咨询与建议

限定检索结果

文献类型

  • 2,910 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,029 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,924 篇 英文
  • 40 篇 中文
  • 23 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2980 条 记 录,以下是401-410 订阅
排序:
Enhancing Explainability of Artificial Intelligence for threat Detection in SDN-based Multicast Systems  16
Enhancing Explainability of Artificial Intelligence for Thre...
收藏 引用
16th international conference on Ambient Systems, Networks and Technologies Networks, ANT 2025 / 8th international conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Prasad, Preety Tahir, Mohammad Isoaho, Jouni Department of Computing University of Turku Turku20014 Finland
the increasing adoption of Artificial Intelligence (AI) based Software-Defined networking (SDN) in multicast systems has improved network management and traffic efficiency. However, for network administrators, underst... 详细信息
来源: 评论
P2P Strategy for Energy Cost Reduction in Multi-Energy Hubs Considering Uncertainty and Flexibility
P2P Strategy for Energy Cost Reduction in Multi-Energy Hubs ...
收藏 引用
Technology and Energy Management (ICTEM), international conference on
作者: Sayyad Nojavan Esmaeil Valipour Department of Electrical Engineering University of Bonab Bonab Iran
the peer-to-peer (P2P) energy transaction scheme is a new structure being recently used in the local energy markets to develop flexibility of energy hubs when energy cost is high. this study proposes a Norwegian indus... 详细信息
来源: 评论
An Efficient Batch Verification Scheme for SM2 Signatures  8
An Efficient Batch Verification Scheme for SM2 Signatures
收藏 引用
8th international conference on Dependable Systems and their Applications, DSA 2021
作者: Liu, Dingning Yuan, Yuyu Xue, Tengfei Chen, Lei Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China Huawei Technologies Co. Ltd China
SM2 cryptographic algorithm is an elliptic curve public key algorithm released by China's State Cryptography Administration, which includes digital signature algorithms, key exchange protocols, public key encrypti... 详细信息
来源: 评论
A Heterogeneous KBA Parallel Algorithm for the Cartesian Discrete Ordinates for Multizone Heterogeneous System
A Heterogeneous KBA Parallel Algorithm for the Cartesian Dis...
收藏 引用
international conference on Computers, Communications, and Systems (ICCCS)
作者: Runhua Li Jie Liu Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China
Innovations in powerful high-performance computing (HPC) architecture are enabling high-fidelity whole-core neutron transport simulations at reasonable time. Especially, the currently fashionable heterogeneous archite...
来源: 评论
AI-Driven User Experience Design: Exploring Innovations and Challenges in Delivering Tailored User Experiences
AI-Driven User Experience Design: Exploring Innovations and ...
收藏 引用
international conference on Information Technology Research (ICITR)
作者: Prasadini Padmasiri Pramukthika Kalutharage Nethma Jayawardhane Jagath Wickramarathne Faculty of Graduate Studies and Research Sri Lanka Institute of Information Technology Malabe Sri Lanka Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
In today’s digital landscape, providing user experiences is considered paramount in respective of user satisfaction and engagement. Artificial Intelligence (AI) has emerged as a transformative force in the User Exper...
来源: 评论
Scalable Personalised Treatment Recommendation in Critical Care
Scalable Personalised Treatment Recommendation in Critical C...
收藏 引用
international conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)
作者: Chandra Prasetyo Utomo Kohei Ichikawa Nashuha Insani Kundjanasith thonglek Soratouch Pornmaneerattanatri Ummi Azizah Rachmawati Department of Informatics Universitas YARSI Jakarta Indonesia Division of Information Science Nara Institute of Science and Technology Nara Japan Cybermedia Center Osaka University Osaka Japan
Sepsis is the leading cause of death in crit-ical care. Most sepsis patients did not receive effective treatment timely. Non-optimal medical treatments can lead to a lower survival rate. We aim to develop an effective... 详细信息
来源: 评论
IoT based Intelligent Parking System for Smart Cities
IoT based Intelligent Parking System for Smart Cities
收藏 引用
international conference on computing Communication Control and Automation (ICCUBEA)
作者: Bhavana Narsingoju Rajashree Jain Bali Shankar Khurana Symbiosis Institute of Computer Studies and Research Symbiosis International University Pune India MCA Department Pimpri Chinchwad College of Engineering Pune India
In the era of smart cities with Internet of things every time there is a need of innovative and sustainable solutions for parking and smart cities management. the solutions which are developed are not sufficient enoug... 详细信息
来源: 评论
Discussion on Network Information Security Based on Cloud computing Environment
Discussion on Network Information Security Based on Cloud Co...
收藏 引用
international conference on Network and Information Systems for Computers (ICNISC)
作者: Ting Chen Haiyan Liu Industrial &Internet College Beijing Information Technology College Beijing China
With the explosive advancement of social development and technological change, cloud computing technology has developed rapidly in China in recent years. Data and information security in cloud computing environment ha... 详细信息
来源: 评论
An Efficient Vehicle Tyre Pressure Monitoring Algorithm Based on Quasi-distributed computing and Recursive Least Squares
An Efficient Vehicle Tyre Pressure Monitoring Algorithm Base...
收藏 引用
conference on Vehicle Control and Intelligence (CVCI)
作者: Daolin Zhou Xiangyu Wang Xiaoming Ye Feng Lai Chunlai Zhao Menghao Wei School of Vehicle and Mobility Tsinghua University Beijing China Research&Development Institute DONGFENG Motor Corportion Wuhan China
Indirect tyre pressure monitoring system (ITPMS) can effectively reduce tyre blowouts risk and enhance high-speed vehicle operation safety, gradually emerging as a rapidly popular-ized on-board electronic control safe... 详细信息
来源: 评论
Two Kinds of Infinite Petri Nets for Modeling computing and Communication Systems  8
Two Kinds of Infinite Petri Nets for Modeling Computing and ...
收藏 引用
8th IEEE international conference on Problems of Infocommunications, Science and Technology, PIC S and T 2021
作者: Zaitsev, Dmitry Shmeleva, Tatiana Probert, David E. Odessa State Environmental University Department of Information Technology Odessa Ukraine State University of Intellectual Technologies And Telecommunications Department of Computer Science Odessa Ukraine Vaza Cybersecurity Newbury Berkshire United Kingdom
Correctness of networking protocols represents the principal requirement of cybersecurity. Correctness of protocols is established via the procedures of their verification. A classical communication system includes a ... 详细信息
来源: 评论