咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,411 篇 计算机科学与技术...
    • 1,568 篇 信息与通信工程
    • 1,424 篇 软件工程
    • 1,051 篇 电气工程
    • 245 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 95 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 32 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 24 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 artificial intel...
  • 362 篇 cloud computing
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是1341-1350 订阅
排序:
DeepSpeed-inference: enabling efficient inference of transformer models at unprecedented scale  22
DeepSpeed-inference: enabling efficient inference of transfo...
收藏 引用
Proceedings of the international conference on High Performance computing, networking, Storage and Analysis
作者: Reza Yazdani Aminabadi Samyam Rajbhandari Ammar Ahmad Awan Cheng Li Du Li Elton Zheng Olatunji Ruwase Shaden Smith Minjia Zhang Jeff Rasley Yuxiong He Microsoft Corporation
The landscape of transformer model inference is increasingly diverse in model size, model characteristics, latency and throughput requirements, hardware requirements, etc. With such diversity, designing a versatile in... 详细信息
来源: 评论
StrongHold: fast and affordable billion-scale deep learning model training  22
StrongHold: fast and affordable billion-scale deep learning ...
收藏 引用
Proceedings of the international conference on High Performance computing, networking, Storage and Analysis
作者: Xiaoyang Sun Wei Wang Shenghao Qiu Renyu Yang Songfang Huang Jie Xu Zheng Wang University of Leeds UK and Alibaba Group China Alibaba Group China University of Leeds UK
Deep neural networks (DNNs) with billion-scale parameters have demonstrated impressive performance in solving many tasks. Unfortunately, training a billion-scale DNN is out of the reach of many data scientists because... 详细信息
来源: 评论
Extend PBFT Protocol with L-DAG
Extend PBFT Protocol with L-DAG
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Anping Song Yi Dai Ruyi Ji Ziheng Song School of Computer Engineering and Science Shanghai University Shanghai China College of Engineering University of Illinois at Urbana–Champaign Champaign and Urbana IL USA
The linear structure of blockchain ensures data security and credibility. But at the same time, it has become the performance bottleneck of the entire system, limiting the growth of the transaction processing rate. Th... 详细信息
来源: 评论
Social-Trust and Power-Efficient Relay Selection for Device-to-Device Underlaying distributed Shared Network
Social-Trust and Power-Efficient Relay Selection for Device-...
收藏 引用
2020 international conference on computing, networking and Communications, ICNC 2020
作者: Sun, Mengyue Bao, Nan Zuo, Jiakuo Sun, Xixia Pan, Su Nanjing University of Posts and Telecommunications School of Internet of Things Nanjing Jiangsu China
In distributed sharing network, limited by short transmission distance, users need to utilize device-to-device (D2D) communication technology to select idle relay users to support communication transmission and realiz... 详细信息
来源: 评论
An Anonymous distributed Electronic Voting System Using Zerocoin
An Anonymous Distributed Electronic Voting System Using Zero...
收藏 引用
international conference on Information networking
作者: Yu Takabatake Yasuo Okabe Graduate School of Informatics Kyoto University Kyoto Japan Academic Center for Computing and Media Studies Kyoto University Kyoto Japan
Electronic voting systems have several necessarily requirements, such as anonymity that others cannot link voters with votes, the fairness that votes should not be leaked before the tally, and the accuracy that eligib... 详细信息
来源: 评论
Identifying Considerable Anomalies and Conflicts in ABAC Security Policies
Identifying Considerable Anomalies and Conflicts in ABAC Sec...
收藏 引用
international conference on ent computing and Control Systems (ICICCS)
作者: K. Vijayalakshmi V. Jayalakshmi Arignar Anna Government Arts College Cheyyar School of Computing Sciences Vels Institute of Science Technology and Advanced Studies VISTAS Chennai India
Nowadays security of shared resources and big data is an important and critical issue. With the growth of information technology and social networks, data and resources are shared in the distributed environment such a... 详细信息
来源: 评论
Impacts on Individual’s Self-Esteem from the Use of Social Media
Impacts on Individual’s Self-Esteem from the Use of Social ...
收藏 引用
international conference on computing, Engineering, and Design (ICCED)
作者: Ryan Ahasan Al-Helal Agung Ginanjar Media Anugerah Ayu Computer Science Faculty of Engineering and Technology Sampoema University Jakarta Indones
Social media has been growing in popularity over the past few years. Many activities done in social media platforms, and some of those activities may affect individual’s perception and self-esteem. Changes in self-es... 详细信息
来源: 评论
distributed storage system for small files
Distributed storage system for small files
收藏 引用
Artificial Intelligence and Computer Engineering (ICAICE), international conference on
作者: Xue Gao Peng Xu Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
With the vigorous rise of the Internet and the Internet of Things, as well as the rapid development of computer technology and artificial intelligence technology, the storage of massive data, has gradually become an u... 详细信息
来源: 评论
Hybrid Chain Based Hierarchical Name Resolution Service in Named Data Network  2nd
Hybrid Chain Based Hierarchical Name Resolution Service in N...
收藏 引用
2nd international conference on Security with Intelligent computing and Big-data Services (SICBS)
作者: Yu, Zhuo Dong, Aiqiang Wei, Xin Guo, Shaoyong Yan, Yong Beijing China Power Informat Technol Co Ltd Div Res & Dev Beijing Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing Peoples R China State Grid Zhejiang Elect Power Res Inst Da Yun Wu Yi Power Applicat Technol Lab Hangzhou Zhejiang Peoples R China
Named Data networking (NDN) is a promising framework which advocates ubiquitous in-network caching to enhance content delivery. The framework provides mechanisms for users to request content restricted by public key o... 详细信息
来源: 评论
QoS-aware Energy Saving Scheme and Traffic Management in Mobile Edge computing Networks
QoS-aware Energy Saving Scheme and Traffic Management in Mob...
收藏 引用
international Wireless Communications and Mobile computing conference, IWCMC
作者: Ali Alnoman Alagan Anpalagan American University of Ras Al Khaimah Ras Al Khaimah UAE Ryerson University Toronto Canada
In this paper, an energy saving scheme is presented whereby unused virtual machines (VMs) in distributed edge devices enter a sleep mode taking into account the quality of service (QoS) experienced by mobile users. Th... 详细信息
来源: 评论