咨询与建议

限定检索结果

文献类型

  • 148,463 篇 会议
  • 1,640 篇 期刊文献
  • 441 册 图书
  • 1 篇 学位论文

馆藏范围

  • 150,544 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 88,271 篇 工学
    • 67,730 篇 计算机科学与技术...
    • 34,163 篇 软件工程
    • 24,843 篇 电气工程
    • 19,518 篇 信息与通信工程
    • 13,777 篇 控制科学与工程
    • 4,533 篇 电子科学与技术(可...
    • 4,482 篇 机械工程
    • 3,383 篇 动力工程及工程热...
    • 3,362 篇 仪器科学与技术
    • 2,872 篇 生物工程
    • 2,316 篇 石油与天然气工程
    • 2,242 篇 网络空间安全
    • 2,196 篇 交通运输工程
    • 2,089 篇 生物医学工程(可授...
    • 1,900 篇 安全科学与工程
    • 1,379 篇 环境科学与工程(可...
    • 1,161 篇 光学工程
  • 18,785 篇 理学
    • 10,518 篇 数学
    • 3,380 篇 物理学
    • 3,331 篇 系统科学
    • 3,148 篇 生物学
    • 2,636 篇 统计学(可授理学、...
    • 1,159 篇 化学
  • 16,166 篇 管理学
    • 12,359 篇 管理科学与工程(可...
    • 5,145 篇 工商管理
    • 5,103 篇 图书情报与档案管...
  • 2,738 篇 医学
    • 2,117 篇 临床医学
    • 1,610 篇 基础医学(可授医学...
  • 1,840 篇 法学
    • 1,371 篇 社会学
  • 1,632 篇 经济学
    • 1,594 篇 应用经济学
  • 791 篇 教育学
  • 601 篇 农学
  • 378 篇 文学
  • 208 篇 军事学
  • 125 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 11,322 篇 cloud computing
  • 11,107 篇 distributed comp...
  • 6,110 篇 computational mo...
  • 5,977 篇 computer archite...
  • 4,549 篇 computer science
  • 4,391 篇 protocols
  • 4,271 篇 application soft...
  • 4,079 篇 computer network...
  • 3,938 篇 peer to peer com...
  • 3,796 篇 concurrent compu...
  • 3,584 篇 resource managem...
  • 3,478 篇 mobile computing
  • 3,445 篇 distributed comp...
  • 3,375 篇 control systems
  • 3,331 篇 hardware
  • 3,266 篇 servers
  • 3,185 篇 costs
  • 3,123 篇 grid computing
  • 3,069 篇 distributed data...
  • 2,869 篇 monitoring

机构

  • 257 篇 institute of com...
  • 166 篇 school of comput...
  • 132 篇 university of ch...
  • 123 篇 department of co...
  • 87 篇 college of compu...
  • 79 篇 ieee
  • 75 篇 department of co...
  • 63 篇 college of compu...
  • 60 篇 school of automa...
  • 59 篇 georgia inst tec...
  • 56 篇 inria
  • 54 篇 college of intel...
  • 53 篇 university of sc...
  • 53 篇 shanghai jiao to...
  • 53 篇 huazhong univers...
  • 53 篇 school of comput...
  • 52 篇 tsinghua univers...
  • 51 篇 distributed syst...
  • 51 篇 school of comput...
  • 50 篇 institute for in...

作者

  • 118 篇 dustdar schahram
  • 70 篇 hong-linh truong
  • 58 篇 hai jin
  • 54 篇 wang lei
  • 48 篇 lei wang
  • 45 篇 schahram dustdar
  • 40 篇 k.g. shin
  • 40 篇 duerr frank
  • 38 篇 zhang lei
  • 37 篇 buyya rajkumar
  • 36 篇 xiao liu
  • 33 篇 dhabaleswar k. p...
  • 32 篇 dan meng
  • 32 篇 chen shu-ching
  • 32 篇 wang wei
  • 31 篇 nectarios koziri...
  • 31 篇 china
  • 30 篇 jin hai
  • 29 篇 li xin
  • 27 篇 xi chen

语言

  • 139,670 篇 英文
  • 10,134 篇 其他
  • 726 篇 中文
  • 35 篇 俄文
  • 10 篇 西班牙文
  • 9 篇 法文
  • 7 篇 葡萄牙文
  • 5 篇 土耳其文
  • 2 篇 乌克兰文
检索条件"任意字段=IEEE International Conference on Distributed Computing Systems"
150545 条 记 录,以下是691-700 订阅
排序:
Zero Trust Score-based Network-level Access Control in Enterprise Networks  22
Zero Trust Score-based Network-level Access Control in Enter...
收藏 引用
ieee 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Bradatsch, Leonard Miroshkin, Oleksandr Trkulja, Natasa Kargl, Frank Ulm Univ Inst Distributed Syst Ulm Germany Ulm Univ KIZ Ulm Germany
Zero Trust security has recently gained attention in enterprise network security. One of its key ideas is making network-level access decisions based on trust scores. However, score-based access control in the enterpr... 详细信息
来源: 评论
A Time-Efficient distributed Constant Conditional Functional Dependency Discovery Algorithm for Data Consistency  48
A Time-Efficient Distributed Constant Conditional Functional...
收藏 引用
48th Annual ieee international Computers, Software, and Applications conference (COMPSAC) - Digital Development for a Better Future
作者: Chen, Junchao Zhou, Jian-tao Hao, Xinyu Inner Mongolia Univ Natl & Local Joint Engn Res Ctr Intelligent Infor Inner Mongolia Engn Lab Cloud Comp & Serv Softwar Inner Mongolia Key Lab Social Comp & Data ProcCo Hohhot Peoples R China
The accuracy of data analysis depends on data quality, and addressing data consistency issues is a key challenge to improve it. Constant Conditional Functional Dependency (CCFD) is an effective approach that ensures d... 详细信息
来源: 评论
ECdo: An Edge computing distributed Data-Driven Evolutionary Optimization Platform
ECdo: An Edge Computing Distributed Data-Driven Evolutionary...
收藏 引用
2023 ieee international conference on systems, Man, and Cybernetics, SMC 2023
作者: Zeng, Qing-Ye Wei, Feng-Feng Guo, Xiao-Qi Chen, Wei-Neng School of Computer Science and Engineering South China University of Technology State Key Laboratory of Subtropical Building and Urban Science Guangzhou510006 China
Surrogate-assisted evolutionary algorithms (SAEAs) have become a popular method to solve data-driven optimization problems (DOPs), which are common in industry. However, with the development of the Internet of Things,... 详细信息
来源: 评论
Poster: In-Network Total Order Guarantees Supporting State Machine Replication with P4 Programmable Switches  32
Poster: In-Network Total Order Guarantees Supporting State M...
收藏 引用
32nd international conference on Network Protocols
作者: Boughzala, Bochra Koldehofe, Boris Univ Groningen Groningen Netherlands Tech Univ Ilmenau Ilmenau Germany
In this paper we propose P4-based Atomic Multicast (P4mCast), a new in-network atomic multicast protocol to support total order guarantees for State Machine Replication (SMR) in cloud-based fault-tolerant and distribu... 详细信息
来源: 评论
Low-Power Distinct Sum for Wireless Sensor Networks  18
Low-Power Distinct Sum for Wireless Sensor Networks
收藏 引用
18th Annual international conference on distributed computing in Sensor systems (DCOSS)
作者: William, Ebram Kamal Chan, Mun Choon Natl Univ Singapore Singapore Singapore
Continuous monitoring is a major component of many applications in wireless sensor network (WSN). In these applications, to reduce the communication overhead, some form of data summary or aggregation can be performed.... 详细信息
来源: 评论
A Secure Information Management and Interoperability Framework: Enabling distributed Fusion Engines for Military IoT Applications
A Secure Information Management and Interoperability Framewo...
收藏 引用
2024 international conference on Military Communication and Information systems, ICMCIS 2024
作者: Penders, Ate Van Der Horst, Max Van Der Linden, Alex De Graaf, Maurits Quillinan, Thomas Pavlin, Gregor Thales Nederland B.V Delft Netherlands Thales Nederland B.V Huizen Netherlands
This paper presents a secure and flexible process integration approach enabling distributed data fusion in military IoT applications. It seamlessly combines two recently developed technologies, the Dynamic Process Int... 详细信息
来源: 评论
Proceedings - 2024 international conference on Cyber-Enabled distributed computing and Knowledge Discover, CyberC 2024
Proceedings - 2024 International Conference on Cyber-Enabled...
收藏 引用
16th international conference on Cyber-Enabled distributed computing and Knowledge Discover, CyberC 2024
The proceedings contain 37 papers. The topics discussed include: few-shot image classification method with label consistent and inconsistent self-supervised learning;a high performance ai-powered cache mechanism for I...
来源: 评论
The Internet of Bio-Nano Things - Smart computing in the Human Body  10
The Internet of Bio-Nano Things - Smart Computing in the Hum...
收藏 引用
international conference on Smart computing (SMARTCOMP)
作者: Fischer, Stefan Univ Lubeck Inst Telemat Lubeck Germany
The Internet of Bio-Nano Things (IoBNT) is an innovative field of research located at the intersection of nanotechnology, biotechnology and information and communication technologies. It aims to enable the seamless in... 详细信息
来源: 评论
Evaluation of Data Enrichment Methods for distributed Stream Processing systems  11
Evaluation of Data Enrichment Methods for Distributed Stream...
收藏 引用
11th ieee international conference on Cloud Engineering (IC2E)
作者: Scheinert, Dominik Casares, Fabian Geldenhuys, Morgan K. Styp-Rekowski, Kevin Kao, Odej Tech Univ Berlin Berlin Germany
Stream processing has become a critical component in the architecture of modern applications. With the exponential growth of data generation from sources such as the Internet of Things, business intelligence, and tele... 详细信息
来源: 评论
Secure Synchronized Spatio-Temporal Trajectory Similarity Search  22
Secure Synchronized Spatio-Temporal Trajectory Similarity Se...
收藏 引用
ieee 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Teng, Yiping Qi, Jiawei Liu, Lei Wang, Shiqing Xu, Li Fan, Chunlong Shenyang Aerosp Univ Sch Comp Large Scale Distributed Syst Lab Shenyang Liaoning Peoples R China
Attracting research interests and applications in academic and industrial community due to the proliferation of mobile devices, computation and processing services on spatio-temporal trajectory data has usually been o... 详细信息
来源: 评论