咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是4971-4980 订阅
排序:
security issues and requirements for Internet-scale publish-subscribe systems
Security issues and requirements for Internet-scale publish-...
收藏 引用
Annual Hawaii international conference on System Sciences (HICSS)
作者: Chenxi Wang A. Carzaniga D. Evans A.L. Wolf Electrical and Computer Engineering Department Carnegie Mellon University USA Department of Computer Science University of Colorado Boulder USA Department of Computer Science University of Virginia USA
Publish-subscribe is a communication paradigm that supports dynamic, many-to-many communications in a distributed environment. Content-based pub-sub systems are often implemented on a peer-to-peer infrastructure that ... 详细信息
来源: 评论
CoStore: a serverless distributed file system utilizing disk space on workstation clusters
CoStore: a serverless distributed file system utilizing disk...
收藏 引用
IEEE international conference on Performance, Computing and Communications (IPCCC)
作者: Yong Chen L.M. Ni Mingyao Yang P. Mohapatra Computer Science & Engineering Michigan State University USA Sun Microsystems Inc. USA
CoStore is a serverless distributed file system designed to provide cost-effective storage service utilizing idle disk space on workstation clusters. With all the system responsibilities evenly distributed across a gr... 详细信息
来源: 评论
An intrusion detection system based on data mining and immune principles
An intrusion detection system based on data mining and immun...
收藏 引用
international conference on Machine Learning and Cybernetics (ICMLC)
作者: Jun-Zhong Zhao Hou-Kuan Huang School of Computer and Information Technology Northern Jiaotong University Beijing China
In this paper, a framework of an immune-based intrusion detection system (IDS) is presented. Here data mining techniques are used to discover frequently occurring patterns, which are equivalent to self proteins in the... 详细信息
来源: 评论
Factoring mobile agents
Factoring mobile agents
收藏 引用
international conference and Workshop on Engineering of computer-Based systems
作者: K.J. Lauvset D. Johansen K. Marzullo Department of Computer Science University of Tromsø Tromso Norway Department of Computer Science and Engineering University of California San Diego La Jolla CA USA
In this paper we argue that the traditional model of a mobile agent provides a poor programming structure. We base our argument on our experience since 1993 in building distributed applications and mobile agent platfo... 详细信息
来源: 评论
Peer-to-peer network computing model design
Peer-to-peer network computing model design
收藏 引用
international conference on computer Supported Cooperative Work in Design
作者: Junzhou Luo Xiaoqiang Tong Department of Computer Science and Engineering South-East University Nanjing China
We introduce a peer-to-peer computing model, JP2P, which can be used in network computing and collaborative systems. The basic theory and logic structure of a network computing system are analyzed in detail, and the r... 详细信息
来源: 评论
Tracking multiple people using distributed vision systems
Tracking multiple people using distributed vision systems
收藏 引用
IEEE international conference on Robotics and Automation (ICRA)
作者: N. Atsushi K. Hirokazu H. Shinsaku I. Seiji Institute of Industrial Science University of Tokyo Hiroshima City University Osaka University Japan
We describe a method for observing multiple targets in a wide-area spatial environment using a distributed vision system (DVS). The DVS is constructed of some 'watching stations' that consist of a camera, an i... 详细信息
来源: 评论
Analysis of system performance by changing the ring architecture on the dual ring CC-NUMA system
Analysis of system performance by changing the ring architec...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Joo Beom Yun Seong Tae Jhang Chu Shik Jhon Cheol Won Lee National Security Research Institute Taejon South Korea Department of Computer Science University of Suwon Hwasung Kyunggi South Korea School of Computer Engineering Seoul National University Seoul South Korea
Since NUMA architecture has to access remote memory, the interconnection network determines the performance of the CC-NUMA system. Bus, which has been used as a popular interconnection network, has many limits in a la... 详细信息
来源: 评论
Design space exploration for energy-efficient secure sensor network
Design space exploration for energy-efficient secure sensor ...
收藏 引用
international conference on Application Specific systems (ASAP), Architectures and Processors
作者: Lin Yuan Gang Qu Electrical and Computer Engineering Department and Institute of Advanced Computer Study University of Maryland College Park MD USA
We consider two of the most important design issues for distributed sensor networks in the battlefield: security for communication in such hostile terrain; and energy efficiency because of the battery's limited ca... 详细信息
来源: 评论
A semantic framework for specifying and reasoning about composable distributed middleware services
收藏 引用
IFIP Advances in Information and Communication Technology 2002年 81卷 25-26页
作者: Talcott, Carolyn SRI International 333 Ravenswood Avenue Menlo Park CA 94025SRI United States
Middleware such as Corba ORBs, DCOM, or Java Beans provide programming abstractions for interoperation of diverse components in an open distributed setting. More recent middleware initiatives focus on resource managem... 详细信息
来源: 评论
Scalable data fusion using Astrolabe
Scalable data fusion using Astrolabe
收藏 引用
international conference on Information Fusion
作者: K.P. Birman R. van Renesse W. Vogels Reliable Network Solutions Inc. Cornell University USA
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to perform data fusion and data mining. The problem is that data often resides on lar... 详细信息
来源: 评论