咨询与建议

限定检索结果

文献类型

  • 7,021 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,954 篇 工学
    • 3,402 篇 计算机科学与技术...
    • 1,562 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,051 篇 电气工程
    • 241 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 91 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 560 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 517 篇 理学
    • 314 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 23 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,086 篇 英文
  • 47 篇 中文
  • 35 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7165 条 记 录,以下是4861-4870 订阅
排序:
Serial distributed Detection Performance Analysis in Wireless Sensor Networks under Noisy Channel
Serial Distributed Detection Performance Analysis in Wireles...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Liping Yin Ying Wang Dian-wu Yue College of Information Science and Technology Dalian Maritime University Dalian China National Mobile Communications Research Laboratory Southeast University Nanjing Nanjing China
In this paper, we consider the performance of serial distributed detection in wireless sensor networks (WSNs) under the assumption that the local decisions made by sensors are transmitted over noisy channels. Differen... 详细信息
来源: 评论
Manipulating Clocks in Timed Automata Using PVS
Manipulating Clocks in Timed Automata Using PVS
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Qingguo Xu Huaikou Miao School of Computer Engineering and Science Shanghai University Shanghai China
Clock is an important notion in TA (Timed automata). In order to manipulate clock easily and conveniently in TA, a mechanized system called FVofTA (formal verification of timed automata) for specifying and reasoning a... 详细信息
来源: 评论
Applying the Grounded Theory Method to Derive Enterprise System Requirements
Applying the Grounded Theory Method to Derive Enterprise Sys...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Suranjan Chakraborty Josh Dehlinger Department of Computer and Information Sciences Towson University Towson MD USA
Enterprise architectures (EA) embody the business objectives, processes and information technology infrastructure reflecting the desired incorporation and standardization requirements of a company's operating mode... 详细信息
来源: 评论
Comparison of vPMM and BPMM
Comparison of vPMM and BPMM
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Jihyun Lee Sungwon Kang Danhyung Lee Yu-Whoan Ahn Andrew Boknam Park College of Information Science and Technology KAIST South Korea HANDYPMG Corporation Seoul South Korea
A business process maturity model provides standards and measures to organizations in assessing, defining and improving business processes, thereby guiding them to achieving business goals and values. We developed a b... 详细信息
来源: 评论
A distributed Routing Algorithm Based on the Reliable Path
A Distributed Routing Algorithm Based on the Reliable Path
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Zan Ma Zhen Xu Liyang Rui BUAA School of Electronic information Engineering Beijing China
In this paper we present a distributed routing algorithm based on the reliable path to improve the efficiency of routing protocols in ad hoc network. This protocol takes advantage of the graphical information, velocit... 详细信息
来源: 评论
Research of the Image Segmentation Based on Ant Colony Algorithm
Research of the Image Segmentation Based on Ant Colony Algor...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Yan Zhe Han-ming Gu China University of Geosciences Wuhan Hubei CN Institute of Geophysics and Geomatics China University of Geosciences Wuhan China
Ant colony algorithm, based on behavior of real ants, is a natural approach to establish from their nest to food source. An ant moves randomly and detects a previously laid pheromone on a path in order to find the sho... 详细信息
来源: 评论
A Comparative Analysis of Enterprise Architecture Frameworks Based on EA Quality Attributes
A Comparative Analysis of Enterprise Architecture Frameworks...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Namkyu Lim Tae-gong Lee Sang-gun Park Department of Network Centric Warfare Ajou University Suwon South Korea Graduate School of Information and Communication Technology Ajou University Suwon South Korea
Many Enterprise Architecture Frameworks (EAFs) are in use today to guide or serve as a model for the enterprise architecture development. Researchers offer general comparative information about EAF. However, there has... 详细信息
来源: 评论
A distributed Environment Approach for the GPS Radio Occultation Analysis
A Distributed Environment Approach for the GPS Radio Occulta...
收藏 引用
international conference on networking and Services (ICNS)
作者: O. Terzo L. Mossucca P. Ruiu M. Molinaro R. Notarpietro M. Cucca S. Stigliano Istituto Superiore Mario Boella Torino Italy Politecnico di Torino Torino Italy INNOVA Consorzio per lInformatica e la Telematica Matera Italy
In this paper we describe this new scenario for the radio occultation data processing, which is based to the use of distributed system architecture. In particular, we describe our approach based on using a grid comput... 详细信息
来源: 评论
A Model for the Transmission of Multimedia Data Flow Based on the Use of Shared Memory Mechanism
A Model for the Transmission of Multimedia Data Flow Based o...
收藏 引用
international conference on Advanced Information networking and Applications Workshops (AINAW)
作者: André Gustavo P. da Silva Adilson B. Lopes Felipe A.P. Pinto Carlos Eduardo da Silva DI-Natal UERN DIMAp UFRN Brazil DIMAp UFRN Computing Laboratory University of Kent
The communication between multimedia components located on the same physical machine, but in different address space, uses mechanisms designed for distributed environments. The present paper proposes an inter-componen... 详细信息
来源: 评论
Secure Route Selection Based on Trust Territories for Ad Hoc Networks
Secure Route Selection Based on Trust Territories for Ad Hoc...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Zhongying Bai Yuan Bai School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Beijing China Liaoning University of Technology Jinzhou Liaoning China
Secure route selection is always a challenge for ad hoc networks. The paper applies trust theory into routing procedure in ad hoc networks and takes trust territories as one of routing metrics. Trust territories conta... 详细信息
来源: 评论