咨询与建议

限定检索结果

文献类型

  • 147,727 篇 会议
  • 1,641 篇 期刊文献
  • 439 册 图书
  • 3 篇 学位论文

馆藏范围

  • 149,809 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 87,793 篇 工学
    • 67,326 篇 计算机科学与技术...
    • 33,960 篇 软件工程
    • 24,653 篇 电气工程
    • 19,234 篇 信息与通信工程
    • 13,431 篇 控制科学与工程
    • 4,476 篇 电子科学与技术(可...
    • 4,406 篇 机械工程
    • 3,315 篇 仪器科学与技术
    • 3,277 篇 动力工程及工程热...
    • 2,866 篇 生物工程
    • 2,203 篇 石油与天然气工程
    • 2,083 篇 生物医学工程(可授...
    • 2,065 篇 交通运输工程
    • 2,059 篇 网络空间安全
    • 1,755 篇 安全科学与工程
    • 1,337 篇 环境科学与工程(可...
    • 1,155 篇 光学工程
  • 18,623 篇 理学
    • 10,415 篇 数学
    • 3,336 篇 物理学
    • 3,326 篇 系统科学
    • 3,148 篇 生物学
    • 2,599 篇 统计学(可授理学、...
    • 1,104 篇 化学
  • 15,888 篇 管理学
    • 12,096 篇 管理科学与工程(可...
    • 5,115 篇 工商管理
    • 4,994 篇 图书情报与档案管...
  • 2,692 篇 医学
    • 2,098 篇 临床医学
    • 1,605 篇 基础医学(可授医学...
  • 1,799 篇 法学
    • 1,334 篇 社会学
  • 1,601 篇 经济学
    • 1,563 篇 应用经济学
  • 777 篇 教育学
  • 601 篇 农学
  • 370 篇 文学
  • 208 篇 军事学
  • 125 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 11,254 篇 cloud computing
  • 11,090 篇 distributed comp...
  • 6,069 篇 computational mo...
  • 5,958 篇 computer archite...
  • 4,548 篇 computer science
  • 4,384 篇 protocols
  • 4,270 篇 application soft...
  • 4,079 篇 computer network...
  • 3,938 篇 peer to peer com...
  • 3,794 篇 concurrent compu...
  • 3,542 篇 resource managem...
  • 3,474 篇 mobile computing
  • 3,443 篇 distributed comp...
  • 3,372 篇 control systems
  • 3,327 篇 hardware
  • 3,255 篇 servers
  • 3,168 篇 costs
  • 3,121 篇 grid computing
  • 3,041 篇 distributed data...
  • 2,855 篇 monitoring

机构

  • 255 篇 institute of com...
  • 166 篇 school of comput...
  • 124 篇 university of ch...
  • 123 篇 department of co...
  • 87 篇 college of compu...
  • 79 篇 ieee
  • 76 篇 department of co...
  • 63 篇 college of compu...
  • 60 篇 school of automa...
  • 58 篇 georgia inst tec...
  • 56 篇 inria
  • 56 篇 school of comput...
  • 54 篇 shanghai jiao to...
  • 53 篇 university of sc...
  • 52 篇 huazhong univers...
  • 52 篇 tsinghua univers...
  • 52 篇 college of intel...
  • 51 篇 school of comput...
  • 50 篇 institute for in...
  • 50 篇 distributed syst...

作者

  • 118 篇 dustdar schahram
  • 70 篇 hong-linh truong
  • 58 篇 hai jin
  • 55 篇 wang lei
  • 48 篇 lei wang
  • 45 篇 schahram dustdar
  • 40 篇 k.g. shin
  • 40 篇 duerr frank
  • 38 篇 zhang lei
  • 37 篇 buyya rajkumar
  • 35 篇 xiao liu
  • 33 篇 dhabaleswar k. p...
  • 33 篇 chen shu-ching
  • 32 篇 dan meng
  • 31 篇 nectarios koziri...
  • 31 篇 china
  • 30 篇 wang wei
  • 30 篇 jin hai
  • 29 篇 li xin
  • 27 篇 xi chen

语言

  • 146,235 篇 英文
  • 2,827 篇 其他
  • 703 篇 中文
  • 35 篇 俄文
  • 13 篇 西班牙文
  • 11 篇 葡萄牙文
  • 9 篇 法文
  • 5 篇 土耳其文
  • 2 篇 乌克兰文
检索条件"任意字段=IEEE International Conference on Distributed Computing Systems"
149810 条 记 录,以下是4711-4720 订阅
排序:
Special Session: Challenges and Opportunities for Sustainable Multi-Scale computing systems
Special Session: Challenges and Opportunities for Sustainabl...
收藏 引用
2023 ACM/ieee international conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2023
作者: Ouvrard, Xavier Peon-Quiros, Miguel Atienza, David Lausanne Switzerland
Multi-Scale computing systems aim at bringing the computing as close as possible to the data sources, to optimize both computation and networking. These systems are composed of at least three computing layers: the ter... 详细信息
来源: 评论
Software Defined Network Based Error Correction Mechanism in Quantum Key Distribution  5
Software Defined Network Based Error Correction Mechanism in...
收藏 引用
5th ieee India Council international Subsections conference, INDISCON 2024
作者: Shajahan, Rasha Jain, Kurunandan Aneesh Kumar, K.B. Krishnan, Prabhakar Amrita Vishwa Vidyapeetham Amritapuri-campus Center for Cybersecurity Systems and Networks India Center for Development of Advanced Computing Cyber Security Group Kerala Thiruvanathapuram India
Quantum Key Distribution (QKD) is a secure communication method that uses quantum mechanics to exchange secret keys. Currently, the QKD process uses a static error correction method, which can lead to inaccuracies and... 详细信息
来源: 评论
TinyLog: Log Anomaly Detection with Lightweight Temporal Convolutional Network for Edge Device
TinyLog: Log Anomaly Detection with Lightweight Temporal Con...
收藏 引用
international Joint conference on Neural Networks (IJCNN)
作者: Meng, Chuangying Chen, Ningjiang Guangxi Univ Sch Comp & Elect Informat Nanning Peoples R China
Log anomaly detection on edge devices is one of the key components to ensure system security and diagnose system faults. Existing log anomaly detection methods usually contain a large number of parameters and computat... 详细信息
来源: 评论
Vacancy Modulated Analog Resistive Switching Memory Device Based on Bilayer of Zn@ZnO/ZnO for Neuromorphic computing  30
Vacancy Modulated Analog Resistive Switching Memory Device B...
收藏 引用
30th ieee international conference on Electronics, Circuits and systems, ICECS 2023
作者: Khan, Muhammad Umair Mohammad, Baker Khalifa University System on Chip Center Department of Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates
This work proposed a vacancy-modulated analog resistive random-access memory (ReRAM) for neuromorphic computing, utilizing a structure composed of Ag/Zn@ZnO/ZnO/FTO. The resistive switching behavior can be modulated b... 详细信息
来源: 评论
An embedded low-cost solution for a fog computing device on the Internet of Things  8
An embedded low-cost solution for a fog computing device on ...
收藏 引用
8th ieee international conference on Fog and Mobile Edge computing (FMEC)
作者: d'Agostino, Pietro Violante, Massimo Macario, Gianpaolo Politecn Torino Dept Control & Comp Engn DAUIN Turin Italy AROL Closure Syst Turin Italy
The adaptability of devices can be significant for a customer that inserts them in an industrial production line. The ability to modify an object bought along with a machine that can be personalized with its features ... 详细信息
来源: 评论
Decentralized Trust: Visual Cryptography for Transparent E-Voting Solutions
Decentralized Trust: Visual Cryptography for Transparent E-V...
收藏 引用
2024 international conference on Innovative computing, Intelligent Communication and Smart Electrical systems, ICSES 2024
作者: Asmitha, M. Kavitha, C.R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
E-voting system is a digital mechanism that enables people to vote electronically, ensuring confidentiality, security, and transparency. Visual cryptography (VC) is a cryptographic technique where a secret image is di... 详细信息
来源: 评论
Prototyping distributed Botnet Detection System in Computer Networks  5
Prototyping Distributed Botnet Detection System in Computer ...
收藏 引用
5th international conference on computing and Informatics (ieee ICCI)
作者: Putra, Muhammad Aidiel Rachman Ahmad, Tohari Ijtihadie, Royyana Muslim Hostiadi, Dandy Pramana Inst Teknol Sepuluh Nopember Dept Informat Surabaya Indonesia
Being dangerous threats and attacks in this cyber era, botnets require proper handling. Nevertheless, some bot detection models that have been proposed are centralized and can only detect at one point of attack, even ... 详细信息
来源: 评论
Joint Communication Bandwidth and computing Frequency Allocation for Control-Oriented UAV-Robot Rescue systems  24
Joint Communication Bandwidth and Computing Frequency Alloca...
收藏 引用
24th ieee international conference on Communication Technology, ICCT 2024
作者: Shen, Daohong Fang, Xinran Feng, Wei Chen, Yunfei Pang, Zhibo Tsinghua University Department of Electronic Engineering Beijing100084 China State Key Laboratory of Space Network and Communications Beijing100084 China University of Durham Department of Engineering DurhamDH1 3LE United Kingdom Kth Royal Institute of Technology Department of Intelligent Systems Sweden
In post-disaster scenarios, field robots and unmanned aerial vehicles (UAVs) are effective tools to provide an ondemand response and guarantee the safety of humans. Sensors, field robots, and the devices equipped by U... 详细信息
来源: 评论
Design of Software Engineering Approach's for web learning applications using Cloud computing  3
Design of Software Engineering Approach's for web learning a...
收藏 引用
3rd ieee North Karnataka Subsection Flagship international conference, NKCon 2024
作者: Sreenivasa, N. Naidu, P. Ramesh Naresh, E. Chandrakala, B.M. Nitte Meenakshi Institute of Technology Department of Computer Science and Engineering Karnataka Bengaluru560064 India Manipal Academy of Higher Education Manipal Institute of Technology Bengaluru Department of Information Technology Manipal India Dayanandasagar College of Engineering Department of Information Science and Engineering Kumaraswamy Layout Bengaluru560078 India
Over the years, Cloud computing has significantly influenced various sectors, including Web learning, as education is considered crucial for individual and national growth. The primary objective is to develop an Appli... 详细信息
来源: 评论
Exploring Machine Learning Methods for Hate Speech Detection on Social Media  2
Exploring Machine Learning Methods for Hate Speech Detection...
收藏 引用
2nd ieee international conference on Advances in Information Technology, ICAIT 2024
作者: Negi, Deepti Manchanda, Mahesh Kala, Aditi Harbola, Aditya School of Computing Graphic Era Hill University Dehradun India Graphic Era Hill University Dehradun India
As social media usage continues to expand daily, so too does the spread of hate speech. To swiftly remove inflammatory content, every social media platform needs to implement a dependable algorithm for identifying hat... 详细信息
来源: 评论