咨询与建议

限定检索结果

文献类型

  • 7,019 篇 会议
  • 92 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 7,135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,952 篇 工学
    • 3,402 篇 计算机科学与技术...
    • 1,561 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,050 篇 电气工程
    • 241 篇 控制科学与工程
    • 122 篇 电子科学与技术(可...
    • 91 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 73 篇 仪器科学与技术
    • 64 篇 生物工程
    • 51 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
  • 560 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 517 篇 理学
    • 314 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 23 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,161 篇 distributed comp...
  • 407 篇 software enginee...
  • 363 篇 cloud computing
  • 356 篇 artificial intel...
  • 312 篇 computer archite...
  • 307 篇 computer network...
  • 276 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 13 篇 buyya rajkumar
  • 12 篇 dustdar schahram
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 rajkumar buyya
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,056 篇 英文
  • 47 篇 中文
  • 35 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7135 条 记 录,以下是271-280 订阅
排序:
Research on Wide-Area-Cloud-Platform Operations Framework for Edge-Cloud System  9
Research on Wide-Area-Cloud-Platform Operations Framework fo...
收藏 引用
9th international conference on Cloud computing and Big Data Analytics, ICCCBDA 2024
作者: Qin, Yuqin Liu, Jiali Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing China
With the rapid increase of data, the scale of cloud is gradually expanding, forming a wide-area cloud platform consisting of multiple data centers distributed across different locations. For industry professionals, ma... 详细信息
来源: 评论
A distributed Storage System for System Logs Based on Hybrid Compression Scheme  21
A Distributed Storage System for System Logs Based on Hybrid...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Chang, Baoming Zhou, Fengxi Wang, Zhaoyang Wen, Yu Zhang, Boyang Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
Modern enterprises are facing a massive threat from Advanced Persistent Threats (APTs), which have risen to be one of the most dangerous challenges in recent years. Since system logs capture the complex causality depe... 详细信息
来源: 评论
Multi-Target distributed Maximum Correntropy Kalman Filter  24
Multi-Target Distributed Maximum Correntropy Kalman Filter
收藏 引用
12th international conference on Communications and Broadband networking, ICCBN 2024
作者: Deng, Xingyu Han, Hongyu Zhang, Sheng Xu, Yin College of Computer Science and Visual Computing Virtual Reality Key Laboratory of Sichuan Province Sichuan Normal University Chengdu610066 China The School of Information Science and Technology Southwest Jiaotong University Chengdu611756 China
Multi-target tracking in sensor networks is a challenging problem, especially in scenarios where sensor observations are limited. Conventional centralized Kalman filters and distributed Kalman filters (DKFs) require e... 详细信息
来源: 评论
distributed Caching Control Strategy in Mobile Edge computing: A Mean Field Game Approach  19
Distributed Caching Control Strategy in Mobile Edge Computin...
收藏 引用
19th Annual IEEE international conference on Sensing, Communication, and networking (IEEE SECON)
作者: Feng, Hao Guo, Songtao Chen, Chao Jiao, Xianlong Southwest Univ Sch Elect & Informat Engn Chongqing 400715 Peoples R China Chongqing Univ Coll Comp Sci Chongqing 400044 Peoples R China
Mobile edge computing (MEC) is a novel computing paradigm that sinks the computing capacity of cloud servers into edge nodes to reduce network latency. By caching the popular content at small base station (SBS) can re... 详细信息
来源: 评论
Smart Edge-based Fake News Detection using Pre-trained BERT Model  18
Smart Edge-based Fake News Detection using Pre-trained BERT ...
收藏 引用
18th international conference on Wireless and Mobile computing, networking and Communications (WiMob)
作者: Guo, Yuhang Lamaazi, Hanane Mizouni, Rabeb Khalifa Univ EECS Dept Elect Engn & Comp Sci Abu Dhabi U Arab Emirates Khalifa Univ Ctr Cyber Phys Syst EECS Dept Abu Dhabi U Arab Emirates
Today, online media applications are an important source of information. People are creating and sharing more information than ever before around the world. Being provided by unreliable sources, some news can be misle... 详细信息
来源: 评论
The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network  42
The Security Investigation of Ban Score and Misbehavior Trac...
收藏 引用
42nd IEEE international conference on distributed computing Systems (ICDCS)
作者: Fan, Wenjun Wuthier, Simeon Hong, Hsiang-Jen Zhou, Xiaobo Bai, Yan Chang, Sang-Yoon Xian Jiaotong Liverpool Univ Dept Commun & Networking Sch Adv Technol Suzhou 215123 Jiangsu Peoples R China Univ Colorado Comp Sci Dept Coll Engn & Appl Sci Colorado Springs CO 80918 USA Univ Washington Tacoma Sch Engn & Technol Tacoma WA 98402 USA Univ Colorado Colorado Springs CO 80907 USA
Bitcoin P2P networking is especially vulnerable to networking threats because it is permissionless and does not have the security protections based on the trust in identities, which enables the attackers to manipulate... 详细信息
来源: 评论
Information-Centric networking (ICN) Based Disaster Recovery and Business Continuity (DRBC) of Bangladesh
Information-Centric Networking (ICN) Based Disaster Recovery...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Mazumder, Kawser A. Abdallah, Eslam G. Department AB Canada
We are proposing an Information-Centric networking (ICN) technology-based solution for a Disaster Recovery Management System (DRMS) for a country such as Bangladesh where disasters happen almost annually. Bangladesh h... 详细信息
来源: 评论
Establishing a High-Performance and Productive Ecosystem for distributed Execution of Python Functions Using Globus Compute
Establishing a High-Performance and Productive Ecosystem for...
收藏 引用
2024 Workshops of the international conference for High Performance computing, networking, Storage and Analysis, SC Workshops 2024
作者: Ananthakrishnan, Rachana Babuji, Yadu Bryan, Josh Chard, Kyle Chard, Ryan Clifford, Ben Foster, Ian Gorenstein, Lev Kesling, Kevin Hunter Janidlo, Chris Katz, Daniel S. Mello, Reid Pauloski, J. Gregory Wang, Lei University of Chicago United States Argonne National Laboratory United States University of Illinois Urbana-Champaign United States
The research computing ecosystem is increasingly heterogeneous and diverse. Democratizing access to these essential resources is critical for accelerating research progress. However, the gap between a high-level workl... 详细信息
来源: 评论
Microgrid Recent Innovations & Uses  15
Microgrid Recent Innovations & Uses
收藏 引用
15th international conference on computing Communication and networking Technologies, ICCCNT 2024
作者: Kaushik, Neeraj Goswami, Shubhashis Sachan, Keerti Vijayalakshmi, V.J. Gajendran, P. Mishra, V.A. Tmu Department of Ece India Dev Bhoomi Uttarakhand University School of Engineering and Computer Uttarakhand India Iimt University School of computer science and application Meerut India Karpagam Academy of Higher Education Department of Electrical and Electronics Engineering Coimbatore India Karpagam College of Engineering Department of Electrical and Electronics Engineering Coimbatore India Vishwakarma Institute of Information Technology Computer Engg Pune India
Concerns about global warming brought on by increasing carbon dioxide levels in the environment have sped up technological development in the sustainable energy sector over the past few years. The advancement in scien... 详细信息
来源: 评论
Context-aware Community Detection in the Russia-Ukraine Conflict Network  24
Context-aware Community Detection in the Russia-Ukraine Conf...
收藏 引用
25th international conference on distributed computing and networking, ICDCN 2024
作者: Chakraborty, Amartya Pal, Deepamoy Mukherjee, Nandini St. Thomas' College of Engineering and Technology West Bengal Kolkata India Jadavpur University West Bengal Kolkata India
Community detection in online social networks is a challenging field of research. The involvement of context information in online user interactions enhances the challenge of effective community detection. The propose... 详细信息
来源: 评论