咨询与建议

限定检索结果

文献类型

  • 60,811 篇 会议
  • 2,740 篇 期刊文献
  • 1,002 册 图书
  • 9 篇 学位论文
  • 1 件 标准
  • 1 篇 专利

馆藏范围

  • 64,563 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 32,804 篇 工学
    • 26,987 篇 计算机科学与技术...
    • 15,246 篇 软件工程
    • 11,166 篇 信息与通信工程
    • 5,633 篇 电气工程
    • 3,711 篇 控制科学与工程
    • 2,811 篇 电子科学与技术(可...
    • 1,199 篇 动力工程及工程热...
    • 1,064 篇 机械工程
    • 898 篇 仪器科学与技术
    • 871 篇 生物工程
    • 669 篇 生物医学工程(可授...
    • 531 篇 安全科学与工程
    • 506 篇 交通运输工程
    • 498 篇 网络空间安全
    • 471 篇 光学工程
    • 426 篇 建筑学
    • 327 篇 材料科学与工程(可...
    • 325 篇 土木工程
  • 8,471 篇 理学
    • 5,975 篇 数学
    • 1,474 篇 统计学(可授理学、...
    • 1,182 篇 系统科学
    • 1,127 篇 物理学
    • 1,036 篇 生物学
  • 5,453 篇 管理学
    • 3,988 篇 管理科学与工程(可...
    • 1,966 篇 工商管理
    • 1,751 篇 图书情报与档案管...
  • 784 篇 法学
    • 499 篇 社会学
  • 616 篇 医学
    • 466 篇 临床医学
    • 400 篇 基础医学(可授医学...
  • 576 篇 经济学
    • 573 篇 应用经济学
  • 203 篇 文学
  • 187 篇 农学
  • 167 篇 教育学
  • 107 篇 军事学
  • 19 篇 艺术学
  • 3 篇 哲学

主题

  • 7,052 篇 computer network...
  • 4,719 篇 computer archite...
  • 4,375 篇 computer science
  • 4,163 篇 distributed comp...
  • 3,711 篇 wireless sensor ...
  • 2,958 篇 application soft...
  • 2,785 篇 protocols
  • 2,611 篇 computational mo...
  • 2,335 篇 hardware
  • 2,298 篇 neural networks
  • 2,193 篇 bandwidth
  • 2,151 篇 delay
  • 2,137 篇 distributed comp...
  • 2,042 篇 routing
  • 1,862 篇 costs
  • 1,616 篇 resource managem...
  • 1,609 篇 intelligent netw...
  • 1,513 篇 network topology
  • 1,424 篇 control systems
  • 1,406 篇 throughput

机构

  • 92 篇 school of comput...
  • 66 篇 ibm thomas j. wa...
  • 59 篇 department of co...
  • 59 篇 department of co...
  • 49 篇 school of comput...
  • 45 篇 school of electr...
  • 36 篇 school of comput...
  • 36 篇 department of sy...
  • 32 篇 college of compu...
  • 32 篇 department of el...
  • 29 篇 inria
  • 29 篇 school of comput...
  • 29 篇 department of el...
  • 28 篇 department of el...
  • 28 篇 ibm thomas j. wa...
  • 28 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 department of sy...
  • 27 篇 department of co...
  • 27 篇 shandong provinc...

作者

  • 50 篇 m. takizawa
  • 27 篇 li li
  • 26 篇 kowalski dariusz...
  • 24 篇 kuhn fabian
  • 24 篇 yu wang
  • 24 篇 santoro nicola
  • 24 篇 s.k. das
  • 23 篇 k.g. shin
  • 23 篇 peleg david
  • 23 篇 p.k. srimani
  • 23 篇 jun wang
  • 23 篇 klaus wehrle
  • 23 篇 duato j.
  • 22 篇 dhabaleswar k. p...
  • 22 篇 l.m. ni
  • 21 篇 sens pierre
  • 21 篇 xiaodong lu
  • 19 篇 guohong cao
  • 19 篇 y. shibata
  • 18 篇 torsten hoefler

语言

  • 61,679 篇 英文
  • 2,441 篇 其他
  • 439 篇 中文
  • 48 篇 葡萄牙文
  • 7 篇 法文
  • 3 篇 德文
  • 3 篇 西班牙文
  • 3 篇 日文
  • 3 篇 俄文
检索条件"任意字段=International Symposium on Computer Networks and Distributed Systems"
64565 条 记 录,以下是1291-1300 订阅
排序:
Quantitative Scalability of Nodes and Geographical Coverage in LEACH Protocol  6
Quantitative Scalability of Nodes and Geographical Coverage ...
收藏 引用
6th international Conference on Pattern Analysis and Intelligent systems, PAIS 2024
作者: Mir, Foudil Meziane, Farid Bounceur, Ahcene Laouid, Abdelkader Faculty of Exact Sciences Bejaia06000 Algeria University of Derby Data Science Research Centre Derby United Kingdom Kfupm Information And Computer Science Department Dhahran Saudi Arabia University of El Oued Liap Laboratory El Oued39000 Algeria
Energy optimisation using clustering remains a constant challenge in wireless sensor networks (WSNs). The high volume of data generated within these networks leads to excessive energy consumption when transferring it ... 详细信息
来源: 评论
Advancing Safety and Efficiency in Human-Robot Interaction  2
Advancing Safety and Efficiency in Human-Robot Interaction
收藏 引用
2nd international Conference on distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Kurian, Smitha Faiz, Mohammed Mohammed Mustafa, C. Zubair, Mohammed Ahamed, Sagheer Hkbk College of Engineering Computer Science and Engineering Bengaluru India
The modern-day studies in video surveillance, fireplace detection, face reputation, crowd detection, augmented reality-based totally navigation, and artificial intelligence programs. In video surveillance, deep master... 详细信息
来源: 评论
Multi-Agent systems for Autonomous IoT Network Management Using distributed Reinforcement Learning  3
Multi-Agent Systems for Autonomous IoT Network Management Us...
收藏 引用
3rd international Conference on Intelligent systems, Advanced Computing, and Communication, ISACC 2025
作者: Neelamegam, G. Venkatesan, Rajaram Ramya, S.R. Ramya, R.S. Akshya, J. Sundarrajan, M. Choudhry, Mani Deepak VSB College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India Builders Engineering College Department of Artificial Intelligence and Data Science Tamil Nadu Tirupur India Dr NGP Institute of Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India Sri Ramakrishna Engineering College Department of Computer Science and Engineering Tamil Nadu Coimbatore India SRM Institute of Science and Technology Department of Computational Intelligence Tamil Nadu Chennai India SRM Institute of Science and Technology Department of Networking and Communications Tamil Nadu Chennai India SRM Institute of Science and Technology Department of Computing Technologies Tamil Nadu Chennai India
The ever-growing complexity of IoT networks ignited by their wide scale adoption in applications such as smart cities, the industrial automation, and health care, compelled to develop sophisticated yet resource effici... 详细信息
来源: 评论
Deep Quantization of Graph Neural networks with Run-Time Hardware-Aware Training  20th
Deep Quantization of Graph Neural Networks with Run-Time Har...
收藏 引用
20th international symposium on Applied Reconfigurable Computing (ARC)
作者: Hansson, Olle Grailoo, Mahdieh Gustafsson, Oscar Nunez-Yanez, Jose Linkoping Univ Dept Elect Engn S-58183 Linkoping Sweden
In this paper, we investigate the benefits of hardware-aware quantization in the gFADES hardware accelerator targeting Graph Convolutional networks (GCNs). GCNs are a type of Graph Neural networks (GNNs) that combine ... 详细信息
来源: 评论
Home Assistant platform under DDoS attacks for IPv4 and IPv6 networks  17
Home Assistant platform under DDoS attacks for IPv4 and IPv6...
收藏 引用
17th IEEE international Scientific Conference on Informatics, INFORMATICS 2024
作者: Simon, Marek Huraj, Ladislav Hrinkino, Dominik University of SS. Cyril and Methodius Institute of Computer Technologies and Informatics Trnava Slovakia
This study investigates the resistance of the Home Assistant platform under different types of distributed Denial of Service (DDoS) attacks, namely TCP SYN flood, UDP flood, and ICMP flood, in IPv4 and IPv6 network en... 详细信息
来源: 评论
distributed Control for Traffic Light in Smart Cities: Parameters and Algorithms  1
收藏 引用
20th international symposium on distributed Computing and Artificial Intelligence, DCAI 2023
作者: Uribe-Chavert, Pedro Posadas-Yagüe, Juan-Luis Poza-Lujan, Jose-Luis Doctoral School Universitat Politècnica de València. Camino de vera sn 46022 Valencia Spain Research Institute of Industrial Computing and Automatics. Universitat Politècnica de València. Camino de vera sn 46022 Valencia Spain
This article focuses on communicating and transmitting meaningful parameters between junctions in traffic control systems. Decisions taken at one junction can have a domino effect on subsequent junctions, and good com... 详细信息
来源: 评论
SentinelMet: Enhancing Metaverse Security through Deep Learning Techniques in 6G  18
SentinelMet: Enhancing Metaverse Security through Deep Learn...
收藏 引用
18th IEEE international Conference on Advanced networks and Telecommunications systems, ANTS 2024
作者: Rajput, Dikshant Singh, Sunil K. Kumar, Sudhakar Vashisht, Harshit Chui, Kwok Tai Gupta, Brij B. Chandigarh College of Engineering and Technology Chandigarh India Hong Kong Hong Kong Asia University Department of Computer Science and Information Engineering Taichung413 Taiwan University of Economics and Human Science Warsaw Poland
With the increasing demand for robust security in the rapidly expanding metaverse within 6 G networks, advanced intrusion detection systems (IDS) are becoming essential. This paper introduces a novel hybrid intrusion ... 详细信息
来源: 评论
Spiking Neural Network Model for Detection Spoofing Attacks in Vehicular Ad-Hoc networks  8
Spiking Neural Network Model for Detection Spoofing Attacks ...
收藏 引用
8th international Artificial Intelligence and Data Processing symposium, IDAP 2024
作者: Yalcin, Sercan Adiyaman University Department of Computer Engineering Adiyaman Turkey
The security and dependability of Vehicular Ad-hoc networks (VANETs) are seriously threatened by spoofing attacks. Malicious entities have the ability to undermine the integrity of vehicular communication through the ... 详细信息
来源: 评论
The Automata-Based Model for Control of Large distributed systems  24th
The Automata-Based Model for Control of Large Distributed Sy...
收藏 引用
24th international Conference on distributed computer and Communication networks, DCCN 2021
作者: Zatuliveter, Yu. S. Fishchenko, E.A. Institute of Control Sciences of Russian Academy of Sciences 65 Profsoyuznaya street Moscow117997 Russia
With the increase in the size of distributed systems implemented in a global computer environment, mathematical methods for formalizing their development and functioning become one of the important problems. The artic... 详细信息
来源: 评论
Energy-Constrained Task Scheduling in Heterogeneous distributed systems  26
Energy-Constrained Task Scheduling in Heterogeneous Distribu...
收藏 引用
26th international Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chen, Chen Zhu, Jie Huang, Haiping Gao, Yingmeng Nanjing University of Posts & Telecommunications Nanjing210003 China Institute of Computing Technology Academy of Sciences State Key Laboratory Chinese of Computer Architecture Beijing100864 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210003 China
The resource-constrained task scheduling problem has been one of the popular research topics in cloud computing systems. By employing the dynamic voltage and frequency scaling (DVFS) techniques, the task scheduling ca... 详细信息
来源: 评论