咨询与建议

限定检索结果

文献类型

  • 7,021 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,954 篇 工学
    • 3,402 篇 计算机科学与技术...
    • 1,562 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,051 篇 电气工程
    • 241 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 91 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 560 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 517 篇 理学
    • 314 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 23 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,086 篇 英文
  • 47 篇 中文
  • 35 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7165 条 记 录,以下是4811-4820 订阅
排序:
Message from the conference and Workshop Chairs
Message from the Conference and Workshop Chairs
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
Presents the welcome message from the conference proceedings.
来源: 评论
international Program Committee
International Program Committee
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
Provides a listing of current committee members.
来源: 评论
A framework for constructing peer-to-peer overlay networks in java  09
A framework for constructing peer-to-peer overlay networks i...
收藏 引用
7th international conference on Principles and Practice of Programming in Java, PPPJ 2009
作者: Rui, Shen Ji, Wang Shengdong, Zhang Siqi, Shen Pei, Fan National Laboratory for Parallel and Distributed Processing Changsha 410073 China School of Computing University of Leeds Leeds LS2 9JT United Kingdom
Peer-to-peer emerges as a better way for building applications on the Internet that require high scalability and availability. Peer-to-peer systems are usually organized into structured overlay networks, which provide... 详细信息
来源: 评论
Flexible Layered Multicasting Method for Multipoint Video conference in Heterogeneous Access Environment
收藏 引用
10th international Work-conference on Artificial Neural Networks (IWANN 2009)
作者: Tode, Hideki Uchida, Kanako Murakami, Koso Osaka Prefecture Univ Dept Comp Sci & Intelligent Syst Osaka Japan Osaka Univ Department of Information Networking Suita Osaka 565 Japan
In multipoint real-time communication, one member needs to transmit information to all of the other members. However, there are some problems in real-time multicasting. Because the network resource of each member is d... 详细信息
来源: 评论
Smart Spaces and Next Generation Wired/Wireless networking - 9th international conference, NEW2AN 2009 and Second conference on Smart Spaces, ruSMART 2009, Proceedings
Smart Spaces and Next Generation Wired/Wireless Networking -...
收藏 引用
9th international conference on Next Generation Wired/Wireless networking, NEW2AN 2009 and 2nd conference on Smart Spaces, ruSMART 2009
The proceedings contain 33 papers. The topics discussed include: extending context spaces theory by predicting run-time context;cross-domain interoperability: a case study;a topology based approach for context-awarene...
来源: 评论
Sensitivity Analysis on Bio-op Errors in DNA computing
Sensitivity Analysis on Bio-op Errors in DNA Computing
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Daniel Bilar Department of Computer Science University of New Orleans USA
We simulate the biological operations of a DNA computational algorithm for a combinatorial problem. We then perform sensitivity analysis in which we vary bio-op error rates to see which bio-ops affect the end result. ... 详细信息
来源: 评论
THE DESIGN OF ARCHITECTURE, WORKFLOW, ALGORITHM ON GRID SYSTEM FOR SOCIAL NETWORK CONTEXT PREDICTION ANALYSIS
THE DESIGN OF ARCHITECTURE, WORKFLOW, ALGORITHM ON GRID SYST...
收藏 引用
IEEE international conference on Network Infrastructure and Digital Content
作者: Chen, Ping Qiao, Xiuquan Liu, Zhen Tian, Xiaoping Beijing Normal Univ Ctr Informat & Network Technol Beijing 100875 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
In Telecom Social Network, the Context-based Prediction Analysis is an important topic, and computing of some context parameters using great amount of data is a problem so far. Architecture of DMG ( Data Mining Grid i... 详细信息
来源: 评论
THE PARALLEL ALGORITHM OF CLIQUE AND IT'S APPLICATION ON DATA MINING GRID SYSTEM
THE PARALLEL ALGORITHM OF CLIQUE AND IT'S APPLICATION ON DAT...
收藏 引用
IEEE international conference on Network Infrastructure and Digital Content
作者: Chen, Ping Liu, Zhen Qiao, Xiuquan Tian, Xiaoping Beijing Normal Univ Ctr Informat & Network Technol Beijing 100875 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
computing of some parameters using great amount of data is a great challenge in data mining fields so far. DMG (Data Mining Grid) is designed to solve the computing problem. The design of the workflow service in DMG a... 详细信息
来源: 评论
Demonstration of distributed TDMA MAC protocol implementation with OLSR on linux enriched WARP
Demonstration of distributed TDMA MAC protocol implementatio...
收藏 引用
4th ACM international Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization, WiNTECH'09, Co-located with the Mobile computing and networking conference, MobiCom'09
作者: Tuomivaara, Hannu Raustia, Matti Jokinen, Markku Centre for Wireless Communications University of Oulu Erkki Koiso-Kanttila Street 3 90570 Oulu Finland
In this demo we present software extension for the Wireless open Access Research Platform (WARP), named as Linux Enriched WARP (LE-WARP). The objective of the LE-WARP is twofold. First, to make the WARP more independe... 详细信息
来源: 评论
2009 1st international conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009
2009 1st International Conference on Computational Intellige...
收藏 引用
2009 1st international conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009
The proceedings contain 91 papers. The topics discussed include: experimental analysis of different metrics (object-oriented and structural) of software;discrete cosine transformation based image authentication and se...
来源: 评论