咨询与建议

限定检索结果

文献类型

  • 147,727 篇 会议
  • 1,641 篇 期刊文献
  • 439 册 图书
  • 3 篇 学位论文

馆藏范围

  • 149,809 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 87,793 篇 工学
    • 67,326 篇 计算机科学与技术...
    • 33,960 篇 软件工程
    • 24,653 篇 电气工程
    • 19,234 篇 信息与通信工程
    • 13,431 篇 控制科学与工程
    • 4,476 篇 电子科学与技术(可...
    • 4,406 篇 机械工程
    • 3,315 篇 仪器科学与技术
    • 3,277 篇 动力工程及工程热...
    • 2,866 篇 生物工程
    • 2,203 篇 石油与天然气工程
    • 2,083 篇 生物医学工程(可授...
    • 2,065 篇 交通运输工程
    • 2,059 篇 网络空间安全
    • 1,755 篇 安全科学与工程
    • 1,337 篇 环境科学与工程(可...
    • 1,155 篇 光学工程
  • 18,623 篇 理学
    • 10,415 篇 数学
    • 3,336 篇 物理学
    • 3,326 篇 系统科学
    • 3,148 篇 生物学
    • 2,599 篇 统计学(可授理学、...
    • 1,104 篇 化学
  • 15,888 篇 管理学
    • 12,096 篇 管理科学与工程(可...
    • 5,115 篇 工商管理
    • 4,994 篇 图书情报与档案管...
  • 2,692 篇 医学
    • 2,098 篇 临床医学
    • 1,605 篇 基础医学(可授医学...
  • 1,799 篇 法学
    • 1,334 篇 社会学
  • 1,601 篇 经济学
    • 1,563 篇 应用经济学
  • 777 篇 教育学
  • 601 篇 农学
  • 370 篇 文学
  • 208 篇 军事学
  • 125 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 11,254 篇 cloud computing
  • 11,090 篇 distributed comp...
  • 6,069 篇 computational mo...
  • 5,958 篇 computer archite...
  • 4,548 篇 computer science
  • 4,384 篇 protocols
  • 4,270 篇 application soft...
  • 4,079 篇 computer network...
  • 3,938 篇 peer to peer com...
  • 3,794 篇 concurrent compu...
  • 3,542 篇 resource managem...
  • 3,474 篇 mobile computing
  • 3,443 篇 distributed comp...
  • 3,372 篇 control systems
  • 3,327 篇 hardware
  • 3,255 篇 servers
  • 3,168 篇 costs
  • 3,121 篇 grid computing
  • 3,041 篇 distributed data...
  • 2,855 篇 monitoring

机构

  • 255 篇 institute of com...
  • 166 篇 school of comput...
  • 124 篇 university of ch...
  • 123 篇 department of co...
  • 87 篇 college of compu...
  • 79 篇 ieee
  • 76 篇 department of co...
  • 63 篇 college of compu...
  • 60 篇 school of automa...
  • 58 篇 georgia inst tec...
  • 56 篇 inria
  • 56 篇 school of comput...
  • 54 篇 shanghai jiao to...
  • 53 篇 university of sc...
  • 52 篇 huazhong univers...
  • 52 篇 tsinghua univers...
  • 52 篇 college of intel...
  • 51 篇 school of comput...
  • 50 篇 institute for in...
  • 50 篇 distributed syst...

作者

  • 118 篇 dustdar schahram
  • 70 篇 hong-linh truong
  • 58 篇 hai jin
  • 55 篇 wang lei
  • 48 篇 lei wang
  • 45 篇 schahram dustdar
  • 40 篇 k.g. shin
  • 40 篇 duerr frank
  • 38 篇 zhang lei
  • 37 篇 buyya rajkumar
  • 35 篇 xiao liu
  • 33 篇 dhabaleswar k. p...
  • 33 篇 chen shu-ching
  • 32 篇 dan meng
  • 31 篇 nectarios koziri...
  • 31 篇 china
  • 30 篇 wang wei
  • 30 篇 jin hai
  • 29 篇 li xin
  • 27 篇 xi chen

语言

  • 146,235 篇 英文
  • 2,827 篇 其他
  • 703 篇 中文
  • 35 篇 俄文
  • 13 篇 西班牙文
  • 11 篇 葡萄牙文
  • 9 篇 法文
  • 5 篇 土耳其文
  • 2 篇 乌克兰文
检索条件"任意字段=IEEE International Conference on Distributed Computing Systems"
149810 条 记 录,以下是4701-4710 订阅
排序:
5th international conference on Advances in distributed computing and Machine Learning, ICADCML 2024
5th International Conference on Advances in Distributed Comp...
收藏 引用
5th international conference on Advances in distributed computing and Machine Learning, ICADCML 2024
The proceedings contain 35 papers. The special focus in this conference is on Advances in distributed computing and Machine Learning. The topics include: Computer-Aided Bundle Branch Block Detection Using Symbolic Fea...
来源: 评论
Competitive Co-Evolution with Spiking Neural Networks
Competitive Co-Evolution with Spiking Neural Networks
收藏 引用
2024 international conference on Neuromorphic systems, ICONS 2024
作者: Mccombs, Luke Friend, Drew Whatley, Luke Schuman, Catherine D. University of Tennessee Department of EECS KnoxvilleTN United States
Spiking neural networks are a natural fit as controllers agents in control task. In this work, we investigate the use of competitive co-evolution to evolve two sets of agents (defenders and attackers) in a competitive... 详细信息
来源: 评论
Evolution of Neuromorphic computing  4
Evolution of Neuromorphic Computing
收藏 引用
4th international conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Sai Sree Vaishnavi, Vakada G. Bhowmik, Biswajit National Institute of Technology Karnataka Ishwarchandra Vidyasagar Ait Lab Brics Laboratory Department of Computer Science and Engineering Surathkal Mangalore575025 India
With the advancement of artificial intelligence (AI) technologies, novel and inventive approaches for addressing complex problems are coming to the forefront. Neuromorphic computing based on AI technologies stands as ... 详细信息
来源: 评论
Hypothyroid Disease Prediction Using Machine Learning & Ensemble Methods
Hypothyroid Disease Prediction Using Machine Learning & Ense...
收藏 引用
2024 ieee international conference on computing, Applications and systems, COMPAS 2024
作者: Haque Prantik, Md. Zihadul Mustary Abeda, Maliha Alam, Mohammad Jahangir Daffodil International University Computer Science and Engineering Dhaka Bangladesh
Thyroid illness is spreading more and more nowadays and it has become the most common disease that can lead to various health disorders. The main reason behind this disease is thyroid hormone disorder which can lead t... 详细信息
来源: 评论
Accessing the Edge: Delay Evaluation to distributed Edge Services in a City-Level 5G Network  12
Accessing the Edge: Delay Evaluation to Distributed Edge Ser...
收藏 引用
12th international conference on Cloud Engineering
作者: Frei, Matthias Karbownik, Piotr German, Reinhard Djanatliev, Anatoli Fraunhofer Inst Integrated Circuits IIS Erlangen Germany Univ Erlangen Nurnberg Dept Comp Sci Comp Networks & Commun Syst Erlangen Germany
Cloud combined with Multi-Access Edge computing (MEC) empowers service creators and application developers with promising architectural design and communication performance improvements. In fifth generation (5G) and i... 详细信息
来源: 评论
Quantum Secure Key Management & Delivery Protocol in the QKD framework  5
Quantum Secure Key Management & Delivery Protocol in the QKD...
收藏 引用
5th ieee India Council international Subsections conference, INDISCON 2024
作者: Harmalkar, Manjiri Jain, Kurunandan Aneesh Kumar, K.B. Krishnan, Prabhakar Amrita Vishwa Vidyapeetham Amritapuri Amrita Center for Cybersecurity Systems and Networks India Center for Development of Advanced Computing Cyber Security Group Kerala Thiruvanathapuram India
The current Quantum Key Distribution (QKD) key delivery API relies on HTTPS for secure communication. It is vulnerable to quantum computer threats due to its use of public key cryptography. To mitigate insider attacks... 详细信息
来源: 评论
PROOF: Decentralized Platform for Verifiable Outsourced Computation  6
PROOF: Decentralized Platform for Verifiable Outsourced Comp...
收藏 引用
6th ieee international conference on Blockchain and Cryptocurrency, ICBC 2024
作者: Grigoratos, Spiros Doka, Katerina Koziris, Nectarios National Technical University of Athens Computing Systems Laboratory Greece
Decentralization is reshaping our digital landscape, promising improved control, security, and accessibility. This demo paper explores the potential of decentralization in Cloud computing, presenting PROOF, a platform... 详细信息
来源: 评论
A Comprehensive Survey of Intrusion Detection System Using Machine Learning and Deep Learning Approaches  10
A Comprehensive Survey of Intrusion Detection System Using M...
收藏 引用
10th international conference on Advanced computing and Communication systems, ICACCS 2024
作者: Abhiram, Kotnur Muthusamy, Hariharan Ravindran, Sindhu Vijean, Vikneswaran Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India National Institute of Technology Uttarakhand Department of Electronis Engineering Uttarakhand Srinagar Garhwal246174 India Universiti Malaysia Perlis Faculty of Electronic Engineering & Technology Arau Pauh Putra Perlis02600 Malaysia
The necessity for Computer networks' use is expanding quickly, which raises problems with preserving network secrecy, availability, and integrity. Intrusion can be defined as an intentional breach of security rule... 详细信息
来源: 评论
CYBERSECURITY FUNDAMENTALS - NOT JUST FOR INDUSTRIAL CONTROL systems WHEN GUIDANCE AND DIRECTION ARE AVAILABLE
CYBERSECURITY FUNDAMENTALS - NOT JUST FOR INDUSTRIAL CONTROL...
收藏 引用
ieee IAS Petroleum and Chemical Industry Technical conference (PCIC)
作者: Dunn, Donald G. Cosman, Eric OIT Concepts LLC Lakeway TX 78734 USA
Industrial Control systems (ICS) are important to supporting US critical infrastructure and maintaining national security. ICS owners and operators continue to face threats from a variety of adversaries whose intentio... 详细信息
来源: 评论
An Optical Transceiver Reliability Study based on SFP Monitoring and OS-level Metric Data  23
An Optical Transceiver Reliability Study based on SFP Monito...
收藏 引用
23rd ieee/ACM international Symposium on Cluster, Cloud and Internet computing (CCGrid)
作者: Notaro, Paolo Yu, Qiao Haeri, Soroush Cardoso, Jorge Gerndt, Michael Huawei Technol Duesseldorf GmbH D-80992 Munich Germany Tech Univ Munich Chair Comp Architecture & Parallel Syst Munich Germany Tech Univ Berlin Chair Distributed & Operating Syst Berlin Germany Univ Coimbra Dept Informat Engn CISUC Coimbra Portugal
The increasing demand for cloud computing drives the expansion in scale of datacenters and their internal optical network, in a strive for increasing bandwidth, high reliability, and lower latency. Optical transceiver... 详细信息
来源: 评论