收藏 引用
8th IEEE international conference on Cloud computing Technology and Science (CloudCom)
作者: Dowsley, Rafael Gabel, Matthias Huebsch, Gerald Schiefer, Gunther Schwichtenberg, Antonia Karlsruhe Inst Technol Karlsruhe Germany CAS Software AG Karlsruhe Germany
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encr... 详细信息
来源: 评论
Review of Virtual Memory Optimization in Cloud Environment  8
Review of Virtual Memory Optimization in Cloud Environment
收藏 引用
8th international conference on Intelligent networking and Collaborative Systems (INCoS)
作者: Ding, Ye Xu, He Li, Peng Ding, Jie Nanjing Univ Posts & Telecommun Sch Comp Sci & Technol Nanjing 210003 Jiangsu Peoples R China Nanjing Univ Posts & Telecommun Jiangsu High Technol Res Key Lab Wireless Sensor Nanjing 210003 Jiangsu Peoples R China
As the development in the cloud environment, virtual technology can consolidate multiple servers and abstract the hardware resources to each virtual machine. Memory is a well-known physical hardware resource, which ha... 详细信息
来源: 评论