咨询与建议

限定检索结果

文献类型

  • 2,911 篇 会议
  • 40 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,808 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 529 篇 信息与通信工程
    • 388 篇 电气工程
    • 161 篇 控制科学与工程
    • 90 篇 生物工程
    • 70 篇 电子科学与技术(可...
    • 60 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 42 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,915 篇 英文
  • 42 篇 中文
  • 34 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2982 条 记 录,以下是681-690 订阅
排序:
Architecture Design of distributed Medical Big Data Platform Based on Spark  8
Architecture Design of Distributed Medical Big Data Platform...
收藏 引用
IEEE 8th Joint international Information Technology and Artificial Intelligence conference (ITAIC)
作者: Tu, Yongqiu Lu, Yiqiang Chen, Guohua Zhao, Jie Yi, Faling Guangdong Pharmaceut Univ Guangzhou Guangdong Peoples R China
An Apache Spark based distributed computing and storage system designed for large-scale health data. the system provides the solution for health data digitalization and analysis, while enabling high-throughput data pr... 详细信息
来源: 评论
An optimization method for resource allocation in fog computing  13
An optimization method for resource allocation in fog comput...
收藏 引用
2020 IEEE Congress on Cybermatics: 13th IEEE international conferences on Internet of things, ithings 2020, 16th IEEE international conference on Green computing and Communications, GreenCom 2020, 13th IEEE international conference on Cyber, Physical and Social computing, CPSCom 2020 and 6th IEEE international conference on Smart Data, SmartData 2020
作者: Yin, Chao Li, Tongfang Qu, Xiaoping Yuan, Sihao School of Information Science and Technology Jiujiang University Jiujiang332005 China
With the rapid development of the network, a huge amount of data will be generated. Existing technologies usually use cloud computing to process data. However, when all the data of users need to be transferred to the ... 详细信息
来源: 评论
XAI: A Middleware for Scalable AI  8
XAI: A Middleware for Scalable AI
收藏 引用
8th international conference on Data Science, Technology and Applications (DATA)
作者: Salama, Abdallah Linke, Alexander Rocha, Igor Pessoa Binnig, Carsten Tech Univ Darmstadt Data Management Lab Darmstadt Germany
A major obstacle for the adoption of deep neural networks (DNNs) is that the training can take multiple hours or days even with modern GPUs. In order to speed-up training of modern DNNs, recent deep learning framework... 详细信息
来源: 评论
distributed anomaly detection method in wireless sensor networks based on temporal-spatial QSSVM  8th
Distributed anomaly detection method in wireless sensor netw...
收藏 引用
8th international conference on Computer Engineering and Networks, CENet 2018
作者: Chen, Zhili Wu, Huarui Zhu, Huaji Miao, Yisheng National Engineering Research Center for Information Technology in Agriculture Beijing100097 China College of Information and Electrical Engineering China Agricultural University Beijing100083 China Beijing Research Center for Information Technology in Agriculture Beijing Academy of Agriculture and Forestry Sciences Beijing100097 China
In Wireless Sensor Networks (WSNs), abnormal sensing data is easily generated due to factors such as the harsh working environment, sensor faults and external events. In order to enhance the detection rate of abnormal... 详细信息
来源: 评论
Enhancing the performance of elliptic curve digital signature algorithm (ECDSA) in named data networking (NDN)  8
Enhancing the performance of elliptic curve digital signatur...
收藏 引用
8th IEEE international conference on Control System, computing and Engineering, ICCSCE 2018
作者: Ting, Ren Leau, Yu-Beng Park, Yong Jin Obit, Joe H. Kota Kinabalu Sabah Malaysia
Named data networking (NDN) had been considered as a most recognizable Information Centric networking (ICN) infrastructure. the deployment of NDN in the internet architecture requires the confidentiality and integrity... 详细信息
来源: 评论
On the Optimal Size of Ring-canal in Starfish Routing  8
On the Optimal Size of Ring-canal in Starfish Routing
收藏 引用
Joint 8th international conference on Informatics, Electronics and Vision (ICIEV) / 3rd international conference on Imaging, Vision and Pattern Recognition (icIVPR) / international conference on Activity and Behavior computing (ABC)
作者: Habib, Md Ahsan Saha, Sajeeb Razzaque, Md Abdur Mamun-Or-Rashid, Md Univ Dhaka Dept Comp Sci & Engn Green Networking Res Grp Dhaka Bangladesh
Backbone based routing strategies for Mobile Wireless Sensor Networks (MWSNs) are becoming very popular for minimizing end-to-end delay with extended network lifetime, while collecting real-time sensed data from diffe... 详细信息
来源: 评论
Method of complex internet of things simulation attack and reliability analysis  8th
Method of complex internet of things simulation attack and r...
收藏 引用
8th international conference on Computer Engineering and Networks, CENet 2018
作者: Chen, Bingwei Chen, Zidi Yuan, Hecun Rui, Lanlan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Haidian District Beijing China
In recent years, with the rapid development of Internet of things, the scale of networks has gradually increased, link capacity has become higher and higher. In this context, the research on the reliability of complex... 详细信息
来源: 评论
Identifying the Writing Style of Bangla Language Using Natural Language Processing
Identifying the Writing Style of Bangla Language Using Natur...
收藏 引用
international conference on computing and networking Technology (ICCNT)
作者: Syeda Farjana Shetu Mohd. Saifuzzaman Masuma Parvin Nazmun Nessa Moon Ridwanullah Yousuf Sharmin Sultana Daffodil International University Dhaka Bangladesh
Bangla is one of the 8th major spoken languages around the world and like other widely spoken languages, it is a very morphologically rich language. It has two styles, one is standard literary style, known as Sadhu Bh... 详细信息
来源: 评论
Edge-Centric Queries’ Stream Management Based on an Ensemble Model  8th
Edge-Centric Queries’ Stream Management Based on an Ensembl...
收藏 引用
8th international Workshop on Combinations of Intelligent Methods and Applications, CIMA 2018 held in conjunction with the 30th IEEE international conference on Tools with Artificial Intelligence, IEEE ICTAI 2018
作者: Kolomvatsos, Kostas Anagnostopoulos, Christos School of Computing Science University of Glasgow GlasgowG12 8RZ United Kingdom
the Internet of things (IoT) involves numerous devices that can interact with each other or with their environment to collect and process data. the collected data streams are guided to the cloud for further processing... 详细信息
来源: 评论
A Method of Document Sensitivity Calculation Based on Semantic Dependency Analysis  8
A Method of Document Sensitivity Calculation Based on Semant...
收藏 引用
IEEE 8th Joint international Information Technology and Artificial Intelligence conference (ITAIC)
作者: Gang, Lu Xu, Wu Xie Xia-qing Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China BUPT Key Lab Trustworthy Distributed Comp & Serv Minist Educ Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Lib Beijing 100876 Peoples R China
Sensitive text recognition has become an important technical means to maintain the harmonious development of network environment. this paper proposes a document sensitivity calculation method (SDC) based on semantic d... 详细信息
来源: 评论