咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,413 篇 计算机科学与技术...
    • 1,567 篇 信息与通信工程
    • 1,427 篇 软件工程
    • 1,051 篇 电气工程
    • 241 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 33 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 565 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 25 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 362 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是4361-4370 订阅
排序:
Design and Implementation of the Earthquake Precursor Network Running Monitoring Software based on C/S Structure
Design and Implementation of the Earthquake Precursor Networ...
收藏 引用
6th international conference on Wireless Communications, networking and Mobile computing (WICOM)
作者: Wang Jianguo Su Meiyan Zhao Guomin Liu Chungui Zhang Mingdong Wang Dahong Gao Xun Earthquake Adm Tianjin Municipal Tianjin 300201 Peoples R China Guilin Seism Stat Guilin Peoples R China Datong Univ Dept Comp Sci Datong Peoples R China
first, we introduce the design principles of the function of Tianjin earthquake precursor network running monitoring software;second, we have developed the software by using the precursor instrument communication tech... 详细信息
来源: 评论
Intentional networking: Opportunistic Exploitation of Mobile Network Diversity  10
Intentional Networking: Opportunistic Exploitation of Mobile...
收藏 引用
16th Annual international conference on Mobile computing and networking / 11th ACM international Symposium on Mobile Ad Hoc networking and computing (MobiCom/MobiHoc)
作者: Higgins, Brett D. Reda, Azarias Alperovich, Timur Flinn, Jason Giuli, T. J. Noble, Brian Watson, David Univ Michigan Ann Arbor MI 48109 USA Ford Motor Co Dearborn MI 48121 USA
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional networking, a simple but powerful mech... 详细信息
来源: 评论
Reactive Service Location in IEEE WAVE
Reactive Service Location in IEEE WAVE
收藏 引用
6th Annual IEEE international conference on Wireless and Mobile computing, networking and Communications (WiMob)/STMWC/NASSUE/CMPA/VECON/AWSAN/AWSAN
作者: Cruz, Andry B. Boutaleb, Tuleen Huan Nguyen Tianfield, Huaglory Glasgow Caledonian Univ Dept Commun Network & Elect Engn Sch Engn & Comp Glasgow G4 0BA Lanark Scotland
The IEEE Wireless Access in Vehicular Environments (WAVE) family of standards is the leading worldwide standardisation effort in terms of Dedicated Short Range Communications (DSRC). WAVE aims at defining a common set... 详细信息
来源: 评论
Optimizing distributed computing Workflows in Heterogeneous Network Environments
Optimizing Distributed Computing Workflows in Heterogeneous ...
收藏 引用
11th international conference on distributed computing and networking
作者: Gu, Yi Wu, Qishi Univ Memphis Dept Comp Sci Memphis TN 38152 USA
Next-generation computation-intensive applications in various science and engineering fields feature large-scale computing workflows. Supporting such computing workflows and optimizing their network performance in ter... 详细信息
来源: 评论
DisClus: A distributed Clustering Technique over High Resolution Satellite Data
DisClus: A Distributed Clustering Technique over High Resolu...
收藏 引用
11th international conference on distributed computing and networking
作者: Sarmah, Sauravjyoti Bhattacharyya, Dhruba Kumar Tezpur Univ Dept Comp Sc & Engg Napaam 784028 India
This paper Presents a distributed Grid-Density based Satellite data Clustering technique, DisClus(1), which can detect clusters of arbitrary shapes and sizes over high resolution, multi-spectral satellite datasets. Qu... 详细信息
来源: 评论
Energy Efficient Information-Driven Target Location Estimation in Wireless Sensor Networks
Energy Efficient Information-Driven Target Location Estimati...
收藏 引用
6th international conference on Wireless Communications, networking and Mobile computing (WICOM)
作者: Khonsari, Hossein Kahaei, Mohammad Hossein Iran Univ Sci & Technol Dept Elect Engn Tehran Iran
This paper describes a technique to save energy in the distributed Information_Driven maximum likelihood algorithm used for the localization of a diffusive source in Wireless Sensor Networks. First, the accurate Infor... 详细信息
来源: 评论
distributed PCI assignment in LTE based on consultation mechanism
Distributed PCI assignment in LTE based on consultation mech...
收藏 引用
6th international conference on Wireless Communications, networking and Mobile computing (WICOM)
作者: Liu, Yanguang Li, Wenjing Zhang, Heng Yu, Likun Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100088 Peoples R China
Physical Cell Identity (PCI) is cell identifier on the physical layer which can be used to create synchronization signals. There is a mapping between synchronization signals and physical cell identity, and then User E... 详细信息
来源: 评论
Throughput Estimation for Singleton Video Streaming Application over Wireless Sensor Network
Throughput Estimation for Singleton Video Streaming Applicat...
收藏 引用
6th international conference on Wireless Communications, networking and Mobile computing (WICOM)
作者: Guo, S. Little, T. D. C. Boston Univ Dept ECE Boston MA 02215 USA
Recent advances in wireless communications technology and low-power, low-cost CMOS imaging sensors enable a new sensing modality employing ubiquitous distributed video sensing. In many video sensing applications multi... 详细信息
来源: 评论
Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks
Mobility-assisted Detection of the Replication Attacks in Mo...
收藏 引用
6th Annual IEEE international conference on Wireless and Mobile computing, networking and Communications (WiMob)/STMWC/NASSUE/CMPA/VECON/AWSAN/AWSAN
作者: Deng, Xiaoming Xiong, Yan Chen, Depin Univ Sci & Technol China Sch Comp Sci Hefei 230026 Peoples R China
Wireless sensor networks are often deployed in harsh environments, where the adversary is able to capture certain sensors. Once a sensor is compromised, the adversary can easily replicate it and deploy several replica... 详细信息
来源: 评论
Challenges for Cloud networking Security
Challenges for Cloud Networking Security
收藏 引用
2nd international ICST conference on Mobile Networks and Management (NONAMI)
作者: Schoo, Peter Fusenig, Volker Souza, Victor Melo, Marcio Murray, Paul Debar, Herve Medhioub, Houssem Zeghlache, Djamal Fraunhofer Inst Secure Informat Technol SIT Garching Germany Ericsson Res Stockholm Sweden Portugal Telecom Inovaco Aveiro Portugal HP Labs Bristol Avon England Telecom SudParis Inst Telecom Paris France
Cloud computing is widely considered as an attractive service model since the users commitments for investment and operations are minimised, and costs are in direct relation to usage and demand. However, when networki... 详细信息
来源: 评论