咨询与建议

限定检索结果

文献类型

  • 2,911 篇 会议
  • 40 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 2,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,808 篇 计算机科学与技术...
    • 831 篇 软件工程
    • 529 篇 信息与通信工程
    • 388 篇 电气工程
    • 161 篇 控制科学与工程
    • 90 篇 生物工程
    • 70 篇 电子科学与技术(可...
    • 60 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 42 篇 机械工程
    • 33 篇 生物医学工程(可授...
    • 29 篇 仪器科学与技术
    • 26 篇 环境科学与工程(可...
    • 22 篇 交通运输工程
    • 22 篇 安全科学与工程
    • 20 篇 建筑学
  • 389 篇 理学
    • 222 篇 数学
    • 97 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 43 篇 系统科学
    • 35 篇 化学
  • 260 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 59 篇 法学
    • 44 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 21 篇 教育学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 10 篇 文学
  • 8 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 306 篇 cloud computing
  • 151 篇 distributed comp...
  • 133 篇 social networkin...
  • 90 篇 computational mo...
  • 75 篇 computer archite...
  • 74 篇 distributed comp...
  • 70 篇 resource managem...
  • 66 篇 distributed data...
  • 65 篇 servers
  • 63 篇 grid computing
  • 61 篇 protocols
  • 58 篇 mobile computing
  • 53 篇 wireless sensor ...
  • 51 篇 monitoring
  • 51 篇 security
  • 49 篇 edge computing
  • 41 篇 big data
  • 41 篇 data models
  • 40 篇 computer science
  • 39 篇 internet of thin...

机构

  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 institute of com...
  • 7 篇 school of cybers...
  • 6 篇 college of compu...
  • 6 篇 beijing univ pos...
  • 5 篇 school of comput...
  • 5 篇 shandong normal ...
  • 5 篇 school of comput...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 school of comput...
  • 5 篇 tu wien distribu...
  • 4 篇 univ sci & techn...
  • 4 篇 school of inform...
  • 4 篇 poznan supercomp...
  • 4 篇 north china inst...
  • 4 篇 beijing universi...
  • 4 篇 aalto univ dept ...
  • 4 篇 school of engine...

作者

  • 12 篇 dustdar schahram
  • 9 篇 yang yang
  • 8 篇 buyya rajkumar
  • 7 篇 wehrle klaus
  • 7 篇 soman k. p.
  • 7 篇 wu xu
  • 6 篇 liu yang
  • 6 篇 xu wu
  • 6 篇 zhang peng
  • 6 篇 jin hai
  • 5 篇 wang jing
  • 5 篇 yao wenbin
  • 5 篇 tomforde sven
  • 5 篇 liu pangfeng
  • 5 篇 xiangyu bai
  • 5 篇 wu jingchen
  • 5 篇 roy nirmalya
  • 5 篇 edenhofer sarah
  • 5 篇 rothermel kurt
  • 5 篇 yan zheng

语言

  • 2,915 篇 英文
  • 42 篇 中文
  • 34 篇 其他
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Distributed Computing and Networking"
2982 条 记 录,以下是851-860 订阅
排序:
Enhancing Middleware-based IoT Applications through Run-Time Pluggable QoS Management Mechanisms. Application to a oneM2M compliant IoT Middleware  9th
Enhancing Middleware-based IoT Applications through Run-Time...
收藏 引用
9th international conference on Ambient Systems, Networks and Technologies (ANT) / 8th international conference on Sustainable Energy Information Technology (SEIT)
作者: Ouedraogo, Clovis Anicet Medjiah, Samir Chassot, Christophe Drira, Khalil CNRS LAAS 7 Ave Colonel Roche F-31400 Toulouse France Univ Toulouse UPS F-31400 Toulouse France Univ Toulouse INSA LAAS F-31400 Toulouse France
In the recent years, telecom and computer networks have witnessed new concepts and technologies through Network Function Virtualization (NFV) and Software-Defined networking (SDN). SDN, which allows applications to ha... 详细信息
来源: 评论
RTT based probabilistic hop count packet filtering at iaas virtual cloud infrastructure against CHCF and PHCF techniques  8
RTT based probabilistic hop count packet filtering at iaas v...
收藏 引用
8th international conference on Communication Systems and Network Technologies, CSNT 2018
作者: Maheshwari, Ritu Rajput, Anil Gupta, Anil Kumar Bhopal M.P. India Department of Mathematics and Computer Science CSA Govt. PG Nodal College Sehore Madhya Pradesh India
HCF technique that is used to filter out the illegitimate packets from the total number of packets has got certain constraints related to detection rate of, malicious packets. the HCF technique never ensures us about ... 详细信息
来源: 评论
A Privacy-Preserving Schema for the Detection and Collaborative Mitigation of DNS Water Torture Attacks in Cloud Infrastructures
A Privacy-Preserving Schema for the Detection and Collaborat...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Nikos Kostopoulos Adam Pavlidis Marinos Dimolianis Dimitris Kalogeras Vasilis Maglaris Network Management & Optimal Design Laboratory (NETMODE) School of Electrical & Computer Engineering National Technical University of Athens (NTUA) Greece
this paper presents a privacy-preserving schema between Authoritative and Recursive DNS Servers for the efficient detection and collaborative mitigation of DNS Water Torture attacks in cloud environments. Monitoring d... 详细信息
来源: 评论
User Profile-based Caching in 5G Telco-CDNs
User Profile-based Caching in 5G Telco-CDNs
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Arian Soltani Behzad Akbari Nader Mokari Tarbiat Modares University (TMU) Tehran Iran
With 5G networks on the horizon, providing immense radio access rate, mobile core networks will face an extremely heavy load to accommodate the users' requests. Employing Content Delivery Networks inside Mobile Ne... 详细信息
来源: 评论
Mininet on steroids: exploiting the cloud for Mininet performance
Mininet on steroids: exploiting the cloud for Mininet perfor...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Giuseppe Di Lena Andrea Tomassilli Damien Saucez Frédéric Giroire thierry Turletti Chidung Lac Orange Labs France Université Côte d’Azur Inria CNRS France
Networks have become complex systems that combine various concepts, techniques, and technologies. As a consequence, modelling or simulating them is now extremely complicated and researchers massively resort to prototy... 详细信息
来源: 评论
A Reliability-aware Computation Offloading Solution via UAV-mounted Cloudlets
A Reliability-aware Computation Offloading Solution via UAV-...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Elie El Haber Hyame Assem Alameddine Chadi Assi Sanaa Sharafeddine
Multi-access Edge computing (MEC) has enabled low-latency computation offloading for provisioning latency-sensitive 5G services that may also require stringent reliability. Given the growing user demands incurring com... 详细信息
来源: 评论
Network Servers Inbound Traffic Load Balancing Based on Central Decision System Results of research and model testing  8
Network Servers Inbound Traffic Load Balancing Based on Cent...
收藏 引用
8th international conference on Computer Science and Information Technology, CSIT 2018
作者: Radojević, Branko Žagar, Mario Faculty of Electrical Engineering and Computing University of Zagreb Zagreb Croatia
Network Load Balancing (NLB) is essential for efficient operations in distributed computer systems, especially in cloud environments. NLB systems used today usually consist of relatively simple algorithms which in cer... 详细信息
来源: 评论
Deep AlexNet with Reduced Number of Trainable Parameters for Satellite Image Classification  8
Deep AlexNet with Reduced Number of Trainable Parameters for...
收藏 引用
8th international conference on Advances in computing & Communications (ICACC)
作者: Unnikrishnan, Anju Sowmya, V Soman, K. P. Amrita Vishwa Vidyapeetham Amrita Sch Engn Coimbatore Ctr Computat Engn & Networking CEN Coimbatore Tamil Nadu India
the emergence of machine learning algorithms enhanced the effectiveness of satellite image applications. On account of the high variability in-born in satellite data, a large portion of the present classification prop... 详细信息
来源: 评论
UR Rank: Micro-blog User Influence Ranking Algorithm Based on User Relationship  13th
UR Rank: Micro-blog User Influence Ranking Algorithm Based o...
收藏 引用
13th European-Alliance-for-Innovation (EAI) international conference on Collaborative computing - networking, Applications and Worksharing (CollaborateCom)
作者: Yao, Wenbin Yang, Yiwei Wang, Dongbin Beijing Univ Posts & Telecommun Beijing Key Lab Intelligent Telecommun Software & Beijing Peoples R China Beijing Univ Posts & Telecommun Natl Engn Lab Mobile Network Secur Beijing Peoples R China Beijing Univ Posts & Telecommun Minist Educ Trustworthy Distributed Comp & Serv Key Lab Beijing Peoples R China
In this paper, a novel UR Rank (User Relationships based Ranking) algorithm is proposed for ranking the influence of the user. We first explore five factors that affect user relationship. they are following rate (FR) ... 详细信息
来源: 评论
RSU-driven Cloud Construction and Management Mechanism in VANETs
RSU-driven Cloud Construction and Management Mechanism in VA...
收藏 引用
IEEE international conference on Cloud networking (CLOUDNET)
作者: Yoonhyeong Lee Hyunseok Choi Youngju Nam Sungjin Park Euisin Lee School of Information & Communication Engineering Chungbuk National University Cheongju Republic of Korea
Recently, Vehicular Ad hoc Networks (VANETs) introduce a Vehicular Cloud (VC) model for collaborating to share and use resources of vehicles to create value-added services. To construct a VC, a vehicle should search v... 详细信息
来源: 评论