咨询与建议

限定检索结果

文献类型

  • 2,232 篇 会议
  • 54 篇 期刊文献
  • 3 册 图书
  • 1 篇 学位论文

馆藏范围

  • 2,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,649 篇 工学
    • 1,192 篇 计算机科学与技术...
    • 701 篇 电气工程
    • 506 篇 软件工程
    • 479 篇 信息与通信工程
    • 192 篇 控制科学与工程
    • 101 篇 电子科学与技术(可...
    • 44 篇 航空宇航科学与技...
    • 43 篇 机械工程
    • 31 篇 生物工程
    • 30 篇 石油与天然气工程
    • 30 篇 交通运输工程
    • 25 篇 仪器科学与技术
    • 25 篇 动力工程及工程热...
    • 21 篇 建筑学
    • 20 篇 生物医学工程(可授...
    • 19 篇 土木工程
    • 18 篇 光学工程
    • 17 篇 材料科学与工程(可...
  • 265 篇 理学
    • 133 篇 数学
    • 78 篇 物理学
    • 43 篇 系统科学
    • 40 篇 生物学
    • 17 篇 统计学(可授理学、...
  • 189 篇 管理学
    • 153 篇 管理科学与工程(可...
    • 57 篇 工商管理
    • 37 篇 图书情报与档案管...
  • 76 篇 医学
    • 51 篇 基础医学(可授医学...
    • 33 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 25 篇 教育学
    • 24 篇 教育学
  • 15 篇 法学
  • 8 篇 军事学
  • 3 篇 农学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 171 篇 computer archite...
  • 165 篇 programming
  • 91 篇 hardware
  • 86 篇 network architec...
  • 80 篇 linear programmi...
  • 71 篇 neural networks
  • 68 篇 protocols
  • 64 篇 network topology
  • 62 篇 optimization
  • 57 篇 computational mo...
  • 52 篇 deep learning
  • 52 篇 computer network...
  • 49 篇 routing
  • 49 篇 cloud computing
  • 45 篇 application soft...
  • 45 篇 network-on-chip
  • 42 篇 dynamic programm...
  • 41 篇 switches
  • 40 篇 throughput
  • 39 篇 parallel program...

机构

  • 7 篇 univ calif berke...
  • 6 篇 xidian univ stat...
  • 5 篇 natl res univ hi...
  • 5 篇 deakin univ sch ...
  • 5 篇 swiss fed inst t...
  • 5 篇 mit cambridge ma...
  • 5 篇 tsinghua univ pe...
  • 5 篇 southeast univ n...
  • 5 篇 dalian univ tech...
  • 5 篇 russian acad sci...
  • 4 篇 pg demidov yaros...
  • 4 篇 georgia inst tec...
  • 4 篇 univ chinese aca...
  • 4 篇 shanghai jiao to...
  • 4 篇 peking universit...
  • 4 篇 pacific northwes...
  • 4 篇 univ calif san d...
  • 3 篇 columbia univers...
  • 3 篇 univ estadual ca...
  • 3 篇 nanjing univ aer...

作者

  • 10 篇 carle georg
  • 6 篇 magedanz thomas
  • 6 篇 emmerich paul
  • 5 篇 zhao bo
  • 5 篇 benini luca
  • 5 篇 georg carle
  • 4 篇 zhang tao
  • 4 篇 wang lei
  • 4 篇 garcia jordi
  • 4 篇 dongarra jack
  • 4 篇 hoefler torsten
  • 4 篇 li tao
  • 4 篇 turdakov denis
  • 4 篇 luca foschini
  • 4 篇 kellerer wolfgan...
  • 4 篇 vetter jeffrey s...
  • 4 篇 liu derong
  • 4 篇 chatha karam s.
  • 4 篇 li ming
  • 4 篇 lee seyong

语言

  • 2,231 篇 英文
  • 47 篇 其他
  • 10 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE Conference on Open Architectures and Network Programming"
2290 条 记 录,以下是2011-2020 订阅
排序:
Intrusion tolerant distributed object systems: Project summary
Intrusion tolerant distributed object systems: Project summa...
收藏 引用
3rd DARPA Information Survivability conference and Exposition
作者: Tally, G Whitmore, B Sames, D Matt, B Niebuhr, B Bakken, D Network Associates Laboratories United States Washington State University United States
Intrusion prevention mechanisms and technologies cannot always prevent a well-funded and persistent adversary from penetrating information systems. Middleware is one area where a system can provide intrusion tolerance... 详细信息
来源: 评论
Code revocation for active networks
Code revocation for active networks
收藏 引用
ieee conference on open architectures and network programming
作者: S. Murphy A. Hayatnagarkar S. Krishnaswamy W. Morrison R. Watson Network Associates Laboratories Rockville MD USA
Active networks are placed at considerable risk by running code that arrives over the network. Careful crafting of authorization policy and stringent enforcement provide considerable protection against such risks. How... 详细信息
来源: 评论
On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
On neural network techniques in the secure management of com...
收藏 引用
INNS/ieee International Joint conference on Neural networks (IJCNN 03)
作者: Karras, DA Zorkadis, V Univ Hertfordshire Hellen Aerosp Ind Hatfield AL10 9AB Herts England Hellen Open Univ Athens 16342 Greece Data Protect Autor Athens 10564 Greece
Random components play an especially important role in the management of secure communication systems, with emphasis on the key management of cryptographic protocols. For this reason, the existence of strong pseudo ra... 详细信息
来源: 评论
Transparent and scalable client-side server selection using Netlets
Transparent and scalable client-side server selection using ...
收藏 引用
ieee conference on open architectures and network programming
作者: K. Dharmalingam M. Collier Research Institute in Networks and Communications Engineering School of Electronic Engineering University of Dublin Ireland
Replication of web content in the Internet has been found to improve service response time, performance and reliability offered by web services. When working with such distributed server systems, the location of serve... 详细信息
来源: 评论
OPCA: robust interdomain policy routing and traffic control
OPCA: robust interdomain policy routing and traffic control
收藏 引用
ieee conference on open architectures and network programming
作者: S. Agarwal Chen-Nee Chuah R.H. Katz IP & Interworking Division Sprint Advanced Technology Laboratories USA Computer Science Division University of California Berkeley USA Department of Electrical & Computer Engineering University of California Davis USA
An increasing number of ASes have been connecting to the Internet through the BGP inter-domain routing protocol. With increasing stress on the scale of this system and increasing reliance on Internet connectivity, mor... 详细信息
来源: 评论
Dynamic packet processors-a new abstraction for router extensibility
Dynamic packet processors-a new abstraction for router exten...
收藏 引用
ieee conference on open architectures and network programming
作者: G. Hjalmtysson H. Sverrisson B. Brynjulfsson O.R. Helgason Department of Computer Science Reykjavík University Reykjavik Iceland
The history of the Internet is one of rapid change and adaptability. The simple IP service model and the informal standardization process have fostered rapid evolution of systems and services. However, as the Internet... 详细信息
来源: 评论
On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
收藏 引用
NEURAL networkS 2003年 第5-6期16卷 899-905页
作者: Karras, DA Zorkadis, V Univ Hertfordshire Hellen Aerosp Ind Hatfield AL10 9AB Herts England Hellen Open Univ Athens 16342 Greece Data Protect Autor Athens 10564 Greece
Random components play an especially important role in the management of secure communication systems, with emphasis on the key management of cryptographic protocols. For this reason, the existence of strong pseudo ra... 详细信息
来源: 评论
Storage management in process networks using the lexicographically maximal preimage
Storage management in process networks using the lexicograph...
收藏 引用
International conference on Application Specific Systems (ASAP), architectures and Processors
作者: A. Turjan B. Kienhuis Leiden Institute of Advanced Computer Science Leiden Netherlands
At the Leiden embedded research center, we are developing a compiler called Compaan that automatically translates signal processing applications written in Matlab into Kahn process networks (KPNs). In general, these s... 详细信息
来源: 评论
open distributed client server model in an energy management system for power system security
Open distributed client server model in an energy management...
收藏 引用
ieee Region 10 International conference TENCON
作者: J.A. Reddy K.S. Swarup Department of Electrical Engineering Indian Institute of Technology Madras Chennai India
The controlling functions in the SCADA/EMS system are increasing with the expansion of the power system network as the demand for power increasing. It is difficult to control the functions with the centralized system ... 详细信息
来源: 评论
On the fusion and transference of knowledge. I
On the fusion and transference of knowledge. I
收藏 引用
ieee International conference on Information Reuse and Integration (IRI)
作者: S.H. Rubin SPAWAR Systems Center San Diego CA USA
Contemporary neural architectures having one or more hidden layers suffer from the same deficiencies that genetic algorithms and methodologies for non-trivial automatic programming do; namely, they cannot exploit inhe... 详细信息
来源: 评论