咨询与建议

限定检索结果

文献类型

  • 2,911 篇 会议
  • 40 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,808 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 529 篇 信息与通信工程
    • 388 篇 电气工程
    • 161 篇 控制科学与工程
    • 90 篇 生物工程
    • 70 篇 电子科学与技术(可...
    • 60 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 42 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,915 篇 英文
  • 42 篇 中文
  • 34 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2982 条 记 录,以下是561-570 订阅
排序:
Identifying the Writing Style of Bangla Language Using Natural Language Processing  11
Identifying the Writing Style of Bangla Language Using Natur...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Shetu, Syeda Farjana Saifuzzaman, Mohd. Parvin, Masuma Moon, Nazmun Nessa Yousuf, Ridwanullah Sultana, Sharmin Daffodil International University Department of Computer Science and Engineering Dhaka Bangladesh Department of General Educational Development Daffodil International University Dhaka Bangladesh
Bangla is one of the 8th major spoken languages around the world and like other widely spoken languages, it is a very morphologically rich language. It has two styles, one is standard literary style, known as Sadhu Bh... 详细信息
来源: 评论
Proceedings of IA3 2020: 10th Workshop on Irregular Applications: Architectures and Algorithms, Held in conjunction with SC 2020: the international conference for High Performance computing, networking, Storage and Analysis
Proceedings of IA3 2020: 10th Workshop on Irregular Applicat...
收藏 引用
10th Workshop on Irregular Applications: Architectures and Algorithms, IA3 2020
the proceedings contain 8 papers. the topics discussed include: accelerating domain propagation: an efficient GPU-parallel algorithm over sparse matrices;parallelizing irregular computations for molecular docking;redu...
来源: 评论
A Deep Learning Approach Combining Autoencoder with One-class SVM for DDoS Attack Detection in SDNs  8
A Deep Learning Approach Combining Autoencoder with One-clas...
收藏 引用
8th international conference on Communications and networking, ComNet2020
作者: Mhamdi, Lotfi McLernon, Desmond El-Moussa, Fadi Raza Zaidi, Syed Ali Ghogho, Mounir Tang, Tuan University of Leeds United Kingdom BT Security Research United Kingdom International University of Rabat Morocco
Software Defined networking (SDN) provides us with the capability of collecting network traffic information and managing networks proactively. therefore, SDN facilitates the promotion of more robust and secure network... 详细信息
来源: 评论
Fault-Tolerant Covering Points by UAVs  21
Fault-Tolerant Covering Points by UAVs
收藏 引用
8th international conference on networking, Systems and Security, NSysS 2021
作者: Samanta, Supravat Pramanick, Subhajit Mandal, Partha Sarathi Department of Mathematics Indian Institute of Technology Guwahati India
Unmanned Aerial vehicles (UAVs) or Drones crash due to power failure, communication failure, mechanical malfunction, or Cyber-Physical attacks. this paper aims to study fault-tolerant covering by UAVs, i.e., in case o... 详细信息
来源: 评论
Selective Combination and Management of distributed Machine Learning Models  8th
Selective Combination and Management of Distributed Machine ...
收藏 引用
8th international conference on Future Data and Security Engineering , FDSE 2021
作者: Tsuchiya, Takeshi Mochizuki, Ryuichi Hirose, Hiroo Yamada, Tetsuyasu Koyanagi, Keiichi Minh, Quang Tran Suwa University of Science Chino Japan Institute for Data Science Education Tokyo International University Kawagoe Japan Waseda University Tokyo Japan Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology 268 Ly Thuong Kiet District 10 Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Linh Trung Ward Thu Duc District Ho Chi Minh City Viet Nam
this study presents a method for selecting and combining feature models constructed by the machine learning on the processing task capability. the evaluation of combining the feature models shows that the processing t... 详细信息
来源: 评论
Social Synchrony: An Analytical Contemplation of Contemporary State of Art Frameworks
Social Synchrony: An Analytical Contemplation of Contemporar...
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Shabana Nargis Rasool Prem Kumar Singh Ayaz Hassan Moon Amity Inst. of Information Technology Amity University Noida India Islamic University of Science and Technology Awantipora India
An appraisal of recent studies conducted under the broad spectrum of social synchrony to measure the information flow and its analytics. there is indeed requirement for social network analysis in static as well as dyn... 详细信息
来源: 评论
Depression Detection on Social Media with the Aid of Machine Learning Platform: A Comprehensive Survey
Depression Detection on Social Media with the Aid of Machine...
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Gaurav Kumar Gupta Dilip Kumar Sharma GLA University Mathura India
Depression is a group of mental disorders associated with certain factors which can affect the mood, feelings, negativity, losing interest, and sadness in human participants. To maintain the quality of life, people te... 详细信息
来源: 评论
Energy Optimization-based Optimal Trade-off Scheme for Job Scheduling in Fog computing
Energy Optimization-based Optimal Trade-off Scheme for Job S...
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Harwant Singh Arri Ramandeep Singh Lovely Professional University Punjab India
Fog computing is designed to expand the cloud-based storage, computing, and networking features that involve the concept of data processing on the end devices of the network and not in the cloud. In this article, an e... 详细信息
来源: 评论
A Survey on Video-Based Fake News Detection Techniques
A Survey on Video-Based Fake News Detection Techniques
收藏 引用
international conference on computing for Sustainable Global Development (INDIACom)
作者: Ronak Agrawal Dilip Kumar Sharma GLA University Mathura India
In today's world, fake news identification is a critical problem. Fake news may exist in form of text, images and videos also. there are several techniques exist for fake news detection including forgery detection... 详细信息
来源: 评论
Domestic Violence Crisis Recognition Method based on Bi-LSTM+Attention
Domestic Violence Crisis Recognition Method based on Bi-LSTM...
收藏 引用
international conference on Network and Information Systems for Computers (ICNISC)
作者: Zhixiao Wang Wenyao Yan Zhuochun Li Min Huang Qinyuan Fan Xin Wang Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Network Computing and Security Xi'an China College of Xi'an Innovation Yan'an University Xi'an China University of Pittsburgh Pittsburgh PA USA Art and Design Xi'an University of Technology Xi'an China Fakultät Verkehrs- und Maschinensysteme Technische Universität Berlin Berlin Germany Computer Science and Engineering Xi'an University of Technology Xi'an China
Domestic violence (DV) is getting more and more attention due to the critical trouble and danger that pose great challenge to human rights and health. the popularity of various social medias can help these victims to ... 详细信息
来源: 评论