咨询与建议

限定检索结果

文献类型

  • 8,691 篇 会议
  • 160 篇 期刊文献
  • 129 册 图书

馆藏范围

  • 8,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,553 篇 工学
    • 4,742 篇 计算机科学与技术...
    • 2,103 篇 软件工程
    • 1,523 篇 电气工程
    • 946 篇 信息与通信工程
    • 539 篇 控制科学与工程
    • 321 篇 动力工程及工程热...
    • 248 篇 电子科学与技术(可...
    • 144 篇 机械工程
    • 139 篇 生物工程
    • 131 篇 环境科学与工程(可...
    • 126 篇 仪器科学与技术
    • 113 篇 安全科学与工程
    • 109 篇 石油与天然气工程
    • 90 篇 网络空间安全
    • 80 篇 交通运输工程
    • 79 篇 建筑学
    • 70 篇 化学工程与技术
    • 68 篇 生物医学工程(可授...
  • 1,248 篇 理学
    • 697 篇 数学
    • 246 篇 物理学
    • 177 篇 系统科学
    • 167 篇 生物学
    • 124 篇 统计学(可授理学、...
    • 117 篇 化学
  • 1,148 篇 管理学
    • 907 篇 管理科学与工程(可...
    • 544 篇 工商管理
    • 343 篇 图书情报与档案管...
  • 151 篇 经济学
    • 149 篇 应用经济学
  • 107 篇 法学
    • 91 篇 社会学
  • 94 篇 医学
    • 73 篇 临床医学
  • 32 篇 农学
  • 29 篇 教育学
  • 24 篇 文学
  • 14 篇 军事学
  • 3 篇 艺术学

主题

  • 2,239 篇 grid computing
  • 558 篇 application soft...
  • 520 篇 cloud computing
  • 496 篇 distributed comp...
  • 443 篇 resource managem...
  • 399 篇 computational mo...
  • 396 篇 computer archite...
  • 317 篇 computer science
  • 303 篇 processor schedu...
  • 301 篇 middleware
  • 198 篇 computer network...
  • 197 篇 grid
  • 196 篇 monitoring
  • 196 篇 web services
  • 173 篇 peer to peer com...
  • 169 篇 quality of servi...
  • 168 篇 costs
  • 167 篇 high performance...
  • 164 篇 computer applica...
  • 155 篇 concurrent compu...

机构

  • 28 篇 institute of com...
  • 21 篇 state grid elect...
  • 20 篇 services computi...
  • 17 篇 huazhong univ sc...
  • 17 篇 state grid corpo...
  • 16 篇 institute of com...
  • 15 篇 shanghai jiao to...
  • 15 篇 department of co...
  • 15 篇 huazhong univ sc...
  • 15 篇 state grid shand...
  • 15 篇 state grid labor...
  • 14 篇 indian inst tech...
  • 14 篇 services computi...
  • 14 篇 grid computing a...
  • 13 篇 china electric p...
  • 13 篇 nanjing univ sta...
  • 12 篇 national enginee...
  • 12 篇 school of comput...
  • 12 篇 state grid zheji...
  • 12 篇 school of comput...

作者

  • 74 篇 hai jin
  • 56 篇 jin hai
  • 25 篇 rajkumar buyya
  • 21 篇 singh bhim
  • 21 篇 buyya rajkumar
  • 18 篇 liao xiaofei
  • 16 篇 xhafa fatos
  • 15 篇 fahringer thomas
  • 15 篇 leonard barolli
  • 15 篇 fatos xhafa
  • 14 篇 tai-hoon kim
  • 13 篇 zou deqing
  • 13 篇 jin h
  • 13 篇 deqing zou
  • 13 篇 li kuan-ching
  • 12 篇 darlington john
  • 12 篇 xu aidong
  • 12 篇 fox geoffrey
  • 12 篇 prodan radu
  • 12 篇 xiaofei liao

语言

  • 8,805 篇 英文
  • 113 篇 其他
  • 57 篇 中文
  • 6 篇 俄文
  • 2 篇 法文
检索条件"任意字段=International Conference on Grid Computing and Applications"
8980 条 记 录,以下是251-260 订阅
排序:
Enhancing Large Language Models with Graph-Based Node Sampling for Fault Attribution in Power Distribution Networks  20th
Enhancing Large Language Models with Graph-Based Node Sampli...
收藏 引用
20th international conference on Intelligent computing (ICIC)
作者: Liu, Bingqian Wu, Xinxin Pan, Deng Chen, Yanyu Huang, Jianye Liao, Feilong Lin, Shuang State Grid Fujian Elect Power Res Inst Fuzhou 350000 Peoples R China Xiamen Univ Sch Informat Xiamen 361005 Peoples R China
The increasing complexity of power distribution networks necessitates advanced methods for fault attribution analysis to uphold system reliability and stability. This paper introduces a novel approach that integrates ... 详细信息
来源: 评论
international conference for Technological Engineering and its applications in Sustainable Development, ICTEASD 2023
International Conference for Technological Engineering and i...
收藏 引用
2023 international conference for Technological Engineering and its applications in Sustainable Development, ICTEASD 2023
The proceedings contain 69 papers. The topics discussed include: IoT based exam hall surveillance robot;immersive technologies: a literature review on brand engagement and consumer behavior;fog computing in IoT: archi...
来源: 评论
Non-targeted Adversarial Attacks on Object Detection Models  20th
Non-targeted Adversarial Attacks on Object Detection Models
收藏 引用
20th international conference on Intelligent computing (ICIC)
作者: Mi, Jian-Xun Zhao, Xiangjin Chen, Yongtao Cheng, Xiao Tian, Peng Lv, Xiaohong Zhong, Jiayong Chongqing Univ Posts & Telecommun Chongqing Key Lab Image Cognit Chongqing 400065 Peoples R China Chongqing Univ Posts & Telecommun Coll Comp Sci & Technol Chongqing 400065 Peoples R China State Grid Chongqing Elect Power Res Inst Chongqing 401123 Peoples R China
Adversarial attacks involve introducing imperceptible noise into images to induce incorrect outputs from models, serving as a means to assess model security. Object detection, as a crucial task in the field of compute... 详细信息
来源: 评论
Dynamic load balancing method based on optimal complete matching of weighted bipartite graph for simulation tasks in multi-energy system digital twin applications
收藏 引用
ENERGY REPORTS 2022年 8卷 1423-1431页
作者: Tang, Xueyong Ding, Yi Lei, Jinyong Yang, He Song, Yankan Zhejiang Univ Hangzhou 310058 Peoples R China Elect Power Res Inst CGS Guangzhou 510663 Peoples R China Tsinghua Sichuan Energy Internet Res Inst Chengdu 610200 Peoples R China
As demands of renewable energy and more energy storages in power systems promote, the digital twin technology for multi-energy system draws attention from the researchers in power system and energy area. The load bala... 详细信息
来源: 评论
Precision high power wide bandwidth AC/DC current shunt  4
Precision high power wide bandwidth AC/DC current shunt
收藏 引用
4th international conference on Smart grid Metrology, SMAGRIMET 2023
作者: Sala, Alan Konjevod, Jure Mostarac, Petar Gasparini, Stipe University of Zagreb Faculty of Electrical Engineering and Computing Department of Electrical Engineering Fundamentals and Measurements Zagreb10000 Croatia KONČAR-Electrical Engineering Institute Ltd. ZagrebHR-10000 Croatia
As new calibration equipment becomes available, there is an increasing demand for calibrations at higher currents and wider frequency ranges of up to 100 kHz and 100 A [1]. In response to this demand, we have expanded...
来源: 评论
Data Augmentation Techniques for Medical Image Segmentation - A Review
Data Augmentation Techniques for Medical Image Segmentation ...
收藏 引用
2024 international conference on Computer and applications, ICCA 2024
作者: Kozah, Naney Dornaika, Fadi Charafeddine, Jinan El Jaam, Jihad University of the Basque Country UPV/EHU Department of Computer Science and Artificial Intelligence San Sebastian Spain University of the Basque Country UPV/EHU Ikerbasque Basque Foundation for Science San Sebastian Spain Léonard de Vinci Pôle Universitaire Research Center Paris La Défense92916 France School of Computing and Data Liverpool J. Mores University Liverpool United Kingdom
Segmentation of medical images is crucial for accu-rate diagnosis, treatment planning and intervention. However, the scarcity of data and the variability of different imaging modalities, including MRI, CT, PET and ult... 详细信息
来源: 评论
Grouped federated learning for time-sensitive tasks in industrial IoTs
收藏 引用
PEER-TO-PEER NETWORKING AND applications 2024年 第2期17卷 819-833页
作者: Hao, Jiangshan Zhang, Linghao Zhao, Yanchao Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Jiangjun Ave Nanjing 211106 Jiangsu Peoples R China State Grid Sichuan Elect Power Res Inst Power Internet Things Key Lab Jinhui West Second St Chengdu 610094 Sichuan Peoples R China
The Industrial Internet of Things (IoT) is a crucial part of Industry 4.0 and constantly calls for intelligence to improve productivity. Meanwhile, the federated learning scheme has recently been proposed to provide b... 详细信息
来源: 评论
Enhancing Privacy Strategy in New Power Systems: Problem Assessment, Comparative Analysis and Suggestions  5th
Enhancing Privacy Strategy in New Power Systems: Problem Ass...
收藏 引用
5th international conference on Big Data and Security (ICBDS)
作者: Chen, Li Yao, Xuyan Zhang, Xin Cao, Yuxin Su, Jiahe Tian, Yuan Nanjing Inst Technol Nanjing 211167 Jiangsu Peoples R China Univ Oulu Sch Software Engn Oulu 90014 Finland
This paper meticulously examines the privacy challenges stemming from the escalating volume of data within the new power systems. It thoroughly explores various privacy computing techniques, including encryption and s... 详细信息
来源: 评论
Quantum-Secure Communication for Trusted Edge computing with IoT Devices  1
收藏 引用
38th international conference on Information Security and Privacy Protection (SEC)
作者: Kornaros, George Berki, Georgia Grammatikakis, Miltos Hellen Mediterranean Univ Iraklion 71410 Greece Intelligent Syst & Comp Architecture Lab Iraklion 71410 Greece
Internet-of-Things(IoT)-based edge computing in smart factories, smart grid, agriculture, constructions and autonomous vehicles include service-oriented gateways that connect with the cloud, perform machine-to-machine... 详细信息
来源: 评论
Research on security monitoring of distributed heterogeneous network environment based on microservice architecture
Research on security monitoring of distributed heterogeneous...
收藏 引用
2024 international conference on Cloud computing and Communication Engineering, CCCE 2024
作者: Wei, Wei Zhong, Ye Wang, Ce Wang, Xingchuan Long, Na Information Center of Guizhou Power Grid Co. Ltd Guizhou Guiyang550000 China
In a distributed network environment, multiple mutually independent trust domains are formed between different enterprises. During network access, access requests for resources may come from local trust domains or fro... 详细信息
来源: 评论