咨询与建议

限定检索结果

文献类型

  • 7,036 篇 会议
  • 92 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,966 篇 工学
    • 3,411 篇 计算机科学与技术...
    • 1,568 篇 信息与通信工程
    • 1,424 篇 软件工程
    • 1,051 篇 电气工程
    • 245 篇 控制科学与工程
    • 123 篇 电子科学与技术(可...
    • 95 篇 网络空间安全
    • 78 篇 动力工程及工程热...
    • 74 篇 仪器科学与技术
    • 64 篇 生物工程
    • 54 篇 机械工程
    • 37 篇 安全科学与工程
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 测绘科学与技术
    • 32 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
  • 566 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 520 篇 理学
    • 314 篇 数学
    • 95 篇 物理学
    • 74 篇 生物学
    • 73 篇 系统科学
    • 66 篇 统计学(可授理学、...
  • 100 篇 法学
    • 52 篇 社会学
    • 49 篇 法学
  • 63 篇 医学
    • 37 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 42 篇 经济学
    • 41 篇 应用经济学
  • 26 篇 文学
  • 24 篇 教育学
  • 12 篇 农学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 1,159 篇 distributed comp...
  • 419 篇 software enginee...
  • 363 篇 artificial intel...
  • 362 篇 cloud computing
  • 312 篇 computer archite...
  • 306 篇 computer network...
  • 274 篇 social networkin...
  • 270 篇 protocols
  • 247 篇 computer science
  • 232 篇 computational mo...
  • 221 篇 wireless sensor ...
  • 211 篇 scalability
  • 205 篇 peer to peer com...
  • 204 篇 resource managem...
  • 195 篇 routing
  • 190 篇 bandwidth
  • 189 篇 servers
  • 188 篇 application soft...
  • 181 篇 distributed data...
  • 166 篇 grid computing

机构

  • 110 篇 beijing univ pos...
  • 90 篇 state key labora...
  • 12 篇 department of co...
  • 11 篇 college of compu...
  • 10 篇 tsinghua univers...
  • 10 篇 poznan supercomp...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 beijing universi...
  • 9 篇 inria
  • 9 篇 beijing universi...
  • 9 篇 research institu...
  • 9 篇 rissho universit...
  • 9 篇 tsinghua univ pe...
  • 9 篇 institute of net...
  • 9 篇 school of cyber ...
  • 9 篇 institute of com...
  • 8 篇 georgia inst tec...
  • 8 篇 department of co...
  • 8 篇 institute of net...

作者

  • 25 篇 yang yang
  • 16 篇 huang lican
  • 16 篇 lican huang
  • 14 篇 wehrle klaus
  • 13 篇 gao zhipeng
  • 12 篇 dustdar schahram
  • 12 篇 buyya rajkumar
  • 12 篇 rothermel kurt
  • 11 篇 duerr frank
  • 11 篇 wu jan-jan
  • 11 篇 rajkumar buyya
  • 11 篇 wang wei
  • 11 篇 liu pangfeng
  • 11 篇 teruhisa hochin
  • 11 篇 qi qi
  • 10 篇 ming chen
  • 10 篇 hoefler torsten
  • 10 篇 m. takizawa
  • 10 篇 cheng shiduan
  • 10 篇 schahram dustdar

语言

  • 7,055 篇 英文
  • 81 篇 其他
  • 47 篇 中文
检索条件"任意字段=International Conference on Networking and Distributed Computing"
7180 条 记 录,以下是981-990 订阅
排序:
Approaching Solutions to Blockchain Security Trilemma and Consensus Mechanisms
Approaching Solutions to Blockchain Security Trilemma and Co...
收藏 引用
Advances in computing, Communication Control and networking (ICAC3N), international conference on
作者: Dipanshu Parashar Madhav Sharma Vishnu Sharma Prama Nand CSE Department GCET Greater Noida School of Engg. &Tech. Sharda University Greater Noida India
Blockchains have been referred to as revolutions that will enable the processing of data and transactions to move from a centralized party to a high-trust decentralized network of different verifying nodes. This paper... 详细信息
来源: 评论
Implementation of Hyperparameter Tuning Random Forest Algorithm in Machine Learning for SDN Security: An Innovative Exploration of DDoS Attack Detection
Implementation of Hyperparameter Tuning Random Forest Algori...
收藏 引用
Artificial Intelligence, Blockchain, Cloud computing, and Data Analytics (ICoABCD), international conference on
作者: Hijrah Nisya Sofia Naning Hertiana Yudha Purwanto School of Electrical Engineering Telkom University Bandung Indonesia
Software Defined Network (SDN) represents a novel approach to network programming for the design, construction, and administration of computer networks. This approach entails the separation of the control plane from t... 详细信息
来源: 评论
Utilization of Augmented Reality Technology in Campus Promotion Using the Marker Based Tracking Method
Utilization of Augmented Reality Technology in Campus Promot...
收藏 引用
international conference on Informatics and computing (ICIC)
作者: Heny Pratiwi Muhammad Ibnu Sa’Ad Oktadius Giantoro STMIK Widya Cipta Dharma Information System Samarinda Indonesia
This study aims to develop an Augmented Reality (AR) application as a more attractive and interactive promotional media for the STMIK Widya Cipta Dharma campus. By utilizing AR technology, it is hoped that information... 详细信息
来源: 评论
Welcome Message from ICDCN 2022 conference Chairs
ACM International Conference Proceeding Series
收藏 引用
ACM international conference Proceeding Series 2022年 III页
作者: Singh, Pushpendra Wattenhofer, Roger Wu, Jie IIIT Delhi India ETH Zurich Switzerland Temple University United States
来源: 评论
From Federated Learning to Quantum Federated Learning for Space-Air-Ground Integrated Networks
From Federated Learning to Quantum Federated Learning for Sp...
收藏 引用
IEEE conference on Standards for Communications and networking (CSCN)
作者: Vu Khanh Quy Nguyen Minh Quy Tran Thi Hoai Shaba Shaon Md Raihan Uddin Tien Nguyen Dinh C. Nguyen Aryan Kaushik Periklis Chatzimisios Faculty of Information Technology Hung Yen University of Technology and Education Hungyen Vietnam College of Sciences and Engineering University of Tasmania Sandy Bay Hobart TAS Australia Department of Electrical and Computer Engineering University of Alabama in Huntsville USA Department of Electrical and Electronics Engineering Lac Hong University Vietnam Department of Computing & Mathematics Manchester Metropolitan University UK International Hellenic University Thessaloniki Greece University of New Mexico Albuquerque USA
6G wireless networks are expected to provide seamless and data-based connections that cover space-air-ground and underwater networks. As a core partition of future 6G networks, Space-Air-Ground Integrated Networks (SA... 详细信息
来源: 评论
STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network
STGCN-Based Link Flooding Attack Detection and Mitigation in...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yue Li Runcheng Fang Qipeng Song Xilei Yang School of Cyber Engineering Xidian University Xi’an China
Link Flooding Attacks (LFA) are increasingly challenging the availability and stability of Software-Defined Networks (SDN), leveraging their distributed and covert nature to escape detection. Existing methods such as ... 详细信息
来源: 评论
Enhanced Feature Selection for Superior Ensemble DDoS Detection in Software-Defined Networks
Enhanced Feature Selection for Superior Ensemble DDoS Detect...
收藏 引用
Future Machine Learning and Data Science (FMLDS), IEEE international conference on
作者: Abdussalam Ahmed Alashhab Aisha Edrah Maythem K. Abbas Mohamed Alashhab Mohamed Alngib Muhammad Yunis Daha Department of Computer Science Faculty of Information Technology Alasmarya Islamic University Zliten Libya Department of Electrical and Computer Engineering Faculty of Engineering Western University London Canada Asia Pacific University of Technology and Innovation School of Computing Kuala Lumpur Malaysia Faculty of Management and Information Technology Universiti Sultan Azlan Shah Kuala Kangsar Malaysia School of Engineering Ulster University Belfast United Kingdom
distributed Denial-of-Service (DDoS) attacks disrupt networks by flooding systems with traffic from multiple sources, making real-time detection essential. Integrating Machine Learning (ML) with Software-Defined Netwo... 详细信息
来源: 评论
METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN  19
METER: An Ensemble DWT-based Method for Identifying Low-rate...
收藏 引用
19th IEEE international conference on Embedded and Ubiquitous computing (EUC)
作者: Wang, Cong Cui, Yunhe Qian, Qing Shen, Guowei Gao, Hongfeng Li, Saifei Guizhou Univ Sch Comp Sci & Technol Guizhou Prov Key Lab Publ Big Data Guiyang Peoples R China GuiZhou Univ Finance & Econ Sch Informat Guiyang Peoples R China Southwest Jiaotong Univ Sch Informat Sci & Technol Chengdu Peoples R China
As one of the next generation of network architectures, Software-Defined networking (SDN) decouples the forwarding and control function of the traditional network device. However, it also faces new threats from networ... 详细信息
来源: 评论
CTS Sketch: A Sketch Scheme for Precise Identification of Top-k Flows Combined with SDN
CTS Sketch: A Sketch Scheme for Precise Identification of To...
收藏 引用
international conference on Advanced Cloud and Big Data (CBD)
作者: Xiaolin Yang Kai Yang Hao Zhang Gaoming Jin Yifei Lu Changzhou Power Supply Branch of State Grid Jiangsu Electric Power Co. Ltd. China School of Computer Science and Engineering Nanjing University of Science and Technology China
Identifying elephant flows in a network is crucial for network traffic measurement, significantly impacting congestion control optimization, anomaly detection, and traffic engineering. With increasing network link rat... 详细信息
来源: 评论
Peak Shaving Approach of Distribution Network
Peak Shaving Approach of Distribution Network
收藏 引用
Smart Generation computing, Communication and networking (SMART GENCON), international conference on
作者: Rajib Baran Roy Sanath Alahakoon School of Engineering and Technology Central Queensland University Gladstone Australia
The modern power system network comprises distributed generations of renewable sources. The intermittent nature of renewable sources may not always support the peak demand of the electricity network; therefore the int... 详细信息
来源: 评论