咨询与建议

限定检索结果

文献类型

  • 2,906 篇 会议
  • 39 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 2,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,029 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 303 篇 cloud computing
  • 151 篇 distributed comp...
  • 132 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 69 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 60 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 security
  • 50 篇 monitoring
  • 49 篇 edge computing
  • 41 篇 big data
  • 40 篇 computer science
  • 40 篇 data models
  • 39 篇 internet

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...
  • 4 篇 key lab of trust...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,901 篇 英文
  • 40 篇 中文
  • 23 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2957 条 记 录,以下是161-170 订阅
排序:
A Fundamental Analysis of Standardization for Blockchain and distributed Ledger Technologies in ISO  9
A Fundamental Analysis of Standardization for Blockchain and...
收藏 引用
9th IEEE international conference on Cyber Security and Cloud computing and 8th IEEE international conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2022
作者: Chen, Xiaofeng Zhang, Lu Zhang, Yijian Du, Jingyi Jia, XiangJuan Yang, Xiaohu Zhejiang University Hangzhou Qulian Technology Co. Ltd. Blockchain Research Center Hangzhou China Zhejiang University Blockchain Research Center Hangzhou China
Blockchain and distributed Ledger Technology (DLT) are becoming important driving forces for a new round of scientific and technological development. the construction of blockchain information infrastructure has risen... 详细信息
来源: 评论
Fault Location of Distribution Network with distributed Generation Based on BAS-PSO  8th
Fault Location of Distribution Network with Distributed Gene...
收藏 引用
8th international conference on computing, Control and Industrial Engineering, CCIE 2024
作者: Wang, Jing Peng, Yuefeng Zuo, Zhengqin Ren, Haige Wu, Xingxiu Liang, Yujie Tongren Power Supply Bureau of Guizhou Power Grid Co. Ltd Tongren554300 China
A Particle Swarm Optimization algorithm (BAS-PSO) based on the Tencent Bull whisker search algorithm is proposed to address the drawbacks of long localization time and easy falling into local optima when using particl... 详细信息
来源: 评论
Vision: Information-Centric Dataflow - Re-Imagining Reactive distributed computing  8
Vision: Information-Centric Dataflow - Re-Imagining Reactive...
收藏 引用
8th ACM conference on Information-Centric networking (ICN)
作者: Kutscher, Dirk Al Wardani, Laura Gias, T. M. Rayhan Univ Appl Sci Emden Leer Emden Germany
this paper describes an Information-Centric Dataflow system that is based on name-based access to computation results, NDN PSync dataset synchronization for enabling consuming compute functions to learn about updates ... 详细信息
来源: 评论
A Demand Side Adjustable Load Cluster Regulation Method Based on Alternating Direction Multiplier Method  8
A Demand Side Adjustable Load Cluster Regulation Method Base...
收藏 引用
8th international conference on Power and Renewable Energy, ICPRE 2023
作者: Shao, Chong Liu, Zhiwen Li, Yan Hong, Yuejia Cheng, Ran Duan, Yao China Southern Power Grid Energy Development Research Institute GuangZhou China Guangdong Power Grid Co. Ltd. Grid Planning & Research Center GuangZhou China
On the demand side, a large number of adjustable load clusters are connected to the distribution network as diversified stakeholders. In order to reduce its electricity cost and improve the local consumption rate of n... 详细信息
来源: 评论
Electric Power Scam Prediction Using Machine Learning Techniques  8th
Electric Power Scam Prediction Using Machine Learning Techni...
收藏 引用
8th international conference on Information System Design and Intelligent Applications, ISDIA 2024
作者: Suresh, A. Vishnoi, Mahendra Mishra, Aditya Kumar Department of Networking and Communications School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur TamilNadu Chengalpattu603203 India
Electricity fraud is causing huge losses in both the public and private sectors. the proposition of this paper uses a temporarily controlled learning program to include potential theft data from non-specific data on t... 详细信息
来源: 评论
WideVision: A Low-Power, Multi-Protocol Wireless Vision Platform for distributed Surveillance  18
WideVision: A Low-Power, Multi-Protocol Wireless Vision Plat...
收藏 引用
18th international conference on Wireless and Mobile computing, networking and Communications (WiMob)
作者: Scherer, Moritz Sidler, Fabian Rogenmoser, Michael Magno, Michele Benini, Luca Swiss Fed Inst Technol Dept Informat Technol & Elect Engn Zurich Switzerland Univ Bologna Dept Elect Elect & Informat Engn Bologna Italy
the trend in Internet of things research points toward performing increasingly compute-intensive data analysis tasks on embedded sensor nodes, rather than server centers. Exploiting the technological advances in both ... 详细信息
来源: 评论
Weak Network Oriented Mobile distributed Storage: A Hybrid Fault-Tolerance Scheme Based on Potential Replicas  24
Weak Network Oriented Mobile Distributed Storage: A Hybrid F...
收藏 引用
24th IEEE international conference on High Performance computing and Communications, 8th IEEE international conference on Data Science and Systems, 20th IEEE international conference on Smart City and 8th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Wei, Xinlei Tan, Yujuan Liu, Duo Wu, Daitao Wu, Yu Chen, Xianzhang Li, Jian College of Computer Science Chongqing University Chongqing China School of Big Data and Software Engineering Chongqing University Chongqing China School of Electrical Engineering Chongqing University Chongqing China
Node failure is one of the most typical issues in distributed storage systems. the classic fault-tolerance methods can meet the fault tolerance needs of systems deployed in edge storage, 5G IoT, and other high-perform... 详细信息
来源: 评论
Discussion on Network Information Security Based on Cloud computing Environment  8
Discussion on Network Information Security Based on Cloud Co...
收藏 引用
8th Annual international conference on Network and Information Systems for Computers, ICNISC 2022
作者: Chen, Ting Liu, Haiyan Industrial & Internet College Beijing Information Technology College Beijing China
With the explosive advancement of social development and technological change, cloud computing technology has developed rapidly in China in recent years. Data and information security in cloud computing environment ha... 详细信息
来源: 评论
AI-Driven User Experience Design: Exploring Innovations and Challenges in Delivering Tailored User Experiences  8
AI-Driven User Experience Design: Exploring Innovations and ...
收藏 引用
8th international conference on Information Technology Research, ICITR 2023
作者: Padmasiri, Prasadini Kalutharage, Pramukthika Jayawardhane, Nethma Wickramarathne, Jagath Sri Lanka Institute of Information Technology Faculty of Graduate Studies and Research Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Malabe Sri Lanka
In today's digital landscape, providing user experiences is considered paramount in respective of user satisfaction and engagement. Artificial Intelligence (AI) has emerged as a transformative force in the User Ex... 详细信息
来源: 评论
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of things  24
RBCP: A Reputation-based Blockchain Consensus Protocol for I...
收藏 引用
24th IEEE international conference on High Performance computing and Communications, 8th IEEE international conference on Data Science and Systems, 20th IEEE international conference on Smart City and 8th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Shang, Jiaze Lu, Tianbo Cai, Yingjie Luo, Shuang Jin, Zhaoxin School of Computer Science National Pilot Software Enginerring School Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
the application of blockchain in the Internet of things (IoT) solves the problem of centralization, enables data interaction of IoT nodes in untrusted environments. However, most of the blockchain consensus protocols ... 详细信息
来源: 评论