咨询与建议

限定检索结果

文献类型

  • 7,062 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,971 篇 工学
    • 3,416 篇 计算机科学与技术...
    • 1,570 篇 信息与通信工程
    • 1,428 篇 软件工程
    • 1,054 篇 电气工程
    • 242 篇 控制科学与工程
    • 125 篇 电子科学与技术(可...
    • 94 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 38 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 34 篇 交通运输工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 418 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 25 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,160 篇 distributed comp...
  • 419 篇 software enginee...
  • 362 篇 cloud computing
  • 360 篇 artificial intel...
  • 312 篇 computer archite...
  • 303 篇 computer network...
  • 284 篇 social networkin...
  • 269 篇 protocols
  • 247 篇 computer science
  • 239 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 215 篇 scalability
  • 207 篇 resource managem...
  • 205 篇 peer to peer com...
  • 196 篇 routing
  • 190 篇 bandwidth
  • 190 篇 servers
  • 188 篇 application soft...
  • 187 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 beijing universi...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 research institu...
  • 9 篇 school of comput...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 6,885 篇 英文
  • 277 篇 其他
  • 50 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7206 条 记 录,以下是1981-1990 订阅
排序:
Speech Synthesis of Shanghai Dialect Based on DNN and LSTM-RNN
Speech Synthesis of Shanghai Dialect Based on DNN and LSTM-R...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Yuren You Yun Zhou Hongwu Yang Hui Wang Lijia Chen College of Physics and Electronic Engineering Northwest Normal University Lanzhou China Northwest Normal University Lanzhou China
This paper proposes a speech synthesis method in Shanghai dialect based on deep learning. We firstly build a Shanghai dialect speech corpus for model training. At the same time, we realize a text analyzer for obtainin... 详细信息
来源: 评论
DDoS Flooding Attack Detection Based on Joint-entropy with Multiple Traffic Features  17
DDoS Flooding Attack Detection Based on Joint-entropy with M...
收藏 引用
17th IEEE international conference on Trust, Security and Privacy in computing and Communications (IEEE TrustCom) / 12th IEEE international conference on Big Data Science and Engineering (IEEE BigDataSE)
作者: Mao, Jiewen Deng, Weijun Shen, Fuke East China Normal Univ Dept Comp Sci & Technol Shanghai Peoples R China
distributed Denial of Service (DDoS) attacks are still considered as severe threats to the Internet. Previous works have used information entropy to detect DDoS flooding attacks. However, these methods usually only us... 详细信息
来源: 评论
A distributed Control System for Software Defined Wireless Sensor Networks Through Containerisation
A Distributed Control System for Software Defined Wireless S...
收藏 引用
international Multidisciplinary Information Technology and Engineering conference (IMITEC)
作者: Hlabishi I. Kobo Adnan M. Abu-Mahfouz Council for Scientific and Industrial Research Next Generation Enterprises and Institutions Pretoria South Africa Tshwane University of Technology Pretoria South Africa
Software-Defined networking and Network Function Virtualisation are gaining much prominence in the technological space. Major technologies are built on their principles. As their impact permeates, many architectural d... 详细信息
来源: 评论
Perishable Digital Goods Trading Mechanism for Blockchain- Based Vehicular Network
Perishable Digital Goods Trading Mechanism for Blockchain- B...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Rui Xi Kang Liu Shuo Liu Wuhui Chen Shenghui Li School of Data and Computer Science Sun Yat-sen University Guangzhou China
Recently, Internet of Vehicles (IoV) equipped with autopilot technology show much concern in their quality of service (QoS), especially in how to ensure the quality of crowdsourcing data for QoS. It is an open issue t... 详细信息
来源: 评论
The Complexity of Leader Election: A Chasm at Diameter Two  18
The Complexity of Leader Election: A Chasm at Diameter Two
收藏 引用
19th international conference on distributed computing and networking (ICDCN)
作者: Chatterjee, Soumyottam Pandurangan, Gopal Robinson, Peter Univ Houston Dept Comp Sci Houston TX 77204 USA Royal Holloway Univ London Dept Comp Sci Egham Surrey England
Leader election is one of the fundamental problems in distributed computing. In its implicit version, only the leader must know who is the elected leader. This paper focuses on studying the message complexity of leade... 详细信息
来源: 评论
Metropolis-Hastings Random Walk with a Reduced Number of Self-Loops
Metropolis-Hastings Random Walk with a Reduced Number of Sel...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Toshiki Matsumura Kazuyuki Shudo Tokyo Institute of Technology
The random walk (RW) is one of the effective sampling methods for large-scale networks such as the Internet and social networks. While a simple RW method tends to visit nodes with high degrees, the Metropolis-Hastings... 详细信息
来源: 评论
The Influence of Bandit-Based User Openness Feature on Recommendation Diversity and Accuracy
The Influence of Bandit-Based User Openness Feature on Recom...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: YuXiang Lin Shaozhen Ye College of Mathematics and Computer Science Fuzhou University Fuzhou China
Collaborative filtering algorithms have obvious advantages in recommendation accuracy, and Bandit's algorithm is a strategy to address diversity needs. The COFIBA algorithm combines the collaborative filtering alg... 详细信息
来源: 评论
Rumor Spreading with Cross Propagation in Multilayer Social Networks
Rumor Spreading with Cross Propagation in Multilayer Social ...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Qiyi Han Musong Gu Lei You Fang Miao School of Information Science and Engineering Chengdu University No. 2025 Avenue been Chengdu Sichuan People’s Republic of China
Social networks have achieved great success by making social interaction online. Malicious users, whereas, make use of social networks to spread rumors. Recent researches manifest that the union of social applications... 详细信息
来源: 评论
On High Availability distributed Control Plane for Software-Defined Networks
On High Availability Distributed Control Plane for Software-...
收藏 引用
international Scientific and Technical conference on Modern Computer Network Technologies (MoNeTeC)
作者: Pashkov, V. Smeliansky, R. Lomonosov Moscow State Univ Appl Res Ctr Comp Networks Moscow Russia
The architecture and organization of the high availability distributed control plane for SDN/OpenFlow networks are considered. High availability is achieved by redundancy of controller instances, active switch-control... 详细信息
来源: 评论
Randomized k-set agreement in crash-prone and Byzantine asynchronous systems
收藏 引用
THEORETICAL COMPUTER SCIENCE 2018年 709卷 80-97页
作者: Mostefaoui, Achour Moumen, Hamouma Raynal, Michel Univ Nantes LINA F-44322 Nantes France Univ Batna Batna Algeria Inst Univ France Paris France Univ Rennes IRISA F-35042 Rennes France
k-Set agreement is a central problem of fault-tolerant distributed computing. Considering a set of n processes, where up to t may commit failures, let us assume that each process proposes a value. The problem consists... 详细信息
来源: 评论