咨询与建议

限定检索结果

文献类型

  • 6,705 篇 会议
  • 116 册 图书
  • 70 篇 期刊文献

馆藏范围

  • 6,891 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,560 篇 工学
    • 3,366 篇 计算机科学与技术...
    • 1,736 篇 软件工程
    • 1,054 篇 信息与通信工程
    • 673 篇 电气工程
    • 228 篇 控制科学与工程
    • 179 篇 电子科学与技术(可...
    • 143 篇 机械工程
    • 97 篇 动力工程及工程热...
    • 97 篇 生物工程
    • 94 篇 测绘科学与技术
    • 42 篇 生物医学工程(可授...
    • 40 篇 仪器科学与技术
    • 39 篇 光学工程
    • 34 篇 建筑学
    • 29 篇 土木工程
    • 28 篇 网络空间安全
    • 27 篇 安全科学与工程
  • 771 篇 理学
    • 568 篇 数学
    • 112 篇 生物学
    • 102 篇 统计学(可授理学、...
    • 100 篇 物理学
    • 75 篇 系统科学
    • 37 篇 化学
  • 511 篇 管理学
    • 383 篇 管理科学与工程(可...
    • 197 篇 工商管理
    • 155 篇 图书情报与档案管...
  • 82 篇 医学
    • 80 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 42 篇 经济学
    • 42 篇 应用经济学
  • 35 篇 法学
    • 25 篇 社会学
  • 12 篇 农学
  • 10 篇 文学
  • 8 篇 教育学
  • 8 篇 军事学
  • 1 篇 艺术学

主题

  • 898 篇 distributed comp...
  • 802 篇 computer network...
  • 513 篇 concurrent compu...
  • 450 篇 wireless sensor ...
  • 377 篇 parallel process...
  • 354 篇 computer science
  • 352 篇 routing
  • 344 篇 neural networks
  • 341 篇 computational mo...
  • 304 篇 computer archite...
  • 260 篇 application soft...
  • 255 篇 network topology
  • 253 篇 peer to peer com...
  • 253 篇 protocols
  • 244 篇 bandwidth
  • 235 篇 grid computing
  • 232 篇 software enginee...
  • 189 篇 costs
  • 177 篇 intelligent netw...
  • 176 篇 artificial intel...

机构

  • 28 篇 institute of com...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 15 篇 shandong fundame...
  • 14 篇 department of co...
  • 13 篇 university of ch...
  • 12 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 institute of com...
  • 11 篇 national laborat...
  • 11 篇 beijing universi...
  • 10 篇 college of compu...
  • 10 篇 institute of inf...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...
  • 10 篇 school of comput...
  • 9 篇 shandong enginee...
  • 9 篇 department of co...
  • 9 篇 school of comput...

作者

  • 16 篇 jiannong cao
  • 15 篇 m. takizawa
  • 15 篇 li dongsheng
  • 15 篇 shen hong
  • 15 篇 hong shen
  • 14 篇 shietung peng
  • 14 篇 eyas el-qawasmeh
  • 13 篇 lemin li
  • 13 篇 rothermel kurt
  • 12 篇 hai jin
  • 11 篇 dongsheng li
  • 11 篇 wei zhang
  • 10 篇 koibuchi michihi...
  • 10 篇 jack dongarra
  • 10 篇 t. enokido
  • 10 篇 wang yang
  • 10 篇 stephen l. scott
  • 10 篇 j. duato
  • 10 篇 m. ould-khaoua
  • 9 篇 duerr frank

语言

  • 6,711 篇 英文
  • 168 篇 其他
  • 17 篇 中文
检索条件"任意字段=IASTED International Conference on Parallel and Distributed Computing and Networks"
6891 条 记 录,以下是671-680 订阅
排序:
A GPU Architecture Aware Fine-Grain Pruning Technique for Deep Neural networks  27th
A GPU Architecture Aware Fine-Grain Pruning Technique for De...
收藏 引用
27th international European conference on parallel and distributed computing (Euro-Par)
作者: Choi, Kyusik Yang, Hoeseok Ajou Univ Dept ECE Suwon 16499 Gyeonggi South Korea
The model size and computation requirement of Deep Convolutional Neural networks (DNNs) have ever increased as their applications to various real-life use-cases, e.g., autonomous driving, are getting more pervasive an... 详细信息
来源: 评论
Guest Editorial: Softwarized Networking for Next Generation Industrial Cyber-Physical Systems
收藏 引用
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2021年 第8期17卷 5506-5510页
作者: Garg, Sahil Wang, Honggang Granelli, Fabrizio Li, Hongwei Univ Quebec Ecole Technol Super Montreal PQ H3C 1K3 Canada Univ Massachusetts Dartmouth N Dartmouth MA 02747 USA Univ Trento I-38122 Trento Italy Univ Elect Sci & Technol China Chengdu 610054 Peoples R China
The papers in this special section focus on softwarized networking for next generation industrial cyber-physical systems (CPSs). With the emergence of embedded and ubiquitous cyberphysical applications, the rationale ... 详细信息
来源: 评论
Deep learning methods for malicious URL detection using embedding techniques as Logistic Regression with Lasso penalty and Random Forest
Deep learning methods for malicious URL detection using embe...
收藏 引用
international conference on parallel distributed and Grid computing (PDGC)
作者: Isha Thakur Kajal Panda Sanjeev Kumar Cyber Security Technology Division Centre for Development of Advanced Computing Mohali India
In the Internet ecosystem, URLs (Uniform Resource Locators) are widely used to propagate malicious infections through spam, spear-phishing, drive-by-download exploitation, malware embedding, etc. The blacklisting, pat... 详细信息
来源: 评论
Aspect Based Sentiment Classification Using Deep Memory Network
Aspect Based Sentiment Classification Using Deep Memory Netw...
收藏 引用
international conference on parallel distributed and Grid computing (PDGC)
作者: Jagendra Singh Penmetsa Dharmesh Adith Varma Sahas Gundapaneni Sai Preethi Bhupathiraju Darshiniram Mattaparthi Mohammad Sajid School of Computer Science Engineering and Technology Bennett University India Greater Noida India Department of Computer Science Aligarh Muslim University Aligarh India
Our main aim is to target and identify the polarity of the sentiments using a Deep memory network for the classification. And for emerging new technologies there is a drastic need for new services. Even though there a... 详细信息
来源: 评论
Performance, Energy and parallelism: Using Near Data Processing in Utility and Cloud computing
Performance, Energy and Parallelism: Using Near Data Process...
收藏 引用
IEEE international conference on Utility and Cloud computing (UCC)
作者: Gul Agha Dipayan Mukherjee Atul Sandur Department of Computer Science University of Illinois at Urbana-Champaign Urbana IL USA
Massive amounts of data are generated by sensor networks, edge computers, IoT devices, and enterprise networks. To process this volume of data requires (1) a scalable programming model that is not only concurrent and ... 详细信息
来源: 评论
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE
Trusted Auditing of Data Operation Behaviors in Cloud based ...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Shujiang Xu Fansheng Wang Lianhai Wang Miodrag J. Mihaljević Shuhui Zhang Wei Shao Qihao Huang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Mathematical Institute the Serbian Academy of Sciences and Arts Belgrade Serbia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of the new generation of information technologies, including cloud computing, 5G, and the Internet of Things, data outsourcing storage in the cloud has brought great convenience to data stor...
来源: 评论
Adaboost-based Graph Convolutional networks with Channel Attention for Intrusion Detection in Internet-of-Things
Adaboost-based Graph Convolutional Networks with Channel Att...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Jing Long Cuiting Luo Ruxin Chen Wei Liang Zheng Qin College of Information Science and Engineering Hunan Normal University Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China College of Computer Science and Electronic Engineering Hunan University Changsha China
With the increasing proliferation of Internet of Things (IoT) and industrial big data technologies, while IoT scenarios offer intelligent services, cyberspace faces various types of threats and attacks. Despite Graph ...
来源: 评论
Towards Energy-Aware Federated Traffic Prediction for Cellular networks
Towards Energy-Aware Federated Traffic Prediction for Cellul...
收藏 引用
international conference on Fog and Mobile Edge computing (FMEC)
作者: Vasileios Perifanis Nikolaos Pavlidis Selim F. Yilmaz Francesc Wilhelmi Elia Guerra Marco Miozzo Pavlos S. Efraimidis Paolo Dini Remous-Aris Koutsiamanis Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi Greece Department of Electrical and Electronic Engineering Imperial College London London United Kingdom Radio Systems Research Nokia Bell Labs Stuttgart Germany Sustainable Artificial Intelligence Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA) Barcelona Spain Department of Automation Production and Computer Sciences LS2N IMT Atlantique Inria Nantes France
Cellular traffic prediction is a crucial activity for optimizing networks in fifth-generation (5G) networks and beyond, as accurate forecasting is essential for intelligent network design, resource allocation and anom...
来源: 评论
GP-GPU computing for Analysis of Large Scale networks  20
GP-GPU Computing for Analysis of Large Scale networks
收藏 引用
21st international conference on distributed computing and Networking (ICDCN)
作者: Ghoshal, Arnab Kumar Das, Nabanita Univ Calcutta Kolkata India Indian Stat Inst Kolkata India
Over last few years the interest in large scale network processing has gained momentum due to the increased importance of efficient processing of such networks for the analysis and problem solving in Social networks, ... 详细信息
来源: 评论
WiRN: Real-Time and Lightweight Gesture Detection System on Edge Device  27
WiRN: Real-Time and Lightweight Gesture Detection System on ...
收藏 引用
27th IEEE international conference on parallel and distributed Systems, ICPADS 2021
作者: Yang, Qing Xing, Tianzhang Jiang, Zhiping Fu, Xinhua He, Jingyi School of Information Science and Technology Northwest University Xi'an China School Computer Science and Technology Xidian University Xi'an China
Gesture detection based on WiFi signals does not require users to carry additional equipment, and can better protect the privacy of users during the detection process, so it has received widespread attention. However,... 详细信息
来源: 评论