咨询与建议

限定检索结果

文献类型

  • 2,911 篇 会议
  • 40 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,808 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 529 篇 信息与通信工程
    • 388 篇 电气工程
    • 161 篇 控制科学与工程
    • 90 篇 生物工程
    • 70 篇 电子科学与技术(可...
    • 60 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 42 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,915 篇 英文
  • 42 篇 中文
  • 34 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2982 条 记 录,以下是531-540 订阅
排序:
Transparent Transaction Processing with A High-Performance Proxy for distributed KVS  8
Transparent Transaction Processing with A High-Performance P...
收藏 引用
8th international Symposium on computing and networking Workshops, CANDARW 2020
作者: Miwa, Ryuya Miyamoto, Motoshi Kawashima, Ryota Matsuo, Hiroshi Nagoya Institute of Technology Nagoya Aichi466-8555 Japan
distributed consensus protocols require a large amount of communications for transaction processing in distributed KVS (D-KVS). Google Spanner and Amazon DynamoDB alleviate the communication overhead using highly accu... 详细信息
来源: 评论
Artificial Intelligence based Facial Emotion Recognition with Deep Neural GAN Augmentation
Artificial Intelligence based Facial Emotion Recognition wit...
收藏 引用
international conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: D. Menaka D. Karthika Priya C. Reeda Lenus A Ashwini P. Josephin Shermila Banu Priya Prathaban Department of Electronics and Instrumentation Engineering Noorul Islam Centre for Higher Education Kumaracoil India Department of Artificial Intelligence and Data Science Easwari Engineering College Ramapuram Chennai India Department of Physics S.A.Engineering College Chennai India Department of ECE Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Artificial Intelligence and Data Science R.M.K.College of Engineering and Technology Chennai India Department of Networking and Communication School of computing SRM institute of Science and Technology Kattankulathur Chennai India
Facial recognition system in computer vision is widely used in human-computer interface and clinical diagnostics. Nonetheless, achieving high accuracy in this task still poses a challenge due to issues of inadequate a... 详细信息
来源: 评论
Research and Implementation of Asynchronous Transmission and Update Strategy for Federated Learning
Research and Implementation of Asynchronous Transmission and...
收藏 引用
international conference on Computer and Communications (ICCC)
作者: Yudong Jia Ningbo Zhang Key Laboratory of Universal Wireless Communications Beijing University of Posts and Telecommunications Beijing China
In today's era, there is a growing concern about data privacy and security. Data is the foundation of machine learning, and due to the complexity of the reality, data often exists in silos. the great development o... 详细信息
来源: 评论
Proceedings - 2020 8th IEEE international conference on Mobile Cloud computing, Services, and Engineering, MobileCloud 2020
Proceedings - 2020 8th IEEE International Conference on Mobi...
收藏 引用
8th IEEE international conference on Mobile Cloud computing, Services, and Engineering, MobileCloud 2020
the proceedings contain 13 papers. the topics discussed include: global and secured UAV authentication system based on hardware-security;drone-assisted fog-cloud IoT content service platform for rural communities;scal...
来源: 评论
Cloud-Edge Microservice Architecture for DNN-based distributed Multimedia Event Processing  8th
Cloud-Edge Microservice Architecture for DNN-based Distribut...
收藏 引用
1st international Workshop on Edge Adoption and Migration, EdgeWays 2020, 16th international Workshop on Engineering Service-Oriented Applications and Cloud Services, WESOACS 2020, ESOCC 2020 PhD Symposium, ESOCC 2020 EU Projects Track which took place at 8th European conference on Service-Oriented and Cloud computing, ESOCC 2020
作者: Pontes, Felipe Arruda Curry, Edward Insight SFI Research Centre for Data Analytics Data Science Institute National University of Ireland Galway Ireland
the rise of Big Data, Internet of Multimedia things (IoMT), and Deep Neural Network (DNN) enabled the growth of DNN-based Computer Vision solutions to Multimedia Event Processing (MEP) applications. When these are app... 详细信息
来源: 评论
GAP-AWARE MITIGATION OF GRADIENT STALENESS  8
GAP-AWARE MITIGATION OF GRADIENT STALENESS
收藏 引用
8th international conference on Learning Representations, ICLR 2020
作者: Barkai, Saar Hakimi, Ido Schuster, Assaf Department of Electrical Engineering Technion - Israel Institute of Technology Haifa Israel Department of Computer Science Technion - Israel Institute of Technology Haifa Israel
Cloud computing is becoming increasingly popular as a platform for distributed training of deep neural networks. Synchronous stochastic gradient descent (SSGD) suffers from substantial slowdowns due to stragglers if t... 详细信息
来源: 评论
Students’ Perspectives on ‘PeVe App’ to Learn English Phrasal Verbs
Students’ Perspectives on ‘PeVe App’ to Learn English Phr...
收藏 引用
international conference on computing, Engineering, and Design (ICCED)
作者: Melania Wiannastiti Teguh Prasandy Yi Ying Krystl Mo Liem Wiwik Andreani Endang Ernawati Language Center The Faculty of Humanity Bina Nusantara University Jakarta Indonesia Informatic Engineering Dept BINUS Online Learning Bina Nusantara University Jakarta Indonesia Chinese Department The Faculty of Humanity Bina Nusantara University Jakarta Indonesia Applied Foreign Languages Department Cheng Shiu University Kaoh Taiwan English Department The Faculty of Humanity Bina Nusantara University Jakarta Indonesia
Learning English Phrasal Verbs (PVs) is one of the biggest challenges for the English as a Foreign Language (EFL) learners in higher education in Indonesia that demands a learning method coping with the development of... 详细信息
来源: 评论
A Local Interpretability Model-Based Approach for Black-Box Adversarial Attack  8th
A Local Interpretability Model-Based Approach for Black-Box ...
收藏 引用
8th international conference on Data Mining and Big Data, DMBD 2023
作者: Duan, Yuanjie Zuo, Xingquan Huang, Hai Wu, Binglin Zhao, Xinchao School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Science Beijing University of Posts and Telecommunications Beijing China
Deep learning models are vulnerable to adversarial examples due to their fragility. Current black-box attack methods typically add perturbations to the whole example, and added perturbations may be large and easily de... 详细信息
来源: 评论
Cervical Cancer Identification using Deep Learning Approaches
Cervical Cancer Identification using Deep Learning Approache...
收藏 引用
international conference on computing, Engineering, and Design (ICCED)
作者: Shien Nie Kong Dini Oktarina Dwi Handayani Hou Kit Mun Pei Pei Chong Teddy Mantoro School of Computer Science & Engineering Faculty of Innovation & Technology Taylor's University Subang Jaya Selangor Computer Science Department Kuliyyah of Information Communication and Technology International Islamic University Malaysia Kuala Lumpur Department of Mechatronic and Biomedical Engineering Faculty of Engineering and Science Universiti Tunku Abdul Rahman Bandar Sungai Long Selangor School of Biosciences Faculty of Health and Medical Sciences Taylor's University Subang Jaya Selangor Department of Computer Science Faculty of Engineering and Technology Sampoerna University Jakarta Indonesia
the presence of cervical cancer is not apparent as its incubation period is long. A pap smear screening is the only diagnostic method; examining the pap smear slides uses a microscope. However, problems happen where h... 详细信息
来源: 评论
Economic Denial of Sustainability (EDoS ) Detection using GANs in SDN-based Cloud  8
Economic Denial of Sustainability (EDoS ) Detection using GA...
收藏 引用
8th IEEE international conference on Communications and Electronics (IEEE ICCE)
作者: Dinh, Phuc Trinh Park, Minho Soongsil Univ Dept Informat Commun Mat & Chem Convergence Techn Seoul 156743 South Korea Soongsil Univ Sch Elect Engn Seoul 156743 South Korea
Cloud computing is now considered to be the most cost-effective platform for offering business and consumer IT services over the Internet. However, it is prone to new vulnerabilities. Specifically, a newly discovered ... 详细信息
来源: 评论