咨询与建议

限定检索结果

文献类型

  • 7,021 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,954 篇 工学
    • 3,402 篇 计算机科学与技术...
    • 1,562 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,051 篇 电气工程
    • 241 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 91 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 560 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 517 篇 理学
    • 314 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 23 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,086 篇 英文
  • 47 篇 中文
  • 35 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7165 条 记 录,以下是4951-4960 订阅
排序:
A Protocol for Secure Electronic Remote Voting
A Protocol for Secure Electronic Remote Voting
收藏 引用
international conference on Network and Service Security, N2S
作者: Edoardo Biagioni Yingfei Dong W. Wesley Peterson Kazuo Sugihara University of Hawai Manoa USA
We have developed distributed, Voter Verified, Secret Ballot Voting (DVVSB), a potentially remote voting system that allows a voter to directly verify that their votes are in the final database of tallied votes. DVVSB... 详细信息
来源: 评论
Research on VRML Modeling for Web-Based Virtual Product Development
Research on VRML Modeling for Web-Based Virtual Product Deve...
收藏 引用
international conference on networking and Digital Society, ICNDS
作者: Haopeng Wang Kai Zhao Bing Liu Binru Chen Dept. of Comput. Aviation Univ. of Air Force Changchun Chinese Academy of Sciences
In this paper, we present the methods to develop the Web-based virtual product that is capable to dynamically simulate machine processes in solid graphics form through the Internet. The methods include the function-ba... 详细信息
来源: 评论
A Hybrid Load Balancing Strategy of Sequential Tasks for Computational Grids
A Hybrid Load Balancing Strategy of Sequential Tasks for Com...
收藏 引用
international conference on networking and Digital Society, ICNDS
作者: Yajun Li Yuhang Yang Rongbo Zhu Electronic Engineering Department Shanghai Jiaotong University Shanghai China College of Computer Science South Central University of Nationalities Wuhan China
Load balancing is crucial to computational grids. Based on the typeof information on which corresponding decisions are made, load balancing approaches can be generally categorized into two classes: average-based and i... 详细信息
来源: 评论
Domain Specific Languages (DSLs) for Network Protocols (Position Paper)
Domain Specific Languages (DSLs) for Network Protocols (Posi...
收藏 引用
international conference on distributed computing Systems Workshop
作者: Saleem Bhatti Edwin Brady Kevin Hammond James McKinna School of Computer Science University of Saint Andrews Saint Andrews UK ICIS/Grondslagen Radboud University Nijmegen Netherlands
Next generation network architectures will benefit from the many years of practical experience that have been gained in designing, using and operating network protocols. Over time, the networking community has gradual... 详细信息
来源: 评论
Survivability in Existing ATM-Based Mesh Networks
Survivability in Existing ATM-Based Mesh Networks
收藏 引用
international conference on Advanced Information networking and Applications (AINA)
作者: Isaac Woungang Guangyan Ma Mieso K. Denko Alireza Sadeghian Sudip Misra Alexander Ferworn Department of Computer Science Ryerson University Toronto ONT Canada Department of Computing and Information Science University of Guelph Guelph ONT Canada School of Information Technology Indian Institute of Technology Kharagpur West Bengal India
This paper addresses the survivability in existing ATM mesh networks with the goal to (1) compare the network survivability for link and path restorations, (2) to determine the effect of spare capacity distribution sc... 详细信息
来源: 评论
A Geometric Routing Protocol in Disruption Tolerant Network
A Geometric Routing Protocol in Disruption Tolerant Network
收藏 引用
international conference on distributed computing Systems Workshop
作者: Jingzhe Du Evangelos Kranakis Amiya Nayak School of Computer Science Carleton University Ottawa Canada School of Information Technology and Engineering University of Ottawa Ottawa Canada
We describe a novel geometric localized routing (GLR) protocol in disruption (delay) tolerant network (DTN). Although DTNs do not guarantee the connectivity of the network all the time, geometric location information ... 详细信息
来源: 评论
Achieving Energy Conservation, Coverage and Connectivity Requirements in Wireless Sensor Networks
Achieving Energy Conservation, Coverage and Connectivity Req...
收藏 引用
international conference on distributed computing Systems Workshop
作者: Li Liu Bin Hu Huifang Miao Hao Li Lian Li Qinglin Zhao School of Information Science and Engineering Lanzhou University Lanzhou Gansu China LRI Universite Paris-Sud and CNRS Orsay France Department of Computing Birmingham City University UK Department of Communication Engineering Xiamen University Xiamen Fujian China
Energy conservation, coverage and connectivity are three critical application requirements in wireless sensor networks. Related researches have either concerned coverage, connectivity, and energy conservation separate... 详细信息
来源: 评论
Delay-dependent Robust Stability for uncertain Neutral System with Discrete and distributed Delays
Delay-dependent Robust Stability for uncertain Neutral Syste...
收藏 引用
The First international conference on Multimedia Information networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Diankun Wang Department of Science and Information Qingdao Agricultural University QingDao ChengYang P.R.China 266109
A class of new model transformation and a corresponding Lyapunov-Krasovskii function is introduced to solve the stability problem of uncertain neutral system with Discrete and distributed Delays. By using the theory o... 详细信息
来源: 评论
Data Currency in Replicated distributed Storage System
Data Currency in Replicated Distributed Storage System
收藏 引用
international conference on networking, Architecture, and Storage (NAS)
作者: Bingheng Yan Depei Qian Yuanqiang Huang School of Electronics and Information Engineering Xi''an Jiaotong University Xi'an China School of Computer Science and Engineering Beihang University Beijing China
Application-level storage aggregation provides a massive storage capacity with high scalability and low cost. However, these systems usually only support their special sites, which ignores the legacy storage systems. ... 详细信息
来源: 评论
A Credibility-Based Congestion Control Method
A Credibility-Based Congestion Control Method
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Shu-juan Wang Man-gui Liang Institute of Information Science Beijing Jiaotong University Beijing China
A novel congestion control method works at the network layer, which is credibility-based and under supervision is proposed. The method supposes that network elements are all well-reputed, which means that most of them... 详细信息
来源: 评论