咨询与建议

限定检索结果

文献类型

  • 2,914 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,984 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 832 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 390 篇 理学
    • 223 篇 数学
    • 98 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 152 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 73 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 59 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 50 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 internet of thin...
  • 40 篇 computer science

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 6 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,857 篇 英文
  • 94 篇 其他
  • 43 篇 中文
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2984 条 记 录,以下是1101-1110 订阅
排序:
8th international conference on Internet and distributed computing Systems, IDCS 2015
8th International Conference on Internet and Distributed Com...
收藏 引用
8th international conference on Internet and distributed computing Systems, IDCS 2015
the proceedings contain 26 papers. the special focus in this conference is on Cloud computing and Internet of things. the topics include: Towards modelling-based self-adaptive resource allocation in multi-tiers cloud ...
来源: 评论
Analysis and Real Implementation of a Cloud Infraestructure for computing Laboratories Virtualization
收藏 引用
8th international conference on Image Processing and Communications (IP and C)
作者: Enrique Munoz-Exposito, Jose Perez de Prado, Rocio Garcia-Galan, Sebastian Rodriguez-Reche, Rafael Marchewka, Adam Univ Jaen Telecommun Engn Dept Alfonso X El Sabio 28 Linares Spain UTP Univ Sci & Technol Bydgoszcz Inst Telecommun & Comp Sci Bydgoszcz Poland
In this work, a cloud infrastructure is analysed and deployed to virtualize computing laboratories. Virtualization of computing resources allows the user to face a single computing interface whose capabilities are rea... 详细信息
来源: 评论
Face-Based distributed Visitor Identification System
收藏 引用
8th international conference on Image Processing and Communications (IP and C)
作者: Nowosielski, Adam West Pomeranian Univ Technol Fac Comp Sci Zolnierska 52 PL-71210 Szczecin Poland
In this paper the problem of the expansion of the simple face recognition system using the distributed system architecture is considered. the basic principle of the simple real-life face recognition system assumes the... 详细信息
来源: 评论
A Cloud computing Platform for Data Analysis based on R Cluster  8
A Cloud Computing Platform for Data Analysis based on R Clus...
收藏 引用
8th international conference on Cyber-Enabled distributed computing and Knowledge Discovery (CyberC)
作者: Tong, Yiming Zheng, Zeyu Fu, Dianzheng Fu, Yang Li, Shuai Chinese Acad Sci Shenyang Inst Automat Shenyang 110016 Peoples R China Chinese Acad Sci Key Lab Network Control Syst Shenyang 110016 Peoples R China
Translation of Data analysis algorithms from data analysis language to high-level programming language is hard work when we construct a cloud computing platform for data analysis. It adds implementation difficulty and... 详细信息
来源: 评论
Influential User Detection on Twitter: Analyzing Effect of Focus Rate
Influential User Detection on Twitter: Analyzing Effect of F...
收藏 引用
8th IEEE/ACM international conference on Advances in Social Networks Analysis and Mining (ASONAM)
作者: Alp, Zeynep Zengin Oguducu, Sule Gunduz Istanbul Tech Univ Inst Sci & Technol TR-34469 Istanbul Turkey Istanbul Tech Univ Dept Comp Engn TR-34469 Istanbul Turkey
Social media usage has increased marginally in the last decade and it is still continuing to grow. Companies, data scientists, and researchers are trying to infer meaningful information from this vast amount of data. ... 详细信息
来源: 评论
User-triggered structural changes in OSN-Alike distributed content networks  12th
User-triggered structural changes in OSN-Alike distributed c...
收藏 引用
12th international conference on computing and Information Technology, IC2IT 2016
作者: Coltzau, Hauke Kubek, Mario Fernuniversität in Hagen Hagen Germany
We continue the evaluation of our model to describe regularly occurring phenomena in online social networks. the influence of link removals triggered by dislikes on the network structure is analyzed. Additionally, two... 详细信息
来源: 评论
Priority-Oriented Cloud Video Delivery Networks  8
Priority-Oriented Cloud Video Delivery Networks
收藏 引用
8th international conference on Information Technology in Medicine and Education (ITME)
作者: Zhao, Tianqi Lu, Dianjie Zheng, Xiangwei Liu, Hong Shandong Normal Univ Sch Informat Sci & Engn Jinan Shandong Peoples R China Shandong Prov Key Lab Novel Distributed Comp Soft Jinan Shandong Peoples R China
Video delivery networks (VDNs) using cloud storage have recently started to emerge. Different to the conventional VDNs, Cloud Video Delivery Networks (CVDNs) take advantage of the cloud computing technology which help... 详细信息
来源: 评论
Detecting colluding attackers in distributed grid systems  8
Detecting colluding attackers in distributed grid systems
收藏 引用
8th international conference on Agents and Artificial Intelligence, ICAART 2016
作者: Kantert, Jan Kauder, Melanie Edenhofer, Sarah Tomforde, Sven Müller-Schloer, Christian Institute of Systems Engineering Leibniz University Hanover Appelstr. 4 Hanover30167 Germany Organic Computing Group University of Augsburg Eichleitnerstr. 30 Augsburg86159 Germany
distributed grid systems offer possible benefits in terms of fast computation of tasks. this is accompanied by potential drawbacks due to their openness, the heterogeneity of participants, and the unpredictability of ... 详细信息
来源: 评论
Cloud data security and integrity protection model based on distributed virtual machine agents  8
Cloud data security and integrity protection model based on ...
收藏 引用
8th international conference on Cyber-Enabled distributed computing and Knowledge Discovery (CyberC)
作者: Xu, Xiaolong Liu, Guangpei Zhu, Jie Nanjing Univ Posts & Telecommun Coll Comp Nanjing Jiangsu Peoples R China Chinese Acad Sci State Key Lab Informat Secur Beijing Peoples R China
Cloud computing has been popular as the new IT infrastructure, because it is able to provide convenient and low-cost network computing and storage service. However, duo to separation of ownership and control rights, c... 详细信息
来源: 评论
2016 8th IFIP international conference on New Technologies, Mobility and Security, NTMS 2016
2016 8th IFIP International Conference on New Technologies, ...
收藏 引用
8th IFIP international conference on New Technologies, Mobility and Security, NTMS 2016
the proceedings contain 68 papers. the topics discussed include: amplified distributed denial of service attack in software defined networking;a case of service interaction in M2M device management;applying and compar...
来源: 评论