咨询与建议

限定检索结果

文献类型

  • 7,021 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,954 篇 工学
    • 3,402 篇 计算机科学与技术...
    • 1,562 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,051 篇 电气工程
    • 241 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 91 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 560 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 517 篇 理学
    • 314 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 23 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,086 篇 英文
  • 47 篇 中文
  • 35 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7165 条 记 录,以下是4851-4860 订阅
排序:
Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks
Self-Adaptable and Intrusion Tolerant Certificate Authority ...
收藏 引用
international conference on Advanced Information networking and Applications (AINA)
作者: Fernando Carlos Pereira Joni da Silva Fraga Ricardo Felipe Custódio Departamento de Automacçãoe Sistemas Universidade Federal de Santa Catarina Brazil Laboratório de Seguranc-a em Computação Universidade Federal de Santa Catarina Brazil
Dynamic distributed systems like peer-to-peer systems, overlay networks and mobile ad hoc networks must execute their applications using distributed resources and in a decentralized way. The structure (composition and... 详细信息
来源: 评论
A Fully distributed P2P Communications Architecture for Network Virtual Environments
A Fully Distributed P2P Communications Architecture for Netw...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Yan Wang ZhaoKui Li Weijia Zhang College of Computer Science Shenyang AeroSpace University Shenyang China College of Resources and Environment North China University of Water Resources and Electric Power Zhengzhou China
distributed Network Virtual Environments (NVEs) are becoming more and more popular in today's computing and communications. The scalability of NVEs is an important problem, and faces many challenges. Voronoi-based... 详细信息
来源: 评论
Attack-resistant techniques in P2P reputation systems
Attack-resistant techniques in P2P reputation systems
收藏 引用
international conference on networking and Digital Society, ICNDS
作者: Xiaoning Jiang Lingxiao Ye Information and Electronic Engineering Institute Zhejiang Gongshang University Hangzhou China
The success of a reputation system depends on accurately calculated reputations that predict the quality of future interactions. In the peer-to-peer (P2P) networks, the scores are distributed by each peer locally or m... 详细信息
来源: 评论
Increasing Awareness in Collaborative Authoring through Edit Profiling
Increasing Awareness in Collaborative Authoring through Edit...
收藏 引用
international conference on Collaborative computing: networking, Applications and Worksharing (CollaborateCom)
作者: S. Papadopoulou C. Ignat G. Oster M. Norrie Department of Computer Science ETH Zurich Switzerland
Awareness of the activities of other users and also document evolution is an important part of collaborative authoring. We introduce the concept of an editing profile that can be used to maintain and visualise measure... 详细信息
来源: 评论
An investigation of network support for grid middleware and applications
An investigation of network support for grid middleware and ...
收藏 引用
international conference on Information, Communications and Signal Processing
作者: Y.F. Wong C.Y. Wong L.H. Ngoh W.C. Wong Computer Center National University of Singapore Singapore Institute for Infocomm Research Singapore
Owing to the rapidly growing interests and excitement in distributed computing and grid-enabled applications, the facilitating middleware layer has become a center of attention in recent years. At the same time, rapid... 详细信息
来源: 评论
Operator placement for efficient distributed complex event processing in MANETs
Operator placement for efficient distributed complex event p...
收藏 引用
IEEE international conference on Wireless and Mobile computing, networking And Communications (WiMob)
作者: Fabrice Starks Thomas Peter Plagemann Department of Informatics University of Oslo Oslo Norway
Complex Event Processing (CEP) and Mobile Adhoc networks (MANETs) are two technologies that can be used to enable monitoring applications for Emergency and Rescue missions (ER). MANETs are characterized by energy limi... 详细信息
来源: 评论
Request distribution with pre-learning for distributed SSL reverse proxies
Request distribution with pre-learning for distributed SSL r...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Haitao Dong Jun Yang Yiqiang Sheng Key Laboratory of Noise and Vibration Research Institute of Acoustics Chinese Academy of Sciences Beijing China National Network New Media Engineering Research Center Chinese Academy of Sciences Beijing China
As network data security becoming more and more universalized, distributed Secure Sockets Layer (SSL) reverse proxies are often used in Web systems to offload CPU exhausting SSL operations from Web servers and improve... 详细信息
来源: 评论
Data Structures for Routing Table of the distributed Key-Value Store Based on Order Preserving Linear Hashing and Skip Graph with the Load Balancing Method
Data Structures for Routing Table of the Distributed Key-Val...
收藏 引用
Summer Virtual conference on Software Engineering, Artificial Intelligence, networking and Parallel/distributed computing (SNPD-Summer), ACIS international
作者: Ken Higuchi Ami Miyazaki Kenya Hasegawa Tatsuo Tsuji Center for Data Science and Artificial Intelligence University of Fukui Fkui Japan School of Engineering University of Fukui Fkui Japan
In this paper, data structures for reducing redundancy of routing information on the distributed key-value store based on order preserving linear hashing and Skip Graph with the load balancing method are proposed and ... 详细信息
来源: 评论
How to survive and thrive in a private bittorrent community
How to survive and thrive in a private bittorrent community
收藏 引用
14th international conference on distributed computing and networking, ICDCN 2013
作者: Jia, Adele Lu Chen, Xiaowei Chu, Xiaowen Pouwelse, Johan A. Epema, Dick H. J. Department of Computer Science Delft University of Technology Netherlands Department of Computer Science Hong Kong Baptist University Hong Kong
Many private BitTorrent communities employ Sharing Ratio Enforcement (SRE) schemes to incentivize users to contribute. It has been demonstrated that communities that adopt SRE are greatly oversupplied, i.e., they have... 详细信息
来源: 评论
Session: distributed computing and networking 3
Session: Distributed computing and networking 3
收藏 引用
IEEE international conference on Intelligent Computer Communication and Processing (ICCP)
Start of the above-titled section of the conference proceedings record.
来源: 评论