咨询与建议

限定检索结果

文献类型

  • 4,281 篇 会议
  • 47 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 4,331 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,432 篇 工学
    • 2,168 篇 计算机科学与技术...
    • 1,080 篇 软件工程
    • 607 篇 电气工程
    • 586 篇 信息与通信工程
    • 185 篇 仪器科学与技术
    • 138 篇 控制科学与工程
    • 120 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 59 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 38 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
    • 27 篇 安全科学与工程
    • 26 篇 网络空间安全
    • 24 篇 光学工程
    • 23 篇 土木工程
    • 22 篇 材料科学与工程(可...
    • 20 篇 建筑学
    • 19 篇 航空宇航科学与技...
  • 418 篇 理学
    • 253 篇 数学
    • 86 篇 物理学
    • 72 篇 生物学
    • 51 篇 系统科学
    • 42 篇 统计学(可授理学、...
  • 261 篇 管理学
    • 179 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
  • 33 篇 法学
    • 19 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 7 篇 教育学
  • 7 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 543 篇 parallel process...
  • 259 篇 computer archite...
  • 238 篇 computational mo...
  • 207 篇 distributed comp...
  • 186 篇 concurrent compu...
  • 179 篇 computer network...
  • 164 篇 network topology
  • 157 篇 hardware
  • 157 篇 graphics process...
  • 148 篇 routing
  • 130 篇 bandwidth
  • 123 篇 application soft...
  • 120 篇 neural networks
  • 120 篇 protocols
  • 107 篇 scalability
  • 104 篇 multicore proces...
  • 103 篇 throughput
  • 102 篇 algorithm design...
  • 102 篇 kernel
  • 101 篇 computer science

机构

  • 15 篇 institute of inf...
  • 14 篇 institute of com...
  • 14 篇 science and tech...
  • 13 篇 college of compu...
  • 13 篇 school of cyber ...
  • 13 篇 shandong fundame...
  • 12 篇 school of comput...
  • 10 篇 science and tech...
  • 9 篇 univ chinese aca...
  • 9 篇 university of ch...
  • 9 篇 natl univ def te...
  • 9 篇 natl univ def te...
  • 8 篇 shenyang aerospa...
  • 8 篇 beijing univ pos...
  • 8 篇 nanjing univ aer...
  • 8 篇 beijing universi...
  • 7 篇 shanghai jiao to...
  • 7 篇 college of compu...
  • 7 篇 chinese acad sci...
  • 7 篇 national key lab...

作者

  • 17 篇 bagherzadeh nade...
  • 16 篇 kotenko igor
  • 14 篇 j. duato
  • 12 篇 wang yijie
  • 11 篇 daneshtalab maso...
  • 10 篇 ebrahimi masoume...
  • 10 篇 yijie wang
  • 10 篇 nader bagherzade...
  • 10 篇 igor kotenko
  • 10 篇 lexi xu
  • 9 篇 li dongsheng
  • 9 篇 marco aldinucci
  • 9 篇 matsutani hiroki
  • 8 篇 hiroki matsutani
  • 8 篇 masoumeh ebrahim...
  • 8 篇 plosila juha
  • 8 篇 marco danelutto
  • 8 篇 wang huaimin
  • 7 篇 tenhunen hannu
  • 7 篇 xinzhou cheng

语言

  • 4,273 篇 英文
  • 49 篇 其他
  • 11 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=Euromicro Conference on Parallel, Distributed and Network-Based Processing"
4331 条 记 录,以下是901-910 订阅
排序:
Truly Scalable Real-time Coincidence Processor based on Serial and parallel Hybrid Architecture
Truly Scalable Real-time Coincidence Processor based on Seri...
收藏 引用
IEEE Symposium on Nuclear Science (NSS/MIC)
作者: Mingyue Cui Zhixiang Zhao Huifan Qu Qiu Huang School of Biomedical Engineering Shanghai Jiao Tong University Shanghai China
Many PET systems use coincidence processors based on a serial architecture for coincidence detection, but this single-threaded coincidence detection has high latency and may even lose events in the case of a high even...
来源: 评论
Intrusion Detection for Marine Meteorological Sensor network
Intrusion Detection for Marine Meteorological Sensor Network
收藏 引用
IEEE International conference on Big Data and Cloud Computing (BdCloud)
作者: Xin Su Guifu Zhang Minxue Zhang Baoliu Ye Hongyan Xing College of IOT Engineering Hohai University Changzhou Jiangsu China Information Department Hohai University Nanjing Jiangsu China Collaborative Innovation Center for Meteorological Disaster Prediction and Evaluation Nanjing University of Information Science and Technology Nanjing China Jiangsu Key Laboratory of Meteorological Detection and Information Processing Nanjing University of Information Science and Technology Nanjing China
The rapid development of intelligent devices and wireless communication has greatly promoted the intelligence of the maritime Internet of Things (MIoT) in recent years, and the marine meteorological sensor network (MM... 详细信息
来源: 评论
Learning Dynamic Behavior Patterns for Fraud Detection
Learning Dynamic Behavior Patterns for Fraud Detection
收藏 引用
IEEE International conference on Big Data and Cloud Computing (BdCloud)
作者: Zijun Huang Junhang Wu Lingfei Ren Ruimin Hu Dengshi Li National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Cyber Engineering Xidian University Xi'an China School of Artificial Intelligence Jianghan University Wuhan China
Telecom fraud detection is considered a needle in a haystack task due to the fact that fraudsters are usually hidden among a large number of normal users. In fact, a fraudster will usually act in a continuous manner o... 详细信息
来源: 评论
StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise Use-Cases  4
StreamChain: Building a Low-Latency Permissioned Blockchain ...
收藏 引用
4th IEEE International conference on Blockchain (Blockchain)
作者: Kuhring, Lucas Istvan, Zsolt Sorniotti, Alessandro Vukolic, Marko Otto GmbH & Co KG Hamburg Germany Tech Univ Darmstadt Darmstadt Germany IBM Res Zurich Switzerland Protocol Labs Zurich Switzerland IMDEA Software Inst Madrid Spain
Permissioned blockchains are a promising technology for secure decentralized data management in business-tobusiness use-cases. In contrast to Bitcoin and similar public blockchains, which rely on Proof-of-Work for con... 详细信息
来源: 评论
Modeling Ledger Dynamics in IOTA Blockchain
Modeling Ledger Dynamics in IOTA Blockchain
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications conference
作者: Fengyang Guo Xun Xiao Artur Hecker Schahram Dustdar Munich Research Center Huawei Technologies Munich Germany Distributed Systems Group TU Wien Vienna Austria
IOTA blockchain is a new type of distributed ledger systems that is lightweight without mining and feeless-of-using. Rather than using a chain structure as in traditional blockchains, IOTA organizes ledger records wit... 详细信息
来源: 评论
Nighttime Pedestrian Detection based on Feature Attention and Transformation  25
Nighttime Pedestrian Detection Based on Feature Attention an...
收藏 引用
25th International conference on Pattern Recognition (ICPR)
作者: Li, Gang Zhang, Shanshan Yang, Jian Nanjing Univ Sci & Technol Key Lab Intelligent Percept & Syst High Dimens In Jiangsu Key Lab Image & Video Understanding Socia PCA LabSch Comp Sci & EngnMinist Educ Nanjing Peoples R China
Pedestrian detection at nighttime is an important yet challenging task, which is fundamental for many practical applications, e.g. autonomous driving, video surveillance. To address this problem, in this work we start... 详细信息
来源: 评论
Resource Allocation Strategy for Virtualized Wireless Sensor networks based on Actor-Critic
Resource Allocation Strategy for Virtualized Wireless Sensor...
收藏 引用
IEEE International Symposium on parallel and distributed processing with Applications and IEEE International conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Changjin Li Guangxu Zhou Yue Guo Junfeng Hou Hongjun Zhang Song Li Xuchang Branch of Henan Provincial Tobacco Company Xuchang Henan China
Aiming at the problem of effective utilization of virtualized WSN resources, a reinforcement learning-based resource allocation strategy for virtualized WSNs is proposed from the perspective of service requests of vir... 详细信息
来源: 评论
An Inception-based Architecture for Haemodialysis Time Series Classification  17th
An Inception-Based Architecture for Haemodialysis Time Seri...
收藏 引用
17th IFIP WG 12.5 International conference on Artificial Intelligence Applications and Innovations, AIAI 2021, 6th Workshop on 5G-Putting Intelligence to the network Edge, 5G-PINE 2021, Artificial Intelligence in Biomedical Engineering and Informatics Workshop, AI-BIO 2021, Workshop on Defense Applications of AI, DAAI 2021, distributed AI for Resource-Constrained Platforms Workshop, DARE 2021, Energy Efficiency and Artificial Intelligence Workshop, EEAI 2021, and 10th Mining Humanistic Data Workshop, MHDW 2021
作者: Leonardi, Giorgio Montani, Stefania Striani, Manuel DISIT Computer Science Institute Università del Piemonte Orientale Alessandria Italy
Classifying haemodialysis sessions, on the basis of the evolution of specific clinical variables over time, allows the physician to identify patients that are being treated inefficiently, and that may need additional ... 详细信息
来源: 评论
Multi-Antenna based Fast Routing Recovery Protocol for Dynamic UAV networks
Multi-Antenna Based Fast Routing Recovery Protocol for Dynam...
收藏 引用
IEEE International conference on Big Data and Cloud Computing (BdCloud)
作者: Chuanxin Zhou Chao Dong Xiaojun Zhu Lei Zhang The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China
Unmanned Aerial Vehicle (UAV) network is a wireless network composed of many dynamic nodes. Due to the characteristics of UAV network, in the battlefield, it is easy for UAV nodes to fail and disconnect from other nod... 详细信息
来源: 评论
Construction of Political Science Research Application Platform based on Big Data Analysis Technology
Construction of Political Science Research Application Platf...
收藏 引用
Education, Knowledge and Information Management (ICEKIM), International conference on
作者: Qiao Li Dawei Zhang Hulunbuir University Hulunbuir Inner Mongolia China Hulunbuir Economic and Social Research Institute Hulunbuir Inner Mongolia China
based on big data analysis technology, Hadoop and Spark big data parallel computing framework and HDFS distributed file storage database, we can complete the construction of political science research application plat... 详细信息
来源: 评论