咨询与建议

限定检索结果

文献类型

  • 7,023 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,956 篇 工学
    • 3,404 篇 计算机科学与技术...
    • 1,565 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,053 篇 电气工程
    • 243 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 561 篇 管理学
    • 411 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 519 篇 理学
    • 316 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 65 篇 医学
    • 37 篇 基础医学(可授医学...
    • 33 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 22 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 231 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 180 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,085 篇 英文
  • 46 篇 中文
  • 38 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7167 条 记 录,以下是4991-5000 订阅
排序:
On Power Allocation for Alamouti STBC OFDM Systems with distributed Transmit Antennas in the Presence of Residual Frequency Offsets
On Power Allocation for Alamouti STBC OFDM Systems with Dist...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Ke Sun Shihai Shao Youxi Tang Yi Wang Jiayin Zhang National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology Chengdu China Corporate Research Department Huawei Technologies Company Limited Shanghai China
This paper proposes a transmit power allocation scheme for distributed transmit antenna Alamouti space-time block coded (STBC) orthogonal frequency division multiplexing (OFDM) systems using Cholesky decision-feedback... 详细信息
来源: 评论
A distributed Trust-based Reputation Model in P2P System
A Distributed Trust-based Reputation Model in P2P System
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributed computing (SNPD)
作者: Yu-mei Liu Shou-bao Yang Lei-tao Guo Wan-ming Chen Liang-min Guo Department of Computer Science and Technology University of Science and Technology China Department of Automation University of Science and Technology Hefei China
The P2P system is an anonymous and dynamic system, thus, some malicious behaviour can't be punished. In order to restrict the malicious behaviour in the P2P system, researchers have focused on establishing effecti... 详细信息
来源: 评论
Modeling for Facility Location Optimization of Spent Computers' Reverse Logistics
Modeling for Facility Location Optimization of Spent Compute...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Zhaohua Wang Jianhua Yin Sch. of Manage. & Econ. Beijing Inst. of Technol. Beijing Sch. of Bus. Univ. of Int. Bus. & Econ. Beijing
In spent computers reverse logistics, an important planning problem is the location optimization of landfills or treatment facilities for recovering/reusing used products or materials. Combining with the spent compute... 详细信息
来源: 评论
A Cloud Trust Evaluation System using Hierarchical Fuzzy Inference System for Service Selection
A Cloud Trust Evaluation System using Hierarchical Fuzzy Inf...
收藏 引用
IEEE international conference on Advanced Information networking and Applications
作者: Chenhao Qu Rajkumar Buyya The Cloud Computing and Distributed Systems (CLOUDS) Lab Department of Computing and Information Systems The University of Melbourne Australia
Cloud computing is an utility computing paradigm that allows users to flexibly acquire virtualized computing resources in a pay-as-you-go model. To realize the benefits of using cloud, users need to first select the s... 详细信息
来源: 评论
Best Position Algorithms for Top-k Query Processing in Highly distributed Environments
Best Position Algorithms for Top-k Query Processing in Highl...
收藏 引用
The First international conference on networking and distributed computing(第一届网络与分布式计算国际会议 ICNDC 2010)
作者: Qiming Fang Guangwen Yang Weimin Zheng Bo Wang Ying Zhao Tsinghua National Laboratory for Information Science and Technology Department of Computer Science a Tsinghua National Laboratory for Information Science and Technology Department of Computer Science a
Efficient top-* query processing in highly distributed environments is useful but challenging. This paper focuses on the problem over vertically partitioned data and aims to propose efficient algorithms with lower com... 详细信息
来源: 评论
Constructing Interest-Oriented Search Union of Web Servers based on P2P Overlay
Constructing Interest-Oriented Search Union of Web Servers b...
收藏 引用
international conference on Communications and networking in China (CHINACOM)
作者: Feng Hong Minglu Li Jiadi Yu Zhongwen Guo Department of Computer Science and Engineering Ocean University of China China Department of Computer Science and Engineering Shanghai Jiao Tong University China
We consider the problem of building Web information retrieval mechanism through distributed solution based on Peer-to-Peer technology. We describe a prototype system called IOSUW (Interest-Oriented Search Union of Web... 详细信息
来源: 评论
Performance issues of grid computing based on different architecture cluster computing platforms
Performance issues of grid computing based on different arch...
收藏 引用
international conference on Advanced Information networking and Applications (AINA)
作者: Hsun-Chang Chang Kuan-Ching Li Yaw-Ling Lin Chao-Tung Yang Hsiao-Hsi Wang Liang-Teh Lee Department of Computer Science and Information Management Providence University Taichung Taiwan Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan Department of Computer Science and Engineering Tatung University Taipei Taiwan
This research paper discusses performance issues of cluster and grid computing platforms, and reasons to support the implementation of these computing infrastructures. A number of benchmark programs are executed in th... 详细信息
来源: 评论
A distributed Bandwidth Reservation Protocol for QoS Routing in Mobile Ad Hoc Networks
A Distributed Bandwidth Reservation Protocol for QoS Routing...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Xiangli Wang Layuan Li Bencan Gong Wenbo Wang School of Computer Science and Technology Wuhan University of Technology Wuhan China School of Science Wuhan University of Science and Technology Wuhan China
The paper proposes a distributed bandwidth reservation protocol (DBRP) for QoS routing in ad hoc networks. The protocol adopts a TDMA-based model, derives from AODV, refers to the idea of three slot states (*** et al.... 详细信息
来源: 评论
A distributed Iterative Interference Alignment Scheme for K-User MIMO Interference Channel
A Distributed Iterative Interference Alignment Scheme for K-...
收藏 引用
international conference on Wireless Communications, networking and Mobile computing (WiCom)
作者: Ruixue Zhou Tiejun Lv Wei Long School of Information and Telecommunication Engineering Beijing University of Posts and Telecommunications Beijing China
In this paper, we propose an iterative interference alignment scheme to improve the sum rate performance of the K-user MIMO interference channel. We design the precoding matrices to minimize the leakage interference. ... 详细信息
来源: 评论
Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents
Trust Enhanced Security - A New Philosophy for Secure Collab...
收藏 引用
international conference on Collaborative computing: networking, Applications and Worksharing (CollaborateCom)
作者: Ching Lin Vijay Varadharajan Department of Computing Macquarie University NSW Australia
The mobile agent computing model violates some of the fundamental assumptions of conventional security techniques. Consequently, this has rendered many of the existing conventional security countermeasures less effect... 详细信息
来源: 评论