咨询与建议

限定检索结果

文献类型

  • 2,910 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,029 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,924 篇 英文
  • 40 篇 中文
  • 23 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2980 条 记 录,以下是391-400 订阅
排序:
the Influence-Maximizing Node Selection Algorithm Based on Local Isolated Centrality in Large-scale networks Implemented by distributed Graph computing
The Influence-Maximizing Node Selection Algorithm Based on L...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Piaoyang Chen Rong Lei Mingsen Deng School of Information Guizhou University of Finance and Economics Guiyang China
Identifying influence-maximizing (IM) nodes is an effective strategy for designing efficient communication networks or contain the spreading of information for rumors and epidemics with limited budgets. With the growi... 详细信息
来源: 评论
Review on Zero Trust Architecture Apply In Enterprise Next Generation Firewall
Review on Zero Trust Architecture Apply In Enterprise Next G...
收藏 引用
international conference on Information Technology (INCIT)
作者: thana Sarkorn Krishna Chimmanee College of Digital Innovation Technology Rangsit University Thailand
the modern cybersecurity threat landscape requires a paradigm change in network defense strategies. Zero Trust Architecture (ZTA), that significant difference from traditional security models, by limiting the total tr... 详细信息
来源: 评论
Compute and Network Aware VM Scheduling using Reinforcement Learning in Cloud
Compute and Network Aware VM Scheduling using Reinforcement ...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Suyash Kamat Surabhi Naik Sagar Kanamadi Shrinidhi Alur Narayan D G Somashekar Patil KLE Technological University Hubballi India
Cloud computing has been used widely to provide a variety of services which include servers, databases, storage, networking, software, analytics, and intelligence. Scalability is increased and upfront IT infrastructur... 详细信息
来源: 评论
A Community-Driven Approach to Democratize Access to Satellite Ground Stations  21
A Community-Driven Approach to Democratize Access to Satelli...
收藏 引用
27th ACM Annual international conference on Mobile computing and networking (MobiCom)
作者: Singh, Vaibhav Prabhakara, Akarsh Zhang, Diana Yagan, Osman Kumar, Swarun Carnegie Mellon Univ Pittsburgh PA 15213 USA
Should you decide to launch a nano-satellite today in Low-Earth Orbit (LEO), the cost of renting ground station communication infrastructure is likely to significantly exceed your launch costs. While space launch cost... 详细信息
来源: 评论
Hybrid Multiple Cryptography for Data Encryption
Hybrid Multiple Cryptography for Data Encryption
收藏 引用
international conference on Communication and Electronics Systems (ICCES)
作者: M. Anuradha Sathyapriya Loganathan G. Suseela Mercy Paul Selvan M. Nalini Chitra Devi D Dept of CSE S.A.Engineering College Computing Technologies Faculty of Engineering and Technology SRM Institute of Science and Technology Dept of Networking and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology CSE Department Sathyabama Institute of Science & Technology Dept of CSE S.A. Engineering College
Since the information technology revolution, cryptography has been essential for protecting sensitive information and communication. A plethora of algorithms have been developed to safeguard data and protect data inte...
来源: 评论
A Comparative Analysis on three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method
A Comparative Analysis on Three Duplication Elements in Copy...
收藏 引用
international conference on Software Engineering and Computer Systems (ICSECS)
作者: Nur Izzati Nor Azaimi Nor Bakiah Abd Warif Nor-Syahidatul N Ismail Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Johor Malaysia Faculty of Computer Science and Information Technology Centre for Information Security Research Universiti Tun Hussein Onn Malaysia Johor Malaysia Department of Computer System and Networking Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah Pekan Pahang Malaysia
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same...
来源: 评论
the Effect of Plastic Bag Ban Policy towards Waste Complaints in Jakarta through JAKI and Qlue  8
The Effect of Plastic Bag Ban Policy towards Waste Complaint...
收藏 引用
8th international conference on ICT for Smart Society, ICISS 2021
作者: Feliren, Vicky Nugraha, Yudhistira Nasution, Bahrul Ilmi Febria Finola, Clarissa Kanggrawan, Juan I. Suherman, Alex L. Jakarta Smart City Department of Communication Informatics and Statistics Jakarta Indonesia Jakarta Smart City School of Computing Telkom University Bandung Jakarta Indonesia Directorate of Research and Community Service Telkom University Bandung Indonesia
Plastic bag ban policy has been implemented in Jakarta since July 1st, 2020. However, it is still unclear the impact of this policy on Jakarta to reduce waste. the public complaint can be used as a proxy to see how th... 详细信息
来源: 评论
Sentiment Analysis on Indonesia-English Code-Mixed Data
Sentiment Analysis on Indonesia-English Code-Mixed Data
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Hilal Ramadhan Utomo Ade Romadhony School of Computing Telkom University Bandung Indonesia
Social media users nowadays tend to use code-mixed language to express their opinion. the users of social media has exponentially risen in some countries like Indonesia, it has given rise to large volumes of code-mixe... 详细信息
来源: 评论
DRL Model for distributed Agent-based IoT on Multi-Access Edge computing for Accident Forecast
DRL Model for Distributed Agent-based IoT on Multi-Access Ed...
收藏 引用
Big Data, Cloud computing, Data Science & Engineering (BCD)
作者: Jongho Seol Jongyeop Kim Abhilash Kancharla Department of Information Technology Middle Georgia State University Macon GA U.S.A Department of Information Technology Georgia Southern University Statesboro GA U.S.A Department of Computer Science The University of Tampa Tampa FL U.S.A
this paper introduces a state-of-the-art Deep Reinforcement Learning (DRL) model designed for IoT devices in Multi-Access Edge computing (MEC), with a focus on urban accident prediction. the Edge server serves as a ce...
来源: 评论
Direct GPU Compilation and Execution for Host Applications with OpenMP Parallelism  8
Direct GPU Compilation and Execution for Host Applications w...
收藏 引用
8th IEEE/ACM Annual Workshop on the LLVM Compiler Infrastructure in HPC, LLVM-HPC 2022
作者: Tian, Shilei Huber, Joseph Parasyris, Konstantinos Chapman, Barbara Doerfert, Johannes Stony Brook University Department of Computer Science Stony Brook United States Advanced Micro Devices Austin United States Lawrence Livermore National Laboratory Center for Applied Scientific Computing Livermore United States
Currently, offloading to accelerators requires users to identify which regions are to be executed on the device, what memory needs to be transferred, and how synchronization is to be resolved. On top of these manual t... 详细信息
来源: 评论