咨询与建议

限定检索结果

文献类型

  • 33,155 篇 会议
  • 832 篇 期刊文献
  • 229 册 图书
  • 1 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 34,218 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,136 篇 工学
    • 17,854 篇 计算机科学与技术...
    • 7,807 篇 软件工程
    • 4,543 篇 电气工程
    • 2,839 篇 信息与通信工程
    • 1,459 篇 控制科学与工程
    • 745 篇 电子科学与技术(可...
    • 685 篇 动力工程及工程热...
    • 468 篇 机械工程
    • 381 篇 生物工程
    • 339 篇 石油与天然气工程
    • 302 篇 仪器科学与技术
    • 248 篇 生物医学工程(可授...
    • 247 篇 环境科学与工程(可...
    • 247 篇 网络空间安全
    • 217 篇 力学(可授工学、理...
    • 205 篇 建筑学
    • 192 篇 材料科学与工程(可...
    • 190 篇 安全科学与工程
    • 185 篇 土木工程
  • 4,377 篇 理学
    • 2,838 篇 数学
    • 885 篇 物理学
    • 531 篇 系统科学
    • 471 篇 生物学
    • 424 篇 统计学(可授理学、...
    • 229 篇 化学
  • 3,202 篇 管理学
    • 2,473 篇 管理科学与工程(可...
    • 1,262 篇 工商管理
    • 964 篇 图书情报与档案管...
  • 287 篇 经济学
    • 281 篇 应用经济学
  • 287 篇 医学
    • 217 篇 临床医学
  • 191 篇 法学
  • 98 篇 农学
  • 97 篇 教育学
  • 77 篇 文学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 1 篇 哲学

主题

  • 4,289 篇 grid computing
  • 4,219 篇 distributed comp...
  • 2,063 篇 concurrent compu...
  • 2,043 篇 cloud computing
  • 2,017 篇 parallel process...
  • 1,844 篇 computational mo...
  • 1,619 篇 computer archite...
  • 1,403 篇 computer science
  • 1,362 篇 application soft...
  • 1,288 篇 resource managem...
  • 1,257 篇 computer network...
  • 988 篇 processor schedu...
  • 782 篇 scalability
  • 777 篇 distributed comp...
  • 765 篇 high performance...
  • 760 篇 peer to peer com...
  • 682 篇 costs
  • 670 篇 distributed data...
  • 666 篇 algorithm design...
  • 651 篇 middleware

机构

  • 52 篇 department of co...
  • 47 篇 school of comput...
  • 46 篇 institute of com...
  • 45 篇 college of compu...
  • 39 篇 huazhong univ sc...
  • 34 篇 china electric p...
  • 34 篇 shanghai jiao to...
  • 33 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 univ chinese aca...
  • 31 篇 department of co...
  • 27 篇 inria
  • 27 篇 tsinghua univ de...
  • 27 篇 university of ch...
  • 25 篇 shandong provinc...
  • 24 篇 tsinghua univers...
  • 23 篇 huazhong univers...
  • 23 篇 institute of par...
  • 23 篇 nanjing univ sta...
  • 23 篇 college of intel...

作者

  • 69 篇 jin hai
  • 49 篇 rajkumar buyya
  • 47 篇 hai jin
  • 39 篇 fahringer thomas
  • 37 篇 zomaya albert y.
  • 33 篇 liu yang
  • 31 篇 li dongsheng
  • 29 篇 dongsheng li
  • 29 篇 m. takizawa
  • 27 篇 duerr frank
  • 26 篇 li li
  • 25 篇 xhafa fatos
  • 23 篇 wei li
  • 22 篇 wang lei
  • 22 篇 yang yang
  • 20 篇 lei wang
  • 20 篇 xuejun yang
  • 19 篇 dongarra jack
  • 18 篇 singh bhim
  • 18 篇 bala piotr

语言

  • 33,788 篇 英文
  • 251 篇 其他
  • 143 篇 中文
  • 43 篇 俄文
  • 2 篇 乌克兰文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Parallel Distributed and Grid Computing"
34218 条 记 录,以下是4851-4860 订阅
排序:
Cloud computing Transformation * : Considering Adoption of Mixed Security
Cloud Computing Transformation * : Considering Adoption of M...
收藏 引用
Software Engineering, Artificial Intelligence, Networking and parallel/distributed computing (SNPD-Winter), ACIS international Winter conference on
作者: Jung Ji Young Shin Hee Kyoung Minwoo Park Yongtae Shin IT Policy and Management Soongsil University Seoul Korea Information Science Building 105 Seoul Korea
Companies built IT Center and operated an on-premise system because IT is a kind of asset. But the pace of change in management is accelerating and the pressure on cost efficiency in the IT sector is increasing. Cloud... 详细信息
来源: 评论
Artifact: Scalable distributed Data Anonymization
Artifact: Scalable Distributed Data Anonymization
收藏 引用
IEEE Annual conference on Pervasive computing and Communications Workshops (PerCom)
作者: Sabrina De Capitani di Vimercati Dario Facchinetti Sara Foresti Gianluca Oldani Stefano Paraboschi Matthew Rossi Pierangela Samarati Università degli Studi di Milano Italy Università degli Studi di Bergamo Italy
We describe the artifact, publicly available at [1], that implements the proposal in [2], and the reproduction of the experimental results. It is an extended and distributed version of the Mondrian anonymization algor... 详细信息
来源: 评论
17th international conference on Intelligent computing, ICIC 2021
17th International Conference on Intelligent Computing, ICIC...
收藏 引用
17th international conference on Intelligent computing, ICIC 2021
The proceedings contain 130 papers. The special focus in this conference is on Intelligent computing. The topics include: A Comparable Study on Dimensionality Reduction Methods for Endmember Extraction;Hyperspectral I...
来源: 评论
Multi-Agent Based distributed Dynamic State Estimation Algorithm for Smart grid Integrating Intermittent Electric Vehicles
Multi-Agent Based Distributed Dynamic State Estimation Algor...
收藏 引用
Annual IEEE Systems conference
作者: Md Masud Rana Ahmed Abdelhadi Md Liakat Ali Amer Daowud University of Houston Texas USA Rider University NJ USA School of Computing Sciences and Computer Engineering The University of Southern Mississippi USA
Large number of physical systems such as electric vehicles and energy storage elements are connected to the main grid. Monitoring and regulating of this interconnected cyberphysical power system state within a short p... 详细信息
来源: 评论
LA-vIOMMU: An Efficient Hardware-Software Co-design of IOMMU Virtualization
LA-vIOMMU: An Efficient Hardware-Software Co-design of IOMMU...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Chen Lv Fuxin Zhang Xiang Gao Chen Zhu Chinese Academy of Sciences Institute of Computing Technology Beijing China University of Chinese Academy of Sciences Beijing China Loongson Technology Corporation Limited Beijing China
I/O Memory Management Unit (IOMMU) is im-portant hardware support for I/O virtualization, and it is widely used in device passthrough. However, IOMMU sacrifices memory utilization due to the static mapping requirement... 详细信息
来源: 评论
A Novel One-stage distributed parallel Embedding for Virtualized Network Environment
A Novel One-stage Distributed Parallel Embedding for Virtual...
收藏 引用
IEEE international conference on Systems, Man, and Cybernetics (SMC)
作者: Lu, Qiao Nguyen, Khoa T. D. Huang, ChangCheng Carleton Univ Dept Syst & Comp Engn Ottawa ON Canada
Network virtualization recognized as an enabling technology for the forthcoming networks is utterly popular. One of the main challenges of network virtualization is called the virtual network embedding problem. Virtua... 详细信息
来源: 评论
An Online Decision-Making Method for the Overload Preventive Control of Transmission Equipment Based on the Control Objects Relaxation
An Online Decision-Making Method for the Overload Preventive...
收藏 引用
Electrical Engineering and Control Technologies (CEECT), conference on
作者: Lin Ye Jingliao Sun Weilun Ni Jiabin Zhang Taibin Zhou State Grid Zhejiang Electric Power Co. Ltd. Hangzhou China State Grid Wenzhou Electric Power Supply Company Wenzhou China NARI Group Corporation Nanjing China
The linear programming model based on active power sensitivity ignores the influence of voltage and network loss, the preventive control strategy is difficult to meet the calculation accuracy requirements after AC pow... 详细信息
来源: 评论
distributed Feature Extraction on Apache Spark for Human Action Recognition  14
Distributed Feature Extraction on Apache Spark for Human Act...
收藏 引用
14th international conference on Ubiquitous Information Management and Communication (IMCOM)
作者: Nguyen Anh Tu Thien Huynh-The Wong, Kok-Seng Dinh-Mao Bui Lee, Young-Koo Nazarbayev Univ Dept Comp Sci Nur Sultan Kazakhstan Kumoh Natl Inst Technol ICT Convergence Res Ctr Gumi South Korea Kyung Hee Univ Dept Comp Sci & Engn Yongin South Korea
Local feature extraction is one of the most important tasks to build robust video representation in human action recognition. Recent advances in computing visual features, especially deep-learned features, have achiev... 详细信息
来源: 评论
17th international conference on Intelligent computing, ICIC 2021
17th International Conference on Intelligent Computing, ICIC...
收藏 引用
17th international conference on Intelligent computing, ICIC 2021
The proceedings contain 130 papers. The special focus in this conference is on Intelligent computing. The topics include: A Comparable Study on Dimensionality Reduction Methods for Endmember Extraction;Hyperspectral I...
来源: 评论
SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT
SFMD: A Semi-Supervised Federated Malicious Traffic Detectio...
收藏 引用
IEEE international conference on Big Data and Cloud computing (BdCloud)
作者: Wenyue Wang Shanshan Wang Daokuan Bai Chuan Zhao Lizhi Peng Zhenxiang Chen Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China School of Information Science and Enaineering. University of Jinan Jinan China Quan Cheng Laboratory Jinan China
With the increasingly widespread application of Internet of Things (IoT), network attacks has become a main threat of IoT devices' security. Due to the network traffic data is the carrier of information from users... 详细信息
来源: 评论