咨询与建议

限定检索结果

文献类型

  • 2,908 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,978 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 829 篇 软件工程
    • 531 篇 信息与通信工程
    • 392 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 388 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 42 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 303 篇 cloud computing
  • 152 篇 distributed comp...
  • 132 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 69 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 60 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 security
  • 50 篇 monitoring
  • 47 篇 edge computing
  • 42 篇 big data
  • 40 篇 computer science
  • 40 篇 data models
  • 39 篇 internet

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,920 篇 英文
  • 40 篇 中文
  • 25 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2978 条 记 录,以下是2911-2920 订阅
排序:
An implementation of Scalable, Vegas, Veno, and YeAH congestion control algorithms in ns-3  16
An implementation of Scalable, Vegas, Veno, and YeAH congest...
收藏 引用
8th Workshop on Network Simulator (ns-3), WNS3 2016
作者: Nguyen, Truc Anh N. Gangadhar, Siddharth Rahman, Md Moshfequr Sterbenz, James P.G. Information and Telecommunication Technology Center Department of Electrical Engineering and Computer Science The University of Kansas LawrenceKS66045 United States InfoLab21 Lancaster University LA1 4WA United Kingdom Department of Computing Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong
Despite the modern advancements in networking, TCP congestion control is still one of the key mechanisms that ensure the stability of the Internet. Given its principal role, it is a popular research topic revisited ev... 详细信息
来源: 评论
Detecting rumors through modeling information propagation networks in a social media environment  8
Detecting rumors through modeling information propagation ne...
收藏 引用
8th international conference on Social computing, Behavioral-Cultural Modeling, and Prediction, SBP 2015
作者: Liu, Yang Xu, Songhua Tourassi, Georgia New Jersey Insititute of Technology University Heights NewarkNJ07102 United States Health Data Sciences Institute Oak Ridge National Laboratory Biomedical Science and Engineering Center 1 Bethel Valley Road Oak RidgeTN37830 United States
In the midst of today’s pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in... 详细信息
来源: 评论
Creating private network overlays for high performance scientific computing  2007
收藏 引用
Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware
作者: Edward Walker Texas Advanced Computing Center The University of Texas at Austin Austin Texas
In this paper we describe an approach in creating private network overlays in user-space to support the dynamic creation of personal clusters on-demand. these personal clusters are created by submitting job proxies to... 详细信息
来源: 评论
BIGS: A framework for large-scale image processing and analysis over distributed and heterogeneous computing resources
BIGS: A framework for large-scale image processing and analy...
收藏 引用
IEEE international conference on e-Science and Grid computing
作者: Raúl Ramos-Pollán Fabio A. González Juan C. Caicedo Angel Cruz-Roa Jorge E. Camargo Jorge A. Vanegas Santiago A. Pérez Jose David Bermeo Juan Sebastián Otálora Paola K. Rozo John E. Arévalo Bioingenium Research Group at Universidad Nacional de Colombia Bogotá Colombia Universidad Nacional de Colombia Bogota CO
this paper presents BIGS the Big Image Data Analysis Toolkit, a software framework for large scale image processing and analysis over heterogeneous computing resources, such as those available in clouds, grids, comput... 详细信息
来源: 评论
Research of Cooperative Product Design Based on a Rapid Inducing Solid Model
Research of Cooperative Product Design Based on a Rapid Indu...
收藏 引用
the 8th international conference on Computer Supported Cooperative Work in Design(第八届计算机支持的协同工作设计国际会议)(CSCWD2004)
作者: Hongming Cai Yuanjun He Yong Wu Computer Science Dept. Shanghai Jiaotong Univ.200030ShanghaiChina
Web-based interactive design always brings outmass of data transferring and makes it difficult todisplay real-time model. In order to decreasetransferring data, a model called RISM (RapidInducing Solid Model) is prov... 详细信息
来源: 评论
Enhancing Product Review System: Leveraging CUDA-BB Algorithm for Sentiment Classification
Enhancing Product Review System: Leveraging CUDA-BB Algorith...
收藏 引用
international conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: S Ramanjaneyulu Bhvs Ramakrishnam Raju D Rajya Lakshmi Department of CSE Geethanjali College of Engineering and Technology Keesara(M) Medchal Dist. Telangana INDIA Dept of IT SRKR Engineering College Bhimavaram AP India Department of CSE JNTU Vizianagaram Vizianagaram AP India
Sentiment analysis is an important method in natural language processing (NLP) for detecting emotions and categorizing text as positive, negative, or neutral. It is invaluable for evaluating customer feedback, which i... 详细信息
来源: 评论
Domestic Violence Crisis Recognition Method based on Bi-LSTM+Attention
Domestic Violence Crisis Recognition Method based on Bi-LSTM...
收藏 引用
international conference on Network and Information Systems for Computers (ICNISC)
作者: Zhixiao Wang Wenyao Yan Zhuochun Li Min Huang Qinyuan Fan Xin Wang Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Network Computing and Security Xi'an China College of Xi'an Innovation Yan'an University Xi'an China University of Pittsburgh Pittsburgh PA USA Art and Design Xi'an University of Technology Xi'an China Fakultät Verkehrs- und Maschinensysteme Technische Universität Berlin Berlin Germany Computer Science and Engineering Xi'an University of Technology Xi'an China
Domestic violence (DV) is getting more and more attention due to the critical trouble and danger that pose great challenge to human rights and health. the popularity of various social medias can help these victims to ... 详细信息
来源: 评论
the Detection of Fake News through the use of a Hierarchical Convolutional Attention Network
The Detection of Fake News through the use of a Hierarchical...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Chameera De Silva thilina Halloluwa School of Computing University of Colombo Colombo Sri Lanka
In the current digital era, the popularity of social media platforms has expanded tremendously. Every one of us, no matter what age or gender or class we belong to, are active on social media, sharing so much of our p... 详细信息
来源: 评论
Predictive Modelling for Lung Cancer Detection using Machine Learning Techniques
Predictive Modelling for Lung Cancer Detection using Machine...
收藏 引用
international conference on Communication and Electronics Systems (ICCES)
作者: B. Yamini K. Sudha M. Nalini G. Kavitha R. Siva Subramanian R. Sugumar Dept of Networking and Communications School of Computing College of Engg and Tech SRM Institute of Science and Tech Dept of CSBS R.M.D Engineering College Dept of CSE S.A.Engineering College Dept of CSE Rajalakshmi Insitute of Technology Dept of CSE R.M.K.College of Engg and Tech Institute of CSE Saveetha School of Engineering Saveetha Institute of Medical & Technical Sciences Chennai
Lung cancer (LC), generally called lung carcinoma, is a fatal and debilitating illness that affects the lungs. Lung cancer is caused by the genetic damage that occurs to the DNA of the cell as a result of numerous env...
来源: 评论
RSU-driven Cloud Construction and Management Mechanism in VANETs
RSU-driven Cloud Construction and Management Mechanism in VA...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Yoonhyeong Lee Hyunseok Choi Youngju Nam Sungjin Park Euisin Lee School of Information & Communication Engineering Chungbuk National University Cheongju Republic of Korea
Recently, Vehicular Ad hoc Networks (VANETs) introduce a Vehicular Cloud (VC) model for collaborating to share and use resources of vehicles to create value-added services. To construct a VC, a vehicle should search v... 详细信息
来源: 评论