咨询与建议

限定检索结果

文献类型

  • 1,927 篇 会议
  • 142 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,078 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 1,184 篇 计算机科学与技术...
    • 861 篇 软件工程
    • 225 篇 信息与通信工程
    • 169 篇 控制科学与工程
    • 128 篇 电气工程
    • 77 篇 电子科学与技术(可...
    • 73 篇 生物医学工程(可授...
    • 72 篇 生物工程
    • 40 篇 建筑学
    • 36 篇 动力工程及工程热...
    • 35 篇 机械工程
    • 34 篇 光学工程
    • 29 篇 仪器科学与技术
    • 29 篇 化学工程与技术
    • 27 篇 力学(可授工学、理...
    • 27 篇 土木工程
  • 498 篇 理学
    • 377 篇 数学
    • 100 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 75 篇 生物学
    • 26 篇 化学
    • 23 篇 系统科学
  • 276 篇 管理学
    • 168 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 88 篇 工商管理
  • 66 篇 教育学
    • 64 篇 教育学
  • 63 篇 医学
    • 61 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
  • 28 篇 法学
    • 23 篇 社会学
  • 18 篇 经济学
  • 9 篇 农学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 91 篇 mobile computing
  • 73 篇 distributed comp...
  • 70 篇 computer science
  • 52 篇 grid computing
  • 47 篇 application soft...
  • 40 篇 concurrent compu...
  • 39 篇 computational mo...
  • 36 篇 computer network...
  • 34 篇 computer archite...
  • 32 篇 cloud computing
  • 29 篇 virtual reality
  • 29 篇 ubiquitous compu...
  • 27 篇 internet
  • 26 篇 costs
  • 25 篇 laboratories
  • 23 篇 peer to peer com...
  • 23 篇 middleware
  • 20 篇 parallel process...
  • 20 篇 hardware
  • 20 篇 delay

机构

  • 20 篇 the hong kong po...
  • 18 篇 hong kong polyte...
  • 18 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 12 篇 institute of com...
  • 12 篇 department of co...
  • 10 篇 nit calicut
  • 10 篇 depauw universit...
  • 10 篇 national institu...
  • 9 篇 school of comput...
  • 8 篇 college of compu...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 university of lo...
  • 6 篇 pablo de olavide...
  • 6 篇 department of co...
  • 6 篇 college of compu...
  • 6 篇 department of co...
  • 6 篇 school of comput...

作者

  • 25 篇 hong va leong
  • 18 篇 leong hong va
  • 15 篇 alvin chan
  • 12 篇 hong jiman
  • 11 篇 hung chih-cheng
  • 11 篇 chan alvin t.s.
  • 10 篇 liu ling
  • 10 篇 gloria childress...
  • 10 篇 george roussos
  • 8 篇 umesh bellur
  • 8 篇 song enmin
  • 7 篇 rajiv ramnath
  • 7 篇 pu calton
  • 7 篇 si antonio
  • 7 篇 ahamed sheikh iq...
  • 7 篇 chandran priya
  • 6 篇 federico divina
  • 6 篇 sheikh iqbal aha...
  • 6 篇 madhu kumar s.d.
  • 6 篇 raúl giráldez ro...

语言

  • 2,067 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 2 篇 葡萄牙文
检索条件"任意字段=Applied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing"
2078 条 记 录,以下是171-180 订阅
排序:
A mechanism for replicated data consistency in mobile computing environments  07
A mechanism for replicated data consistency in mobile comput...
收藏 引用
2007 acm symposium on applied computing
作者: Monteiro, José Maria Brayner, Ângelo Lifschitz, Sérgio PUC-Rio Brazil Universidade de Fortaleza Brazil
Mobile computing allows for the development of new and sophisticated database applications. Such applications require the reading of current and consistent data. In order to improve data availability, increase perform... 详细信息
来源: 评论
Integrating knowledge base and database  96
Integrating knowledge base and database
收藏 引用
1996 acm symposium on applied computing, SAC 1996
作者: Debenham, John Key Centre for Advanced Computing Sciences University of Technology PO Box 123 SydneyNSW2007 Australia
A practical approach is described for integrating knowledge technology and traditional database technology;this approach generates systems that are maintainable in a precise sense. Integration of systems is achieved b... 详细信息
来源: 评论
An efficient anonymity protocol for Grid computing  04
An efficient anonymity protocol for Grid computing
收藏 引用
5th International Workshop on Grid computing
作者: Ray, S Zhang, Z Iowa State Univ Sci & Technol Dept Elect & Comp Engn Ames IA 50011 USA
As grid computing scales up in size and diversity, anonymous communications will be desirable, and sometimes vital, for certain applications. However, existing anonymity protocols, when being applied to grid applicati... 详细信息
来源: 评论
Formal analysis of device authentication applications in ubiquitous computing  11
Formal analysis of device authentication applications in ubi...
收藏 引用
proceedings of the 2011 acm symposium on applied computing
作者: Claycomb, William R. Shin, Dongwan Sandia National Laboratories Albuquerque NM United States New Mexico Tech. Socorro NM United States
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or loc... 详细信息
来源: 评论
A macroscopic model of an interactive computing system
A macroscopic model of an interactive computing system
收藏 引用
acm symposium on Interactive Systems for Experimental Mathematics held in conjunction with the acm National Meeting 1967
作者: Haag, James N. University of San Francisco San FranciscoCA United States
来源: 评论
Evaluation of Fog Topologies in Fog Planning for IoT Task Scheduling  20
Evaluation of Fog Topologies in Fog Planning for IoT Task Sc...
收藏 引用
35th Annual acm symposium on applied computing (SAC)
作者: He, Zhiming Peng, Limei Kyungpook Natl Univ Daegu South Korea
In this paper, we investigate the impact of different fog topologies in fog planning on provisioning diverse IoT tasks under an integrated cloud and fog framework (iCloudFog). Two Integer Linear Programming (ILP) mode... 详细信息
来源: 评论
Towards a Replication Service for Data-Intensive Fog Applications  20
Towards a Replication Service for Data-Intensive Fog Applica...
收藏 引用
35th Annual acm symposium on applied computing (SAC)
作者: Hasenburg, Jonathan Grambow, Martin Bermbach, David TU Berlin Berlin Germany Einstein Ctr Digital Future Mobile Cloud Comp Res Berlin Germany
The combination of edge and cloud in the fog computing paradigm enables a new breed of data-intensive applications. These applications, however, have to face a number of fog-specific challenges which developers have t... 详细信息
来源: 评论
An XML-based protocol for improving trust negotiation between Web Services  12
An XML-based protocol for improving trust negotiation betwee...
收藏 引用
27th Annual acm symposium on applied computing, SAC 2012
作者: Zhang, Yunxi Ishaya, Tanko Internet Computing University of Hull Scarborough Campus Filey Road Scarborough YO11 3AZ United Kingdom
This paper aims to propose an XML-based protocol for two Web Services to utilise TN to establish a trust relationship between them. The main contribution of this protocol is towards preventing failed TN caused by the ... 详细信息
来源: 评论
An architecture for providing elasticity based on autonomic computing concepts  16
An architecture for providing elasticity based on autonomic ...
收藏 引用
31st Annual acm symposium on applied computing, SAC 2016
作者: Coutinho, Emanuel F. Gomes, Danielo G. Rego, Paulo A. L. De Souza, José Neuman Fortaleza Ceará Brazil Fortaleza Ceará Brazil Fortaleza Ceará Brazil
Elasticity is a feature quite important for cloud computing and it is related to how a system autonomously adapts its capacity over time to fit the workload variation. In this context, this paper proposes an elastic a... 详细信息
来源: 评论
Communication delay in wormhole-routed torus networks
Communication delay in wormhole-routed torus networks
收藏 引用
applied computing 2002: Proceeedings of the 2002 acm symposium on applied computing
作者: Shahrabi, A. Ould-Khaoua, M. Mackenzie, L. Computing Science Department Glasgow University Glasgow United Kingdom
A new analytical model for predicting message delay in wormhole-routed torus is presented. Unlike previous wormhole routing models, which mainly have been developed for uniform traffic, the model introduced in this pa... 详细信息
来源: 评论