咨询与建议

限定检索结果

文献类型

  • 7,023 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,956 篇 工学
    • 3,404 篇 计算机科学与技术...
    • 1,565 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,053 篇 电气工程
    • 243 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 561 篇 管理学
    • 411 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 519 篇 理学
    • 316 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 65 篇 医学
    • 37 篇 基础医学(可授医学...
    • 33 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 22 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 180 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,085 篇 英文
  • 46 篇 中文
  • 38 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7167 条 记 录,以下是4971-4980 订阅
排序:
Energy-aware task allocation over MANETs
Energy-aware task allocation over MANETs
收藏 引用
IEEE international conference on Wireless and Mobile computing, networking And Communications (WiMob)
作者: W. Alsalih S. Akl H. Hassanein School of Computing Queen's University Kingston ONT Canada
Since the emergence of mobile computing, reducing energy consumption of battery-operated computing devices has become a very active research area. The widespread popularity of mobile computing devices, such as laptops... 详细信息
来源: 评论
An Approach to Middleware Specialization for Cyber Physical Systems
An Approach to Middleware Specialization for Cyber Physical ...
收藏 引用
international conference on distributed computing Systems Workshop
作者: Akshay Dabholkar Aniruddha Gokhale Department of EECS Vanderbilt University Nashville TN USA
Contemporary computing infrastructure, such as networking stacks, OS and middleware, are made up of layers of software functionality that have evolved over decades to support the broadest range of *** feature-richness... 详细信息
来源: 评论
DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication
DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: M. Amir Moulavi Jalal A. Nasiri Behnam Bahmani Hossein Parvar M. Sadeghizadeh Mahmoud Naghibzadeh Networking Department Information Technology Services (ITS) Center Ferdowsi University of Mashhad Iran Computer Engineering Department Ferdowsi University of Mashhad Iran Computer Engineering Department Islamic Azad University Firoozkooh Iran Department of Computer Engineering Islamic Azad University of Mashhad Iran
Confidentiality is one of the most nontrivial issues in secrecy of group communication. In order to satisfy confidentiality, symmetric cryptography must be exploited. All symmetric algorithms require a shared key betw... 详细信息
来源: 评论
Lightweight distributed Method for Connectivity-based Clustering Based on Schelling's Model
Lightweight Distributed Method for Connectivity-based Cluste...
收藏 引用
international conference on Advanced Information networking and Applications Workshops (AINAW)
作者: Sho Tsugawa Hiroyuki Ohsaki Makoto Imase Graduate School of Information Science and Technology Osaka University Suita Osaka Japan
In the literature, there exist connectivity-based distributed clustering methods called CDC (Connectivity-based distributed node Clustering scheme) and SDC (SCM-based distributed Clustering). CDC and SDC have mechanis... 详细信息
来源: 评论
Efficient and Customizable Top-k Query on Named Data networking
Efficient and Customizable Top-k Query on Named Data Network...
收藏 引用
IEEE international Symposium on Parallel and distributed Processing with Applications and IEEE international conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Zhuhua Liao Zengde Teng Jian Zhang Yizhi Liu Jianxun Liu College of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
Offering a flexible paradigm for efficient data discovery is a crucial requirement in large information-centric networks. However, a major hindrance to query data in multicast networks is the uncertain sources and cro... 详细信息
来源: 评论
A lightweight inter-user interference mitigation method in Body Sensor Networks
A lightweight inter-user interference mitigation method in B...
收藏 引用
IEEE international conference on Wireless and Mobile computing, networking And Communications (WiMob)
作者: Wen Sun Yu Ge Wai-Choong Wong Department of Electrical and Computer Engineering National University of Singapore Singapore Networking Protocols Department Institute for Infocomm Research Singapore
Body Sensor Networks (BSNs) enable continuous and remote health monitoring in medical applications. Inter-user interference is the major cause that deteriorates the reliable data transmission in BSNs when multiple BSN... 详细信息
来源: 评论
The Application of EVT-Copula in Operational Risk Quantification
The Application of EVT-Copula in Operational Risk Quantifica...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Liqin Hu Hongfeng Peng Economics & Management School Wuhan University Wuhan China Economics& Management School Wuhan UniversityWuhan China
As the operational risk of Chinese banks becomes increasingly outstanding, we need urgently to find out a accurate measurement method. This article takes one commercial bank as an example, analyses the tails' char... 详细信息
来源: 评论
distributed Task Scheduling in Heterogeneous Fog Networks: A Matching with Externalities Method
Distributed Task Scheduling in Heterogeneous Fog Networks: A...
收藏 引用
international conference on computing, networking and Communications (ICNC)
作者: Zening Liu Kunlun Wang Ming-Tuo Zhou Ziyu Shao Yang Yang SHIFT School of Information Science and Technology ShanghaiTech University Shanghai China
Fog computing shows great potential advantages over legacy cloud computing in terms of latency and efficiency. While it also poses huge challenges in task scheduling and resource allocation, which are key to reap the ...
来源: 评论
Key Space of Cryptosystem Based on Chebyshev Polynomials over Finite Field
Key Space of Cryptosystem Based on Chebyshev Polynomials ove...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Zhihui Li Yidong Cui Yuehui Jin Huimin Xu Beijing University of Posts and Telecommunications Beijing Beijing CN Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications China School of Information and Communication Engineering Beijing University of Posts and Telecommunications China
A recently proposed public key cryptosystem based on Chebyshev polynomials suggests a new approach to data encryption. The sequence of Chebyshev polynomial is proved to be periodically, but its symmetry properties hav... 详细信息
来源: 评论
Applicability analysis of grid security mechanisms on cloud networking
Applicability analysis of grid security mechanisms on cloud ...
收藏 引用
international conference on Cloud and Service computing (CSC)
作者: Rasib Hassan Khan Miika Komu Tuomas Aura Department of Computer Science and Engineering School of Science and Technology Aalto University Finland
Grid computing has been around for quite a while. It facilitates utilization of distributed resources and has been extremely popular in its implementation. Grids have evolved enough to secure their operational archite... 详细信息
来源: 评论