咨询与建议

限定检索结果

文献类型

  • 254 篇 会议
  • 15 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 273 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 179 篇 工学
    • 129 篇 计算机科学与技术...
    • 60 篇 软件工程
    • 55 篇 信息与通信工程
    • 41 篇 电气工程
    • 22 篇 农业工程
    • 13 篇 仪器科学与技术
    • 12 篇 电子科学与技术(可...
    • 12 篇 控制科学与工程
    • 6 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 生物工程
    • 4 篇 安全科学与工程
    • 3 篇 土木工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 建筑学
  • 21 篇 理学
    • 11 篇 数学
    • 4 篇 生物学
    • 3 篇 物理学
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 21 篇 农学
    • 12 篇 作物学
    • 6 篇 农业资源与环境
    • 5 篇 植物保护
  • 15 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 法学
  • 1 篇 教育学

主题

  • 34 篇 internet of thin...
  • 27 篇 internet
  • 27 篇 cloud computing
  • 15 篇 protocols
  • 13 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 wireless sensor ...
  • 10 篇 servers
  • 9 篇 routing
  • 9 篇 mobile communica...
  • 9 篇 algorithm analys...
  • 7 篇 wireless communi...
  • 7 篇 energy consumpti...
  • 7 篇 mobile computing
  • 7 篇 fog computing
  • 7 篇 measurement
  • 7 篇 peer-to-peer com...
  • 6 篇 database managem...
  • 6 篇 computational mo...
  • 6 篇 security

机构

  • 6 篇 beijing research...
  • 5 篇 beijing res ctr ...
  • 5 篇 natl engn res ct...
  • 5 篇 national enginee...
  • 4 篇 changchun city a...
  • 4 篇 college of biolo...
  • 3 篇 school of inform...
  • 3 篇 beijing engn res...
  • 3 篇 wuhan univ techn...
  • 3 篇 key laboratory o...
  • 3 篇 beijing engineer...
  • 2 篇 department of in...
  • 2 篇 college of infor...
  • 2 篇 vienna universit...
  • 2 篇 national key lab...
  • 2 篇 beijing engn res...
  • 2 篇 university campu...
  • 2 篇 tu münchen garch...
  • 2 篇 institute of com...
  • 2 篇 electrical engin...

作者

  • 4 篇 wenyu zhang
  • 4 篇 hongxin cao
  • 4 篇 lei zhang
  • 3 篇 weixin zhang
  • 3 篇 yuanyuan sui
  • 3 篇 guowei wang
  • 3 篇 chunhuan feng
  • 3 篇 guogang zhao
  • 3 篇 haiye yu
  • 3 篇 lianjun yu
  • 3 篇 yan liu
  • 3 篇 daokuo ge
  • 3 篇 weitao chen
  • 2 篇 duan pengfei
  • 2 篇 lingfeng duan
  • 2 篇 zhang lei
  • 2 篇 calton pu
  • 2 篇 wanneng yang
  • 2 篇 jerzy waśniewski
  • 2 篇 michael alexande...

语言

  • 270 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"任意字段=9th International Conference on Distributed Computing and Internet Technology, ICDCIT 2013"
273 条 记 录,以下是151-160 订阅
排序:
Mobile based attendance system in distributed LAN server  9th
Mobile based attendance system in distributed LAN server
收藏 引用
9th international conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2013
作者: Srivastava, Ratnesh Prasad Mandoria, Hardwari Lal Nautiyal, Rajesh Department of Information Technology College of Technology GBPUAT Pantnagar263145 India UniversitýDepartment of Information Technology College of Technology GBPUAT Pantnagar263145 India
With recent advancement in mobile communication, there has been a rise in the number of applications for mobile and its users are also continuously growing throughout the universe. Most of the applications developed, ... 详细信息
来源: 评论
A robust end-to-end neural network for scene text detection
A robust end-to-end neural network for scene text detection
收藏 引用
9th international conference on internet Multimedia computing and Service, ICIMCS 2017
作者: Yuan, Qi Li, Haojie Wang, Zhihui Fan, Xin Luo, Zhongxuan DUT-RU International School of Information & Software Engineering Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian China
Scene text detection is an important task in computer vision. Many previous work require multi-step processing and are not robust against challenges, such as small-scales and blurring. In this paper, we propose a Mult... 详细信息
来源: 评论
A Lightweight VMM on Many Core for High Performance computing  13
A Lightweight VMM on Many Core for High Performance Computin...
收藏 引用
9th ACM SIGPLAN/SIGOPS international conference on Virtual Execution Environments
作者: Dai, Yuehua Qi, Yong Ren, Jianbao Shi, Yi Wang, Xiaoguang Yu, Xuan Xi An Jiao Tong Univ Xian Peoples R China
Traditional Virtual Machine Monitor (VMM) virtualizes some devices and instructions, which induces performance overhead to guest operating systems. Furthermore, the virtualization contributes a large amount of codes t... 详细信息
来源: 评论
An analysis of the Ninux wireless community network
An analysis of the Ninux wireless community network
收藏 引用
IEEE international conference on Wireless and Mobile computing, Networking And Communications (WiMob)
作者: Leonardo Maccari DISI - University of Trento Italy
Wireless community networks are wireless mesh networks created and managed by a local community with mainly two main goals: sharing internet connection and supporting local services. they are an emerging trend in Euro... 详细信息
来源: 评论
DDoS attack detection algorithms based on entropy computing
DDoS attack detection algorithms based on entropy computing
收藏 引用
9th international conference on Information and Communications Security, ICICS 2007
作者: Li, Ying Zhou, Jianying Xiao, Ning National University of Singapore Singapore Singapore Institute for Infocomm Research Singapore Singapore Co. Ltd. China
distributed Denial of Service (DDoS) attack poses a severe threat to the internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume... 详细信息
来源: 评论
Elastic framework for augmenting the performance of mobile applications using cloud computing
Elastic framework for augmenting the performance of mobile a...
收藏 引用
作者: Abdelminaam, Diaa Salama Abdul Kader, Hatem M. Hadhoud, Mohie M. El-Sayed, Salah M Information Systems Department Information Technology Department Egypt Scientific Computing Department Menofyia University Egypt Banha University Faculty of Computers and Informatics Egypt Menofyia University Benha University Egypt
the increasing use of wireless internet and smartphone has accelerated the need for widespread computing. Smartphones stimulate growth of Global Position Systems (GPS) and mobile cloud computing. Mobile cloud computin... 详细信息
来源: 评论
distributed computing security model based on type system  9th
Distributed computing security model based on type system
收藏 引用
9th international conference on Applications and Techniques in Information Security, ATIS 2018
作者: Huang, Yong Li, Yongsheng Jin, Qinggeng College of Software and Information Security Guangxi University for Nationalities Nanning530006 China College of Information Science and Engineering Guangxi University for Nationalities Nanning530006 China
Aiming at the problem of access control in distributed computing security model, a secure Seal calculus based on hybrid type detection is proposed. In order to realize the security policy that low security level infor... 详细信息
来源: 评论
Wireless Algorithms, Systems, and Applications  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Zhipeng Cai Chaokun Wang Siyao Cheng Hongzhi Wang Hong Gao
this book constitutes the refereed proceedings of the 9th international conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. the 41 revised full papers presented... 详细信息
来源: 评论
Message from the conference chairs
Proc. 9th ACIS Int. Conf. Software Engineering, Artificial I...
收藏 引用
Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/distributed computing, SNPD 2008 and 2nd Int. Workshop on Advanced internet technology and Applications 2008年 xvii-xviii页
作者: Lee, Roger Rivepiboon, Wanchai Doseh, Walter Central Michigan Univ. Mt. Pleasant MI United States Chulalongkorn University Bangkok Thailand University of Lübeck Lübeck Germany
No abstract available
来源: 评论
Data storage and retrieval with RPL routing
Data storage and retrieval with RPL routing
收藏 引用
international Wireless Communications and Mobile computing conference, IWCMC
作者: Pietro Gonizzi Gianluigi Ferrari Paolo Medagliani Jérémie Leguay Department of Information Engineering University of Parma Parma Italy Thales Communications and Security Colombes France
In scenarios like the surveillance of isolated areas, when the border node of a network does not have a permanent connection with the internet, Wireless Sensor Networks (WSNs) are calling for resilient in-network data... 详细信息
来源: 评论