咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 9 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 620 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 341 篇 工学
    • 332 篇 计算机科学与技术...
    • 204 篇 软件工程
    • 122 篇 信息与通信工程
    • 34 篇 电气工程
    • 25 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 8 篇 动力工程及工程热...
    • 8 篇 测绘科学与技术
    • 7 篇 机械工程
    • 7 篇 建筑学
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
  • 109 篇 理学
    • 90 篇 数学
    • 13 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 9 篇 物理学
    • 9 篇 生物学
    • 5 篇 化学
    • 2 篇 大气科学
    • 2 篇 地球物理学
  • 76 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 27 篇 图书情报与档案管...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
  • 2 篇 法学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 174 篇 distributed comp...
  • 111 篇 computer network...
  • 100 篇 software enginee...
  • 93 篇 artificial intel...
  • 73 篇 concurrent compu...
  • 55 篇 computer science
  • 47 篇 grid computing
  • 47 篇 distributed comp...
  • 45 篇 peer to peer com...
  • 39 篇 application soft...
  • 31 篇 parallel process...
  • 31 篇 wireless sensor ...
  • 30 篇 network topology
  • 29 篇 parallel process...
  • 29 篇 delay
  • 28 篇 costs
  • 25 篇 algorithm design...
  • 25 篇 large-scale syst...
  • 24 篇 protocols
  • 23 篇 resource managem...

机构

  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 school of inform...
  • 3 篇 national laborat...
  • 3 篇 institute of com...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 univ sci & techn...
  • 2 篇 huazhong univ sc...
  • 2 篇 department of co...
  • 2 篇 univ adelaide sc...
  • 2 篇 school of comput...
  • 2 篇 univ technol syd...
  • 2 篇 department of co...
  • 2 篇 school of manage...
  • 2 篇 sharif universit...
  • 2 篇 school of comput...
  • 2 篇 lab. com. phys. ...
  • 2 篇 natl univ def te...
  • 2 篇 school of comput...

作者

  • 4 篇 xicheng lu
  • 4 篇 aaron harwood
  • 4 篇 nong xiao
  • 3 篇 shietung peng
  • 3 篇 hong chen
  • 3 篇 rui chu
  • 3 篇 wenhong wei
  • 3 篇 yongxuan lai
  • 3 篇 huanguo zhang
  • 3 篇 engelmann christ...
  • 3 篇 gerald kunzmann
  • 3 篇 wenjun xiao
  • 2 篇 nandi asoke k.
  • 2 篇 xing-ming li
  • 2 篇 choi k.
  • 2 篇 ling zhang
  • 2 篇 wu cheng
  • 2 篇 lo re giuseppe
  • 2 篇 kodama eiichiro
  • 2 篇 brzezinski krzys...

语言

  • 620 篇 英文
检索条件"任意字段=IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2007"
620 条 记 录,以下是411-420 订阅
排序:
Comparative evaluation of the non-contiguous processor allocation strategies based on a real workload and a stochastic workload on multicomputers
Comparative evaluation of the non-contiguous processor alloc...
收藏 引用
international conference on parallel and distributed Systems (ICPADS)
作者: S. Bani-Mohammad M. Ould-Khaoua I. Ababneh Lewis M. Mackenzie Computing Science Glasgow University Glasgow UK Computing Science Al al-Bayt University Mafraq Jordan
The performance study of the existing noncontiguous processor allocation strategies has been traditionally carried out by means of simulation based on a stochastic workload model to generate a stream of incoming jobs ... 详细信息
来源: 评论
A Quick Algorithm for computing Core Based on the Positive Region
A Quick Algorithm for Computing Core Based on the Positive R...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Wei-Dong Cai Zhang-Yan Xu Wei Song Bing-Ru Yang School of Information Engineering University of Science and Technology Beijing Beijing China School of Information Science and Engineering University of Ji'nan Jinan China Department of computer Guangxi Normal University Guilin China
Some scholars provided the discernibility matrix based on the positive region. The time complexity of the algorithm for computing core with this discernibility matrix is O(|CparU| 2 ). For cutting down the time compl... 详细信息
来源: 评论
A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP
A (t, n)-Threshold Verified Multi-secret Sharing Scheme Base...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Ruanhua Shi Hong Zhong Liusheng Huang Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Department of Computer Science and Technology University of Science and Technology Hefei China
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as ... 详细信息
来源: 评论
Spaces: Support for Decoupled Communication in Wide-Area parallel Applications
Spaces: Support for Decoupled Communication in Wide-Area Par...
收藏 引用
international conference on Grid and Cooperative computing (GCC)
作者: Philip Chan David Abramson MESSAGE Laboratory Faculty of Information Technology Monash University Caulfield VIC Australia
Wide-area distributed systems like computational grids are emergent infrastructures for high-performance parallel applications. On these systems, communication mechanisms have to deal with many issues, including: priv... 详细信息
来源: 评论
Multi-view Face Detection Based on the Enhanced AdaBoost Using Walsh Features
Multi-view Face Detection Based on the Enhanced AdaBoost Usi...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Yunyang Yan Zhibo Guo Jingyu Yang Department of Computer Engineer Huaiyin Institute of Technology Huaian Jiangsu China School of Computer Science and Technology Nanjing University of Science and Technology of PLA Nanjing Jiangsu China
A novel face detection algorithm is proposed in this paper to improve the training speed and detection performance. Firstly, we used Walsh features instead of Haar-like features in the AdaBoost algorithm. Walsh featur... 详细信息
来源: 评论
Efficient Modular Exponentiation with Three-Moduli (2^{n}±1,2^{n}+3)
Efficient Modular Exponentiation with Three-Moduli (2^{n}±1...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Bangju Wang Huanguo Zhang Yuhua Wang School of Computer Wuhan University of China Wuhan China
Modular exponentiation is the basic computation for most public key cryptosystems and digital signal processing. A new signed binary representation (SBR) of operand is presented, which has less weight than NAF when mo... 详细信息
来源: 评论
A New Data Protecting Scheme Based on TPM
A New Data Protecting Scheme Based on TPM
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Mingdi Xu Jian He Bo Zhang Huanguo Zhang School of Computer State Key Laboratory of Software Engineering Wuhan University of China China Informationization Construction Teaching and Research Section Commanding Communications Academy Computer Faculty Working Office Electronic Information Department Hubei Water Resource Technical College
Trusted platform model (TPM) is special-purpose integrated circuits built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confident... 详细信息
来源: 评论
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
Privacy Preserving Set Intersection Protocol Secure against ...
收藏 引用
IEEE international conference on parallel and distributed computing, Applications and Technologies (PDCAT)
作者: Yingpeng Sang Hong Shen School of Computer Science University of Adelaide Adelaide SA Australia
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we address the privacy preserving set intersect... 详细信息
来源: 评论
Scheduling Divisible Loads on Bus networks with Start-Up Costs by Utilizing Multiple Data Transfer Streams: PORI
Scheduling Divisible Loads on Bus Networks with Start-Up Cos...
收藏 引用
international conference on parallel Processing (ICPP)
作者: Jie Hu Raymond Klefstad Department of Electrical Engineering and Computer Science University of California Irvine CA USA
The problem of scheduling divisible loads on a distributed bus network with start-up costs is considered. In this paper, we present a novel algorithm to obtain one-round installment load distribution solutions by util... 详细信息
来源: 评论
An Efficient Hybrid P2P Incentive Scheme
An Efficient Hybrid P2P Incentive Scheme
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Zhitao Guan Muhammad Hanif Durad Yuanda Cao Liehuang Zhu School of Computer Science and Technology Beijing Institute of Technology China School of Software Beijing Institute of Technology China
P2P systems have suffered a lot from free riding problem i.e. some participants consume more resources than they contribute. In order to deal with this problem efficiently, an incentive model based on peer credit has ... 详细信息
来源: 评论