咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,411 篇 计算机科学与技术...
    • 1,568 篇 信息与通信工程
    • 1,424 篇 软件工程
    • 1,051 篇 电气工程
    • 245 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 95 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 32 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 24 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 artificial intel...
  • 362 篇 cloud computing
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是1201-1210 订阅
排序:
distributed-Memory DMRG via Sparse and Dense Parallel Tensor Contractions
Distributed-Memory DMRG via Sparse and Dense Parallel Tensor...
收藏 引用
international conference on High Performance computing, networking, Storage and Analysis (SC)
作者: Levy, Ryan Solomonik, Edgar Clark, Bryan K. Univ Illinois Illinois Quantum Informat Sci & Technol Ctr IQUIS Champaign IL 61801 USA Univ Illinois Inst Condensed Matter Theory Champaign IL 61801 USA Univ Illinois Dept Phys Champaign IL 61801 USA Univ Illinois Dept Comp Sci Champaign IL 61801 USA
The density matrix renormalization group (DMRG) algorithm is a powerful tool for solving eigenvalue problems to model quantum systems. DMRG relies on tensor contractions and dense linear algebra to compute properties ... 详细信息
来源: 评论
Cross-Lingual Propaganda Detection
Cross-Lingual Propaganda Detection
收藏 引用
IEEE international conference on Big Data
作者: Wenshan Zhang Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Propaganda information that aims at influencing people’s opinions is becoming more and more common around people, especially through social media. For the detection of propaganda content, researchers have conducted s... 详细信息
来源: 评论
A Study on Security Threats to Blockchain & Cryptocurrencies
A Study on Security Threats to Blockchain & Cryptocurrencies
收藏 引用
Advances in computing, Communication Control and networking (ICAC3N), international conference on
作者: Jashan Khangura Jatin Arora Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Cryptocurrency is a digital asset that works through distributed ledger technology such as a blockchain. Blockchain was dubbed as un-hackable by many, but recent incidents indicate that it is not the case. This paper ... 详细信息
来源: 评论
Optimizing DG Parameters for Voltage Profile and Real Power Loss Improvement using Elephant Herd Optimization  11
Optimizing DG Parameters for Voltage Profile and Real Power ...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Mahajan, Shreya Verma, Yajvender Pal UIET Panjab University EEE Department Chandigarh India
The purpose of distributed generation in improving voltage profile, abating losses, slashing fuel cost and boosting efficiency is becoming important in modern power system operation. This paper summarizes an unconvent... 详细信息
来源: 评论
Are Coordinator Election Algorithms in distributed Systems Vulnerable?  11
Are Coordinator Election Algorithms in Distributed Systems V...
收藏 引用
11th international conference on computing, Communication and networking Technologies, ICCCNT 2020
作者: Supase, Shital S Ingle, Rajesh B Pune Institute of Computer Technology Computer Engineering Department Pune India
Now a days distributed systems are backbone of majority of the networked applications. It has multiple entities working collaboratively. This collaboration needs to be coordinated by an entity among the member entitie... 详细信息
来源: 评论
Message from the conference Chairs
Proceedings - 2021 21st ACIS International Semi-Virtual Wint...
收藏 引用
Proceedings - 2021 21st ACIS international Semi-Virtual Winter conference on Software Engineering, Artificial Intelligence, networking and Parallel/distributed computing, SNPD-Winter 2021 2021年 xiii页
作者: Kim, Jongbae Khanh, Ngo Tan Vu Soongsil University Korea Republic of Ueh Viet Nam
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record. ...
来源: 评论
Building Microservices Architecture for Smart Banking  11th
Building Microservices Architecture for Smart Banking
收藏 引用
11th international conference on Intelligent networking and Collaborative Systems (INCoS) / 22nd international conference on Network-Based Information Systems (NBiS)
作者: Poniszewska-Maranda, Aneta Vesely, Peter Urikova, Oksana Ivanochko, Iryna Lodz Univ Technol Lodz Poland Comenius Univ Fac Management Bratislava Slovakia Lviv Polytech Natl Univ Lvov Ukraine
We attempt to solve in this research a problem of efficiency and, at the same time, the reduction of the operating costs when creating complex banking IT systems. We propose an approach based on micro-service architec... 详细信息
来源: 评论
GMAS: A Geo-Aware MAS-Based Workflow Allocation Approach on Hybrid-Edge-Cloud Environment  13
GMAS: A Geo-Aware MAS-Based Workflow Allocation Approach on ...
收藏 引用
IEEE 13th international conference on Cloud computing (CLOUD)
作者: Niu, Meng Cheng, Bo Chen, Jun-Liang Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing Peoples R China
Cloud computing is expanding to distributed edge computing(or known as fog computing). Connecting edge and cloud open great potential for real-time and mobility support workflow applications. However, scheduling workf... 详细信息
来源: 评论
A Study on Blockchain Application in Donation Platform
A Study on Blockchain Application in Donation Platform
收藏 引用
Software Engineering, Artificial Intelligence, networking and Parallel/distributed computing (SNPD-Winter), ACIS international Winter conference on
作者: Wooyoung Lee Dukjin Kim Byeong Ryun Jeon Graduate School Soongsil Univ. Seoul South Korea
Recently, interest in the spread of the culture of sharing has been increasing at a social level due to the deepening income polarization, poverty, and the rapid growth of civil society and the importance of public in... 详细信息
来源: 评论
Dynamic Computation Off-loading and Control based on Occlusion Detection in Drone Video Analytics  20
Dynamic Computation Off-loading and Control based on Occlusi...
收藏 引用
21st international conference on distributed computing and networking (ICDCN)
作者: Ramisetty, Rajeswara Rao Qu, Chengyi Aktar, Rumana Wang, Songjie Calyam, Prasad Palaniappan, Kannappan Jawaharlal Nehru Technol Univ Kakinada Vizianagaram India Univ Missouri Columbia MO USA
Unmanned Aerial Vehicles (UAVs) or drones equipped with cameras are extensively used in different scenarios such as surveillance of hazardous locations, disaster response and crime fighting. The related video streamin... 详细信息
来源: 评论