咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 9 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 620 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 341 篇 工学
    • 332 篇 计算机科学与技术...
    • 204 篇 软件工程
    • 122 篇 信息与通信工程
    • 34 篇 电气工程
    • 25 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 8 篇 动力工程及工程热...
    • 8 篇 测绘科学与技术
    • 7 篇 机械工程
    • 7 篇 建筑学
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
  • 109 篇 理学
    • 90 篇 数学
    • 13 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 9 篇 物理学
    • 9 篇 生物学
    • 5 篇 化学
    • 2 篇 大气科学
    • 2 篇 地球物理学
  • 76 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 27 篇 图书情报与档案管...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
  • 2 篇 法学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 174 篇 distributed comp...
  • 111 篇 computer network...
  • 100 篇 software enginee...
  • 93 篇 artificial intel...
  • 73 篇 concurrent compu...
  • 55 篇 computer science
  • 47 篇 grid computing
  • 47 篇 distributed comp...
  • 45 篇 peer to peer com...
  • 39 篇 application soft...
  • 31 篇 parallel process...
  • 31 篇 wireless sensor ...
  • 30 篇 network topology
  • 29 篇 parallel process...
  • 29 篇 delay
  • 28 篇 costs
  • 25 篇 algorithm design...
  • 25 篇 large-scale syst...
  • 24 篇 protocols
  • 23 篇 resource managem...

机构

  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 school of inform...
  • 3 篇 national laborat...
  • 3 篇 institute of com...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 univ sci & techn...
  • 2 篇 huazhong univ sc...
  • 2 篇 department of co...
  • 2 篇 univ adelaide sc...
  • 2 篇 school of comput...
  • 2 篇 univ technol syd...
  • 2 篇 department of co...
  • 2 篇 school of manage...
  • 2 篇 sharif universit...
  • 2 篇 school of comput...
  • 2 篇 lab. com. phys. ...
  • 2 篇 natl univ def te...
  • 2 篇 school of comput...

作者

  • 4 篇 xicheng lu
  • 4 篇 aaron harwood
  • 4 篇 nong xiao
  • 3 篇 shietung peng
  • 3 篇 hong chen
  • 3 篇 rui chu
  • 3 篇 wenhong wei
  • 3 篇 yongxuan lai
  • 3 篇 huanguo zhang
  • 3 篇 engelmann christ...
  • 3 篇 gerald kunzmann
  • 3 篇 wenjun xiao
  • 2 篇 nandi asoke k.
  • 2 篇 xing-ming li
  • 2 篇 choi k.
  • 2 篇 ling zhang
  • 2 篇 wu cheng
  • 2 篇 lo re giuseppe
  • 2 篇 kodama eiichiro
  • 2 篇 brzezinski krzys...

语言

  • 620 篇 英文
检索条件"任意字段=IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2007"
620 条 记 录,以下是361-370 订阅
排序:
The Task Distribution and Scheduling of The parallel Delivery System for Massive Databases
The Task Distribution and Scheduling of The Parallel Deliver...
收藏 引用
IFIP international conference on Network and parallel computing Workshops (NPC Workshops)
作者: Gong Yue Wang Yuzhuo Xu Zhanbo Ge Shan Zhao Xin Fu Huixia The College of Computer Science and Technology Changchun University of Science and Technology Changchun China
A dynamic task distribution and scheduling technology of a message middleware for parallel data delivery on massive database systems is presented. The techniques of computer cluster and parallel processing are used to... 详细信息
来源: 评论
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services
Trust Management and Negotiation for Attestation in Trusted ...
收藏 引用
IEEE international conference on parallel and distributed computing, Applications and Technologies (PDCAT)
作者: Aarthi Nagarajan Vijay Varadharajan Michael Hitchens Department of Computing Macquarie University Sydney Australia
The concept of trusted computing technology is becoming significant in that such technologies are being increasingly available in PCs and mobile devices. With the advent of this technology, one can move from tradition... 详细信息
来源: 评论
Toward a Formalization of UML2.0 Metamodel using Z Specifications
Toward a Formalization of UML2.0 Metamodel using Z Specifica...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Ahmed M. Mostafa Manal A. Ismail Hatem EL-Bolok E. M. Saad Electronics & Communication Department Faculty of Engineering Helwan University Egypt
The Unified Modeling Language (UML) has become a widely adopted standard in the software development industry. Unfortunately, the UML is a semi-formal language which lacks precisely defined constructs. Z language is a... 详细信息
来源: 评论
A Topology Set Method for Vectorization
A Topology Set Method for Vectorization
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Jinhe Wang School of Computer Engineering Qingdao Technological University Shandong China
A topology set structure is a powerful image segmentation technique, it has advantages over individual pixels due to its intrinsic behavior, retrieval of colony characteristic of related pixels, shape independence, an... 详细信息
来源: 评论
A Sufficient and Necessary Condition for the Absolute Consistency of XML DTDs
A Sufficient and Necessary Condition for the Absolute Consis...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Lu Yan Hao ZhongXiao Dai Ran School of Computer Science and Technology Harbin Institute of Technology Harbin China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China
Consistency of DTDs (or Schema) is a rising topic in XML research. In this paper, a sufficient and necessary condition for consistency of XML DTDs and an algorithm with high efficiency for DTDs consistency checking, o... 详细信息
来源: 评论
A Hybrid Model for Computational Morphology Application
A Hybrid Model for Computational Morphology Application
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Xu Yang Wang Hou-feng School of Electronics Engineering and Computer Science Peking University Beijing China
Computational morphology is a core component in many different types of natural language processing, such as the alignment techniques. This paper describes a method for morphological processing. Based on both rules an... 详细信息
来源: 评论
Using Trust Metric to Detect Malicious Behaviors in WSNs
Using Trust Metric to Detect Malicious Behaviors in WSNs
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Zhang Mingwu Yang Bo Qi Yu Zhang Wenzheng College of Informatics South China Agricultural University Guangzhou China College of Software Technology South China Agricultural University Guangzhou China National Laboratory for Modern Communications Chengdu China
In order to enhance transaction security in wireless sensor networks, it is important to evaluate nodes' trustworthiness. Malicious nodes may strategically alter their behavior for concealing malicious behavior an... 详细信息
来源: 评论
Speculative and distributed simulation of many-particle collision systems
Speculative and distributed simulation of many-particle coll...
收藏 引用
international conference on parallel and distributed Systems (ICPADS)
作者: Ruipeng Li Hai Jiang Hung-Chi Su Bin Zhang Jeff Jenness Department of Computer Science Arkansas State University USA Department of Chemistry & Physics Arkansas State University USA
As problem size increases dramatically and quickly, many scientific computing applications, such as molecular dynamics and many-particle collision simulations, exhibit high demand on data capacity and computability of... 详细信息
来源: 评论
A Framework for Revocation of Proxy Certificates in a Grid
A Framework for Revocation of Proxy Certificates in a Grid
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Shushan Zhao Akshai Aggarwal Robert D. Kent Computer Science Department University of Windsor Canada
Proxy certificates (PCs) are essential in grid security infrastructure (GSI), but their revocation still remains problematic in grid environments. The mechanisms for normal end entity certificates (EEC) revocation nee... 详细信息
来源: 评论
A New Algorithm for Weighted Proportional Fairness Based Spectrum Allocation of Cognitive Radios
A New Algorithm for Weighted Proportional Fairness Based Spe...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Tian Feng Yang Zhen Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications China
Cognitive Radio can achieve dynamic spectrum access by spectrum sensing. The paper proposes a new scheme to share spectrum employing OFDMA-based Cognitive Radio. To show efficiency and fairness, the paper builds an As... 详细信息
来源: 评论