咨询与建议

限定检索结果

文献类型

  • 60,511 篇 会议
  • 2,738 篇 期刊文献
  • 997 册 图书
  • 12 篇 学位论文
  • 1 件 标准
  • 1 篇 专利
  • 1 篇 科技报告

馆藏范围

  • 64,260 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 32,700 篇 工学
    • 26,904 篇 计算机科学与技术...
    • 15,211 篇 软件工程
    • 11,107 篇 信息与通信工程
    • 5,598 篇 电气工程
    • 3,643 篇 控制科学与工程
    • 2,800 篇 电子科学与技术(可...
    • 1,189 篇 动力工程及工程热...
    • 1,062 篇 机械工程
    • 895 篇 仪器科学与技术
    • 874 篇 生物工程
    • 666 篇 生物医学工程(可授...
    • 492 篇 安全科学与工程
    • 470 篇 光学工程
    • 463 篇 交通运输工程
    • 453 篇 网络空间安全
    • 423 篇 建筑学
    • 325 篇 材料科学与工程(可...
    • 322 篇 土木工程
  • 8,451 篇 理学
    • 5,956 篇 数学
    • 1,471 篇 统计学(可授理学、...
    • 1,183 篇 系统科学
    • 1,123 篇 物理学
    • 1,039 篇 生物学
  • 5,395 篇 管理学
    • 3,932 篇 管理科学与工程(可...
    • 1,960 篇 工商管理
    • 1,708 篇 图书情报与档案管...
  • 780 篇 法学
    • 496 篇 社会学
  • 612 篇 医学
    • 464 篇 临床医学
    • 398 篇 基础医学(可授医学...
  • 575 篇 经济学
    • 572 篇 应用经济学
  • 202 篇 文学
  • 187 篇 农学
  • 160 篇 教育学
  • 107 篇 军事学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 7,051 篇 computer network...
  • 4,671 篇 computer archite...
  • 4,373 篇 computer science
  • 4,157 篇 distributed comp...
  • 3,700 篇 wireless sensor ...
  • 2,958 篇 application soft...
  • 2,784 篇 protocols
  • 2,579 篇 computational mo...
  • 2,306 篇 hardware
  • 2,271 篇 neural networks
  • 2,191 篇 bandwidth
  • 2,152 篇 delay
  • 2,139 篇 distributed comp...
  • 2,036 篇 routing
  • 1,849 篇 costs
  • 1,608 篇 intelligent netw...
  • 1,605 篇 resource managem...
  • 1,511 篇 network topology
  • 1,422 篇 control systems
  • 1,402 篇 ip networks

机构

  • 93 篇 school of comput...
  • 66 篇 ibm thomas j. wa...
  • 60 篇 department of co...
  • 59 篇 department of co...
  • 49 篇 school of comput...
  • 45 篇 school of electr...
  • 36 篇 school of comput...
  • 36 篇 department of sy...
  • 32 篇 college of compu...
  • 32 篇 department of el...
  • 29 篇 inria
  • 29 篇 school of comput...
  • 29 篇 department of el...
  • 28 篇 department of el...
  • 28 篇 ibm thomas j. wa...
  • 28 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 department of sy...
  • 27 篇 department of co...
  • 27 篇 shandong provinc...

作者

  • 50 篇 m. takizawa
  • 26 篇 kowalski dariusz...
  • 26 篇 li li
  • 25 篇 santoro nicola
  • 25 篇 s.k. das
  • 24 篇 yu wang
  • 23 篇 k.g. shin
  • 23 篇 kuhn fabian
  • 23 篇 peleg david
  • 23 篇 p.k. srimani
  • 23 篇 jun wang
  • 23 篇 klaus wehrle
  • 23 篇 duato j.
  • 22 篇 dhabaleswar k. p...
  • 22 篇 l.m. ni
  • 21 篇 sens pierre
  • 21 篇 xiaodong lu
  • 19 篇 guohong cao
  • 19 篇 y. shibata
  • 18 篇 torsten hoefler

语言

  • 63,205 篇 英文
  • 606 篇 其他
  • 412 篇 中文
  • 51 篇 葡萄牙文
  • 7 篇 法文
  • 4 篇 西班牙文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 俄文
检索条件"任意字段=International Symposium on Computer Networks and Distributed Systems"
64262 条 记 录,以下是221-230 订阅
排序:
Communication Optimization in Blockchain Peer-to-Peer networks  27
Communication Optimization in Blockchain Peer-to-Peer Networ...
收藏 引用
27th international Conference on computer Supported Cooperative Work in Design (CSCWD)
作者: Zhang, Ke Peng, Zhenwen Zong, Ruixing Wang, Qiong Xiao, Xiong Tang, Zhuo Hunan Univ Changsha Peoples R China Yancheng Blockchain Res Inst Hengyang Peoples R China
With the rapid development of blockchain technology, its network size has increased by hundreds or thousands of times. For large-scale blockchain networks, consensus algorithms need to be used to achieve consensus amo... 详细信息
来源: 评论
Robust Diffusion Average Strategy Over distributed networks with Impulsive Link Noise
Robust Diffusion Average Strategy Over Distributed Networks ...
收藏 引用
IEEE international symposium on Circuits and systems (ISCAS)
作者: Zhang, Zhao Zhang, Sheng Zheng, Wei Xing Southwest Jiaotong Univ Sch Informat Sci & Technol Chengdu 611756 Sichuan Peoples R China Western Sydney Univ Sch Comp Data & Math Sci Sydney NSW 2751 Australia
In this paper, a robust diffusion averageestimate normalized least mean square (NLMS) algorithm is proposed to tackle the impulsive noise in adjacent node communication links over distributed networks. Compared with t... 详细信息
来源: 评论
Circle Search Algorithm with Convolutional Neural Network for distributed Denial-of-Service Attack Detection in Software-Defined networks
Circle Search Algorithm with Convolutional Neural Network fo...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Padmakala, S. Al-Jawahry, Hassan M. Palanivel, R. John, Y.M. Mahaboob Madhavi, Arelli Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Computer Science and Engineering Chennai India College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute of Technology Department of Ai & Ds Bengaluru India Mahendra College of Engineering Department of Ece Salem India Gokaraju Rangaraju Institute of Engineering and Technology Department of Ai&ml Hyderabad India
The distributed Denial-of-Service (DDoS) attack is a crucial cybersecurity threat for Software-Defined Network (SDN). However, DDoS in SDN severely affect network availability which reduces the classifier performance.... 详细信息
来源: 评论
Chronic Kidney Disease Detection using Deep Learning Models
Chronic Kidney Disease Detection using Deep Learning Models
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Thaney, Rohan Shivani, Shivani Jothikumar, C. Nallarasan, V. Srm Institute of Science and Technology Department of Network and Communications Chennai India
Chronic Kidney Disease (CKD) is a pervasive health challenge necessitating accurate and timely diagnosis to mitigate its progression and associated complications. This study proposes an innovative framework for CKD de... 详细信息
来源: 评论
Server Saturation in Skewed networks  24
Server Saturation in Skewed Networks
收藏 引用
2024 ACM SIGMETRICS/IFIP Performance Conference on Measurement and Modeling of computer systems, SIGMETRICS/PERFORMANCE 2024
作者: Goldsztajn, Diego Borst, Sem C. Van Leeuwaarden, Johan S. H. Eindhoven University of Technology Eindhoven Netherlands Inria Sophia Antipolis France Tilburg University Tilburg Netherlands
We use bipartite graphs to model compatibility constraints that arise between tasks and servers in data centers, cloud computing systems and content delivery networks. We prove that servers with skewed graph neighborh... 详细信息
来源: 评论
Decreasing Verification Radius in Local Certification  20th
Decreasing Verification Radius in Local Certification
收藏 引用
20th international symposium on Algorithmics of Wireless networks, ALGOWIN 2024
作者: Feuilloley, Laurent Janoušek, Jan Křišťan, Jan Matyáš Sedláček, Josef Erik Faculty of Information Technology CTU in Prague Prague Czech Republic CNRS INSA Lyon UCBL LIRIS UMR5205 Villeurbanne69622 France
This paper deals with local certification, specifically locally checkable proofs: given a graph property, the task is to certify whether a graph satisfies the property. The verification of this certification needs to ... 详细信息
来源: 评论
Introducing distributed Ledger Security into System Specifications with the Isabelle RR-Cycle
Introducing Distributed Ledger Security into System Specific...
收藏 引用
28th European symposium on Research in computer Security (ESORICS)
作者: Kammueller, Florian Middlesex Univ London London England Tech Univ Berlin Berlin Germany
We present an approach to developing secure system specifications for IoT systems with decentralized data using the Refinement-Risk cycle (RR-cycle), a method for security engineering implemented in the proof assistan... 详细信息
来源: 评论
Harris Corner Detection Algorithm based Long Short-Term Memory for Detecting distributed Denial of Service Anomalies in Software Defined networks
Harris Corner Detection Algorithm based Long Short-Term Memo...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Cigiri, Rashmi Kumar, Gotte Ranjith Alabdeli, Haider John, Y.M. Mahaboob Kaliappan, S. Hyderabad India Sr University Department of Computer Science & Artificial Intelligence Warangal India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Mahendra College of Engineering Department of Ece Salem India Lovely Professional University Department of Research and Development Phagwara India
Software-Defined Networking (SDN) is the innovative development in network technology with a number of attractive features, including management and flexibility. Despite these advantages, SDN was compromised by Distri... 详细信息
来源: 评论
Survey on wait-free consensus protocol in distributed systems
收藏 引用
international JOURNAL OF COMMUNICATION networks AND distributed systems 2023年 第2期29卷 166-208页
作者: Rani, Radha Mahato, Dharmendra Prasad Natl Inst Technol Dept Comp Sci & Engn Hamirpur 177005 India
computer applications are transitioning from centralised to decentralised automation in the modern industrial era. The consensus algorithm is a critical component in decentralised applications. Wait-free consensus is ... 详细信息
来源: 评论
Efficient distributed Secure Memory with Migratable Merkle Tree  29
Efficient Distributed Secure Memory with Migratable Merkle T...
收藏 引用
29th IEEE international symposium on High-Performance computer Architecture (HPCA)
作者: Feng, Erhu Du, Dong Xia, Yubin Chen, Haibo Shanghai Jiao Tong Univ Inst Parallel & Distributed Syst Shanghai Peoples R China Shanghai Artificial Intelligence Lab Shanghai Peoples R China
Hardware-assisted enclaves with memory encryption have been widely adopted in the prevailing architectures, e.g., Intel SGX/TDX, AMD SEV, ARM CCA, etc. However, existing enclave designs fall short in supporting effici... 详细信息
来源: 评论