咨询与建议

限定检索结果

文献类型

  • 2,910 篇 会议
  • 39 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,029 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 528 篇 信息与通信工程
    • 388 篇 电气工程
    • 160 篇 控制科学与工程
    • 90 篇 生物工程
    • 69 篇 电子科学与技术(可...
    • 59 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 41 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 13 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,924 篇 英文
  • 40 篇 中文
  • 23 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2980 条 记 录,以下是471-480 订阅
排序:
A distributed 3D UAV Placement Algorithm for Integrated Ground-Air Cellular Networks
A Distributed 3D UAV Placement Algorithm for Integrated Grou...
收藏 引用
international conference on Big Data computing and Communications (BIGCOM)
作者: Xinwei Wang Ye Liu Shan Chang Computer Science and Technology Donghua University Shanghai China
the problem of deploying unmanned aerial vehicles (UAVs) to form a wireless cellular network has gained much attention. Most of the recent works either need to know the locations of users or to make decision in a cent... 详细信息
来源: 评论
Aware: Adaptive distributed Training with Computation, Communication and Position Awareness for Deep Learning Model
Aware: Adaptive Distributed Training with Computation, Commu...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Yan Zeng Guangzheng Yi Yuyu Yin Jiyang Wu Meiting Xue Jilin Zhang Jian Wan Yunquan Zhang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China School of Cyberspace Hangzhou Dianzi University Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
the accuracy of the neural networks can usually be improved by increasing the size of the dataset and the layers or operators of the network, as it has strong composability. But, it makes a challenge to train these mo... 详细信息
来源: 评论
A Trust Level Evaluation Method for Intelligent Numerical Control Systems Driven by Edge Intelligence
A Trust Level Evaluation Method for Intelligent Numerical Co...
收藏 引用
international conference on Computer and Communications (ICCC)
作者: Zheng Zhou Dong Yu Yi Hu Lipeng Zhang Wuwei He Haoyu Yu University of Chinese Academy of Sciences Shenyang Institute of Computing Technology Chinese Acadamy of Sciences Shenyang P.R. China Shenyang Institute of Computing Technology Chinese Acadamy of Sciences Shenyang P.R. China Digital Workshop Department Shenyang CASNC Technology Co.Ltd Shenyang P.R. China
With the increase in the number of networking devices in the industrial field, the total amount of data increases, resulting in huge broadband pressure and power consumption, making the traditional centralized process... 详细信息
来源: 评论
Weak Network Oriented Mobile distributed Storage: A Hybrid Fault-Tolerance Scheme Based on Potential Replicas
Weak Network Oriented Mobile Distributed Storage: A Hybrid F...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Xinlei Wei Yujuan Tan Duo Liu Daitao Wu Yu Wu Xianzhang Chen Jian Li College of Computer Science Chongqing University Chongqing China School of Big Data & Software Engineering Chongqing University Chongqing China School of Electrical Engineering Chongqing University Chongqing China
Node failure is one of the most typical issues in distributed storage systems. the classic fault-tolerance methods can meet the fault tolerance needs of systems deployed in edge storage, 5G IoT, and other high-perform... 详细信息
来源: 评论
Scientific and Technological News Recommendation Based on Knowledge Graph with User Perception
Scientific and Technological News Recommendation Based on Kn...
收藏 引用
IEEE international conference on Cloud computing and Intelligence Systems (CCIS)
作者: Yuyao Zeng Junping Du Zhe Xue Ang Li School of Computer Science Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
Existing research usually utilizes side information such as social network or item attributes to improve the performance of collaborative filtering-based recommender systems. In this paper, the knowledge graph with us... 详细信息
来源: 评论
the Detection of Fake News through the use of a Hierarchical Convolutional Attention Network
The Detection of Fake News through the use of a Hierarchical...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Chameera De Silva thilina Halloluwa School of Computing University of Colombo Colombo Sri Lanka
In the current digital era, the popularity of social media platforms has expanded tremendously. Every one of us, no matter what age or gender or class we belong to, are active on social media, sharing so much of our p... 详细信息
来源: 评论
Predictive Modelling for Lung Cancer Detection using Machine Learning Techniques
Predictive Modelling for Lung Cancer Detection using Machine...
收藏 引用
international conference on Communication and Electronics Systems (ICCES)
作者: B. Yamini K. Sudha M. Nalini G. Kavitha R. Siva Subramanian R. Sugumar Dept of Networking and Communications School of Computing College of Engg and Tech SRM Institute of Science and Tech Dept of CSBS R.M.D Engineering College Dept of CSE S.A.Engineering College Dept of CSE Rajalakshmi Insitute of Technology Dept of CSE R.M.K.College of Engg and Tech Institute of CSE Saveetha School of Engineering Saveetha Institute of Medical & Technical Sciences Chennai
Lung cancer (LC), generally called lung carcinoma, is a fatal and debilitating illness that affects the lungs. Lung cancer is caused by the genetic damage that occurs to the DNA of the cell as a result of numerous env...
来源: 评论
Secure and Privacy-Preserving Lightweight Blockchain for Energy Trading  8
Secure and Privacy-Preserving Lightweight Blockchain for Ene...
收藏 引用
8th international conference on Future Internet of things and Cloud, FiCloud 2021
作者: Materwala, Huned Ismail, Leila College of Information Technology United Arab Emirates University Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering Abu Dhabi Al Ain15551 United Arab Emirates National Water and Energy Center United Arab Emirates University Abu Dhabi Al Ain United Arab Emirates
Renewable energy is gaining wide attention to address the issues, such as depleting resources and environmental degradation, linked with the current non-renewable energy. However, storing renewable energy is challengi... 详细信息
来源: 评论
A Secure and Reliable Construction Scheme for Enterprise Value Chain Networks
A Secure and Reliable Construction Scheme for Enterprise Val...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Chaoxia Qin Bing Guo Yuting Zhao Yan Shen College of Computer Science Sichuan University Chengdu China School of Computer Science Chengdu University of Information Technology Chengdu China
A value chain optimizes the economic benefit of an enterprise alliance by integrating the cooperation relationships among the upstream and downstream companies. Nevertheless, the absence of information security mechan... 详细信息
来源: 评论
Smart street design for managing crowds in Hajj  8
Smart street design for managing crowds in Hajj
收藏 引用
8th international conference on computing for Sustainable Global Development, INDIACom 2021
作者: Abi Sen, Adnan Ahmed Alsaawy, Yazed Alkhodre, Ahmad Bahbouh, Nour Mahmoud Alhaboob, Mohamed Islamic University Faculty of Computer and Information Systems Al-Madinah Saudi Arabia Granada University Department of Information and Communication Sciences Granada Spain College of Computing and Information Technology Islamic University Al-Madinah Saudi Arabia
Hajj is an annual pilgrimage to Makkah in Saudi Arabia where over two and a half million pilgrims attend. It is one of the most intense crowded events in the world. Unfortunately, Hajj has witnessed several stampedes,... 详细信息
来源: 评论