咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,411 篇 计算机科学与技术...
    • 1,568 篇 信息与通信工程
    • 1,424 篇 软件工程
    • 1,051 篇 电气工程
    • 245 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 95 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 32 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 24 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 artificial intel...
  • 362 篇 cloud computing
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是4481-4490 订阅
排序:
BIONETS Economics and Business Simulation: An Alternative Approach to Quantifying the Added Value for distributed Mobile Communications and Exchanges
BIONETS Economics and Business Simulation: An Alternative Ap...
收藏 引用
4th international conference on Bio-Inspired Models of Network, Information, and computing Systems
作者: Elaluf-Calderwood, Silvia Dini, Paolo Univ London London Sch Econ & Polit Sci Dept Media & Commun London WC2A 2AE England
This article presents current research work on the development of BEBS (BIONETS Economic and Business Simulation Model). This model is used to illustrate how in pervasive agent-based networks dynamic agents engage in ... 详细信息
来源: 评论
Metadata partitioning for large-scale distributed storage systems
Metadata partitioning for large-scale distributed storage sy...
收藏 引用
3rd IEEE international conference on Cloud computing, CLOUD 2010
作者: Wu, Jan-Jan Liu, Pangfeng Chung, Yi-Chien Institute of Information Science Research Center for Information Technology Innovation Academia Sinica Taipei Taiwan Department of Computer Science and Information Engineering Graduate Institute of Networking and Multimedia National Taiwan University Taipei Taiwan
With the emergence of large-scale storage systems that separate metadata management from file read/write operations, and with requests targetting metadata account for over 80% of the total number of I/O requests, meta... 详细信息
来源: 评论
Proc. 2010 ACM Workshop on Wireless of the Students, by the Students, for the Students, S3 '10, Co-located with MobiCom'10 and 11th ACM Int. Symp. on Mobile Ad Hoc networking and computing, MobiHoc'10
Proc. 2010 ACM Workshop on Wireless of the Students, by the ...
收藏 引用
2010 ACM Workshop on Wireless of the Students, by the Students, for the Students, S3 '10
The proceedings contain 15 papers. The topics discussed include: optimal forwarding strategies for the relay channel under average delay constraints;from centralized to distributed sensor localization;SoftCast: clean-...
来源: 评论
A Dynamic, distributed, Hierarchical Load Balancing for HLA-Based Simulations on Large-Scale Environments
A Dynamic, Distributed, Hierarchical Load Balancing for HLA-...
收藏 引用
16th international Euro-Par conference on Parallel Processing
作者: De Grande, Robson Eduardo Boukerche, Azzedine Univ Ottawa Sch Informat Technol & Engn Ottawa ON K1N 6N5 Canada
The dynamic management of load in large-scale distributed systems is essential for the performance of simulations due to the influence that computing capacity and work load have on execution time. The High Level Archi... 详细信息
来源: 评论
distributed context-aware affinity propagation clustering in Wireless Sensor Networks
Distributed context-aware affinity propagation clustering in...
收藏 引用
作者: ElGammal, Mahmoud Eltoweissy, Mohamed Bradley Department of Electrical and Computer Engineering Virginia Tech. United States Cyber Security Research Pacific Northwest National Laboratory United States
We foresee the need for dynamically clustering nodes in Wireless Sensor Networks (WSNs) according to a multitude of disparate co-existing contexts. To this end, we propose a distributed, low-overhead context-aware clu... 详细信息
来源: 评论
An agent execution control method for content-based information retrieval with time constraints
An agent execution control method for content-based informat...
收藏 引用
IASTED international conference on Parallel and distributed computing and Systems, PDCS 2010
作者: Narishige, Atsushi Hara, Yusuke Kinoshita, Kazuhiko Murakami, Koso Yamai, Nariyoshi Department of Information Networking Graduate School of Information Science and Technology Osaka University 1-5 Yamadaoka Suita Osaka 565-0871 Japan Center for Information Technology and Management Okayama University 3-2-2 Tsushimanaka Kitaku Okayama 700-8530 Japan
Networks have gotten bigger recently, and users have a more difficult time finding the information that they want. The use of mobile agents to help users effectively retrieve information has garnered a lot of attentio... 详细信息
来源: 评论
A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling
A comparison study of collaborative strategies for distribut...
收藏 引用
作者: Chen, Hao Chen, Yu Dept. of Electrical and Computer Engineering SUNY - Binghamton Binghamton NY 13902 United States
The prosperity of the Internet has made it attractive to hackers and malicious attackers. Internet worms have become one type of major threats to the network infrastructure. distributed defense collaborating with sing... 详细信息
来源: 评论
Cryptanalysis and improvement of the Lee-Lee identity-based key agreement protocol
Cryptanalysis and improvement of the Lee-Lee identity-based ...
收藏 引用
2010 2nd IEEE international conference on Information Management and Engineering, ICIME 2010
作者: Liu, Shuangqing Wang, Shengbao Wang, Qizhen Liu, Huan Shen, Jiajun Computing Center New Star Research Institute of Applied Technology 451 Huangshan Road Hefei 230031 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Authenticated key agreement protocols are essential for secure communications in open and distributed environments. The protocol design is, however, extremely errorprone due to the inherent complexity of this problem....
来源: 评论
Ensuring ePortfolio data remains personal in next generation distributed and open computing applications
Ensuring ePortfolio data remains personal in next generation...
收藏 引用
作者: Kirkham, Thomas Winfield, Sandra Wood, Stuart Coolin, Kirstie Smallwood, Angela Reul, Quentin Centre for International EPortfolio Development University of Nottingham Nottingham NG72RD United Kingdom STARLab. Vrije Universiteit Brussel Building G10 Pleinlaan 2 B-1050 Brussels Belgium
Personal data privacy and security is a concern for users and legislators alike. The use of data in social networking and applications that aggregate often personal data in a variety of contexts is expanding. Users ne... 详细信息
来源: 评论
Group management in P2P networks
Group management in P2P networks
收藏 引用
2010 19th international conference on Computer Communications and Networks, ICCCN 2010
作者: Elser, Benedikt Groh, Georg Fuhrmann, Thomas Institut für Informatik Technischen Universität München Germany
Groups are both, a social phenomenon inherent to the human nature and a widely used structure in distributed systems. Recently, the Web 2.0 trend has begun to unite both aspects. Social networks provide their users wi... 详细信息
来源: 评论