咨询与建议

限定检索结果

文献类型

  • 7,023 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,956 篇 工学
    • 3,404 篇 计算机科学与技术...
    • 1,565 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,053 篇 电气工程
    • 243 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 561 篇 管理学
    • 411 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 519 篇 理学
    • 316 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 65 篇 医学
    • 37 篇 基础医学(可授医学...
    • 33 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 22 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 180 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,085 篇 英文
  • 46 篇 中文
  • 38 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7167 条 记 录,以下是4881-4890 订阅
排序:
In search of perfect reads  4
In search of perfect reads
收藏 引用
4th IEEE international conference on Computational Advances in Bio and Medical Sciences (ICCABS)
作者: Pal, Soumitra Aluru, Srinivas Indian Inst Technol Dept Comp Sci & Engn Bombay 400076 Maharashtra India Georgia Inst Technol Sch Computat Sci & Engn Coll Comp Atlanta GA 30332 USA
Background: Continued advances in next generation short-read sequencing technologies are increasing throughput and read lengths, while driving down error rates. Taking advantage of the high coverage sampling used in m... 详细信息
来源: 评论
Embedded SW design issues for distributed applications on mobile terminals
Embedded SW design issues for distributed applications on mo...
收藏 引用
international conference on Mobile and Ubiquitous Systems: networking and Services (MobiQuitous)
作者: F. Fummi S. Martini G. Perbellini F. Ricciato M. Turolla Università di Verona Verona Italy Telecom Italia Laboratory Torino Italy Embedded Systems Design Center Verona Italy
Mobile terminals are embedded systems with growing elaboration capacity, even still limited, which are continuously connected to a worldwide communication network. Thus, the idea of embedding in mobile terminals remot... 详细信息
来源: 评论
Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings
Cryptanalysis and Improvement of a Certificateless Proxy Sig...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Rongbo Lu Dake He Changji Wang College of Mathematics and Computer Science Jishou University Jishou China Laboratory of Information Security and National Computer Gird Southwest Jiaotong University Chengdu China Department of Computer Science Sun Yat-sen University Guangzhou China
Due to avoiding the inherent escrow of identity- based cryptography and yet not requiring certificates to guarantee the authenticity of public keys, Li et al. proposed a certificateless proxy signature scheme from bil... 详细信息
来源: 评论
Emergency analysis based on affective computing in universities forum  5th
Emergency analysis based on affective computing in universit...
收藏 引用
5th international conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Lu Wu, Xu Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China School of Cyberspace Security BUPT Beijing100876 China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. The method det... 详细信息
来源: 评论
Fog computing as a defensive approach against distributed Denial of Service (DDoS): a proposed architecture
Fog Computing as a defensive approach against Distributed De...
收藏 引用
international conference on computing, Communication and networking Technologies
作者: Bhumika Paharia Kriti Bhushan Department of Computer Engineering National Institute of Technology Kurukshetra Haryana
Cloud computing is a long-established technique which deals with storage and processing of information. In cloud computing, any user is liable to pay and demand according to its particular needs. Due to various limita... 详细信息
来源: 评论
distributed, self-stabilizing placement of replicated resources in emerging networks
Distributed, self-stabilizing placement of replicated resour...
收藏 引用
international conference on Network Protocols
作者: Bong-Jun Ko D. Rubenstein Department of Electrical Engineering Columbia University NY USA
Emerging large scale distributed networking systems, such as P2P file sharing systems, sensor networks, and ad hoc wireless networks, require replication of content, functionality, or configuration to enact or optimiz... 详细信息
来源: 评论
Facility Location Optimization via Multi-Agent Robotic Systems
Facility Location Optimization via Multi-Agent Robotic Syste...
收藏 引用
IEEE international conference on networking, Sensing and Control
作者: Miad Moarref Hassan Sayyaadi Department of Mechanical Engineering Sharif University of Technology Tehran Iran
A facility location problem deals with locating the best place for a group of facilities, among distinct demand points, minimizing a certain locational optimization function. In this paper, distributed, asynchronous, ... 详细信息
来源: 评论
Dynamic fair bandwidth allocation in multiservice CDMA networks
Dynamic fair bandwidth allocation in multiservice CDMA netwo...
收藏 引用
international conference on distributed computing Systems Workshop
作者: Chengzhou Li S. Papavassiliou Broadband Mobile and Wireless Networking Laboratory New Jersey Center for Wireless Networking and Internet Security ECE Department New Jersey Institute of Technology Newark NJ USA
In this paper we study the fundamental problem of allocating with efficiency and fairness the available resources in a CDMA wireless system that supports multi-rate multimedia services. We propose the Channel Adaptive... 详细信息
来源: 评论
A Study on Test Platform for Verifying New Wireless networking Technologies via Hardware-in-Loop Simulation
A Study on Test Platform for Verifying New Wireless Networki...
收藏 引用
international conference on Cyber-Enabled distributed computing and Knowledge Discovery, CyberC
作者: Lijun Zu Ping Wang Jing Han Fuqiang Liu Qing Ai Yusheng Ji Broadband Wireless Communication and Multimedia Laboratory University of Tongji Shanghai China Graduate University for Advanced Study National Institute of Information Tokyo Japan
For designing a wireless network, field test is mostly preferred for researchers to test and evaluate the system performance. However, it is expensive for field constructions and thus it is not affordable for most res... 详细信息
来源: 评论
Incorporating a PMF-Based Injury Model into a Multi-Agent Representation of Crowd Behavior
Incorporating a PMF-Based Injury Model into a Multi-Agent Re...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Frederic D. McKenzie Herbie H. Piland Min Song Department of Electrical and Computer Engineering Virginia Modeling Analysis and Simulation Center (VMASC) Old Dominion University Norfolk VA USA Department of Electrical and Computer Engineering Virginia Modeling Analysis and Simulation Center (VMASC) Old Dominion University Norfolk VA
Throughout the years, much research has been conducted on human behavior models that focus on individual intelligent human agents. Fewer multi-agent based models have addressed group or crowd behavior from a psycholog... 详细信息
来源: 评论