咨询与建议

限定检索结果

文献类型

  • 2,911 篇 会议
  • 40 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,808 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 529 篇 信息与通信工程
    • 388 篇 电气工程
    • 161 篇 控制科学与工程
    • 90 篇 生物工程
    • 70 篇 电子科学与技术(可...
    • 60 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 42 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,915 篇 英文
  • 42 篇 中文
  • 34 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2982 条 记 录,以下是751-760 订阅
排序:
A Metadata Application Profile to Structure a Scientific Database for Social Network Analysis (SNA)
A Metadata Application Profile to Structure a Scientific Dat...
收藏 引用
international conference in Software Engineering Research and Innovation (CONISOFT)
作者: Araceli López-Acosta Alejandra García-Hernández Sodel Vázquez-Reyes Alejandro Mauricio-González Autonomous University of Zacatecas (UAZ) Zacatecas Mexico
there are a number of challenges associated to metadata in its different applications including data quality, data acquisition, computing resources, interoperability, and discoverability. this work presents an approac... 详细信息
来源: 评论
distributed Parallelizability Analysis of Legacy Code  16
Distributed Parallelizability Analysis of Legacy Code
收藏 引用
16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom
作者: Zhao, Junfeng Zhao, Zhimei Yang, Hongji Inner Mongolia Univ Coll Comp Sci Hohhot Peoples R China Univ Leicester Dept Informat Leicester Leics England
With the emergence of cloud computing and big data, migrating legacy systems to a cloud platform has become a trend. To make full use of the parallel advantage of cloud computing, it is necessary to refactor the legac... 详细信息
来源: 评论
Predicting execution time of CUDA kernel using static analysis  16
Predicting execution time of CUDA kernel using static analys...
收藏 引用
16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom
作者: Alavani, Gargi Varma, Kajal Sarkar, Santonu BITS Pilani KK Birla Goa Campus Sancoale Goa India
With the growing demand for performance-oriented problems, programmers routinely execute the embarrassing parallel part of the application (GPU kernels) in a GPU in order to achieve significant speedup. these applicat... 详细信息
来源: 评论
Emergency analysis based on affective computing in universities forum  5th
Emergency analysis based on affective computing in universit...
收藏 引用
5th international conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Lu Wu, Xu Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China School of Cyberspace Security BUPT Beijing100876 China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. the method det... 详细信息
来源: 评论
Precision Poultry Farming: Software Architecture Framework and Online Zootechnical Diary for Monitoring and Collaborating on Hens’ Health  1
收藏 引用
8th international conference on Information and Communication Technologies in Agriculture, Food and Environment, HAICTA 2017
作者: Stefanova, Magdalena Department of Computing Systems Faculty of Mathematics and Informatics Sofia University "St. Kliment Ohridski" Sofia Bulgaria
Livestock farming needs to reach superior productivity levels in an environmentally sustainable manner. In order to accelerate the development of the livestock industry, it is important to make optimal use of farming ... 详细信息
来源: 评论
Proportion Scheduler to Improve the Mismatched Locality in YARN  16
Proportion Scheduler to Improve the Mismatched Locality in Y...
收藏 引用
16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom
作者: Xu, Jie Wang, Jingyu Qi, Qi Liao, Jianxin Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing Peoples R China
YARN is a prevailing central resource management architecture, which allocates a group of resources to each application. the resource group is consistent with locality requests of tasks in applications. But each appli... 详细信息
来源: 评论
Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency  16
Secure Virtual Machine Placement and Load Balancing Algorith...
收藏 引用
16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom
作者: Wong, Yuchen Shen, Qingni Peking Univ Sch Software & Microelect Beijing Peoples R China
With the fast development of cloud computing, cloud demand has exploded. In order to meet the primary performance needs of cloud users, cloud service providers need to carry out load balancing policy for virtual machi... 详细信息
来源: 评论
An On-the-fly Scheduling Strategy for distributed Stream Processing Platform  16
An On-the-fly Scheduling Strategy for Distributed Stream Pro...
收藏 引用
16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom
作者: Wang, Wen'an Zhang, Chuang Chen, Xiaojun Li, Zhao Ding, Hong Wen, Xin Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
distributed stream processing can accomplish real-time processing of continuous streaming big data to obtain valuable information with high velocity. To maintain continuously stable and efficient running of stream app... 详细信息
来源: 评论
S2R: Service trading based response time optimization in mobile edge computing  16
S2R: Service trading based response time optimization in mob...
收藏 引用
16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom
作者: Mishra, Pritish Tiwary, Mayank Yang, Laurence T. Puthal, Deepak SAP Labs Prod & Innovat Bangalore Karnataka India St Francis Xavier Univ Antigonish NS Canada Univ Technol Sydney Sydney NSW Australia
New caching forms coupled with Mobile Edge computing (MEC) supports new computing architecture at the physical proximity of the end-users. One of the similar architectures is mobile cloudlet, where a smartphone offers... 详细信息
来源: 评论
Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology  8
Anomaly Detection Approaches for Secure Cloud Reference Arch...
收藏 引用
8th international conference on Cloud computing and Services Science (CLOSER)
作者: Oppermann, Alexander Toro, Federico Grasso thiel, Florian Seifert, Jean-Pierre Phys Tech Bundesanstalt PTB Dept Metrol IT 8 5 Berlin Germany Tech Univ Berlin Secur Telecommun Berlin Germany
Securing Computer Systems against all kind of threats is an impossible challenge to fulfill. Although, in the field of Legal Metrology, it shall be assured that one can rely on the measurement carried out by a trusted... 详细信息
来源: 评论