咨询与建议

限定检索结果

文献类型

  • 6,705 篇 会议
  • 116 册 图书
  • 70 篇 期刊文献

馆藏范围

  • 6,891 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,560 篇 工学
    • 3,366 篇 计算机科学与技术...
    • 1,736 篇 软件工程
    • 1,054 篇 信息与通信工程
    • 673 篇 电气工程
    • 228 篇 控制科学与工程
    • 179 篇 电子科学与技术(可...
    • 143 篇 机械工程
    • 97 篇 动力工程及工程热...
    • 97 篇 生物工程
    • 94 篇 测绘科学与技术
    • 42 篇 生物医学工程(可授...
    • 40 篇 仪器科学与技术
    • 39 篇 光学工程
    • 34 篇 建筑学
    • 29 篇 土木工程
    • 28 篇 网络空间安全
    • 27 篇 安全科学与工程
  • 771 篇 理学
    • 568 篇 数学
    • 112 篇 生物学
    • 102 篇 统计学(可授理学、...
    • 100 篇 物理学
    • 75 篇 系统科学
    • 37 篇 化学
  • 511 篇 管理学
    • 383 篇 管理科学与工程(可...
    • 197 篇 工商管理
    • 155 篇 图书情报与档案管...
  • 82 篇 医学
    • 80 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 42 篇 经济学
    • 42 篇 应用经济学
  • 35 篇 法学
    • 25 篇 社会学
  • 12 篇 农学
  • 10 篇 文学
  • 8 篇 教育学
  • 8 篇 军事学
  • 1 篇 艺术学

主题

  • 898 篇 distributed comp...
  • 802 篇 computer network...
  • 513 篇 concurrent compu...
  • 450 篇 wireless sensor ...
  • 377 篇 parallel process...
  • 354 篇 computer science
  • 352 篇 routing
  • 344 篇 neural networks
  • 341 篇 computational mo...
  • 304 篇 computer archite...
  • 260 篇 application soft...
  • 255 篇 network topology
  • 253 篇 peer to peer com...
  • 253 篇 protocols
  • 244 篇 bandwidth
  • 235 篇 grid computing
  • 232 篇 software enginee...
  • 189 篇 costs
  • 177 篇 intelligent netw...
  • 176 篇 artificial intel...

机构

  • 28 篇 institute of com...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 15 篇 shandong fundame...
  • 14 篇 department of co...
  • 13 篇 university of ch...
  • 12 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 institute of com...
  • 11 篇 national laborat...
  • 11 篇 beijing universi...
  • 10 篇 college of compu...
  • 10 篇 institute of inf...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...
  • 10 篇 school of comput...
  • 9 篇 shandong enginee...
  • 9 篇 department of co...
  • 9 篇 school of comput...

作者

  • 16 篇 jiannong cao
  • 15 篇 m. takizawa
  • 15 篇 li dongsheng
  • 15 篇 shen hong
  • 15 篇 hong shen
  • 14 篇 shietung peng
  • 14 篇 eyas el-qawasmeh
  • 13 篇 lemin li
  • 13 篇 rothermel kurt
  • 12 篇 hai jin
  • 11 篇 dongsheng li
  • 11 篇 wei zhang
  • 10 篇 koibuchi michihi...
  • 10 篇 jack dongarra
  • 10 篇 t. enokido
  • 10 篇 wang yang
  • 10 篇 stephen l. scott
  • 10 篇 j. duato
  • 10 篇 m. ould-khaoua
  • 9 篇 duerr frank

语言

  • 6,711 篇 英文
  • 168 篇 其他
  • 17 篇 中文
检索条件"任意字段=IASTED International Conference on Parallel and Distributed Computing and Networks"
6891 条 记 录,以下是801-810 订阅
排序:
Dynamic-Static-based Spatiotemporal Multi-Graph Neural networks for Passenger Flow Prediction  26
Dynamic-Static-based Spatiotemporal Multi-Graph Neural Netwo...
收藏 引用
26th IEEE international conference on parallel and distributed Systems (IEEE ICPADS)
作者: Ma, Jingyan Gu, Jingjing Zhou, Qiang Wang, Qiuhong Sun, Ming Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Peoples R China
Various sensing and computing technologies have gradually outlined the future of the intelligent city. Passenger flow prediction of public transports has become an important task in Intelligent Transportation System (... 详细信息
来源: 评论
An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge Graph
An Unsupervised Approach For Detecting Lateral Movement Logi...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Xiaohan Ma Chen Li Bibo Tu Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
The lateral movement that relies on privacy theft is receiving increasing attention. This type of attack can be achieved by Cross-Host Login. Constructing an authentication graph between hosts is a common way to detec... 详细信息
来源: 评论
A Graph Convolution Neural Network Based Method for Insider Threat Detection
A Graph Convolution Neural Network Based Method for Insider ...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Kexiong Fei Jiang Zhou Lin Su Weiping Wang Yong Chen Fan Zhang School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Computer Science Texas Tech University Lubbock USA Information Technology Center China Mobile Beijing China
In this research, we propose Log2Graph, a new insider threat detection method based on graph convolution neural network (GCN). This method first retrieves the corresponding logs and features from log files through fea... 详细信息
来源: 评论
An adaptive traffic sign recognition scheme based on deep learning in complex environment
An adaptive traffic sign recognition scheme based on deep le...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Junguo Liao Yixun Zhou Qiangqiang Qin School of computer science and Engineering Hunan University of Science and Technology Xiangtan China
Since detection and recognition of traffic signs is one of three modules of autonomous driving, it has been concerned by many researchers. But the traffic sign images, which are gathered in complex environments such a... 详细信息
来源: 评论
Whether Cache Advertisement is Necessary for Content Providers in CDNs? Model and Analysis
Whether Cache Advertisement is Necessary for Content Provide...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Xiaodong Dong Binlei Cai College of Computer Science Nankai University Tianjin China Shandong Computer Science Center Qilu University of Technology Jinan Shandong provience China
Cache advertisement is a widely adopted technique to reduce cache access costs by sending indicators to end-users to inform them of the cached content in Content Delivery networks (CDNs). However, determining the cach... 详细信息
来源: 评论
Herring: Rethinking the Parameter Server at Scale for the Cloud
Herring: Rethinking the Parameter Server at Scale for the Cl...
收藏 引用
international conference on High Performance computing, Networking, Storage and Analysis (SC)
作者: Thangakrishnan, Indu Cavdar, Derya Karakus, Can Ghai, Piyush Selivonchyk, Yauheni Pruce, Cory Amazon Web Serv Seattle WA 98109 USA
Training large deep neural networks is timeconsuming and may take days or even weeks to complete. Although parameter-server-based approaches were initially popular in distributed training, scalability issues led the f... 详细信息
来源: 评论
distributed Unsupervised Learning-Based Task Offloading for Mobile Edge computing Systems  15th
Distributed Unsupervised Learning-Based Task Offloading for ...
收藏 引用
15th EAI international conference on Communications and Networking, ChinaCom 2020
作者: Wei, Jianming Liu, Qiuming Liu, Shumin Zeng, Yiping Xiong, Xin Department of Software Engineering Jiangxi University of Science and Technology Nanchang China
Mobile edge computing has emerged as a new paradigm to enhance computing capabilities by offloading complicated tasks to nearby cloud server. To conserve energy as well as maintain quality of service, algorithms with ... 详细信息
来源: 评论
Non-Cooperative Game for Edge Server Placement in Wireless Body Area Network
Non-Cooperative Game for Edge Server Placement in Wireless B...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Xiaolong Xu Yiming Fei Xiaokang Zhou Xiaoyong Li Yong Cheng Lianyong Qi Wanchun Dou School of Computer Science Nanjing University of Information Science and Technology Nanjing China Faculty of Data Science Shiga University Tokyo Japan College of Meteorology and Oceanography National University of Defense Technology Changsha China College of Computer Science and Technology China University of Petroleum (East China) China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
The outbreak of the coronavirus disease 2019 (COVID-19) has become the worst public health event in the whole world, threatening the physical and mental health of hundreds of millions of people. However, because of th... 详细信息
来源: 评论
A CVAE-GAN-based Approach to Process Imbalanced Datasets for Intrusion Detection in Marine Meteorological Sensor networks
A CVAE-GAN-based Approach to Process Imbalanced Datasets for...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Xin Su Tian Tian Lei Cai Baoliu Ye Hongyan Xing College of IOT Engineering Hohai University Changzhou Jiangsu China Information Department Hohai University Nanjing Jiangsu China Collaborative Innovation Center for Meteorological Disaster Prediction and Evaluation Nanjing University of Information Science and Technology Nanjing Jiangsu China Jiangsu Key Laboratory of Meteorological Detection and Information Processing Nanjing University of Information Science and Technology Nanjing Jiangsu China
In marine meteorological sensor networks (MMSN), there are massive data flows transmitted within numerous nodes, resulting in serious potential consequences once any anomalous traffic implied launches an attack. There... 详细信息
来源: 评论
Towards Secure Bilateral Friend Query with Conjunctive Policy Matching in Social networks
Towards Secure Bilateral Friend Query with Conjunctive Polic...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Chuan Zhang Mingyang Zhao Tong Wu Weiting Zhang Qing Fan Liehuang Zhu Cyberspace Science and Technology Beijing Institute of Technology Beijing China Cyberspace Science and Technology Beijing Institute of Technology Defense Innovation Institute Chinese Academy of Military Science Beijing China Electronic and Information Engineering Beijing Jiaotong University Beijing China
Bilateral friend queries have attracted increasing interest in social networks, as each user has a common requirement to specify a policy for the other. However, existing bilateral friend query schemes either only can... 详细信息
来源: 评论