咨询与建议

限定检索结果

文献类型

  • 2,680 篇 会议
  • 40 册 图书
  • 40 篇 期刊文献

馆藏范围

  • 2,759 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,599 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 500 篇 信息与通信工程
    • 388 篇 电气工程
    • 171 篇 控制科学与工程
    • 67 篇 生物工程
    • 60 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 46 篇 机械工程
    • 41 篇 动力工程及工程热...
    • 34 篇 安全科学与工程
    • 31 篇 网络空间安全
    • 27 篇 环境科学与工程(可...
    • 25 篇 建筑学
    • 22 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 交通运输工程
  • 363 篇 理学
    • 219 篇 数学
    • 80 篇 生物学
    • 60 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 40 篇 系统科学
  • 306 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 117 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 43 篇 医学
    • 28 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
  • 40 篇 法学
    • 28 篇 社会学
  • 39 篇 经济学
    • 39 篇 应用经济学
  • 12 篇 农学
  • 11 篇 教育学
  • 9 篇 文学
  • 3 篇 军事学

主题

  • 239 篇 cloud computing
  • 171 篇 distributed comp...
  • 154 篇 social networkin...
  • 80 篇 protocols
  • 79 篇 computational mo...
  • 76 篇 computer archite...
  • 68 篇 servers
  • 66 篇 mobile computing
  • 57 篇 wireless sensor ...
  • 53 篇 internet of thin...
  • 53 篇 distributed data...
  • 50 篇 resource managem...
  • 49 篇 security
  • 48 篇 computer network...
  • 47 篇 distributed comp...
  • 44 篇 peer to peer com...
  • 43 篇 bandwidth
  • 43 篇 mobile communica...
  • 42 篇 edge computing
  • 41 篇 grid computing

机构

  • 36 篇 state key labora...
  • 14 篇 saint petersburg...
  • 11 篇 beijing univ pos...
  • 9 篇 institute of com...
  • 8 篇 beijing universi...
  • 8 篇 lakhshya cyber s...
  • 8 篇 amrita vishwa vi...
  • 8 篇 lakhshya cyber s...
  • 8 篇 tu wien distribu...
  • 6 篇 center for compu...
  • 6 篇 school of comput...
  • 6 篇 plekhanov russia...
  • 6 篇 institute of inf...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 columbia astroph...
  • 5 篇 iii. physikalisc...
  • 5 篇 dept. of physics...

作者

  • 11 篇 dustdar schahram
  • 10 篇 yang yang
  • 9 篇 soman k. p.
  • 9 篇 vinayakumar r.
  • 8 篇 bandyopadhyay su...
  • 8 篇 bogdanov alexand...
  • 8 篇 pradeep menon
  • 8 篇 menon pradeep
  • 7 篇 r vinayakumar
  • 7 篇 zomaya albert y.
  • 7 篇 kp soman
  • 7 篇 korkhov vladimir
  • 6 篇 calton pu
  • 6 篇 jaekel arunita
  • 6 篇 li jinglin
  • 6 篇 degtyarev alexan...
  • 6 篇 taheri javid
  • 5 篇 huang tao
  • 5 篇 haungs a.
  • 5 篇 fürst p.

语言

  • 2,711 篇 英文
  • 32 篇 中文
  • 17 篇 其他
  • 4 篇 俄文
检索条件"任意字段=9th International Conference on Distributed Computing and Networking"
2760 条 记 录,以下是381-390 订阅
排序:
Disaster Tweet Classification Based on Geospatial Data Using the BERT-MLP Method  9
Disaster Tweet Classification Based on Geospatial Data Using...
收藏 引用
9th international conference on Information and Communication Technology, ICoICT 2021
作者: Maulana, Iqbal Maharani, Warih Telkom University School of Computing Bandung Indonesia
as a popular social media in the world and even in Indonesia, Twitter has a variety of popular topics making these topics trending, including the topic of natural disasters that have occurred in Indonesia. the DKI Jak... 详细信息
来源: 评论
FaaSter Troubleshooting - Evaluating distributed Tracing Approaches for Serverless Applications  9
FaaSter Troubleshooting - Evaluating Distributed Tracing App...
收藏 引用
9th IEEE international conference on Cloud Engineering (IC2E)
作者: Borges, Maria C. Werner, Sebastian Kilic, Ahmet Tech Univ Berlin Informat Syst Engn Berlin Germany Tech Univ Berlin Berlin Germany
Serverless applications can be particularly difficult to troubleshoot, as these applications are often composed of various managed and partly managed services. Faults are often unpredictable and can occur at multiple ... 详细信息
来源: 评论
Enhance Security for the E-payment Application with Blockchain Technology
Enhance Security for the E-payment Application with Blockcha...
收藏 引用
international conference on Integrated Circuits, Design, and Verification (ICDV)
作者: Hung Le-Huy thuat Nguyen-Khanh Quan Le-Trung Faculty of Computer Networks and Communications University of Information Technology Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Vietnam
E-payment systems, despite their practicality, face challenges such as data manipulation, limited bandwidth, and potential denial-of-service attacks. these issues can impact businesses, financial institutions, and ind... 详细信息
来源: 评论
A Smart NIDS Design for SDN-based Cloud IoT Network using Optimal Path Selection and RNN
A Smart NIDS Design for SDN-based Cloud IoT Network using Op...
收藏 引用
international conference on Signal Processing and Communication (ICSC)
作者: Narendra Kumar Ishaan Dawar Anurag Aeron Santosh Kumar Department of computer science and engineering Amity University Jharkhand Ranchi INDIA School of Computing DIT University Dehradun Dehradun INDIA Computer science and Information Technology Siksha ‘O’ Anusandhan University Bhubaneshwar INDIA
the Internet of things (IoT) has greatly increased the possibility for developing intelligent connections and applications in many facets of daily life. Traditional security solutions frequently fail to solve security...
来源: 评论
Optimal Placement of Tie-Switches Among Networked Microgrids Considering Annual Load Demand and distributed Energy Resource Power Supply and Absorption
Optimal Placement of Tie-Switches Among Networked Microgrids...
收藏 引用
Big Data, Cloud computing, Data Science & Engineering (BCD)
作者: Wei-Tzer Huang Wei-Chen Lin Chai-Hsien Hsiao Kai-Chao Yao Zong-Tai Li Pei-Hsun Tsai Department of Industrial Education and Technology National Changhua University of Education Changhua City Taiwan
Guided by the standards outlined in IEEE Std 1547.4, it is feasible to organize distribution networks into a configuration known as networked microgrids, which significantly enhances the resilience of distribution net... 详细信息
来源: 评论
Artificial Intelligence-Driven Unmanned Aerial Vehicle Base Station Placement: Current Advances, Challenges, and Use Case
Artificial Intelligence-Driven Unmanned Aerial Vehicle Base ...
收藏 引用
international conference on Fog and Mobile Edge computing (FMEC)
作者: Sharief Abdel-Razeq Ayat Al-Khdouer Haythem Bany Salameh Yaser Jararweh Ghaleb Elrefae Department of Telecommunications Engineering Yarmouk University Irbid Jordan Department of Communications and Networking Al Ain University Al Ain United Arab Emirates Department of Computer Science Jordan University of Science and Technology Irbid Jordan College of Business Al Ain University Al Ain United Arab Emirates
In recent years, there has been a lot of interest in using drones as aerial base stations (BSs), namely drone base stations (DBS), to help with ground connection under unique situations. Despite the apparent benefits ... 详细信息
来源: 评论
Enhanced Web Security Using Cross-Feature Analysis of Visual Design, Live Logs and Code Structures
Enhanced Web Security Using Cross-Feature Analysis of Visual...
收藏 引用
international conference on Communication and Electronics Systems (ICCES)
作者: Rahul Kumar Tanvi Sharma G. Saranya Department of Networking and Communication School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu India
threats using website visual designs and content structures, along with standard coding vulnerabilities, represent an increasing danger to web security. To enhance web security, this paper introduces a new method call... 详细信息
来源: 评论
Evaluation of Selected APIs for Emotion Recognition from Facial Expressions  9th
Evaluation of Selected APIs for Emotion Recognition from Fac...
收藏 引用
9th international Work-conference on the Interplay Between Natural and Artificial Computation (IWINAC)
作者: Kutt, Krzysztof Sobczyk, Piotr Nalepa, Grzegorz J. Jagiellonian Univ Jagiellonian Human Ctr Artificial Intelligence La Krakow Poland Jagiellonian Univ Inst Appl Comp Sci Krakow Poland
Facial expressions convey the vast majority of the emotional information contained in social utterances. From the point of view of affective intelligent systems, it is therefore important to develop appropriate emotio... 详细信息
来源: 评论
Two-Factor distributed Authentication Scheme for Cloud Storage
Two-Factor Distributed Authentication Scheme for Cloud Stora...
收藏 引用
international conference on Computers, Communications, and Systems (ICCCS)
作者: Yunxia Han Chunxiang Xu Shanshan Li Jingjie Lu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
distributed authentication plays a crucial role in cloud storage, requiring users to authenticate their identity to a set of key management servers. this process guarantees that only authenticated users gain access to... 详细信息
来源: 评论
Supporting IoT Applications with Serverless Edge Clouds  9
Supporting IoT Applications with Serverless Edge Clouds
收藏 引用
IEEE 9th international conference on Cloud networking (CloudNet)
作者: Wang, I Liri, E. Ramakrishnan, K. K. Univ Calif Riverside Riverside CA 92521 USA
Cloud computing has grown because of lowered costs due to economies of scale and multiplexing. Serverless computing exploits multiplexing in cloud computing however, for low latency required by IoT applications, the c... 详细信息
来源: 评论