咨询与建议

限定检索结果

文献类型

  • 991 篇 会议
  • 20 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 764 篇 工学
    • 736 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 195 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 59 篇 电子科学与技术(可...
    • 58 篇 电气工程
    • 21 篇 动力工程及工程热...
    • 19 篇 机械工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 生物工程
    • 13 篇 建筑学
    • 12 篇 环境科学与工程(可...
    • 11 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 力学(可授工学、理...
    • 6 篇 光学工程
    • 6 篇 土木工程
  • 256 篇 理学
    • 209 篇 数学
    • 34 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 21 篇 物理学
    • 20 篇 生物学
    • 12 篇 化学
  • 221 篇 管理学
    • 170 篇 管理科学与工程(可...
    • 111 篇 工商管理
    • 67 篇 图书情报与档案管...
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 10 篇 法学
    • 7 篇 社会学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 农学
  • 3 篇 文学
  • 2 篇 教育学

主题

  • 95 篇 distributed comp...
  • 71 篇 parallel process...
  • 53 篇 grid computing
  • 50 篇 peer to peer com...
  • 48 篇 distributed comp...
  • 33 篇 parallel process...
  • 32 篇 servers
  • 31 篇 fault tolerance
  • 30 篇 computer archite...
  • 29 篇 computational mo...
  • 27 篇 distributed data...
  • 24 篇 protocols
  • 21 篇 concurrent compu...
  • 21 篇 software enginee...
  • 21 篇 cloud computing
  • 19 篇 parallel program...
  • 18 篇 graphics process...
  • 18 篇 algorithm design...
  • 18 篇 artificial intel...
  • 17 篇 bandwidth

机构

  • 11 篇 institute of com...
  • 10 篇 institute of com...
  • 5 篇 academic center ...
  • 5 篇 department of in...
  • 4 篇 institute of par...
  • 4 篇 national laborat...
  • 4 篇 graduate univers...
  • 4 篇 national laborat...
  • 3 篇 school of comput...
  • 3 篇 chinese academy ...
  • 3 篇 institute of inf...
  • 3 篇 chinese academy ...
  • 3 篇 school of comput...
  • 3 篇 computer science...
  • 2 篇 pervasive techno...
  • 2 篇 inria
  • 2 篇 disca univ. poli...
  • 2 篇 state key labora...
  • 2 篇 west bengal univ...
  • 2 篇 dcse college of ...

作者

  • 7 篇 valentin cristea
  • 5 篇 kurt rothermel
  • 5 篇 nakashima hirosh...
  • 5 篇 kondo toshio
  • 5 篇 sasaki takahiro
  • 5 篇 ohno kazuhiko
  • 5 篇 gonzalez teofilo...
  • 4 篇 dongarra jack
  • 4 篇 tang tao
  • 4 篇 wang guibin
  • 4 篇 florin pop
  • 4 篇 matsumoto masaki
  • 4 篇 andresen daniel
  • 3 篇 suter frédéric
  • 3 篇 kawamura takao
  • 3 篇 xhafa fatos
  • 3 篇 alexandru costan
  • 3 篇 lin yisong
  • 3 篇 cristea valentin
  • 3 篇 takata toyoo

语言

  • 1,001 篇 英文
  • 19 篇 其他
检索条件"任意字段=IASTED International Conference on Parallel and Distributed Computing and Systems, PDCS 2010"
1020 条 记 录,以下是521-530 订阅
排序:
Towards Building Efficient Content-Based Publish/Subscribe systems over Structured P2P Overlays
Towards Building Efficient Content-Based Publish/Subscribe S...
收藏 引用
international conference on parallel Processing (ICPP)
作者: Shengdong Zhang Ji Wang Rui Shen Jie Xu National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China School of Computing University of Leeds Leeds UK
In this paper, we introduce a generic model to deal with the event matching problem of content-based publish/subscribe systems over structured P2P overlays. In this model, we claim that there are three methods (event-... 详细信息
来源: 评论
Multi-task Downloading for P2P-VoD: An Empirical Perspective
Multi-task Downloading for P2P-VoD: An Empirical Perspective
收藏 引用
international conference on parallel and distributed systems (ICPADS)
作者: Tieying Zhang Zhenhua Li Xueqi Cheng Xianghui Sun Institute of Computing Technology Chinese Academy and Sciences China Department of Computer Science and Technology Peking University China China Telecom Group Corporation China
For current P2P-VoD systems, three fundamental problems exit in user experience: exceedingly large startup delay, long jump latency, and poor playback continuity. These problems primarily stem from lack of media data.... 详细信息
来源: 评论
An Adaptive Timeout Strategy for UDP Flows Using SVMs
An Adaptive Timeout Strategy for UDP Flows Using SVMs
收藏 引用
IEEE international conference on parallel and distributed computing, Applications and Technologies (PDCAT)
作者: Jing Cai Zhibin Zhang Peng Zhang Xinbo Song Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy and Sciences Beijing China
With the increase of network bandwidth, more and more new applications such as audio, video and online games have become the main body in network traffic. Based on real time considerations, these new applications most... 详细信息
来源: 评论
Small-World Social Relationship Awareness in Unstructured Peer-to-Peer Networks
Small-World Social Relationship Awareness in Unstructured Pe...
收藏 引用
international conference on parallel and distributed systems (ICPADS)
作者: Hao Liao Kuo-Chan Huang Hung-Chang Hsiao Department of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects... 详细信息
来源: 评论
ILGT: Group Reputation Aggregation Method for Unstructured Peer-to-Peer Networks
ILGT: Group Reputation Aggregation Method for Unstructured P...
收藏 引用
international conference on parallel and distributed systems (ICPADS)
作者: Asaki Matsumoto Yo Mashimo Masanori Yasutomi Hiroshi Shigeno Graduate School of Science and Technology Keio University Yokohama Kanagawa Japan
Reputation aggregation methods in unstructured Peer-to-Peer(P2P) networks are used to evaluate the trustworthiness of participating peers and to combat malicious peer's behaviors. In the reputation aggregation met... 详细信息
来源: 评论
Dual-Path Peer-to-Peer Anonymous Approach
Dual-Path Peer-to-Peer Anonymous Approach
收藏 引用
international conference on parallel and distributed systems (ICPADS)
作者: Ehsan Saboori Maghsoud Abbaspour K. N. Toosi University of Technology Tehran Iran Shahid Beheshti University Tehran Iran
There are many approaches proposed to provide anonymous peer-to-peer communications. Data sent via peer-to-peer communications is vulnerable to traffic analysis. Traffic analysis is the process of intercepting and ana... 详细信息
来源: 评论
PMSAI: A Novel Peer-to-Peer Multimedia Streaming Architecture over IMS
PMSAI: A Novel Peer-to-Peer Multimedia Streaming Architectur...
收藏 引用
international conference on parallel and distributed systems (ICPADS)
作者: Ran Liu Hao Yin Wen Hui Department of Electronics and Information Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science and Technology Tsinghua University Beijing China School of Information Engineering University of Science and Technology Beijing Beijing China
Deploying multimedia streaming over IP Multimedia Subsystem (IMS) can enable all kinds of user equipments to enjoy unified streaming service, without considering the differences of heterogeneous accessing methods. The... 详细信息
来源: 评论
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms
Analysis of Integrity Vulnerabilities and a Non-repudiation ...
收藏 引用
international conference on parallel Processing Workshops (ICPPW)
作者: Jun Feng Yu Chen Wei-Shinn Ku Pu Liu Department of Electrical & Computer Engineering State University of New York Binghamton Binghamton NY USA Department of Computer Science & Software Engineering Aubum University Auburn AL USA Systems and Technology Group IBM Endicott Endicott NY USA
Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration ... 详细信息
来源: 评论
Achieving Flow-Level Controllability in Network Intrusion Detection System
Achieving Flow-Level Controllability in Network Intrusion De...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and parallel/distributed computing (SNPD)
作者: Bo Song Weibing Yang Mingyu Chen Xiaofang Zhao Jianping Fan Chinese Academy of Sciences Beijing Beijing CN Institute of Computing Technology Chinese Academy and Sciences Beijing China
Current network intrusion detection systems are lack of controllability, manifested as significant packet loss due to the long-term resources occupation by a single flow. The reasons can be classified into two kinds. ... 详细信息
来源: 评论
On Post-Generation Data Operations in Secure distributed Storage systems with Internal Padding
On Post-Generation Data Operations in Secure Distributed Sto...
收藏 引用
international conference on Computer and Information Technology (CIT)
作者: Feng Shen Hai Jiang Zhiqian Xu Department of Computer Science Arkansas State University USA Information Security Group Royal Holloway University of London UK
Secure distributed storage systems can achieve data security and fault resilience by providing encrypted and redundant data segments across multiple computing nodes. However, such systems might face severe performance... 详细信息
来源: 评论