咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,411 篇 计算机科学与技术...
    • 1,568 篇 信息与通信工程
    • 1,424 篇 软件工程
    • 1,051 篇 电气工程
    • 245 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 95 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 32 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 24 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 artificial intel...
  • 362 篇 cloud computing
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是901-910 订阅
排序:
Deep Learning/PUF-based Item Identification for Supply Chain Management in a distributed Ledger Framework
Deep Learning/PUF-based Item Identification for Supply Chain...
收藏 引用
Blockchain computing and Applications (BCCA), international conference on
作者: Carmelo Felicetti Antonella Guzzo Giuseppe Manco Francesco Pasqua Ettore Ritacco Antonino Rullo Domenico Saccà Department of Informatics Modelling Electronics and Systems (DIMES) University of Calabria Rende Italy Institute for High Performance Computing and Networking National Research Council (ICAR-CNR) Rende Italy Open Knowledge Technologies (OKT) Relatech Group Rende Italy Computer Science Department University of Udine Udine Italy
Item identification is an important issue in modern supply chains where product items are traced by means of electronic tags that, despite the advantages they bring in terms of automation, are still subject to counter...
来源: 评论
Chord Protocol: distributed Hash Table for Peer-to-Peer networking
Chord Protocol: Distributed Hash Table for Peer-to-Peer Netw...
收藏 引用
international conference on Contemporary computing and Informatics (IC3I)
作者: Arpit Rawat Amit Gupta Richa Gupta Computer Science and Engineering Graphic Era Hill University Dehradun Uttarakhand India Computer Science and Engineering Graphic Era deemed to be University Dehradun Uttarakhand India
Chord DHT (distributed Hash Table) is a robust solution to a basic problem encountered in peer-to-peer (P2P) applications: efficiently locating the node that stores specific data items. In this paper, we perform a com... 详细信息
来源: 评论
User-centric distributed Route Planning in Smart Cities based on Multi-objective Optimization  7
User-centric Distributed Route Planning in Smart Cities base...
收藏 引用
7th IEEE international conference on Smart computing (SMARTCOMP)
作者: Tiausas, Francis Talusan, Jose Paolo Ishimaki, Yu Yamana, Hayato Yamaguchi, Hirozumi Bhattacharjee, Shameek Dubey, Abhishek Yasumoto, Keiichi Das, Sajal K. NAIST Nara Japan Waseda Univ Tokyo Japan Osaka Univ Osaka Japan Western Michigan Univ Kalamazoo MI 49008 USA Vanderbilt Univ 221 Kirkland Hall Nashville TN 37235 USA Missouri Univ Sci & Technol Rolla MO 65409 USA
The realization of edge-based cyber-physical systems (CPS) poses important challenges in terms of performance, robustness, security, etc. This paper examines a novel approach to providing a user-centric adaptive route... 详细信息
来源: 评论
Efficient Large Scale Reverse-time Migration Imaging Computation based on distributed Spark Cluster with GPUs
Efficient Large Scale Reverse-time Migration Imaging Computa...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Suhui Wangzhang Ruizhang Yang Rong Gu Bo Li Dingjin Liu Zhaokang Wang State Key Laboratory for Novel Software Technology Nanjing University China Sinopec Geophysical Research Institute China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China
The reverse-time migration (RTM) imaging algorithm, which is used for complex underground structure analysis, is known as one of the current mainstream method of high-precision seismic imaging. Nowadays, as the fast d...
来源: 评论
Extending TWJ for Triangles Detection in Large Graphs
Extending TWJ for Triangles Detection in Large Graphs
收藏 引用
international conference on Embedded & distributed Systems (EDiS)
作者: Sarah Balbouzi Lougmiri Zekri Kheira Mechach Department of computer science Ahmed Ben Bella Oran1 University Oran Algeria
In light of social networks' expansion and the ever-increasing number of subscribers who daily sign up to them. Detecting and counting triangles of subscribers in these networks are the basis of community detectio... 详细信息
来源: 评论
Weather Prediction from Historical Data using Big Data Technologies
Weather Prediction from Historical Data using Big Data Techn...
收藏 引用
IoT Based Control Networks and Intelligent Systems (ICICNIS), international conference on
作者: Shaurya Choudha Aniruddh Singh Aman Kumar Gouthaman. P Department of Networking and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur India
Weather forecasting is an important function in a variety of activities such as agriculture, environment monitoring, and disaster management among others. Today with the development of technology, vast amounts of mete... 详细信息
来源: 评论
Dynamic Clustering and Power Control for Two-Tier Over-the-Air Federated Learning
Dynamic Clustering and Power Control for Two-Tier Over-the-A...
收藏 引用
IEEE/CIC international conference on Communications in China (ICCC)
作者: Guo, Wei Huang, Chuan Qin, Xiaoqi Yan, Lian Zhang, Wei Chinese Univ Hong Kong Sch Sci & Engn SSE Shenzhen 518172 Peoples R China Chinese Univ Hong Kong Future Network Intelligence Inst FNii Shenzhen 518172 Peoples R China Peng Cheng Lab Shenzhen 518006 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Univ Elect Sci & Technol China Informat & Commun Engn Coll Chengdu 611731 Peoples R China Univ New South Wales Sch Elect Engn & Telecommun Sydney NSW 2052 Australia
Federated learning (FL) has been recognized as a promising distributed learning paradigm to support intelligent applications at the wireless edge. However, direct computing based on the information from the devices ma... 详细信息
来源: 评论
Parallel Implementation of SHA256 on Multizone Heterogeneous Systems
Parallel Implementation of SHA256 on Multizone Heterogeneous...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Yongtao Luo Jie Liu Tiaojie Xiao Chunye Gong Science and Technology on Parallel and Distributed Processing Laboratory Laboratory of Digitizing program for Frontier Equipment National University of Defense Technology Changsha China National Supercomputer Center in Tianjin Tianjin China
SHA-256 plays an important role in widely used applications, such as data security, data integrity, digital signatures, and cryptocurrencies. However, most of the current optimized implementations of SHA-256 are based...
来源: 评论
distributed Task Offloading based on Multi-Agent Deep Reinforcement Learning  17
Distributed Task Offloading based on Multi-Agent Deep Reinfo...
收藏 引用
17th IEEE international conference on Mobility, Sensing and networking (MSN)
作者: Hu, Shucheng Ren, Tao Niu, Jianwei Hu, Zheyuan Xing, Guoliang Beihang Univ Sch Comp Sci & Engn State Key Lab Virtual Real Technol & Syst Beijing 100191 Peoples R China Beihang Univ Hangzhou Innovat Inst Hangzhou 310051 Peoples R China Zhengzhou Univ Res Inst Ind Technol Sch Informat Engn Zhengzhou 450001 Peoples R China Chinese Univ Hong Kong Dept Informat Engn Hong Kong Peoples R China
Recent years have witnessed the increasing popularity of mobile applications, e.g., virtual reality, unmanned driving, which are generally computation-intensive and latency-sensitive, posing a major challenge for reso... 详细信息
来源: 评论
Teaching Toy Car to Self-drive in a Game Environment using Reinforcement Learning
Teaching Toy Car to Self-drive in a Game Environment using R...
收藏 引用
Advances in computing, Communication Control and networking (ICAC3N), international conference on
作者: Purna Jain Saumya Tiwari Saud Hashmi Gaurav Sharma Department of Computer Science Engineering Medi-Caps University Indore India
This research paper explores the use of reinforcement learning (RL) to teach a toy car to self-drive in a game environment. The study focuses on the development of an RL-based algorithm that enables the toy car to lea... 详细信息
来源: 评论