咨询与建议

限定检索结果

文献类型

  • 147,499 篇 会议
  • 1,638 篇 期刊文献
  • 439 册 图书
  • 3 篇 学位论文

馆藏范围

  • 149,578 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 87,607 篇 工学
    • 67,185 篇 计算机科学与技术...
    • 33,877 篇 软件工程
    • 24,613 篇 电气工程
    • 19,174 篇 信息与通信工程
    • 13,372 篇 控制科学与工程
    • 4,451 篇 电子科学与技术(可...
    • 4,393 篇 机械工程
    • 3,296 篇 仪器科学与技术
    • 3,253 篇 动力工程及工程热...
    • 2,865 篇 生物工程
    • 2,188 篇 石油与天然气工程
    • 2,080 篇 生物医学工程(可授...
    • 2,049 篇 交通运输工程
    • 2,026 篇 网络空间安全
    • 1,738 篇 安全科学与工程
    • 1,323 篇 环境科学与工程(可...
    • 1,152 篇 光学工程
  • 18,563 篇 理学
    • 10,388 篇 数学
    • 3,324 篇 物理学
    • 3,322 篇 系统科学
    • 3,145 篇 生物学
    • 2,588 篇 统计学(可授理学、...
    • 1,083 篇 化学
  • 15,827 篇 管理学
    • 12,056 篇 管理科学与工程(可...
    • 5,099 篇 工商管理
    • 4,968 篇 图书情报与档案管...
  • 2,680 篇 医学
    • 2,090 篇 临床医学
    • 1,598 篇 基础医学(可授医学...
  • 1,791 篇 法学
    • 1,330 篇 社会学
  • 1,598 篇 经济学
    • 1,560 篇 应用经济学
  • 774 篇 教育学
  • 600 篇 农学
  • 370 篇 文学
  • 208 篇 军事学
  • 125 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 11,247 篇 cloud computing
  • 11,088 篇 distributed comp...
  • 6,066 篇 computational mo...
  • 5,955 篇 computer archite...
  • 4,548 篇 computer science
  • 4,382 篇 protocols
  • 4,271 篇 application soft...
  • 4,079 篇 computer network...
  • 3,938 篇 peer to peer com...
  • 3,794 篇 concurrent compu...
  • 3,538 篇 resource managem...
  • 3,474 篇 mobile computing
  • 3,439 篇 distributed comp...
  • 3,372 篇 control systems
  • 3,326 篇 hardware
  • 3,253 篇 servers
  • 3,165 篇 costs
  • 3,122 篇 grid computing
  • 3,040 篇 distributed data...
  • 2,854 篇 monitoring

机构

  • 255 篇 institute of com...
  • 166 篇 school of comput...
  • 123 篇 department of co...
  • 120 篇 university of ch...
  • 87 篇 college of compu...
  • 79 篇 ieee
  • 77 篇 department of co...
  • 63 篇 college of compu...
  • 60 篇 school of automa...
  • 58 篇 georgia inst tec...
  • 56 篇 inria
  • 56 篇 school of comput...
  • 54 篇 shanghai jiao to...
  • 53 篇 university of sc...
  • 52 篇 huazhong univers...
  • 52 篇 tsinghua univers...
  • 52 篇 college of intel...
  • 51 篇 school of comput...
  • 50 篇 institute for in...
  • 50 篇 distributed syst...

作者

  • 118 篇 dustdar schahram
  • 70 篇 hong-linh truong
  • 58 篇 hai jin
  • 55 篇 wang lei
  • 48 篇 lei wang
  • 45 篇 schahram dustdar
  • 40 篇 k.g. shin
  • 40 篇 duerr frank
  • 38 篇 zhang lei
  • 37 篇 buyya rajkumar
  • 35 篇 xiao liu
  • 33 篇 dhabaleswar k. p...
  • 32 篇 dan meng
  • 32 篇 chen shu-ching
  • 31 篇 nectarios koziri...
  • 31 篇 china
  • 30 篇 wang wei
  • 30 篇 jin hai
  • 29 篇 li xin
  • 27 篇 xi chen

语言

  • 147,215 篇 英文
  • 1,616 篇 其他
  • 697 篇 中文
  • 35 篇 俄文
  • 13 篇 西班牙文
  • 11 篇 葡萄牙文
  • 9 篇 法文
  • 5 篇 土耳其文
  • 2 篇 乌克兰文
检索条件"任意字段=IEEE International Conference on Distributed Computing Systems"
149579 条 记 录,以下是4861-4870 订阅
排序:
Resource-Aware Classification via Model Management Enabled Data Stream Optimization  20
Resource-Aware Classification via Model Management Enabled D...
收藏 引用
20th ieee international conference on Pervasive computing and Communications (ieee PerCom)
作者: Suenkel, Michael Elmamooz, Golnaz Grawunder, Marco Phan Thai Hoang Rauch, Elke Schmeling, Lara Thurner, Stefan Nicklas, Daniela Univ Bamberg Chair Mobile Syst Bamberg Germany Carl von Ossietzky Univ Oldenburg Dept Comp Sci Oldenburg Germany Bavarian State Res Ctr Inst Agr Engn & Anim Husb Freising Weihenstephan Germany Ludwig Maximilians Univ Munchen Chair Anim Welf Ethol Anim Hyg & Anim Husb Dept Vet Sci Fac Vet Med D-80539 Munich Germany
The integration of machine learning (ML) approaches in sensor-based applications in the field of pervasive computing is becoming increasingly prominent due to the increasing number of sensor-based applications in gene... 详细信息
来源: 评论
An Architecture for Predictive Resource Allocation in Cloud Capacity Management Using Neural Networks
An Architecture for Predictive Resource Allocation in Cloud ...
收藏 引用
2023 ieee international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Amaral, Janete Lima, Alberto Sampaio De Souza, Jose Neuman Moura, Jose Antao Beltrao Federal University of Ceará Computer Science Department Cear Fortaleza Brazil Federal University of Ceará Teleinformatics Engineering Department CE Fortaleza Brazil Federal University of Ceará Computer Science Department CE Fortaleza Brazil Federal University of Campina Grande Department of Systems and Computing Paraiba Campina Grande Brazil
Cloud service providers (CSP) offer shared environments to meet customers' fluctuating requirements. The challenge is to use mechanisms capable of optimizing the use of resources and ensuring that the performance ... 详细信息
来源: 评论
Fortifying the Academic Perimeter: A Study on Network Sniffers in University computing systems  15
Fortifying the Academic Perimeter: A Study on Network Sniffe...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Pradhan, Rajeshwari Kaur, Inderdeep Singh, Yudhvir Jakhar, Nitil Heena Chandigarh University Computer Science and Engineering Mohali India
This study presents a specialised Java-based network sniffer designed for department-level monitoring of commercial computer systems on university networks. The sniffer is a powerful, platform-independent tool for rea... 详细信息
来源: 评论
PolyNet: Cost- and Performance-Aware Multi-Criteria Link Selection in Software-Defined Edge-to-Cloud Overlay Networks  10
PolyNet: Cost- and Performance-Aware Multi-Criteria Link Sel...
收藏 引用
10th international conference on Network Softwarization (NetSoft)
作者: Daneshmand, Vahid Subratie, Kensworth C. Figueiredo, Renato J. Univ Florida Dept Elect & Comp Engn Gainesville FL 32610 USA
In the ever-evolving networking landscape, the demand for efficient and adaptable Virtual Private Network (VPN) solutions is growing. Software-Defined Networks (SDNs), particularly Peer-to-Peer (P2P) overlay VPNs, off... 详细信息
来源: 评论
Animal Intrusion Detection Using Yolo V8  10
Animal Intrusion Detection Using Yolo V8
收藏 引用
10th international conference on Advanced computing and Communication systems, ICACCS 2024
作者: Kathir, M. Balaji, V. Ashwini, K. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Tamil Nadu Chennai India
This project presents an inventive Animal Intrusion Detection System using Yolo v8 object detection algorithm. Addressing the problem of wildlife intrusions in agriculture as its main goal, the presented work focuses ... 详细信息
来源: 评论
Deep Multimodal Emotion Recognition: Fusion of Facial Features and Neurophysiological Signals  20
Deep Multimodal Emotion Recognition: Fusion of Facial Featur...
收藏 引用
20th international conference on Body Sensor Networks
作者: Safavi, Farshad Venkannagari, Vikas Reddy Vinjamuri, Ramana Kumar Univ Maryland Baltimore Cty Dept Comp Sci & Elect Engn Baltimore MD 21228 USA
Multimodal emotion recognition through the fusion of facial and neurophysiological features plays an important role in various applications, such as advertising, the automotive industry, wearable devices, and human-co... 详细信息
来源: 评论
A distributed Critical Node Detection Algorithm for UAV Swarm Networks  3
A Distributed Critical Node Detection Algorithm for UAV Swar...
收藏 引用
3rd international conference on computing, Communication, Perception and Quantum Technology, CCPQT 2024
作者: He, Zihang Gou, Haosong Wu, Xiong Zhang, Gaoyi Du, Pengfei Zhai, Daosen School of Electronics and Information Northwestern Polytechnical University Xi’an China Sichuan Co. Ltd. China Mobile Group Chengdu China School of Physics and Electronics Hunan University Changsha China Engineering Research Center of Intelligent Airground Integrated Vehicle and Traffic Control Ministry of Education Xihua University Chengdu China
Unmanned aerial vehicle (UAV) swarm can be widely used in cooperative detection and strike across wide geographic areas. To support the collaboration of multiple UAVs, a connected network topology is essential. Thus, ... 详细信息
来源: 评论
A distributed transaction performance optimization method  5
A distributed transaction performance optimization method
收藏 引用
5th international conference on Electronics and Communication, Network and Computer Technology, ECNCT 2023
作者: Wang, Yunhui Yang, Lei Southwest University of Science and Technology School of Computer Science and Technology Mianyang China
With the wide application of distributed systems, complex transaction processing involving multiple nodes has become an important challenge. The difficulty lies in how to ensure the data consistency of each node and h... 详细信息
来源: 评论
Empirical Analysis of Prompt-Based LLMs for Structural Classification of Indian Legal Judgements  5
Empirical Analysis of Prompt-Based LLMs for Structural Class...
收藏 引用
5th ieee international conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2025
作者: Chandana, Sidda Siri Bysani, Hemanth Garg, Shubham Prasoona, Ghanana Gupta, Deepa Sinha, Sushant Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bangalore India India Kanoon Karnataka Bangalore Urban India
Legal judgment is a decision formally issued by a court as a conclusion to legal proceedings, analyzing the court's findings, reasoning, and rulings on the matters brought before it. This study explores the analys... 详细信息
来源: 评论
Enhancing Access Control Mechanisms for Data Stored in Cloud computing  5
Enhancing Access Control Mechanisms for Data Stored in Cloud...
收藏 引用
5th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2024
作者: Madavarapu, Jhansi Bharathi Yalamanchili, Radha Krishna Madavarapu, Rahul Charan Bose University of the Cumberland's Department of Information Technology WilliamsburgKY40769 United States Governor's State University Department of Computer Science University ParkIL60484 United States University of Central Florida Department of ECE OrlandoFL32816 United States
The security and access control of data kept in the cloud are becoming increasingly important to the popularity of cloud computing services. In cloud computing, the access control can limit the data stored for further... 详细信息
来源: 评论