咨询与建议

限定检索结果

文献类型

  • 2,911 篇 会议
  • 40 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,808 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 529 篇 信息与通信工程
    • 388 篇 电气工程
    • 161 篇 控制科学与工程
    • 90 篇 生物工程
    • 70 篇 电子科学与技术(可...
    • 60 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 42 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,915 篇 英文
  • 42 篇 中文
  • 34 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2982 条 记 录,以下是541-550 订阅
排序:
FedTADBench: Federated Time-series Anomaly Detection Benchmark
FedTADBench: Federated Time-series Anomaly Detection Benchma...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Fanxing Liu Cheng Zeng Le Zhang Yingjie Zhou Qing Mu Yanru Zhang Ling Zhang Ce Zhu College of Computer Science Sichuan University China School of Information and Communication Engineering University of Electronic Science and Technology of China China School of Computer Science and Engineering University of Electronic Science and Technology of China China College of Polymer Science and Engineering Sichuan University China West China School of Public Health Sichuan University China
Time series anomaly detection strives to uncover potential abnormal behaviors and patterns from temporal data, and has fundamental significance in diverse application scenarios. Constructing an effective detection mod... 详细信息
来源: 评论
Abstract Test Execution for Early Testing Activities in Model-Driven Scenarios  8th
Abstract Test Execution for Early Testing Activities in Mode...
收藏 引用
8th international conference on Model-Driven Engineering and Software Development (MODELSWARD)
作者: Proell, Reinhard Hagemann, Noeel Bauer, Bernhard Univ Augsburg Software Methodol Distributed Syst Augsburg Germany
the continuous improvement of the performance of computing units makes it possible to cope with increasingly complex tasks. this results in more complex software systems. However, the development of such highly comple... 详细信息
来源: 评论
NETREACT: distributed Event Detection in Sensor Data Streams with Disaggregated Packet Processing Pipelines
NETREACT: Distributed Event Detection in Sensor Data Streams...
收藏 引用
IEEE conference on Network Softwarization (NetSoft)
作者: Csaba Gyö rgyi roly Kecskemé ti Hiba Mallouhi ter Vö s ndor Laki ELTE E&#x00F6 tv&#x00F6 s Lor&#x00E1 nd University Budapest Hungary
A new phenomenon called in-network computing has recently emerged with the aim of offloading calculations beyond the traditional task of packet forwarding to network switches. One of the most studied in-network comput... 详细信息
来源: 评论
Simulation Platform for Optimal Pricing of a Distribution Utility with distributed Energy Resources Operating in a Residential Community  8
Simulation Platform for Optimal Pricing of a Distribution Ut...
收藏 引用
8th IEEE international conference on Smart Energy Grid Engineering (SEGE)
作者: Atienza, Annie Delos Reyes, Blessie Nicole Pedrasa, Michael Angelo Univ Philippines Diliman Elect & Elect Engn Inst Quezon City Philippines
the current power grid system in the Philippines allows the consumers to utilize any amount of electrical energy as long as they can pay for it. As a response, the utilities need to meet the demand at all times by pur... 详细信息
来源: 评论
A Blockchain-based Access and Management System for IoT Devices  8
A Blockchain-based Access and Management System for IoT Devi...
收藏 引用
8th international conference on Internet of things, Systems, Management and Security (IOTSMS)
作者: Valentin, Manuel Pahl, Claus El Ioini, Nabil Barzegar, Hamid R. Free Univ Bozen Bolzano Bozen Bolzano Italy
Recent developments in distributed ledger technologies have created a whole new set of possibilities in the way of managing trust, security, privacy and traceability in computer-based transactions, principles which ar... 详细信息
来源: 评论
Cloud Resource Demand Prediction to Achieve Efficient Resource Provisioning
Cloud Resource Demand Prediction to Achieve Efficient Resour...
收藏 引用
international conference of Signal Processing and Intelligent Systems (ICSPIS)
作者: Sepideh Ebneyousef Saeed Ghazanfari-Rad Department of Electrical and Computer Engineering AleTaha University Tehran Iran
Cloud computing is a paradigm that uses techniques such as virtualization, time sharing and distributed computing to provide a wide range of hardware and software services for users based on a pay-as-you-go model, on-... 详细信息
来源: 评论
distributed Deep Learning of ResNet50 and VGG16 with Pipeline Parallelism  8
Distributed Deep Learning of ResNet50 and VGG16 with Pipelin...
收藏 引用
8th international Symposium on computing and networking Workshops, CANDARW 2020
作者: Takisawa, Naoki Yazaki, Syunji Ishihata, Hiroaki School of Computer Science Tokyo University of Technology Hachioji Tokyo Japan Information Technology Center University of Electro-Communications Chofu Tokyo Japan
Data parallel distributed deep learning has been used to accelerate the learning speed. the communication is becoming a bottleneck as the computation time is accelerated. therefore, the communication time is needed to... 详细信息
来源: 评论
Fog computing based Health Care Applications and Frameworks: A Review
Fog Computing based Health Care Applications and Frameworks:...
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Shalu Duggal Parminder Kaur Guru Nanak Dev University Amritsar India
Fog computing has emerged as a distributed computing structure that extends the cloud platform model. this paper presents a literature review of Fog computing-based health care applications and frameworks. the objecti... 详细信息
来源: 评论
Heterogeneous Propagation Graph Representation Learning for Fake News Detection
Heterogeneous Propagation Graph Representation Learning for ...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Zhi Zeng Xiang Li Ying Sha College of Informatics Huazhong Agricultural University Wuhan China Key Laboratory of Smart Farming for Agricultural Animals Wuhan China Hubei Engineering Technology Research Center of Agricultural Big Data Wuhan China
Recently, social network platforms have led to a deluge of fake news, which tends to mislead readers and may arouse public spark panic. thus, detecting fake news on social networks re-mains an important role. Previous... 详细信息
来源: 评论
Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network
Dynamic Behavior Pattern: Mining the Fraudsters in Telecom N...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Dengshi Li Lu Zeng Ruimin Hu Zijun Huang Xiaocong Liang Yilong Zang School of Artificial Intelligence Jianghan University Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
In telecom network fraud, the fraud method of the fraudsters varies significantly in different periods. However, the traditional method of telecom fraud is to train the telecom fraud mining model through the user'... 详细信息
来源: 评论