咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 9 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 620 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 341 篇 工学
    • 332 篇 计算机科学与技术...
    • 204 篇 软件工程
    • 122 篇 信息与通信工程
    • 34 篇 电气工程
    • 25 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 8 篇 动力工程及工程热...
    • 8 篇 测绘科学与技术
    • 7 篇 机械工程
    • 7 篇 建筑学
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
  • 109 篇 理学
    • 90 篇 数学
    • 13 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 9 篇 物理学
    • 9 篇 生物学
    • 5 篇 化学
    • 2 篇 大气科学
    • 2 篇 地球物理学
  • 76 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 27 篇 图书情报与档案管...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
  • 2 篇 法学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 174 篇 distributed comp...
  • 111 篇 computer network...
  • 100 篇 software enginee...
  • 93 篇 artificial intel...
  • 73 篇 concurrent compu...
  • 55 篇 computer science
  • 47 篇 grid computing
  • 47 篇 distributed comp...
  • 45 篇 peer to peer com...
  • 39 篇 application soft...
  • 31 篇 parallel process...
  • 31 篇 wireless sensor ...
  • 30 篇 network topology
  • 29 篇 parallel process...
  • 29 篇 delay
  • 28 篇 costs
  • 25 篇 algorithm design...
  • 25 篇 large-scale syst...
  • 24 篇 protocols
  • 23 篇 resource managem...

机构

  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 school of inform...
  • 3 篇 national laborat...
  • 3 篇 institute of com...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 univ sci & techn...
  • 2 篇 huazhong univ sc...
  • 2 篇 department of co...
  • 2 篇 univ adelaide sc...
  • 2 篇 school of comput...
  • 2 篇 univ technol syd...
  • 2 篇 department of co...
  • 2 篇 school of manage...
  • 2 篇 sharif universit...
  • 2 篇 school of comput...
  • 2 篇 lab. com. phys. ...
  • 2 篇 natl univ def te...
  • 2 篇 school of comput...

作者

  • 4 篇 xicheng lu
  • 4 篇 aaron harwood
  • 4 篇 nong xiao
  • 3 篇 shietung peng
  • 3 篇 hong chen
  • 3 篇 rui chu
  • 3 篇 wenhong wei
  • 3 篇 yongxuan lai
  • 3 篇 huanguo zhang
  • 3 篇 engelmann christ...
  • 3 篇 gerald kunzmann
  • 3 篇 wenjun xiao
  • 2 篇 nandi asoke k.
  • 2 篇 xing-ming li
  • 2 篇 choi k.
  • 2 篇 ling zhang
  • 2 篇 wu cheng
  • 2 篇 lo re giuseppe
  • 2 篇 kodama eiichiro
  • 2 篇 brzezinski krzys...

语言

  • 620 篇 英文
检索条件"任意字段=IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2007"
620 条 记 录,以下是501-510 订阅
排序:
Coal Thickness Prediction Based on Support Vector Machine Regression
Coal Thickness Prediction Based on Support Vector Machine Re...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Li Zhengwei Xia Shixiong Niuqiang Xia Zhanguo School of Computer Science and Technology China University of Mining and Technology Xuzhou Jiangsu China China University of Mining and Technology China
A novel method based on support vector machine for coal thickness prediction through seismic attribute technology is proposed in this paper. Based on SVM which embodies the structural risk minimization principle, the ... 详细信息
来源: 评论
Research on Topology Discovery for IPv6 networks
Research on Topology Discovery for IPv6 Networks
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Junhai Luo Mingyu Fang Danxia Ye University of Electronic Science and Technology of China China
With some new features introduced by IPv6 network, such as a wider address space, a different scope based on addressing scheme, a modified protocol field and so on, IPv6 topology discovery faces some challenging probl... 详细信息
来源: 评论
Secure Routing for Mobile Ad Hoc networks
Secure Routing for Mobile Ad Hoc Networks
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Jing Liu Fei Fu Junmo Xiao Yang Lu People''s Liberation Army University of Science and Technology China
Buttyan found out a security flaw in Ariadne (Y.C. Hu, A. Perrig, andD. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," in Proc. of the Eighth ACM hitl Conf. on Mobile Computi... 详细信息
来源: 评论
Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal Logic
Modeling Cooperative Problem Solving Process with Extended A...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Zhengyuan Ning Xianwei Lai Shanli Hu Qingqing Zhan Computer and Information College Fujian Agriculture and Forestry University China Department of Computer Science and Technology Fuzhou University China
The paradigm example of social interaction is cooperative problem solving, in which a group of autonomous agents choose to work together to achieve a common goal. In order to improve existing work on developing formal... 详细信息
来源: 评论
Mining of Reuse Patterns in CDMA Network Optimization
Mining of Reuse Patterns in CDMA Network Optimization
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Wen Ye Hongxu Cui School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China
CAP, a classical problem in cellular mobile communication networks such as GSM/GPRS or CDMA cellular mobile networks, refers to assigning a limited number of available channels to many mobile voice or data users while... 详细信息
来源: 评论
Message Dissemination under the Multicasting Communication Mode
Message Dissemination under the Multicasting Communication M...
收藏 引用
IEEE international conference on parallel and distributed computing, Applications and Technologies (PDCAT)
作者: Teofilo F. Gonzalez Department of Computer Science University of California Santa Barbara USA
We discuss algorithms, complexity issues, and applications for message dissemination problems under the multicasting communication mode. These problems arise while executing in a parallel or distributed computing envi... 详细信息
来源: 评论
Fault Tolerance Comparison of IDS Models with Multilayer Perceptron and Radial Basis Function networks
Fault Tolerance Comparison of IDS Models with Multilayer Per...
收藏 引用
international Joint conference on Neural networks (IJCNN)
作者: Masayuki Murakami Nakaji Honda Department of Systems Engineering University of Electro-Communications Chofu Tokyo Japan
The ink drop spread (IDS) method is a modeling technique developed by algorithmically mimicking the information-handling processes of the human brain. This method is a new paradigm of soft computing. The structure of ... 详细信息
来源: 评论
A Quick Algorithm for computing Core Based on the Positive Region
A Quick Algorithm for Computing Core Based on the Positive R...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Wei-Dong Cai Zhang-Yan Xu Wei Song Bing-Ru Yang School of Information Engineering University of Science and Technology Beijing Beijing China School of Information Science and Engineering University of Ji'nan Jinan China Department of computer Guangxi Normal University Guilin China
Some scholars provided the discernibility matrix based on the positive region. The time complexity of the algorithm for computing core with this discernibility matrix is O(|CparU| 2 ). For cutting down the time compl... 详细信息
来源: 评论
A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP
A (t, n)-Threshold Verified Multi-secret Sharing Scheme Base...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Ruanhua Shi Hong Zhong Liusheng Huang Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Department of Computer Science and Technology University of Science and Technology Hefei China
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as ... 详细信息
来源: 评论
A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog Deviation
A Numerical Prediction Product FNN Prediction Model Based on...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Long Jin Xvming Shi Guangxi Research Institute of Meterological Disasters Mitigation Nanning Guangxi China
Aiming at the problem that the fuzzy neural network (FNN) technique itself does not provide the input matrix to the FNN prediction model, we present a prediction modeling methodology which combines the computation and... 详细信息
来源: 评论