咨询与建议

限定检索结果

文献类型

  • 2,908 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,978 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 829 篇 软件工程
    • 531 篇 信息与通信工程
    • 392 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 388 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 42 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 303 篇 cloud computing
  • 152 篇 distributed comp...
  • 132 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 69 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 60 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 security
  • 50 篇 monitoring
  • 47 篇 edge computing
  • 42 篇 big data
  • 40 篇 computer science
  • 40 篇 data models
  • 39 篇 internet

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,920 篇 英文
  • 40 篇 中文
  • 25 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2978 条 记 录,以下是2941-2950 订阅
排序:
Zero-interaction authentication  02
Zero-interaction authentication
收藏 引用
Proceedings of the 8th annual international conference on Mobile computing and networking
作者: Mark D. Corner Brian D. Noble University of Michigan
Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully address this problem. Such systems ask the user... 详细信息
来源: 评论
An Efficient Vehicle Tyre Pressure Monitoring Algorithm Based on Quasi-distributed computing and Recursive Least Squares
An Efficient Vehicle Tyre Pressure Monitoring Algorithm Base...
收藏 引用
conference on Vehicle Control and Intelligence (CVCI)
作者: Daolin Zhou Xiangyu Wang Xiaoming Ye Feng Lai Chunlai Zhao Menghao Wei School of Vehicle and Mobility Tsinghua University Beijing China Research&Development Institute DONGFENG Motor Corportion Wuhan China
Indirect tyre pressure monitoring system (ITPMS) can effectively reduce tyre blowouts risk and enhance high-speed vehicle operation safety, gradually emerging as a rapidly popular-ized on-board electronic control safe... 详细信息
来源: 评论
A distributed Algorithm for Controller Placement in Software Defined Vehicular Networks  2019
A Distributed Algorithm for Controller Placement in Software...
收藏 引用
Proceedings of the 2019 8th international conference on Networks, Communication and computing
作者: Junpeng Wang Zhumu Fu Pengju Si Fazhan Tao Henan University of Science and Technology Henan Key Laboratory of Robot and Intelligent Systems Luoyang Henan China School of Information Engineering Henan University of Science and Technology Luoyang Henan China
With the rise of autonomous driving technology and the growing demand for real-time traffic information, there is a growing demand for Internet of Vehicle (IoV). Vehicle Ad-hoc Network (VANET) is purposed to avoid lon... 详细信息
来源: 评论
SDN-DDoSNet: A Deep Learning Framework for DDoS Attack Detection in Software-Defined Networks
SDN-DDoSNet: A Deep Learning Framework for DDoS Attack Detec...
收藏 引用
conference on Information and Communication Technology (CICT)
作者: Abhilash Ojha Ashok Yadav Vrijendra Singh Department of Computer Science Tezpur University Tezpur Assam India Department of Information Technology Indian Institute of Information Technology Allahabad Prayagraj India
distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal web traffic, posing an increasing threat to network infrastructures due to the growing frequency and sophistication of such attacks.... 详细信息
来源: 评论
A Proactive Data-Parallel Framework for Machine Learning  21
A Proactive Data-Parallel Framework for Machine Learning
收藏 引用
2021 IEEE/ACM 8th international conference on Big Data computing, Applications and Technologies (BDCAT '21)
作者: Guoyi Zhao Tian Zhou Lixin Gao University of Massachusetts Amherst USA University of Massachusetts Amherst USA
Data parallel frameworks become essential for training machine learning models. the classic Bulk Synchronous Parallel (BSP) model updates the model parameters through pre-defined synchronization barriers. However, whe... 详细信息
来源: 评论
the Vision of 5G and Cell-Free Communication Networks in Malaysia
The Vision of 5G and Cell-Free Communication Networks in Mal...
收藏 引用
international conference on Information Technology and Multimedia (ICIM)
作者: Mohammed Najah Mahdi Khalid Sheikhidris Mohamed Abdul Rahim Ahmad Mohammed Ahmed Subhi Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Kajang Malaysia Faculty of Engineering Multimedia University Cyberjaya Malaysia College of Computing & Informatics Universiti Tenaga Nasional Kajang Malaysia Universiti Kebangsaan Malaysia Bangi Malaysia
5 G cellular networks are supposed to accommodate the ever-increasing data explosion and hyper-dense installation of base stations thanks to their capacity to leverage connectivity and cost-effectiveness. 5G networks ... 详细信息
来源: 评论
distributed Misbehavior Detection System for Cooperative Driving Networks
Distributed Misbehavior Detection System for Cooperative Dri...
收藏 引用
IEEE international conference on Fog and Edge computing (ICFEC)
作者: Abdullahi Modibbo Abdullahi Wassila Lalouani Department of Computer and Information Science Towson University Towson Maryland USA
Cooperative Intelligent Transportation Systems (C-ITS) are foundational evolution of vehicular networks, emphasizing the seamless coordination of Vehicle-to-Vehicle communication for exchanging vital information. In C... 详细信息
来源: 评论
Key Safe Algorithms for Blockchain Technologies
Key Safe Algorithms for Blockchain Technologies
收藏 引用
international conference on computing Communication Control and Automation (ICCUBEA)
作者: Bhavesh Ingale Amar Buchade Varsha Jadhav Ratna Patil Swapnil Shinde Information Technology Vishwakarma Institute of Information Technology Pune India Artificial Intelligence and Data Science Vishwakarma Institute of Information Technology Pune India
In the fast-changing world of blockchain tech, keeping cryptographic algorithms secure and efficient is crucial, especially for managing keys in groups. this paper compares three cryptographic algorithms—Shamir's... 详细信息
来源: 评论
Traffic-Aware Dynamic Functional Split for 5G Cloud Radio Access Networks
Traffic-Aware Dynamic Functional Split for 5G Cloud Radio Ac...
收藏 引用
IEEE conference on Network Softwarization (NetSoft)
作者: Himank Gupta A Antony Franklin Mayank Kumar Bheemarjuna Reddy Tamma Indian Institute of Technology Hyderabad India Indian Institute of Technology Bhilai India
the recent adaption of virtualization technologies in the next generation mobile network enables 5G base station to be segregated into a Radio Unit (RU), a distributed Unit (DU), and a Central Unit (CU) to support Clo... 详细信息
来源: 评论
VATE: Edge-Cloud System for Object Detection in Real-Time Video Streams
VATE: Edge-Cloud System for Object Detection in Real-Time Vi...
收藏 引用
IEEE international conference on Fog and Edge computing (ICFEC)
作者: Maximilian Maresch Stefan Nastic Distributed Systems Group TU Wien
In the realm of edge intelligence, emerging video analytics applications are often based on resource constrained edge devices. these applications need systems which are able to provide both low-latency and high-accura... 详细信息
来源: 评论