咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,411 篇 计算机科学与技术...
    • 1,568 篇 信息与通信工程
    • 1,424 篇 软件工程
    • 1,051 篇 电气工程
    • 245 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 95 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 32 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 24 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 artificial intel...
  • 362 篇 cloud computing
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是1311-1320 订阅
排序:
Trajectory Privacy Protection Method based on Shadow vehicles
Trajectory Privacy Protection Method based on Shadow vehicle...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Yaqiong Ma Xiangyu Bai Zhaoran Wang College of Computer Science Inner Mongolia University Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
Location Based Services (LBS) are widely used in VANETs to provide a variety of services for vehicles. The trajectory privacy protection has attracted wide attention. However, there are some shortcomings in the scheme... 详细信息
来源: 评论
Fully Compact Routing in Low Memory Self-Healing Trees  20
Fully Compact Routing in Low Memory Self-Healing Trees
收藏 引用
21st international conference on distributed computing and networking (ICDCN)
作者: Castaneda, Armando Lefevre, Jonas Trehan, Amitabh Univ Nacl Autonoma Mexico Inst Matemat Mexico City DF Mexico Loughborough Univ Comp Sci Loughborough Leics England
The paper (Compact Routing Messages in Self-Healing Trees, TCS 2017) introduced CompactFTZ, the first self-healing compact routing algorithm that works in a distributed network with each node using only O(log n) words... 详细信息
来源: 评论
Network Decomposition and distributed Derandomization  21
Network Decomposition and Distributed Derandomization
收藏 引用
Proceedings of the 22nd international conference on distributed computing and networking
作者: Mohsen Ghaffari ETH Zurich Zurich Switzerland
This keynote talk will provide an overview of a recent line of work [Rozhoň and Ghaffari at STOC 2020; Ghaffari, Harris, and Kuhn at FOCS 2018; and Ghaffari, Kuhn, and Maus at STOC 2017], which presented the first ef... 详细信息
来源: 评论
distributed Quantum computing with QMPI
Distributed Quantum Computing with QMPI
收藏 引用
Supercomputing conference
作者: Thomas Häner Damian S. Steiger Torsten Hoefler Matthias Troyer Microsoft Quantum Switzerland ETH Zürich Switzerland Microsoft Quantum USA
Practical applications of quantum computers require millions of physical qubits and it will be challenging for individual quantum processors to reach such qubit numbers. It is therefore timely to investigate the resou... 详细信息
来源: 评论
Using Content Analysis and Machine Learning to Identify COVID-19 Information Relevant to Low-income Households on Social Media
Using Content Analysis and Machine Learning to Identify COVI...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Sarthak Khanal Rus Refati Kyle Glandt Doina Caragea Sifan Xu Chien-fei Chen Kansas State University Manhattan KS USA University of Tennessee Knoxville Knoxville TN Kansas State University Manhattan KS School of Advertising and Public Relations University of Tennessee Knoxville Knoxville TN
COVID-19 pandemic has caused great distress in the lives of many populations. Low-income households are among the most severely impacted groups in the United States and across the globe. Using social media, this paper... 详细信息
来源: 评论
Avalanche blockchain protocol for distributed computing security  7
Avalanche blockchain protocol for distributed computing secu...
收藏 引用
7th IEEE international Black Sea conference on Communications and networking (IEEE BlackSeaCom)
作者: Tanana, Dmitry Ural Fed Univ Lab Combinatory Algebra Ekaterinburg Russia
Platforms for distributed computing are able to solve complex problems such as radio telescope signal analysis or protein design. However, the distributed computing systems are also vulnerable to attacks, especially c... 详细信息
来源: 评论
Micro-service Based Network Management for distributed Applications  34th
Micro-service Based Network Management for Distributed Appli...
收藏 引用
34th international conference on Advanced Information networking and Applications, AINA 2020
作者: de Jesus Martins, Rafael Hecht, Rodolfo B. Machado, Ederson Ribas Nobre, Jéferson Campos Wickboldt, Juliano Araujo Granville, Lisandro Zambenedetti Porto AlegreRS Brazil
Computer networks and their services have become increasingly dynamic with the introduction of concepts such as Network Functions Virtualization (NFV) and cloud computing. To understand and configure such a complex ne... 详细信息
来源: 评论
Proceedings of 2020 5th international conference on Cloud computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020
Proceedings of 2020 5th International Conference on Cloud Co...
收藏 引用
5th international conference on Cloud computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020
The proceedings contain 53 papers. The topics discussed include: block sizes control for an efficient real time record linkage;run time optimization using a novel implementation of parallel-PSO for real-world applicat...
来源: 评论
Transformative computing for distributed Services Management Protocols  34th
Transformative Computing for Distributed Services Management...
收藏 引用
34th international conference on Advanced Information networking and Applications, AINA 2020
作者: Ogiela, Lidia Takizawa, Makoto Ogiela, Urszula Department of Cryptography and Cognitive Informatics Pedagogical University of Krakow Podchorążych 2 Street Kraków30-084 Poland Department of Advanced Sciences Hosei University 3-7-2 Kajino-cho Tokyo Koganei-shi184-8584 Japan Pedagogical University of Krakow Podchorążych 2 Street Kraków30-084 Poland
This paper describes new solutions for distributed services management protocols. The new idea will be based on use transformative computing methodology in services securing algorithms. Such solutions will be based on... 详细信息
来源: 评论
Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks
Malicious Conspiracy on Permissioned Blockchain to Mount Den...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Siyuan Zheng Changqing Yin Bin Wu School of Software Engineering Tongji University Shanghai China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
With the application of blockchains in cryptocurrencies, Internet-of-things and smart contracts etc., many attacks on blockchains and related vulnerabilities have been found. In this paper, we propose a conspiracy sch... 详细信息
来源: 评论