咨询与建议

限定检索结果

文献类型

  • 2,680 篇 会议
  • 40 册 图书
  • 40 篇 期刊文献

馆藏范围

  • 2,759 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,599 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 500 篇 信息与通信工程
    • 388 篇 电气工程
    • 171 篇 控制科学与工程
    • 67 篇 生物工程
    • 60 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 46 篇 机械工程
    • 41 篇 动力工程及工程热...
    • 34 篇 安全科学与工程
    • 31 篇 网络空间安全
    • 27 篇 环境科学与工程(可...
    • 25 篇 建筑学
    • 22 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 交通运输工程
  • 363 篇 理学
    • 219 篇 数学
    • 80 篇 生物学
    • 60 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 40 篇 系统科学
  • 306 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 117 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 43 篇 医学
    • 28 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
  • 40 篇 法学
    • 28 篇 社会学
  • 39 篇 经济学
    • 39 篇 应用经济学
  • 12 篇 农学
  • 11 篇 教育学
  • 9 篇 文学
  • 3 篇 军事学

主题

  • 239 篇 cloud computing
  • 171 篇 distributed comp...
  • 154 篇 social networkin...
  • 80 篇 protocols
  • 79 篇 computational mo...
  • 76 篇 computer archite...
  • 68 篇 servers
  • 66 篇 mobile computing
  • 57 篇 wireless sensor ...
  • 53 篇 internet of thin...
  • 53 篇 distributed data...
  • 50 篇 resource managem...
  • 49 篇 security
  • 48 篇 computer network...
  • 47 篇 distributed comp...
  • 44 篇 peer to peer com...
  • 43 篇 bandwidth
  • 43 篇 mobile communica...
  • 42 篇 edge computing
  • 41 篇 grid computing

机构

  • 36 篇 state key labora...
  • 14 篇 saint petersburg...
  • 11 篇 beijing univ pos...
  • 9 篇 institute of com...
  • 8 篇 beijing universi...
  • 8 篇 lakhshya cyber s...
  • 8 篇 amrita vishwa vi...
  • 8 篇 lakhshya cyber s...
  • 8 篇 tu wien distribu...
  • 6 篇 center for compu...
  • 6 篇 school of comput...
  • 6 篇 plekhanov russia...
  • 6 篇 institute of inf...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 columbia astroph...
  • 5 篇 iii. physikalisc...
  • 5 篇 dept. of physics...

作者

  • 11 篇 dustdar schahram
  • 10 篇 yang yang
  • 9 篇 soman k. p.
  • 9 篇 vinayakumar r.
  • 8 篇 bandyopadhyay su...
  • 8 篇 bogdanov alexand...
  • 8 篇 pradeep menon
  • 8 篇 menon pradeep
  • 7 篇 r vinayakumar
  • 7 篇 zomaya albert y.
  • 7 篇 kp soman
  • 7 篇 korkhov vladimir
  • 6 篇 calton pu
  • 6 篇 jaekel arunita
  • 6 篇 li jinglin
  • 6 篇 degtyarev alexan...
  • 6 篇 taheri javid
  • 5 篇 huang tao
  • 5 篇 haungs a.
  • 5 篇 fürst p.

语言

  • 2,711 篇 英文
  • 32 篇 中文
  • 17 篇 其他
  • 4 篇 俄文
检索条件"任意字段=9th International Conference on Distributed Computing and Networking"
2760 条 记 录,以下是111-120 订阅
排序:
A Novel Routing Protocol for Hierarchical Software Defined Vehicular Adhoc Network  9
A Novel Routing Protocol for Hierarchical Software Defined V...
收藏 引用
9th international conference on computing for Sustainable Global Development, INDIACom 2022
作者: Kumar, Manish Raw, Ram Shringar Ggsipu New Delhi India Bharati Vidyapeeth's Institute of Computer Applications and Management New Delhi India Netaji Subhas University of Technology Delhi India
the nodes of a Vehicular Adhoc Network (VANET), are highly mobile in nature. Hence, it is very challenging to disseminate the message to the nodes with high reliability. the scalability and heterogeneity of these netw... 详细信息
来源: 评论
A Novel Approach for Federated Learning with Non-IID Data  9
A Novel Approach for Federated Learning with Non-IID Data
收藏 引用
9th international conference on Soft computing and Machine Intelligence (ISCMI)
作者: Nguyen, Hiep Warrier, Harikrishna Gupta, Yogesh HCL Technol Hanoi Vietnam HCL Technol Hyderabad Telangana India
Federated learning (FL) is an emerging technique used to collaboratively train a global machine learning model while keeping the data localized on the user devices. the main obstacle to FL9;s practical implementati... 详细信息
来源: 评论
Enhancing Resilience against DDoS Attacks in SDN -based Supply Chain Networks Using Machine Learning  9
Enhancing Resilience against DDoS Attacks in SDN -based Supp...
收藏 引用
9th international conference on Control, Decision and Information Technologies, CoDIT 2023
作者: Sebbar, Anass Zkik, Karim International University of Rabat Esin TICLab Rabat Morocco Esaip Ecole d'Ingenieur Cerade Angers France
distributed Denial of Service (DDoS) attacks are becoming increasingly common and sophisticated, and supply chain networks are particularly vulnerable to these types of attacks due to their reliance on interconnected ... 详细信息
来源: 评论
9th international conference on Mobility, IoT and Smart Cities, EAI Mobility IoT 2022
9th International Conference on Mobility, IoT and Smart Citi...
收藏 引用
9th international conference on Mobility, IoT and Smart Cities, EAI Mobility IoT 2022
the proceedings contain 12 papers. the special focus in this conference is on Mobility, IoT and Smart Cities. the topics include: A New Trend in Car Personalization Based on Augmented Reality: A Study;Management and M...
来源: 评论
Incentive-based task matching with evolving preferences in distributed fog computing: A trust-aware approach  9
Incentive-based task matching with evolving preferences in d...
收藏 引用
9th international conference on Computer and Communications, ICCC 2023
作者: Yan, Lei Zhang, Zaigui Sun, Bin Wang, Yonghai Inspur Group Company Limited Shandong Jinan250102 China Data Technology Co. Ltd Henan Zhengzhou450047 China
Fog computing has been a promising technology for the computation-intensive Apps with the resource pool adjacent to the mobile users. In which, users9; workloads or management can be offloaded to servers with a des... 详细信息
来源: 评论
ML based Web Application Firewall for Signature and Anomaly Detection Using Feature Extraction  15
ML based Web Application Firewall for Signature and Anomaly ...
收藏 引用
15th international conference on computing Communication and networking Technologies, ICCCNT 2024
作者: Dhote, Sanjana Magdum, Aditya Singh, Siddharth Raigar, Dipika Pune Institute of Computer Technology Department of Computer Engineering Pune India
In today9;s digital landscape, web applications have become indispensable tools for businesses, facilitating access to vital data and services. However, this ubiquity also exposes them to a myriad of cyber threats,... 详细信息
来源: 评论
Resource Trading Incentive Mechanism Based on Stackelberg Game and Auction theory in computing Power Network  9
Resource Trading Incentive Mechanism Based on Stackelberg Ga...
收藏 引用
9th international conference on Computer and Communications, ICCC 2023
作者: Li, Yinan Xie, Renchao Tang, Qinqin Huang, Tao Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing China Purple Mountain Laboratories Nanjing China
computing power network (CPN) is a new architecture proposed in recent years. It has integrated multidimensional resources, such as computing, network and storage resources in cloud, edge and end to realize more flexi... 详细信息
来源: 评论
Blockchain Over Named Data networking Architecture: A Review  9th
Blockchain Over Named Data Networking Architecture: A Review
收藏 引用
9th international conference on computing and Informatics, ICOCI 2023
作者: Alsamman, Mohammed Hassan, Suhaidi Mohammed, Fathey Fazea, Yousef School of Computing Universiti Utara Malaysia Sintok Kedah Bukit Kayu Hitam06010 Malaysia Sunway Business School Sunway University Selangor Subang Jaya47500 Malaysia Computer and Information Technology Marshall University 1 John Marshall Drive HuntingtonWV25755 United States
With infinite apps and online services, future Internet architecture will face new challenges and consequences, such as scalability, dependability, suitable mobility, and security. Internet use has changed spectacular... 详细信息
来源: 评论
indexPDT: A High Scalable distributed Classification Approach with Novel Cache Structure for Geo-location  25
indexPDT: A High Scalable Distributed Classification Approac...
收藏 引用
25th IEEE international conferences on High Performance computing and Communications, 9th international conference on Data Science and Systems, 21st IEEE international conference on Smart City and 9th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Sun, Zhijie Li, Jing Xie, Jun Zheng, Binfan Zeng, Li Zhao, Rongqian Huawei Technologies Co. Ltd. Shenzhen China
Geo-location, also known as measurement report (MR) location, is a technique to determine the geographic location of user equipment (UE) and the behaviour attribute of telephone traffic based on wireless signals measu... 详细信息
来源: 评论
Research on Large-scale Model System Management Technology for Joint Operations  9
Research on Large-scale Model System Management Technology f...
收藏 引用
9th international conference on Big Data and Information Analytics, BigDIA 2023
作者: Li, Zhenya Zhu, Yong Jiang, Kai Liu, Shanyi Zhang, Yiming Zhang, Daowei Zhang, Yan Li, Zhimeng National University of Defense Technology ChangSha China Nanjing Research Institute of Electronic Engineering ChangSha China Nanjing Research Institute of Electronic Engineering NanJing China
the paper focuses on the computational power requirements with domain-crossing models and distributed collaborative combat command systems under a joint combat environment, and developed a massive combat model system ... 详细信息
来源: 评论