咨询与建议

限定检索结果

文献类型

  • 3,404 篇 会议
  • 95 册 图书
  • 73 篇 期刊文献

馆藏范围

  • 3,570 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 1,909 篇 工学
    • 1,557 篇 计算机科学与技术...
    • 973 篇 软件工程
    • 339 篇 信息与通信工程
    • 213 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 机械工程
    • 102 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 电子科学与技术(可...
    • 68 篇 生物工程
    • 68 篇 安全科学与工程
    • 66 篇 动力工程及工程热...
    • 56 篇 交通运输工程
    • 40 篇 建筑学
    • 37 篇 环境科学与工程(可...
    • 35 篇 生物医学工程(可授...
    • 29 篇 光学工程
  • 568 篇 管理学
    • 459 篇 管理科学与工程(可...
    • 159 篇 工商管理
    • 132 篇 图书情报与档案管...
  • 473 篇 理学
    • 301 篇 数学
    • 80 篇 生物学
    • 71 篇 系统科学
    • 67 篇 统计学(可授理学、...
    • 57 篇 物理学
    • 30 篇 化学
  • 85 篇 经济学
    • 83 篇 应用经济学
  • 61 篇 法学
    • 42 篇 社会学
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 18 篇 农学
  • 15 篇 军事学
  • 12 篇 教育学
  • 9 篇 文学
  • 6 篇 艺术学

主题

  • 274 篇 distributed comp...
  • 237 篇 application soft...
  • 229 篇 computer science
  • 195 篇 computational mo...
  • 142 篇 computer archite...
  • 129 篇 business
  • 122 篇 cloud computing
  • 112 篇 grid computing
  • 106 篇 resource managem...
  • 105 篇 concurrent compu...
  • 86 篇 quality of servi...
  • 85 篇 processor schedu...
  • 84 篇 parallel process...
  • 78 篇 computer network...
  • 77 篇 servers
  • 77 篇 web services
  • 75 篇 middleware
  • 72 篇 costs
  • 71 篇 software enginee...
  • 67 篇 internet

机构

  • 33 篇 school of comput...
  • 14 篇 school of scienc...
  • 14 篇 institute of inf...
  • 13 篇 department of co...
  • 13 篇 changsha univers...
  • 12 篇 naval research i...
  • 12 篇 college of mathe...
  • 11 篇 school of intern...
  • 10 篇 university of ch...
  • 10 篇 jiangnan univers...
  • 10 篇 department of co...
  • 9 篇 school of iot en...
  • 9 篇 university of ch...
  • 9 篇 hannam universit...
  • 8 篇 huazhong univers...
  • 8 篇 school of comput...
  • 8 篇 wuhan university...
  • 8 篇 school of comput...
  • 8 篇 school of busine...
  • 8 篇 the islamic univ...

作者

  • 19 篇 jun sun
  • 18 篇 quanyin zhu
  • 16 篇 meiqing wang
  • 13 篇 h. casanova
  • 13 篇 shesheng zhang
  • 13 篇 ioana banicescu
  • 12 篇 yang yang
  • 11 篇 wenbo xu
  • 10 篇 min huang
  • 10 篇 peng wang
  • 10 篇 minyi guo
  • 10 篇 florina m. ciorb...
  • 9 篇 qiang yang
  • 9 篇 wang guojun
  • 9 篇 xingwei wang
  • 9 篇 souheil khaddaj
  • 9 篇 tai-hoon kim
  • 9 篇 wang wei
  • 9 篇 dominik ślęzak
  • 9 篇 hai jin

语言

  • 3,284 篇 英文
  • 282 篇 其他
  • 9 篇 中文
检索条件"任意字段=International Symposium Distributed Computing and Applications Business Engineering and Science"
3572 条 记 录,以下是1291-1300 订阅
排序:
A Software Licenses Aware Job Scheduling and Management Approach on Multiclusters  19
A Software Licenses Aware Job Scheduling and Management Appr...
收藏 引用
第十五届分布式计算及其应用国际学术研讨会
作者: Zhengxiong Hou Jianhua Gu Xingshe Zhou Tianhai Zhao Center for High Performance Computing School of Computer Science and Technology NWPU
For commercial software in scientific and engineering computing,software licenses are needed when running them in high performance computing ***,there is a constraint for the number of software *** the traditional sof... 详细信息
来源: 评论
Online credit card fraud detection: A hybrid framework with big data technologies  15
Online credit card fraud detection: A hybrid framework with ...
收藏 引用
Joint 15th IEEE international Conference on Trust, Security and Privacy in computing and Communications, 10th IEEE international Conference on Big Data science and engineering and 14th IEEE international symposium on Parallel and distributed Processing with applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Dai, You Yan, Jin Tang, Xiaoxin Zhao, Han Guo, Minyi Department of Computer Science and Engineering Shanghai Jiao Tong University China School of Computer Science and Technology Huazhong University of Science and Technology China
In this paper, we focus on designing an online credit card fraud detection framework with big data technologies, by which we want to achieve three major goals: 1) the ability to fuse multiple detection models to impro... 详细信息
来源: 评论
P wave detection and delineation based on distances transform  15
P wave detection and delineation based on distances transfor...
收藏 引用
Joint 15th IEEE international Conference on Trust, Security and Privacy in computing and Communications, 10th IEEE international Conference on Big Data science and engineering and 14th IEEE international symposium on Parallel and distributed Processing with applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Wang, Yan Wang, Lirong Chen, Xiaohe Zhu, Wenliang School of Electronic and Information Engineering Soochow University China Suzhou Institute of Biomedical Engineering and Technology Chinese Academy of Sciences China
Automatic detection of P-wave in an electrocardiogram(ECG) is a crucial task in diagnosis of the presence of arrhythmias. In this paper, we proposed an improved method based on distance transform. Distance transform i... 详细信息
来源: 评论
A new virtualized environment for application deployment based on docker and AWS
收藏 引用
international Conference on Information science and applications, ICISA 2016
作者: Tihfon, Gemoh Maliva Kim, Jinsul Kim, Kuinam J. School of Electronics and Computer Engineering Chonnam National University Gwangju500-757 Korea Republic of Convergence Security Department Kyonggi University SuwonGyonggi-Do Korea Republic of
The setup environment and deployment of distributed applications is a human intensive and highly complex process that poses significant challenges. Nowadays many applications are developed in the cloud and existing ap... 详细信息
来源: 评论
Model checking probabilistic network propagation protection strategies  15
Model checking probabilistic network propagation protection ...
收藏 引用
Joint 15th IEEE international Conference on Trust, Security and Privacy in computing and Communications, 10th IEEE international Conference on Big Data science and engineering and 14th IEEE international symposium on Parallel and distributed Processing with applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Zonghao, Guo Ou, Wei Peng, Yu Lansheng, Han Weiming, Wu College of Computer Science and Technology Nanjing University of Aeronautic and Astronautics Nanjing211100 China School of Computer Science and Technonlgy Huazhong University of Science and Technology Wuhan430074 China
Network exists widely in nature and human society. The spread of infections such as computer viruses, diseases and rumors poses great challenges to economic and social system. It is an important issue in the network p... 详细信息
来源: 评论
Application of communication management system in electric power system  19
Application of communication management system in electric p...
收藏 引用
第十五届分布式计算及其应用国际学术研讨会
作者: YangYang YangXiaoPeng Li Yetian State Grid Henan Electric Power Information and Telecommunication Company Henan Electric Power Industry Group Co. Ltd China International Telecommunication Construction Group Design Institute Co. Ltd
This paper firstly introduces the background and significance of the communication management system in power system,and expounds the necessity of the construction of communication management *** a whole solution of t... 详细信息
来源: 评论
Secure Semantic Web Application Development: Present and Future  19
Secure Semantic Web Application Development: Present and Fut...
收藏 引用
第十五届分布式计算及其应用国际学术研讨会
作者: Umara Noor Zahid Rashid Department of Computing School of Electrical Engineering & Computer Science (DOC SEECS) National University of Science & Technology (NUST)
Semantic web is the future realization of the current web,in which resources are annotated with machine understandable meta-data,allowing the automation of tasks by employing these resources in their correct *** notab... 详细信息
来源: 评论
BOLAS+: Scalable lightweight locality-aware scheduling for Hadoop  15
BOLAS+: Scalable lightweight locality-aware scheduling for H...
收藏 引用
Joint 15th IEEE international Conference on Trust, Security and Privacy in computing and Communications, 10th IEEE international Conference on Big Data science and engineering and 14th IEEE international symposium on Parallel and distributed Processing with applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Gao, Shengli Xue, Ruini School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Locality-aware task scheduling for MapReduce can reduce job execution time by avoiding data transferring. However, many existing scheduling algorithms suffer from either heavy storage overhead, reduced task parallelis... 详细信息
来源: 评论
ChainSpot: Mining service logs for cyber security threat detection  15
ChainSpot: Mining service logs for cyber security threat det...
收藏 引用
Joint 15th IEEE international Conference on Trust, Security and Privacy in computing and Communications, 10th IEEE international Conference on Big Data science and engineering and 14th IEEE international symposium on Parallel and distributed Processing with applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Wu, Jain-Shing Lee, Yuh-Jye Wei, Te-En Hsieh, Chih-Hung Lai, Chia-Min Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan Institute for Information Industry Taipei Taiwan
Given service logs of who used what service, and when, how can we find intrusions and anomalies? In this paper, a cyber threat detection framework-ChainSpot was proposed, in which the novelty is to build graphical pat... 详细信息
来源: 评论
Time-Bounded Statistical Analysis of Resource-Constrained business Processes with distributed Probabilistic Systems  1
收藏 引用
2nd international symposium on Dependable Software engineering - Theories, Tools and applications (SETTA)
作者: Saha, Ratul Mukund, Madhavan Bose, R. P. Jagadeesh Chandra Natl Univ Singapore Singapore Singapore Chennai Math Inst Madras Tamil Nadu India Xerox Res Ctr India Bengaluru India
business processes often incorporate stochastic decision points, either due to uncontrollable actions or because the control flow is not fully specified. Formal modeling of such business processes with resource constr... 详细信息
来源: 评论