咨询与建议

限定检索结果

文献类型

  • 7,023 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,956 篇 工学
    • 3,404 篇 计算机科学与技术...
    • 1,565 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,053 篇 电气工程
    • 243 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 561 篇 管理学
    • 411 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 519 篇 理学
    • 316 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 65 篇 医学
    • 37 篇 基础医学(可授医学...
    • 33 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 22 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 180 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,085 篇 英文
  • 46 篇 中文
  • 38 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7167 条 记 录,以下是111-120 订阅
排序:
Mitigating Security Challenges in Edge computing: Attacks, Defence Strategies, and Algorithms
Mitigating Security Challenges in Edge Computing: Attacks, D...
收藏 引用
Intelligent Data Communication Technologies and Internet of Things (IDCIoT), international conference on
作者: Venkata Durga Rao Matta V.V.R. Maheswara Rao Venkata Sai Jayasurya Battula Mahesh Babu Addagatla Computer Science and Engineering Department Vishnu Institute of Technology Bhimavaram Andhra Pradesh India Computer Science and Engineering Department Shri Vishnu Engineering College for Women Bhimavaram Andhra Pradesh India
Edge computing has emerged as a crucial paradigm to fulfill the increasing demand for rapid data processing, low latency, and efficient resource utilization, particularly in applications such as the Internet of Things... 详细信息
来源: 评论
Towards Reliable CIDS: Hybrid Reputation and Challenge Strategies for Combating Internal Attacks
Towards Reliable CIDS: Hybrid Reputation and Challenge Strat...
收藏 引用
Robotics, Control and Automation (ICRCA), international conference on
作者: Yuandong Min Jingjing Zhang Sicong Liu Jia Li Furong Yu Jianjun Chen Hao Zhang National Engineering Research Center for E-Learning Faculty of Artificial Intelligence in Education Central China Normal University Wuhan China Wuhan Maritime Communication Research Institute (WMCRI) Wuhan China
Collaborative Intrusion Detection Systems (CIDS) serve as crucial firewalls, maintaining system security through necessary information exchange and integration among nodes in distributed systems. While CIDS excel at d... 详细信息
来源: 评论
Method for Filtering DDoS Attack Traffic through Routing Path within SDN Domain
Method for Filtering DDoS Attack Traffic through Routing Pat...
收藏 引用
IEEE international conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Meng Yue Mingzhi Yang Hanwen Xu Zhijun Wu College of Safety Science and Engineering Civil Aviation University of China Tianjin China
Attacks that aim to disrupt services, known as distributed Denial of Service (DDoS), exploit protocol vulnerabilities and utilize legitimate traffic to target systems, thereby threatening the normal operation of the n... 详细信息
来源: 评论
ColdStart Reduction in Serverless Using Function Discovery and Distribution
ColdStart Reduction in Serverless Using Function Discovery a...
收藏 引用
international conference on Intelligence in Next Generation Networks (ICIN)
作者: Sanjeet Raj Pandey Maria Mora Martinez Patrick Herbke Service-centric Networking Technische Universität Berlin Berlin Germany
Serverless, Function-as-a-Service (FaaS) is a cloud model that enables on-demand function execution with minimal management overhead for users, as cloud providers fully manage infrastructure. However, serverless compu... 详细信息
来源: 评论
A distributed AI System for Improving Single-Domain Network Intent Resolution
A Distributed AI System for Improving Single-Domain Network ...
收藏 引用
international conference on Intelligence in Next Generation Networks (ICIN)
作者: Pedro Martinez-Julia Ved P. Kafle Hitoshi Asaeda Network Architecture Laboratory Network Research Institute National Institute of Information and Communications Technology Tokyo Japan
Resolving network intents to network service descriptions (NSDs) is a key process in intent-based networking (IBN). Current state-of-the-art systems for single-domain intent resolution operate independently. Agents us... 详细信息
来源: 评论
Improving Cloud Energy Efficiency through Machine Learning Models
Improving Cloud Energy Efficiency through Machine Learning M...
收藏 引用
Euromicro conference on Parallel, distributed and Network-Based Processing
作者: Eugenio Cesario Paolo Lindia Federica Lobello Andrea Vinci Shabnam Zarin Santina Capalbo DICES Department University of Calabria Rende Italy DIMES Department University of Calabria Rende Italy CNRNational Research Council of Italy Institute for HPC and Networking (ICAR) Rende Italy Computer Science Department Monmouth University West Long Branch NJ USA
The rapid growth of Cloud computing and the expansion of large data centers have led to significant increases in energy consumption for hardware and cooling systems. This surge in power usage has raised operational co... 详细信息
来源: 评论
Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology  18th
Dynamic Staleness Control for Asynchronous Federated Learni...
收藏 引用
18th international conference on Wireless Artificial Intelligent computing Systems and Applications, WASA 2024
作者: Ma, Qianpiao Liu, Jianchun Jia, Qingmin Zhou, Xiaomao Hu, Yujiao Xie, Renchao Purple Mountain Laboratories Jiangsu Nanjing China School of Computer Science and Technology University of Science and Technology of China Anhui Hefei China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Decentralized federated learning (DFL) has emerged as a promising paradigm for distributed machine learning over edge nodes (i.e., workers) without relying on a centralized parameter server. Most existing DFL research... 详细信息
来源: 评论
Methods for Identifying Implicit Communities and Analyzing Social Networks Using AI
Methods for Identifying Implicit Communities and Analyzing S...
收藏 引用
international Russian Smart Industry conference (SmartIndustryCon)
作者: Maxim A. Komardin Roman M. Britvin Pavel A. Panilov Bauman Moscow State Technical University Moscow Russian Federation
The article provides an overview of modern methods and algorithms for detecting hidden communities in social networks, a crucial task given the rapid growth of data volumes and the complexity of network structures. Th... 详细信息
来源: 评论
ZTAAC : Zero Trust Adaptive Authorization with CP-ABE for Context-Aware Data Protection
ZTAAC : Zero Trust Adaptive Authorization with CP-ABE for Co...
收藏 引用
international Communication Systems and Networks and Workshops, COMSNETS
作者: Kasturi Routray Padmalochan Bera Indian Institute of Technology Bhubaneswar India
In modern dynamic and distributed computing environments, secure and adaptive access control for sensitive data is essential. Traditional access control models often fail to address the complexities of evolving and he... 详细信息
来源: 评论
Co-training with Progressive Distribution Alignment and Uncertainty-Interactive Relabeling for Semi-Supervised Domain Adaptive Semantic Segmentation
Co-training with Progressive Distribution Alignment and Unce...
收藏 引用
international conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ruiguo Yu Yida Wang Xuewei Li Xuzhou Fu Zijian Zhang Yuan Tian Jie Gao College of Intelligence and Computing Tianjin University China Tianjin Key Laboratory of Cognitive Computing and Application China Tianjin Key Laboratory of Advanced Networking China
Self-training is a strong baseline for semi-supervised domain adaptive semantic segmentation. However, it inevitably introduces biased links between features and concepts in the prediction of certain "hard pixels... 详细信息
来源: 评论