咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,411 篇 计算机科学与技术...
    • 1,568 篇 信息与通信工程
    • 1,424 篇 软件工程
    • 1,051 篇 电气工程
    • 245 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 95 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 32 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 24 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 artificial intel...
  • 362 篇 cloud computing
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是1011-1020 订阅
排序:
Implementing LDA Topic Modelling Technique to Study User Reviews in Tourism
Implementing LDA Topic Modelling Technique to Study User Rev...
收藏 引用
international conference on Parallel distributed and Grid computing (PDGC)
作者: Amit Chauhan Rajni Mohana Department of Computer Science and Information Technology Jaypee University of Information Technology Waknaghat Solan India
Extracting valuable information from unstructured text is a significant difficulty in today's culture due to the ever-increasing proliferation of texts, most of which are generated via online social networks in th... 详细信息
来源: 评论
A Solution to the Techno-Economic Generation Expansion Planning Using Modified Remora Optimization Algorithm
A Solution to the Techno-Economic Generation Expansion Plann...
收藏 引用
Smart Generation computing, Communication and networking (SMART GENCON), international conference on
作者: Bimal Kumar Dora Sunil Bhat Sudip Halder Ishan Srivastava Department of Electrical Engineering VNIT Nagpur Nagpur India
In the recent decade Generation Expansion Planning (GEP) has received a lot of attention among academics and energy policymakers, especially to reduce the greenhouse gas (GHG) emissions such as CO 2 , N 2 O and CH 4 .... 详细信息
来源: 评论
Lightweight and Efficient distributed Cooperative Intrusion Detection System for Intelligent Swarms
Lightweight and Efficient Distributed Cooperative Intrusion ...
收藏 引用
2022 international conference on networking and Network Applications, NaNA 2022
作者: Li, Zhaoyang Zhang, Zhiwei Chen, Zehan Duan, Hao Li, Hongjun Ren, Baoquan School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China Institute of Network Information Academy of Systems Engineering Academy of Military Sciences Beijing100141 China Institute of Systems General Academy of Systems Engineering Academy of Military Sciences Beijing100101 China
Intrusion Detection Systems (IDSs) have been wildly used in various environments to actively detect internal and external attacks with high accuracy. Unfortunately, the traditional IDSs cannot distinguish new or unkno... 详细信息
来源: 评论
Performance comparison of distributed in memory databases in dynamic fog environments
Performance comparison of distributed in memory databases in...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: George Vlahavas Anna-Valentini Michailidou Theodoros Toliopoulos Vasileios G. Psomiadis Anastasios Gounaris Athena Vakali School of Informatics Aristotle University of Thessaloniki Thessaloniki Greece
Fog computing is an extension of cloud computing to overcome limitations of the latter. It brings data processing and storage closer to edge devices, while offering higher processing power and storage space compared t... 详细信息
来源: 评论
Application Research of Vertical Federated Learning Technology in Banking Risk Control Model Strategy
Application Research of Vertical Federated Learning Technolo...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Yong Luo Zhi Lu Xiaofei Yin Songfeng Lu Yiting Weng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
This study centers on the application of vertical federated learning technology in the context of Internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm...
来源: 评论
Kaki: Efficient Concurrent Update Synthesis for SDN
收藏 引用
FORMAL ASPECTS OF computing 2023年 第3期35卷 20-20页
作者: Johansen, Nicklas S. Kaer, Lasse B. Madsen, Andreas L. Nielsen, Kristian O. Srba, Jiri Tollund, Rasmus G. Aalborg Univ Dept Comp Sci Selma Lagerlofs Vej 300 Aalborg Denmark
Modern computer networks based on the software-defined networking (SDN) paradigm are becoming increasingly complex and often require frequent configuration changes in order to react to traffic fluctuations. It is esse... 详细信息
来源: 评论
distributed Deep Reinforcement Learning Based Deterministic Task Offloading in End-Edge-Cloud Collaborative computing Networks  3rd
Distributed Deep Reinforcement Learning Based Deterministic ...
收藏 引用
3rd international conference on Cyberspace Simulation and Evaluation, CSE 2024
作者: Yao, Yingfei Yao, Shunchun Zhou, Nan Liang, Xiaojun Yang, Chunhua Gui, Weihua South China University of Technology Guangzhou510640 China Pengcheng Laboratory Shenzhen518000 China Central South University Changsha410083 China
In the industrial field, the requirements for deterministic and reliable communication cannot be satisfied by current end-edge-cloud collaborative computing (EECC) networks. Time-sensitive networking (TSN) technology ... 详细信息
来源: 评论
Digital Twin Assisted DAG Task Scheduling Via Evolutionary Selection MARL in Large-Scale Mobile Edge Network
Digital Twin Assisted DAG Task Scheduling Via Evolutionary S...
收藏 引用
IEEE international conference on Communications Workshops, ICC
作者: Jiayu Huang Fanqin Zhou Lei Feng Wenjing Li Mingyu Zhao Xueqiang Yan Yan Xi Jianjun Wu State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Huawei Technologies Co. Ltd. Shanghai China
6G is envisioned to serve many compute-intensive and latency-sensitive applications which are now usually formed by functional components in the directed acyclic graphic (DAG) form. Mobile edge computing (MEC) is prov...
来源: 评论
HRC-CLSS: An Hybrid Resource Constrained Certificate-Less Signcryption Solution for Securing Crowdsourced IIoT Environments
HRC-CLSS: An Hybrid Resource Constrained Certificate-Less Si...
收藏 引用
international conference on Inventive Research in computing Applications (ICIRCA)
作者: B Yamini A Srinivasan M. Selvi S. Sumithra T. Sathya G S Uthayakumar Department of Networking and Communication SRM Institute of Science and Technology Kattangulathur Chennai Tamil Nadu India Department of AI & DS Dhanalakshmi College of Engineering Manimangalam Chennai Tamil Nadu India Department of CSE Sathyabama Institute of Science and Technology Chennai Tamil Nadu India Department of CSE Panimalar Engineering College Chennai Tamilnadu India Department of Computer Science and Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai Tamilnadu India Department of Electronics and Communication Engineering St. Joseph's Institute of Technology OMR Chennai Tamilnadu India
The Industrial Internet of Things (IIoT) has become an essential component of modern industrial automation. However, the security of IIoT remains a significant challenge due to its distributed and heterogeneous nature...
来源: 评论
Load Balance in Cloud computing using Software Defined networking
Load Balance in Cloud Computing using Software Defined Netwo...
收藏 引用
2020 international conference on Computer, Control, Electrical, and Electronics Engineering, ICCCEEE 2020
作者: Omer, Yassin Abdulkarim Hamdalla Mohammedel-Amin, Mohamed Ayman Mustafa, Amin Babiker A. Al-Neelain University Faculty of Engineering Khartoum Sudan Future University Faculty-of-Telcommunication Khartoum Sudan
nowadays due to the high demand for cloud services a load balance mechanism for software defined networking (SDN) in a cloud environment appears to solve the availability and latency issues in the HTTP server. This pa... 详细信息
来源: 评论