咨询与建议

限定检索结果

文献类型

  • 147,499 篇 会议
  • 1,638 篇 期刊文献
  • 439 册 图书
  • 3 篇 学位论文

馆藏范围

  • 149,578 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 87,607 篇 工学
    • 67,185 篇 计算机科学与技术...
    • 33,877 篇 软件工程
    • 24,613 篇 电气工程
    • 19,174 篇 信息与通信工程
    • 13,372 篇 控制科学与工程
    • 4,451 篇 电子科学与技术(可...
    • 4,393 篇 机械工程
    • 3,296 篇 仪器科学与技术
    • 3,253 篇 动力工程及工程热...
    • 2,865 篇 生物工程
    • 2,188 篇 石油与天然气工程
    • 2,080 篇 生物医学工程(可授...
    • 2,049 篇 交通运输工程
    • 2,026 篇 网络空间安全
    • 1,738 篇 安全科学与工程
    • 1,323 篇 环境科学与工程(可...
    • 1,152 篇 光学工程
  • 18,563 篇 理学
    • 10,388 篇 数学
    • 3,324 篇 物理学
    • 3,322 篇 系统科学
    • 3,145 篇 生物学
    • 2,588 篇 统计学(可授理学、...
    • 1,083 篇 化学
  • 15,827 篇 管理学
    • 12,056 篇 管理科学与工程(可...
    • 5,099 篇 工商管理
    • 4,968 篇 图书情报与档案管...
  • 2,680 篇 医学
    • 2,090 篇 临床医学
    • 1,598 篇 基础医学(可授医学...
  • 1,791 篇 法学
    • 1,330 篇 社会学
  • 1,598 篇 经济学
    • 1,560 篇 应用经济学
  • 774 篇 教育学
  • 600 篇 农学
  • 370 篇 文学
  • 208 篇 军事学
  • 125 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 11,247 篇 cloud computing
  • 11,088 篇 distributed comp...
  • 6,066 篇 computational mo...
  • 5,955 篇 computer archite...
  • 4,548 篇 computer science
  • 4,382 篇 protocols
  • 4,271 篇 application soft...
  • 4,079 篇 computer network...
  • 3,938 篇 peer to peer com...
  • 3,794 篇 concurrent compu...
  • 3,538 篇 resource managem...
  • 3,474 篇 mobile computing
  • 3,439 篇 distributed comp...
  • 3,372 篇 control systems
  • 3,326 篇 hardware
  • 3,253 篇 servers
  • 3,165 篇 costs
  • 3,122 篇 grid computing
  • 3,040 篇 distributed data...
  • 2,854 篇 monitoring

机构

  • 255 篇 institute of com...
  • 166 篇 school of comput...
  • 123 篇 department of co...
  • 120 篇 university of ch...
  • 87 篇 college of compu...
  • 79 篇 ieee
  • 77 篇 department of co...
  • 63 篇 college of compu...
  • 60 篇 school of automa...
  • 58 篇 georgia inst tec...
  • 56 篇 inria
  • 56 篇 school of comput...
  • 54 篇 shanghai jiao to...
  • 53 篇 university of sc...
  • 52 篇 huazhong univers...
  • 52 篇 tsinghua univers...
  • 52 篇 college of intel...
  • 51 篇 school of comput...
  • 50 篇 institute for in...
  • 50 篇 distributed syst...

作者

  • 118 篇 dustdar schahram
  • 70 篇 hong-linh truong
  • 58 篇 hai jin
  • 55 篇 wang lei
  • 48 篇 lei wang
  • 45 篇 schahram dustdar
  • 40 篇 k.g. shin
  • 40 篇 duerr frank
  • 38 篇 zhang lei
  • 37 篇 buyya rajkumar
  • 35 篇 xiao liu
  • 33 篇 dhabaleswar k. p...
  • 32 篇 dan meng
  • 32 篇 chen shu-ching
  • 31 篇 nectarios koziri...
  • 31 篇 china
  • 30 篇 wang wei
  • 30 篇 jin hai
  • 29 篇 li xin
  • 27 篇 xi chen

语言

  • 147,215 篇 英文
  • 1,616 篇 其他
  • 697 篇 中文
  • 35 篇 俄文
  • 13 篇 西班牙文
  • 11 篇 葡萄牙文
  • 9 篇 法文
  • 5 篇 土耳其文
  • 2 篇 乌克兰文
检索条件"任意字段=IEEE International Conference on Distributed Computing Systems"
149579 条 记 录,以下是4931-4940 订阅
排序:
GSM-Powered Gas Leak Detection: A Modern Approach  15
GSM-Powered Gas Leak Detection: A Modern Approach
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Khanna, Manju Sai, Sibyala Hemanth Sresti, Chakka Subrahmanya Sharma, Vellala Bhavaharnath Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bangalore India
Global systems for mobile communications (GSM) Powered Gas Leakage Detection system aims to prevent gas leakages, especially from inflammable sources like LPG, which poses great risk. This presents a gas leakage detec... 详细信息
来源: 评论
GreDedup: A Greedy-Based Application-Aware Data Routing Strategy for distributed Deduplication  29
GreDedup: A Greedy-Based Application-Aware Data Routing Stra...
收藏 引用
29th ieee international conference on Parallel and distributed systems, ICPADS 2023
作者: Su, Jun Fu, Yinjin Xiao, Nong Qian, Yingjin Sun Yat-Sen University School of Computer Science and Engineering Guangzhou China Sun Yat-Sen University School of Cyber Science and Technology Shenzhen China Data Direct Networks United States
We propose GreDedup, a greedy algorithm based application-aware data routing strategy for distributed deduplication, which can achieve a good tradeoff between high global deduplication ratio and scalable performance b... 详细信息
来源: 评论
Task Offloading and Trajectory Optimization for UAV-Assisted Mobile Edge computing
Task Offloading and Trajectory Optimization for UAV-Assisted...
收藏 引用
international conference on Ubiquitous Communication (Ucom)
作者: Shi, Mengmeng Xing, Yanchao Guo, Xueli Zhu, Xuerui Zhu, Ziyao Zhou, Jiaqi Changan Univ Sch Informat Engn Xian Peoples R China Changan Univ Elect & Informat Engn Xian Peoples R China
Recently, Unmanned Aerial Vehicles (UAVs) have been integrated into Mobile Edge computing (MEC) systems to handle substantial data tasks from distributed user devices, thereby reducing computational task latency and e... 详细信息
来源: 评论
Performance Analysis of Task Offloading in Mobile Edge computing using Multi-Objective Optimization Algorithm  4
Performance Analysis of Task Offloading in Mobile Edge Compu...
收藏 引用
4th ieee Annual Flagship India Council international Subsections conference, INDISCON 2023
作者: Bavana, B.N. Kirthiga, S. Amrita School of Engineering Department of Electronics and Communication Engineering Amrita Vishwa Vidyapeetham Coimbatore India
Mobile edge computing plays a vital role in emerging communication technologies;Edge computing is known for its low latency. Task are offloaded from the mobile users to the servers. For processing the data, edge serve... 详细信息
来源: 评论
Penetration Testing for Securing IoT-Enabled Healthcare systems: A Focus on Wearable Devices and Remote Surgery
Penetration Testing for Securing IoT-Enabled Healthcare Syst...
收藏 引用
2024 ieee international conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Chu, Ge Al-Shareefi, Farah Wu, Haoyu Hu, Yongle Yan, Shiping Runjian Co. Ltd. Research Department Nanning China University of Babylon Computer Department Babylon Iraq Xi'an Jiaotong-Liverpool University Department of Computing Suzhou China Runjian Co. Ltd. Research & Development Department Nanning China Business School Guangxi University Nanning China
Healthcare systems are increasingly adopting IoT-enabled solutions, from wearables to remote surgery platforms;thus, we can expect enormous cybersecurity and data protection risks. In this paper, we propose a penetrat... 详细信息
来源: 评论
Leveraging Approximate computing Techniques in 5:2 Compressors for Enhanced Energy Efficiency
Leveraging Approximate Computing Techniques in 5:2 Compresso...
收藏 引用
2024 international conference on Advances in Modern Age Technologies for Health and Engineering Science, AMATHE 2024
作者: Vidyadhar, R. Phani Suhas, Uttarala Heamanth, Pulimamidi Boosani, Santhosh Vardhaman College Of Engineering Electronics And Communication Engineering Telangana Hyderabad India
As the demand for energy-efficient computing con-tinues to grow, researchers and engineers are exploring novel ways to reduce power consumption without compromising performance. Approximate computing has emerged as a ... 详细信息
来源: 评论
Design of flexible Compression Transmission Framework for distributed Storage System Based on Erasure Coding  5
Design of flexible Compression Transmission Framework for Di...
收藏 引用
5th international conference on Frontiers Technology of Information and Computer, ICFTIC 2023
作者: Li, Ang Yuan, Xiandong North China University of Technology Beijing China
Erasure Coding is a redundancy technology commonly used in distributed storage systems (DSS) to ensure data reliability. However, the large number of repair operations required by Erasure Coding results in a large con... 详细信息
来源: 评论
Flood and Loot Attack in distributed Routing Protocols in PCNs  17
Flood and Loot Attack in Distributed Routing Protocols in PC...
收藏 引用
17th international conference on COMmunication systems and NETworkS, COMSNETS 2025
作者: Sharma, Neeraj Kapoor, Kalpesh Indian Institute of Technology Dept. of Computer Science & Engg. Guwahati India Indian Institute of Technology Dept. of Mathematics Guwahati India
Payment Channel Networks (PCNs) can significantly enhance the scalability of blockchain transactions without requiring major modifications to the underlying distributed ledger protocol. However, to enable efficient an... 详细信息
来源: 评论
The Use of Game Theoretic Based Algorithms for Dynamic Resource Allocation in Vehicular Cloud computing systems  2
The Use of Game Theoretic Based Algorithms for Dynamic Resou...
收藏 引用
2nd ieee international conference on Futuristic Technologies, INCOFT 2023
作者: Singh, Manpreet Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research in Business and Technology Punjab India
The broad use of virtualization of hardware, service-oriented architecture, autonomic and utility computing, and the availability of inexpensive processors and storage devices have all contributed to the expansion of ... 详细信息
来源: 评论
Enhanced Cloud Security Through DNA-based Authentication for Data Storage and Transactions  5
Enhanced Cloud Security Through DNA-based Authentication for...
收藏 引用
5th international conference on Electronics and Sustainable Communication systems, ICESC 2024
作者: Yuvarani, R. Mahaveerakannan, R. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Computer Science and Engineering Tamilnadu Chennai602105 India
Cloud computing has experienced rapid growth, yet data breaches and unauthorized account access continue to be significant threats. Traditional cryptographic authentication methods, although mathematically complex, of... 详细信息
来源: 评论