咨询与建议

限定检索结果

文献类型

  • 4,280 篇 会议
  • 47 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 4,330 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,431 篇 工学
    • 2,167 篇 计算机科学与技术...
    • 1,080 篇 软件工程
    • 607 篇 电气工程
    • 586 篇 信息与通信工程
    • 185 篇 仪器科学与技术
    • 138 篇 控制科学与工程
    • 120 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 59 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 38 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
    • 27 篇 安全科学与工程
    • 26 篇 网络空间安全
    • 24 篇 光学工程
    • 23 篇 土木工程
    • 22 篇 材料科学与工程(可...
    • 20 篇 建筑学
    • 19 篇 航空宇航科学与技...
  • 418 篇 理学
    • 253 篇 数学
    • 86 篇 物理学
    • 72 篇 生物学
    • 51 篇 系统科学
    • 42 篇 统计学(可授理学、...
  • 261 篇 管理学
    • 179 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
  • 33 篇 法学
    • 19 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 7 篇 教育学
  • 7 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 543 篇 parallel process...
  • 259 篇 computer archite...
  • 238 篇 computational mo...
  • 207 篇 distributed comp...
  • 186 篇 concurrent compu...
  • 179 篇 computer network...
  • 164 篇 network topology
  • 157 篇 hardware
  • 157 篇 graphics process...
  • 148 篇 routing
  • 130 篇 bandwidth
  • 123 篇 application soft...
  • 120 篇 neural networks
  • 120 篇 protocols
  • 107 篇 scalability
  • 104 篇 multicore proces...
  • 103 篇 throughput
  • 102 篇 algorithm design...
  • 102 篇 kernel
  • 101 篇 computer science

机构

  • 15 篇 institute of inf...
  • 14 篇 institute of com...
  • 14 篇 science and tech...
  • 13 篇 college of compu...
  • 13 篇 school of cyber ...
  • 13 篇 shandong fundame...
  • 12 篇 school of comput...
  • 10 篇 science and tech...
  • 9 篇 univ chinese aca...
  • 9 篇 university of ch...
  • 9 篇 natl univ def te...
  • 9 篇 natl univ def te...
  • 8 篇 shenyang aerospa...
  • 8 篇 beijing univ pos...
  • 8 篇 nanjing univ aer...
  • 8 篇 beijing universi...
  • 7 篇 shanghai jiao to...
  • 7 篇 college of compu...
  • 7 篇 chinese acad sci...
  • 7 篇 national key lab...

作者

  • 17 篇 bagherzadeh nade...
  • 16 篇 kotenko igor
  • 14 篇 j. duato
  • 12 篇 wang yijie
  • 11 篇 daneshtalab maso...
  • 10 篇 ebrahimi masoume...
  • 10 篇 yijie wang
  • 10 篇 nader bagherzade...
  • 10 篇 igor kotenko
  • 10 篇 lexi xu
  • 9 篇 li dongsheng
  • 9 篇 marco aldinucci
  • 9 篇 matsutani hiroki
  • 8 篇 hiroki matsutani
  • 8 篇 masoumeh ebrahim...
  • 8 篇 plosila juha
  • 8 篇 marco danelutto
  • 8 篇 wang huaimin
  • 7 篇 tenhunen hannu
  • 7 篇 xinzhou cheng

语言

  • 4,282 篇 英文
  • 39 篇 其他
  • 11 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=Euromicro Conference on Parallel, Distributed and Network-Based Processing"
4330 条 记 录,以下是491-500 订阅
排序:
An Online Learning Approach for Client Selection in Federated Edge Learning under Budget Constraint  51
An Online Learning Approach for Client Selection in Federate...
收藏 引用
51st International conference on parallel processing (ICPP)
作者: Su, Lina Zhou, Ruiting Wang, Ne Fang, Guang Li, Zongpeng Wuhan Univ Sch Comp Sci Wuhan Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan Peoples R China Tsinghua Univ Insititue Network Sci & Cyberspace Beijing Peoples R China
Federated learning (FL) has emerged as a new paradigm that enables distributed mobile devices to learn a global model collaboratively. Since mobile devices (a.k.a, clients) exhibit diversity in model training quality,... 详细信息
来源: 评论
Proceedings - 2022 23rd ACIS International Summer Virtual conference on Software Engineering, Artificial Intelligence, networking and parallel/distributed Computing, SNPD-Summer 2022
Proceedings - 2022 23rd ACIS International Summer Virtual Co...
收藏 引用
23rd ACIS International Summer Virtual conference on Software Engineering, Artificial Intelligence, networking and parallel/distributed Computing, SNPD-Summer 2022
The proceedings contain 27 papers. The topics discussed include: Tetris: automatic UAF exploit generation by manipulating layout based on reactivated paths;artificial neural network for processing fingerprint image no...
来源: 评论
BEW-YOLO: An Improved Method for PCB Defect Detection based on YOLOv7  29
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
29th IEEE International conference on parallel and distributed Systems, ICPADS 2023
作者: Li, Zhiyao Li, Aimin Zhang, Yuechen Kong, Xiaotong Li, Wenqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method... 详细信息
来源: 评论
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment  29
DarkTrans: A Blockchain-based Covert Communication Scheme wi...
收藏 引用
29th IEEE International conference on parallel and distributed Systems, ICPADS 2023
作者: Xu, Yuwei Wu, Zehui Cao, Jie Xu, Jingdong Cheng, Guang Southeast University School of Cyber Science and Engineering Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Nankai University College of Computer Science Tianjin China
Covert communication technology serves as a crucial tool for safeguarding not only the content of communication but also the identities of the parties involved. In this regard, blockchain emerges as a promising soluti... 详细信息
来源: 评论
A High-Performance Smart Contract Vulnerability Detection Scheme based on BERT  29
A High-Performance Smart Contract Vulnerability Detection Sc...
收藏 引用
29th IEEE International conference on parallel and distributed Systems, ICPADS 2023
作者: Zeng, Shengqiang Chen, Ruhuang Zhang, Hongwei Wang, Jinsong Tianjin University of Technology Tianjin China
With the emergence of technologies like web3.0, smart contracts have witnessed a flourishing development trend. However, the threat posed by contract vulnerabilities hinders the progress in this field. Traditional vul... 详细信息
来源: 评论
A Multi-holder Role and Strange Attractor-based Data Possession Proof in Medical Clouds  24th
A Multi-holder Role and Strange Attractor-Based Data Possess...
收藏 引用
24th International conference on Algorithms and Architectures for parallel processing, ICA3PP 2024
作者: Guo, Jinyuan Sun, Lijuan Wu, Jingchen Chu, Chiawei Gao, Yutong Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cybersecurity Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance Ministry of Education Minzu University Beijing China Intellectual Property Information Service Center BHU Beihang University Beijing China City University of Macau Taipa China Li’an International Education Innovation Pilot Zone Hainan International College of Minzu University of China Hainan Beijing China
Proof of Data Possession is a technique for ensuring the integrity of data stored in cloud storage. However, most audit schemes assume only one role for data owners, which is not suitable for complex Smart Healthcare ... 详细信息
来源: 评论
Research and optimization of intra-node communication operator performance based on domestic heterogeneous platforms  3
Research and optimization of intra-node communication operat...
收藏 引用
3rd International conference on Electronic Information Engineering, Big Data, and Computer Technology, EIBDCT 2024
作者: Ming, Zhe Ding, Guangyu Han, Mengzhi Zhengzhou University No.100 Science Road Henan Zhengzhou China Co. Ltd No.36 Zhongguancun Software Park No.8 Dongbeiwang West Road Haidian District Beijing China
With the increasing demand for computing power in machine learning tasks, the training of deep neural network models has been pushed to multi-GPU training or even larger scale distributed training. However, the accele... 详细信息
来源: 评论
Simulation Model for Controlling the processing of Information Packets by a NoC Router  7
Simulation Model for Controlling the Processing of Informati...
收藏 引用
7th International conference on Information, Control, and Communication Technologies, ICCT 2023
作者: Kutuzov, Denis Osovsky, Alexey Starov, Dmitriy Maltseva, Nataliya Esaulenko, Vladimir Astrakhan State Technical Universitet Dept. of Communication Astrakhan Russia Astrakhan State Technical Universitet Dept. of Automated Information Processing and Control Systems Astrakhan Russia
This article describes the challenges of modeling switch fabric traffic that is part of NoC routers. Simulation is often used to validate a NoC design and identify potential performance bottlenecks before implementing... 详细信息
来源: 评论
Simulating Cyber Attacks and Designing Malware using Python  10
Simulating Cyber Attacks and Designing Malware using Python
收藏 引用
10th International conference on Signal processing and Integrated networks, SPIN 2023
作者: Ankit, Akash Inder, Shubham Sharma, Anuj Johari, Rahul Vidyarthi, Deo Prakash University School of Information Communication and Technology Guru Gobind Singh Indraprastha University SWINGER: Security Wireless IoT Network Group of Engineering and Research Dwarka New Delhi110078 India MelbourneVIC3000 Australia Jawaharlal Nehru University Parallel and Distributed System Lab School of Computer and Systems Sciences New Delhi110067 India
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field t... 详细信息
来源: 评论
S-chain: A Shard-based Blockchain Scheme for Cross-chain Supervision  29
S-chain: A Shard-based Blockchain Scheme for Cross-chain Sup...
收藏 引用
29th IEEE International conference on parallel and distributed Systems, ICPADS 2023
作者: Xu, Yuwei Song, Yuxing Zeng, Junyu He, Ran Xu, Jingdong Southeast University School of Cyber Science and Engineering Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Nankai University College of Computer Science Tianjin China
With the popularization of consortium blockchain, how to supervise numerous business chains has become a problem. Recently, some researchers have proposed the concept of 'governing chain by chain', which means... 详细信息
来源: 评论