咨询与建议

限定检索结果

文献类型

  • 7,022 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,954 篇 工学
    • 3,402 篇 计算机科学与技术...
    • 1,562 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,051 篇 电气工程
    • 241 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 91 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 560 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 517 篇 理学
    • 314 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 23 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,087 篇 英文
  • 47 篇 中文
  • 35 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7166 条 记 录,以下是4691-4700 订阅
排序:
Priority-Based Scheme for File Distribution in Peer-to-Peer Networks
Priority-Based Scheme for File Distribution in Peer-to-Peer ...
收藏 引用
IEEE international conference on Communications (ICC)
作者: M. E. Rivero-Angeles G. Rubino INRIA Rennes Bretagne Atlantique Rennes France
Peer-to-Peer (P2P) networks are distributed systems where no central authority rules the behavior of the individual peers. A typical application is the sharing of files of some class (movies, music, ...), our object o... 详细信息
来源: 评论
Dynamic computation of population protocols
Dynamic computation of population protocols
收藏 引用
international conference on Telecommunications (ICT)
作者: Marin Bertier Yann Busnel Anne-Marie Kermarrec IRISA / INSA Rennes Universitaire de Beaulieu France LINA University of Nantes Nantes France INRIA Rennes Bretagne Atlantique France
Population protocols provide theoretical foundations for mobile tiny device networks in which global behavior emerges from a set of simple interactions between anonymous agents. The works in this area mostly focus on ... 详细信息
来源: 评论
ICT BONE views on the Network of the Future: The role of Optical networking
ICT BONE views on the Network of the Future: The role of Opt...
收藏 引用
international conference on Transparent Optical Networks
作者: Christina Politi Anna Tzanakaki Michael O'Mahony Kostas Katrinis Peter Van Daele Mario Pickavet Dimitra Simeonidou Alexandros Stavdas Gerald Franzl John Mitchell Piero Castoldi Salvatore Spadaro Franco Callegatti Periklis Petropoulos Kyriakos Vlachos Achille Pattavina Department of Telecommunications Science and Technology University of Peloponnese Tripoli Greece Athens Information Technology Center Athens Greece University of Essex UK IBBT Ghent University Belgium University of Technology Vienna Vienna Austria Department of Electronic and Electrical Engineering University College London London UK Scuola Superiore Sant'' Anna Pisa Italy Universitat Poliltècnica de Catalunya Barcelona Spain DEIS University of Bologna Cesena Italy Optoelectronics Research Centre University of Southampton Southampton UK Computer Engineering and Informatics Department & Research Academic Computer Technology Institute University of Patras Rio Greece Department of Electronics and Information Politecnico di Milano Italy
Part of the activities of the ICT EU Network of Excellence "Building the future Optical Network in Europe" (BONE) project is the development of the European Roadmap on Optical networking in the context of th... 详细信息
来源: 评论
Special Section: Scalable information systems
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE international JOURNAL OF GRID computing THEORY METHODS AND APPLICATIONS 2009年 第1期25卷 51-52页
作者: Lee, Wang-Chien Xu, Jianliang Li, Jianzhong Silvestri, Fabrizio Penn State Univ State Coll PA 16801 USA Hong Kong Baptist Univ Hong Kong Hong Kong Peoples R China Harbin Inst Technol Harbin Peoples R China
As data and knowledge volumes keep increasing, and global means for information dissemination continues to diversify, new methods, modeling paradigms and structures are needed to efficiently support the mounting scala... 详细信息
来源: 评论
An Opportunistic Routing Protocol for Underground Wireless Sensor Networks
An Opportunistic Routing Protocol for Underground Wireless S...
收藏 引用
3rd international Workshop on e-Activity (IWEA2009)/10th ACIS international conference on Software Engineering Artificial Intelligence, networking and Parallel/distributed computing
作者: Joe, Inwhee Kim, Dongik Hanyang Univ Dept Elect & Comp Engn Seoul 133791 South Korea
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is dif... 详细信息
来源: 评论
An Approach to the Development of Inference Engine for distributed System for Fault Diagnosis
An Approach to the Development of Inference Engine for Distr...
收藏 引用
3rd international Workshop on e-Activity (IWEA2009)/10th ACIS international conference on Software Engineering Artificial Intelligence, networking and Parallel/distributed computing
作者: Prasad, Vinod B. Bradley Univ Peoria IL 61625 USA
The reliable and fault tolerant computers are key to the success to aerospace, and communication industries. Designing a reliable digital system, and detecting and repairing the faults are challenging tasks in order f... 详细信息
来源: 评论
A True Concurrent Process Calculus and Its Conflict Bisimulation
A True Concurrent Process Calculus and Its Conflict Bisimula...
收藏 引用
3rd international Workshop on e-Activity (IWEA2009)/10th ACIS international conference on Software Engineering Artificial Intelligence, networking and Parallel/distributed computing
作者: Cao, Zining Nanjing Univ Aero & Astro Dept Comp Sci & Technol Nanjing 210016 Peoples R China
In this paper we present a true concurrency variant of pi-calculus. This calculus can describe the simultaneous execution of several atomic actions and the true concurrent execution of several processes. An important ... 详细信息
来源: 评论
Analysis of VAN-Core System Architecture - A Case Study of Applying the ATAM
Analysis of VAN-Core System Architecture - A Case Study of A...
收藏 引用
3rd international Workshop on e-Activity (IWEA2009)/10th ACIS international conference on Software Engineering Artificial Intelligence, networking and Parallel/distributed computing
作者: Lee, Jihyun Kang, Sungwon Chun, Hyungchul Park, Byungnyun Lim, Choonbong Korea Adv Inst Sci & Technol Coll Informat Sci & Technol Masters Tower 1501533 Dowhadong Seoul South Korea Crossent Seoul South Korea
The Architecture Tradeoff Analysis Method (ATAM) is an architecture evaluation technique for analyzing risks, tradeoffs, and sensitivity points of architectures. In this paper we describe an experience of evaluating a... 详细信息
来源: 评论
Nominative Proxy Ring Signature
Nominative Proxy Ring Signature
收藏 引用
3rd international Workshop on e-Activity (IWEA2009)/10th ACIS international conference on Software Engineering Artificial Intelligence, networking and Parallel/distributed computing
作者: Hu, Chengyu Liu, Pengtao Zhang, Guoyan Shandong Univ Sch Comp Sci & Technol Jinan 250100 Peoples R China Shandong Univ Polit Sci & Law Inst Informat Sci & Technol Jian Jiangxi Peoples R China Shandong Univ Sch Control Sci & Engn Jinan Peoples R China
In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. The member of the ring can generate a nominative signature on behalf of the origin... 详细信息
来源: 评论
A Novel Approach to Find Patterns of Supplier
A Novel Approach to Find Patterns of Supplier
收藏 引用
3rd international Workshop on e-Activity (IWEA2009)/10th ACIS international conference on Software Engineering Artificial Intelligence, networking and Parallel/distributed computing
作者: Xu, Xu Lin, Jie Tongji Univ Sch Econ & Management Shanghai 200092 Peoples R China
Supplier selection and evaluation are one of the most critical activities of a company in today's competitive business world. Partnering with the suppliers has become a key factor to the success of an organization... 详细信息
来源: 评论