咨询与建议

限定检索结果

文献类型

  • 2,906 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,029 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 303 篇 cloud computing
  • 151 篇 distributed comp...
  • 132 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 69 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 60 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 security
  • 50 篇 monitoring
  • 49 篇 edge computing
  • 41 篇 big data
  • 40 篇 computer science
  • 40 篇 data models
  • 39 篇 internet

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,920 篇 英文
  • 40 篇 中文
  • 23 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2976 条 记 录,以下是231-240 订阅
排序:
Block chain Integration with Cloud/Edge/Fog IOT System for Security Issues  8
Block chain Integration with Cloud/Edge/Fog IOT System for S...
收藏 引用
8th international conference on computing in Engineering and Technology, ICCET 2023
作者: Ghadiyaram, Anil Kumar Chakravarthy, Srinivasa L. Department of CSE Vignana Bharathi Institute of Technology Telangana Hyderabad India AP Visakhapatnam India
Over the last several years, the IoT has made significant strides. In conventional IoTecosystems, sensors feed data onto fog devices, which then upload the data to theCloud. IoT is susceptible to threats to privacy an... 详细信息
来源: 评论
APIM: Adaptive Path Isolation for Mixed Flows in Data Center Networks  8
APIM: Adaptive Path Isolation for Mixed Flows in Data Center...
收藏 引用
8th IEEE international conference on Computer and Communications, ICCC 2022
作者: Li, Xiao Yang, Fan State Key Laboratory of Networking and Switching Technology Beijing100876 China Beijing University of Posts and Telecommunications Beijing100876 China Purple Mountain Laboratories Nanjing211111 China
With the emergence of 5G and cloud computing technologies, modern data centers host a wide variety of heterogeneous mixed flows. However, only few load balancing schemes adopt path partition to route mixed flows. Due ... 详细信息
来源: 评论
Privacy Estimation on Twitter: Modelling the Effect of Latent Topics on Privacy by Integrating XGBoost, Topic and Generalized Additive Models  19
Privacy Estimation on Twitter: Modelling the Effect of Laten...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE international conference on Ubiquitous Intelligence and computing, 2022 IEEE international conference on Autonomous and Trusted Vehicles conference, 22nd IEEE international conference on Scalable computing and Communications, 2022 IEEE international conference on Digital Twin, 8th IEEE international conference on Privacy computing and 2022 IEEE international conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Tillmann, Arne Kqiku, Lindrit Reinhardt, Delphine Weisser, Christoph Säfken, Benjamin Kneib, thomas Georg-August-Universität Göttingen Göttingen Germany Insitute of Computer Science Georg-August-Universität Göttingen Göttingen Germany Clausthal University of Technology Clausthal Germany
Securing their users' privacy is a central duty of Online Social Networks (OSN), but the complex non-linear effects of social media content on privacy is not well understood. We propose a novel framework that inte... 详细信息
来源: 评论
Research on Anomaly Detection of distributed Intelligent Teaching System Based on Cloud computing  8th
Research on Anomaly Detection of Distributed Intelligent Tea...
收藏 引用
8th EAI international conference on e-Learning, e-Education, and Online Training, eLEOT 2022
作者: Zheng, Fayue Ma, Lei Yang, Hongxue Liu, Leiguang Beijing Polytechnic Beijing100016 China
the traditional anomaly detection method of intelligent teaching system has some problems, such as poor accuracy and response efficiency. therefore, this paper proposes a distributed anomaly detection method of intell... 详细信息
来源: 评论
Violence Detection In Videos via Motion-Guided Global and Local Views  8
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
8th international conference on Data Science in Cyberspace, DSC 2023
作者: Su, Ning Sun, Lijuan Gao, Yutong Wu, Jingchen Wu, Xu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security Bupt China School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Jiaotong University Beijing Key Lab of Traffic Data Analysis and Mining Beijing China Bupt China
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio... 详细信息
来源: 评论
Dynamic VNF Placement in 5G Edge Nodes  8
Dynamic VNF Placement in 5G Edge Nodes
收藏 引用
8th IEEE international conference on Network Softwarization (NetSoft) - Network Softwarization Coming of Age - New Challenges and Opportunities
作者: Harris, Dor Raz, Danny Techion Dept Comp Sci Haifa Israel
the ongoing transition into 5G networks is enabled in part by the combination of NFV (Network Function Virtualization) and MEC (Multi-access Edge computing), two promising paradigms that allow executing ultra-low-late... 详细信息
来源: 评论
Fuzzy rule-based grey wolf(GW-FIS) in Wireless Body Area Networks  8
Fuzzy rule-based grey wolf(GW-FIS) in Wireless Body Area Net...
收藏 引用
8th IEEE international conference for Convergence in Technology, I2CT 2023
作者: Sharma, Poonam Saini, Kamaljit Singh Sidhu, Prabhjot Kaur Chandigarh University University Institute of Computing Punjab Mohali India MSIT IT Department GGSIP University New Delhi India
Wireless body area networks are crucial in many fields, including healthcare, education, and others. Congestion Control Problem is the main issue facing the design of Wireless Body Area Networks. Inconsistent traffic ... 详细信息
来源: 评论
Challenges in Modelling Applications for Safe and Resilient Digital Twins  8
Challenges in Modelling Applications for Safe and Resilient ...
收藏 引用
8th IEEE international Smart Cities conference, ISC2 2022
作者: Khan, Muhammad Taimoor School of Computing and Mathematical Sciences University of Greenwich London United Kingdom
Digital twin-based modern smart city infrastructures are evolving into intelligent and distributed systems of autonomous entities operating in a dynamic cyber-physical environment to offer real-time and critical servi... 详细信息
来源: 评论
Building a QoS Testing Framework for Simulating Real-World Network Topologies in a Software-defined networking Environment  8
Building a QoS Testing Framework for Simulating Real-World N...
收藏 引用
8th international conference on Engineering and Emerging Technologies, ICEET 2022
作者: Yoo, Hyeong Seon Yu, William Emmanuel S. Ateneo de Manila University Department of Information Systems and Computer Science Quezon City Philippines
Software-defined networking is an emerging technology for implementing Quality of Service (QoS) for its logically centralized control and decoupled control and forwarding planes. In this paper, we extend a previous fr... 详细信息
来源: 评论
A distributed Approach for 5G Computation Offloading based on Non-Preemptive Priority Scheduling and Deep Reinforcement Learning  8
A Distributed Approach for 5G Computation Offloading based o...
收藏 引用
8th IEEE international conference on Computer and Communications, ICCC 2022
作者: Liu, Nian Zhang, Tao Cui, Junlang Cao, Yanyi Zhang, Chuanfu School of Systems Science and Engineering Sun Yat-sen University Guangzhou China
Mobile devices generate numerous non-divisible and delay-sensitive tasks in 5G system, which bring a huge amount of network traffic. As Mobile edge computing can effectively alleviate computational pressure of termina... 详细信息
来源: 评论