咨询与建议

限定检索结果

文献类型

  • 2,910 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,029 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,924 篇 英文
  • 40 篇 中文
  • 23 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2980 条 记 录,以下是451-460 订阅
排序:
Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace
Enhancing IoT Flow Anomaly Detection with Differential Optim...
收藏 引用
IEEE international conference on Data Science in Cyberspace (DSC)
作者: Weidong Shi Mingrui Fan Jiaqi Gao Jiahao Qi Daoqi Han Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education School of Cyberspace Security The State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
With the continuous expansion of network scale and increasing complexity, the application of the Internet of things (IoT) is becoming more extensive. However, it is also vulnerable to various abnormal attacks, making ...
来源: 评论
Polyfund: Polygon - Based Crowdfunding Dapp
Polyfund: Polygon - Based Crowdfunding Dapp
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Milind Rane Smita Mande Mustansir Bohari Asif Mursal Vinit Mundhada Omkar Mundlik Mohit Chawla Jayesh Mundphane Department of E&TC Vishwakarma Institute of Technology Pune Maharashtra India Department of DESH Vishwakarma Institute of Technology Pune Maharashtra India Department of AI&DS Vishwakarma Institute of Technology Pune Maharashtra India Department of Instru and Control Vishwakarma Institute of Technology Pune Maharashtra India Department of Mechanical Engineering Vishwakarma Institute of Technology Pune Maharashtra India
the rise of information technology has led to a surge in interest of investors and businesses in advanced futuristic technologies like Blockchain and Cryptocurrency. Blockchain is the heart of web3 technologies. One o... 详细信息
来源: 评论
EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining
EFM: A Negative Network Public Opinion Early Warning Model B...
收藏 引用
IEEE international conference on Data Science in Cyberspace (DSC)
作者: Fanfeixue Meng Jingchen Wu Feifan Song Xu Wu Lan Hu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT School of Economics and Finance Changchun Finance College
With the popularity of the Internet and the increase in the number of netizens, it is of great significance to effectively monitor and predict the negative network public opinion on social media platforms. Most mainst...
来源: 评论
NetSheriff: Sheltering Software-Defined Networks from Rogue Switches  1
收藏 引用
8th international conference on Networked Systems (NETYS)
作者: Laffranchini, Paolo Miranda, Joao Machado, Nuno Rodrigues, Luis Riviere, Etienne Sadre, Ramin ULisboa INESC ID IST Lisbon Portugal UCLouvain ICTEAM Louvain La Neuve Belgium Teradata San Diego CA USA
We present NetSheriff - a system to automatically isolate faulty switches in Software-Defined Networks. To pinpoint the devices responsible for network misbehaviors, NetSheriff performs a differential analysis between... 详细信息
来源: 评论
Facial Expression Recognition Based on Deep Spatio-Temporal Attention Network  18th
Facial Expression Recognition Based on Deep Spatio-Temporal ...
收藏 引用
18th European-Alliance-for-Innovation (EAI) international conference on Collaborative computing - networking, Applications and Worksharing (CollaborateCom)
作者: Li, Shuqin Zheng, Xiangwei Zhang, Xia Chen, Xuanchi Li, Wei Shandong Normal Univ Sch Informat Sci & Engn Jinan Peoples R China Shandong Prov Key Lab Distributed Comp Software N Jinan Peoples R China Taian City Cent Hosp Internet Diag & Treatment Ctr Tai An Shandong Peoples R China Shandong Normal Univ Lib Shandong Normal Univ Jinan Peoples R China
Facial expression recognition is extremely critical in the process of human-computer interaction. Existing facial expression recognition tends to focus on a single feature of the face and does not take full advantage ... 详细信息
来源: 评论
Efficient Transparent Access to 5G Edge Services
Efficient Transparent Access to 5G Edge Services
收藏 引用
IEEE conference on Network Softwarization (NetSoft)
作者: Josef Hammer Hermann Hellwagner Institute of Information Technology Alpen-Adria-Universit&#x00E4 t Klagenfurt Austria
Multi-access Edge computing (MEC) is a central piece of 5G telecommunication systems and is essential to satisfy the challenging low-latency demands of future applications. MEC provides a cloud computing platform at t... 详细信息
来源: 评论
BYEE: Batch Fully Private Scheme for Coded distributed Matrix Multiplication
BYEE: Batch Fully Private Scheme for Coded Distributed Matri...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Guojing Li Jin Wang Xiaotian Zou Lingzhi Li Fei Gu School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization
Recently, user privacy in distributed computing has received increasing attention. Matrix multiplication is one of the fundamental high-frequency operations in distributed machine learning (e.g., gradient descent, lin... 详细信息
来源: 评论
Questionable Fairness in Federated Learning
Questionable Fairness in Federated Learning
收藏 引用
conference on Data Science and Machine Learning Applications (CDMA)
作者: Raed Alharbi Truc Nguyen Nooshin Yousefzadeh Ahmed Aljohani College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Computatioual Science Center National Renewable Energy Laboratory Golden CO USA Computer and Information Science and Engineering Department University of Florida Gainesville FL USA Computer Science and Engineering University of North Texas Denton USA
Federated learning (FL) has emerged as a powerful framework for training deep learning models across numerous distributed clients, where a central server distributes and aggregates model updates without accessing clie... 详细信息
来源: 评论
GSLA: A Tool for Deciphering Genotype Changes on Phenotype Level
GSLA: A Tool for Deciphering Genotype Changes on Phenotype L...
收藏 引用
international conference on Network and Information Systems for Computers (ICNISC)
作者: Li Ruan Pengcheng Chen Institute of Big Data and Artificial Intelligence in Medicine School of Electronics and Information Engineering Taizhou University Taizhou China
We perform the gene set linkage analysis (GSLA) tool for interpreting the functional influences of genes with expression change in omics studies. It has been illustrated in several studies that the algorithm is useful... 详细信息
来源: 评论
FNotify: A Low-Latency and Scalable Publish/Subscribe System using RDMA
FNotify: A Low-Latency and Scalable Publish/Subscribe System...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Yusen Xu Sijie Shen Mingcong Han Rong Chen Institute of Parallel and Distributed Systems SEIEE Shanghai Jiao Tong University Shanghai China
Publish/subscribe systems are widely used as messaging middleware in various scenarios, such as online business, financial trading, and social media. However, the network overhead intro-duced by the pub/sub system can... 详细信息
来源: 评论