咨询与建议

限定检索结果

文献类型

  • 2,910 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,029 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,924 篇 英文
  • 40 篇 中文
  • 23 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2980 条 记 录,以下是431-440 订阅
排序:
distributed Music Comments Mining System Based on BGLL Algorithm
Distributed Music Comments Mining System Based on BGLL Algor...
收藏 引用
international conference on Network and Information Systems for Computers (ICNISC)
作者: Yawei Peng Chengzhang Qu Department of Electronic Information Engineering Wuhan Bussiness University Wuhan China
this paper aims to establish a distributed music comments mining system based on BGLL algorithm. With the massive music resource and users of NetEase Cloud Music, our system employs big data technology and machine lea... 详细信息
来源: 评论
An Adaptive Tiering Scheme for an Autonomous distributed Storage System  21
An Adaptive Tiering Scheme for an Autonomous Distributed Sto...
收藏 引用
8th international conference on Applied computing and Information Technology, ACIT 2021
作者: Nunome, Atsushi Hirata, Hiroaki Kyoto Institute of Technology Faculty of Information and Human Sciences Kyoto Japan
Our previous works showed a distributed storage system capable to migrate data blocks autonomously across storage tiers. In this paper, we present an adaptive method for constructing storage tiers in the autonomous di... 详细信息
来源: 评论
SDN-DDoSNet: A Deep Learning Framework for DDoS Attack Detection in Software-Defined Networks
SDN-DDoSNet: A Deep Learning Framework for DDoS Attack Detec...
收藏 引用
conference on Information and Communication Technology (CICT)
作者: Abhilash Ojha Ashok Yadav Vrijendra Singh Department of Computer Science Tezpur University Tezpur Assam India Department of Information Technology Indian Institute of Information Technology Allahabad Prayagraj India
distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal web traffic, posing an increasing threat to network infrastructures due to the growing frequency and sophistication of such attacks.... 详细信息
来源: 评论
A Blockchain-Based IoT Data Secure Vickery Auction System  8th
A Blockchain-Based IoT Data Secure Vickery Auction System
收藏 引用
8th international conference on Artificial Intelligence and Security , ICAIS 2022
作者: Wang, Haohui Chen, Xiubo Ahmad, Haseeb Xu, Gang Yang, Yixian Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guizhou Guiyang550025 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science National Textile University Faisalabad37610 Pakistan School of Information Science and Technology North China University of Technology Beijing100144 China
Traditional centralized architectures for IoT data suffer from single points of failure in terms of data storage and access control, and IoT data does not fully realize its value as a digital asset. In response to the... 详细信息
来源: 评论
Towards Accurate and Efficient Super Spreader Detection with Sketching
Towards Accurate and Efficient Super Spreader Detection with...
收藏 引用
IEEE international conference on Data Science in Cyberspace (DSC)
作者: Shouyou Song Pu Wang Yangchun Li Nanyang Wang Wei Jiang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT Beijing China Chinese Academy of Cyberspace Studies Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing China School of Computer and Information Engineering Chuzhou University Anhui China
Super spreaders are the flow that have a large number of distinct connections (also called spread), which related with many threats to networks. Estimating flow spread is the crucial step in super spreader detection. ...
来源: 评论
A Novel Approach to Feature Extraction in MI - Based BCI Systems
A Novel Approach to Feature Extraction in MI - Based BCI Sys...
收藏 引用
international conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Arun Kumar S L Anand Anil Kannur Department of Computer Science and Engineering School of Computing SRM Institute of Science and Technology Kattankulathur Tamil Nadu India Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur Tamil Nadu India Department of Computer Science and Engineering BLDEA'S V.P. Dr. P.G. Halakatti College of Engineering and Technology Vijayapura
Brain-computer interfaces based on motor imagery (MI-BCI) enable communication between the brain and the outside world. It accomplishes this by capturing and examining the EEG data generated when a person visualizes m... 详细信息
来源: 评论
An Energy-Aware Multi-Criteria Federated Learning Model for Edge computing  8
An Energy-Aware Multi-Criteria Federated Learning Model for ...
收藏 引用
8th international conference on Future Internet of things and Cloud, FiCloud 2021
作者: Al-Saedi, Ahmed A. Casalicchio, Emiliano Boeva, Veselka Blekinge Institute of Technology Department of Computer Science Karlskrona Sweden Sapienza University of Rome Departement of Computer Science Italy
the successful convergence of Internet of things (IoT) technology and distributed machine learning have leveraged to realise the concept of Federated Learning (FL) with the collaborative efforts of a large number of l... 详细信息
来源: 评论
Twitter Tweet: Sentiment Analysis on Illegal Investment using Naive Bayes Algorithm
Twitter Tweet: Sentiment Analysis on Illegal Investment usin...
收藏 引用
international conference on computing, Engineering, and Design (ICCED)
作者: Anisa Sholihat Fahurachman Bei Regina Ainaya Falentino Sembiring Amy Lattu Universitas Nusa Putra Sukabumi Indonesia
In today’s era, investment is in demand by society because of its vast profits. In recent months, Indonesia has been shocked by illegal investment platforms or online trading platforms that are touted as fraudulent i... 详细信息
来源: 评论
Factors Influencing Security, Trust and Customer Continuance Usage Intention of Cloud based Electronic Payment System in Indonesia  8
Factors Influencing Security, Trust and Customer Continuance...
收藏 引用
8th international conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021
作者: Gui, Anderes Dwi Putra, Ananda Bilal Sienarto, Axel Geovanni Andriawan, Hary Made Karmawan, I Gusti Permatasari, Angelina Bina Nusantara University Information Systems Study Program School of Information Systems Jakarta Indonesia
Due to the increase in electronic payment system use, this study explores the factors influencing continuance usage intention of cloud based electronic payment system in Indonesia. A total of 385 respondents are colle... 详细信息
来源: 评论
distributed Misbehavior Detection System for Cooperative Driving Networks
Distributed Misbehavior Detection System for Cooperative Dri...
收藏 引用
IEEE international conference on Fog and Edge computing (ICFEC)
作者: Abdullahi Modibbo Abdullahi Wassila Lalouani Department of Computer and Information Science Towson University Towson Maryland USA
Cooperative Intelligent Transportation Systems (C-ITS) are foundational evolution of vehicular networks, emphasizing the seamless coordination of Vehicle-to-Vehicle communication for exchanging vital information. In C... 详细信息
来源: 评论