咨询与建议

限定检索结果

文献类型

  • 7,022 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,954 篇 工学
    • 3,402 篇 计算机科学与技术...
    • 1,562 篇 信息与通信工程
    • 1,421 篇 软件工程
    • 1,051 篇 电气工程
    • 241 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 91 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 52 篇 机械工程
    • 35 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 31 篇 生物医学工程(可授...
    • 30 篇 交通运输工程
  • 560 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 517 篇 理学
    • 314 篇 数学
    • 94 篇 物理学
    • 73 篇 生物学
    • 71 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 23 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 cloud computing
  • 361 篇 artificial intel...
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 210 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 88 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,087 篇 英文
  • 47 篇 中文
  • 35 篇 其他
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7166 条 记 录,以下是961-970 订阅
排序:
Detection of A Novel Dual Attack in Named Data networking
Detection of A Novel Dual Attack in Named Data Networking
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Liang Liu Silin Peng College of Safety Science and Engineering Civil Aviation University of China Tianjin China College of Electronic Information and Automation Civil Aviation University of China Tianjin China
distributed Denial of Service (DDoS) attacks in Named Data networking (NDN), such as Cache Pollution Attacks (CPA) and Improved Collusive Interest Flooding Attacks (I-CIFA), can significantly threaten the NDN network.... 详细信息
来源: 评论
Efficient Diabetes Detection using Hybrid Machine Learning Model
Efficient Diabetes Detection using Hybrid Machine Learning M...
收藏 引用
distributed Systems, Computer Networks and Cybersecurity (ICDSCNC), international conference on
作者: A S Gowri P Jose Karthik S M S Berlin Shaheema K M Karuppasway R. Balamurugan Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department for Applied Research The Gandhigram Rural Institute (Deemed to be University) Gandhigram India Department of Artificial Intelligence and Data Science Stella Mary’s College of Engineering Azhikal India Department of Mathematics and Statistics Bharath Institute of Higher Education and Research Chennai India Department of Information Technology DMI College of Engineering Chennai India
Diabetes is a metabolic disease that affects a large number of the global population and is incurable. The primary causes of death symptoms are kidney failure, heart attacks, strokes, and blindness. In this paper Prin... 详细信息
来源: 评论
Curse of Feature Selection: a Comparison Experiment of DDoS Detection Using Classification Techniques
Curse of Feature Selection: a Comparison Experiment of DDoS ...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Wenjia Wang Seyed Masoud Sadjadi Naphtali Rishe Knight Foundation School of Computing and Information Sciences Florida International University Miami USA
distributed denial-of-service (DDoS) attack is a malicious cybersecurity attack that has become a global threat. Machine learning (ML) as an advanced technology has been proven to be an effective way against DDoS atta... 详细信息
来源: 评论
Pallas: Optimizing Userspace TCP Stack for Short-Lived Connections
Pallas: Optimizing Userspace TCP Stack for Short-Lived Conne...
收藏 引用
international conference on Parallel and distributed Systems (ICPADS)
作者: Haiqiang Lin Wenxin Li Wenyu Qu Tianjin Key Laboratory of Advanced Networking (TANK) College of Intelligence and Computing Tianjin University China
Short-lived TCP connections are important for modern Internet applications and call for efficient network stack support. Traditional Linux TCP stack is inefficient because of the inherent kernel overheads like context... 详细信息
来源: 评论
Optimizing distributed Denial of Service (DDoS) Attack Detection Techniques on Software Defined Network (SDN) Using Feature Selection
Optimizing Distributed Denial of Service (DDoS) Attack Detec...
收藏 引用
Innovations in Computer Science & Software Engineering (ICONICS), international conference on
作者: Inamul Haq Salman A. Khan Nazeeruddin Mohammad Ali Zaman College of Computing and Info. Sciences Karachi Institute of Economics and Technology Karachi Pakistan Cyber security center Prince Mohammad bin Fahd University Al-Khobar Saudi Arabia Computer Science Department Shaheed Zulfiqar Ali Bhutto University Karachi Pakistan
distributed denial of service (DDoS) attacks refer to a category of cyber attacks in which an attacker attempts to overwhelm a resource, such as a server, destination, or bandwidth through various means. This is usual... 详细信息
来源: 评论
Approaching Solutions to Blockchain Security Trilemma and Consensus Mechanisms
Approaching Solutions to Blockchain Security Trilemma and Co...
收藏 引用
Advances in computing, Communication Control and networking (ICAC3N), international conference on
作者: Dipanshu Parashar Madhav Sharma Vishnu Sharma Prama Nand CSE Department GCET Greater Noida School of Engg. &Tech. Sharda University Greater Noida India
Blockchains have been referred to as revolutions that will enable the processing of data and transactions to move from a centralized party to a high-trust decentralized network of different verifying nodes. This paper... 详细信息
来源: 评论
Utilization of Augmented Reality Technology in Campus Promotion Using the Marker Based Tracking Method
Utilization of Augmented Reality Technology in Campus Promot...
收藏 引用
international conference on Informatics and computing (ICIC)
作者: Heny Pratiwi Muhammad Ibnu Sa’Ad Oktadius Giantoro STMIK Widya Cipta Dharma Information System Samarinda Indonesia
This study aims to develop an Augmented Reality (AR) application as a more attractive and interactive promotional media for the STMIK Widya Cipta Dharma campus. By utilizing AR technology, it is hoped that information... 详细信息
来源: 评论
Implementation of Hyperparameter Tuning Random Forest Algorithm in Machine Learning for SDN Security: An Innovative Exploration of DDoS Attack Detection
Implementation of Hyperparameter Tuning Random Forest Algori...
收藏 引用
Artificial Intelligence, Blockchain, Cloud computing, and Data Analytics (ICoABCD), international conference on
作者: Hijrah Nisya Sofia Naning Hertiana Yudha Purwanto School of Electrical Engineering Telkom University Bandung Indonesia
Software Defined Network (SDN) represents a novel approach to network programming for the design, construction, and administration of computer networks. This approach entails the separation of the control plane from t... 详细信息
来源: 评论
Welcome Message from ICDCN 2022 conference Chairs
ACM International Conference Proceeding Series
收藏 引用
ACM international conference Proceeding Series 2022年 III页
作者: Singh, Pushpendra Wattenhofer, Roger Wu, Jie IIIT Delhi India ETH Zurich Switzerland Temple University United States
来源: 评论
From Federated Learning to Quantum Federated Learning for Space-Air-Ground Integrated Networks
From Federated Learning to Quantum Federated Learning for Sp...
收藏 引用
IEEE conference on Standards for Communications and networking (CSCN)
作者: Vu Khanh Quy Nguyen Minh Quy Tran Thi Hoai Shaba Shaon Md Raihan Uddin Tien Nguyen Dinh C. Nguyen Aryan Kaushik Periklis Chatzimisios Faculty of Information Technology Hung Yen University of Technology and Education Hungyen Vietnam College of Sciences and Engineering University of Tasmania Sandy Bay Hobart TAS Australia Department of Electrical and Computer Engineering University of Alabama in Huntsville USA Department of Electrical and Electronics Engineering Lac Hong University Vietnam Department of Computing & Mathematics Manchester Metropolitan University UK International Hellenic University Thessaloniki Greece University of New Mexico Albuquerque USA
6G wireless networks are expected to provide seamless and data-based connections that cover space-air-ground and underwater networks. As a core partition of future 6G networks, Space-Air-Ground Integrated Networks (SA... 详细信息
来源: 评论