咨询与建议

限定检索结果

文献类型

  • 60,568 篇 会议
  • 2,755 篇 期刊文献
  • 997 册 图书
  • 12 篇 学位论文
  • 1 件 标准
  • 1 篇 专利
  • 1 篇 科技报告

馆藏范围

  • 64,334 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 32,747 篇 工学
    • 26,934 篇 计算机科学与技术...
    • 15,229 篇 软件工程
    • 11,116 篇 信息与通信工程
    • 5,608 篇 电气工程
    • 3,653 篇 控制科学与工程
    • 2,803 篇 电子科学与技术(可...
    • 1,193 篇 动力工程及工程热...
    • 1,067 篇 机械工程
    • 895 篇 仪器科学与技术
    • 878 篇 生物工程
    • 670 篇 生物医学工程(可授...
    • 494 篇 安全科学与工程
    • 471 篇 光学工程
    • 465 篇 交通运输工程
    • 455 篇 网络空间安全
    • 425 篇 建筑学
    • 324 篇 材料科学与工程(可...
    • 324 篇 土木工程
  • 8,469 篇 理学
    • 5,966 篇 数学
    • 1,473 篇 统计学(可授理学、...
    • 1,183 篇 系统科学
    • 1,128 篇 物理学
    • 1,041 篇 生物学
  • 5,403 篇 管理学
    • 3,936 篇 管理科学与工程(可...
    • 1,965 篇 工商管理
    • 1,713 篇 图书情报与档案管...
  • 781 篇 法学
    • 496 篇 社会学
  • 617 篇 医学
    • 469 篇 临床医学
    • 400 篇 基础医学(可授医学...
  • 575 篇 经济学
    • 572 篇 应用经济学
  • 202 篇 文学
  • 187 篇 农学
  • 162 篇 教育学
  • 107 篇 军事学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 7,056 篇 computer network...
  • 4,674 篇 computer archite...
  • 4,373 篇 computer science
  • 4,159 篇 distributed comp...
  • 3,701 篇 wireless sensor ...
  • 2,957 篇 application soft...
  • 2,784 篇 protocols
  • 2,580 篇 computational mo...
  • 2,307 篇 hardware
  • 2,272 篇 neural networks
  • 2,191 篇 bandwidth
  • 2,152 篇 delay
  • 2,140 篇 distributed comp...
  • 2,037 篇 routing
  • 1,852 篇 costs
  • 1,609 篇 resource managem...
  • 1,608 篇 intelligent netw...
  • 1,512 篇 network topology
  • 1,422 篇 control systems
  • 1,402 篇 ip networks

机构

  • 93 篇 school of comput...
  • 66 篇 ibm thomas j. wa...
  • 60 篇 department of co...
  • 59 篇 department of co...
  • 49 篇 school of comput...
  • 45 篇 school of electr...
  • 36 篇 school of comput...
  • 36 篇 department of sy...
  • 32 篇 college of compu...
  • 32 篇 department of el...
  • 29 篇 inria
  • 29 篇 school of comput...
  • 29 篇 department of el...
  • 28 篇 department of el...
  • 28 篇 ibm thomas j. wa...
  • 28 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 department of sy...
  • 27 篇 department of co...
  • 27 篇 shandong provinc...

作者

  • 50 篇 m. takizawa
  • 26 篇 kowalski dariusz...
  • 26 篇 li li
  • 25 篇 santoro nicola
  • 24 篇 yu wang
  • 24 篇 s.k. das
  • 23 篇 k.g. shin
  • 23 篇 kuhn fabian
  • 23 篇 peleg david
  • 23 篇 p.k. srimani
  • 23 篇 jun wang
  • 23 篇 klaus wehrle
  • 23 篇 duato j.
  • 22 篇 dhabaleswar k. p...
  • 22 篇 l.m. ni
  • 21 篇 sens pierre
  • 21 篇 xiaodong lu
  • 19 篇 guohong cao
  • 19 篇 y. shibata
  • 18 篇 torsten hoefler

语言

  • 62,964 篇 英文
  • 923 篇 其他
  • 417 篇 中文
  • 49 篇 葡萄牙文
  • 7 篇 法文
  • 4 篇 西班牙文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 俄文
检索条件"任意字段=International Symposium on Computer Networks and Distributed Systems"
64336 条 记 录,以下是251-260 订阅
排序:
A Multi-Path Orchestration Method for Cloud-Edge Data Transmission Based on DRL  30
A Multi-Path Orchestration Method for Cloud-Edge Data Transm...
收藏 引用
30th IEEE international Conference on Parallel and distributed systems, ICPADS 2024
作者: Wang, Zhihui Dou, Xubing Li, Shuyun Ma, Huan Zhang, Xinchang Wang, Maoli Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Normal University Jinan China QuFu Normal University Jining China
In addressing the multi-path problem of cloud-edge data transmission, this paper introduces a multi-path orchestration method based on deep reinforcement learning (DRL) within the context of software-defined networks ... 详细信息
来源: 评论
Blood Pressure Assessment from Contact Photoplethysmographic Signals Using a Combination of Deep Convolutional and Recurrent Neural networks  36
Blood Pressure Assessment from Contact Photoplethysmographic...
收藏 引用
36th IEEE international symposium on computer-Based Medical systems (CBMS)
作者: Masdoua, Yanis Lounici, Melissa Bousefsaf, Frederic Abalache, Feriel Maaoui, Choubeila Pruski, Alain Univ Lorraine LCOMS Metz France
High blood pressure (HBP) is at the root of many cardiovascular diseases, causing millions of deaths every year worldwide. Continuous monitoring of blood pressure (BP) is necessary, not only to prevent cardiovascular ... 详细信息
来源: 评论
A Stochastic Geometry Approach to Performance Modeling of SWIPT Vehicular networks  22
A Stochastic Geometry Approach to Performance Modeling of SW...
收藏 引用
22nd international symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless networks, WiOpt 2024
作者: Rizzo, Gianluca Boi, Biagio Marsan, Marco Ajmone HES-SO Valais Switzerland University of Foggia Italy Christian Esposito University of Salerno Italy Institute Imdea Networks Spain
With the increasing number of devices and the advent of 5G and 6G networks, ensuring reliable power and data connectivity remains a significant challenge, particularly in rural or remote areas. Simultaneous Wireless I... 详细信息
来源: 评论
Reducing Write Tail Latency of distributed Key-Value Stores Using In-Network Chasing  32
Reducing Write Tail Latency of Distributed Key-Value Stores ...
收藏 引用
IEEE/ACM 32nd international symposium on Quality of Service (IWQoS)
作者: Jiang, Jinghui Fan, Xiwen Huang, Zhenpei Zhou, Kairui Xiang, Qiao Tang, Lu Li, Qiang Shu, Jiwu Xiamen Univ Sch Informat Xiamen Key Lab Intelligent Storage & Comp Xiamen Peoples R China Minjiang Univ Fuzhou Peoples R China
Multiple systems have explored how to use programmable switch ASICs to improve the performance of distributed systems. However, they focus on accelerating read operations and perform poorly under write-intensive workl... 详细信息
来源: 评论
Secure Remote Access to Local Network with distributed Tunnel Management
Secure Remote Access to Local Network with Distributed Tunne...
收藏 引用
2024 international Conference on Advances in Data Engineering and Intelligent Computing systems, ADICS 2024
作者: Priyan Kishore, M.S. Chandana Sathwika, U. Malarvel, Muthukumaran Hindustan Institute Of Technology And Science Department Of Computer Science And Engineering Chennai India
The proliferation of distributed networks and the increasing demand for remote collaboration and maintenance have highlighted the need for secure and controlled remote access solutions. This paper presents a novel app... 详细信息
来源: 评论
Advanced Security for IoT networks: A Novel Approach to Intrusion Detection and Feature Selection
Advanced Security for IoT Networks: A Novel Approach to Intr...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Mittal, Akhil Nedunoori, Venkata Ieee Department of Cybersecurity Ieee Department of Software Engineering
The quick development of Internet of Things (IoT) has brought about concerns regarding the security of interconnected networks and devices. This requires the utilization of effective Intrusion Detection System (IDS) t... 详细信息
来源: 评论
Assessing the Generalization Ability of a Global Model for Rapid Building Damage Assessment in Real-world Disaster Scenarios  18
Assessing the Generalization Ability of a Global Model for R...
收藏 引用
18th international Conference on Innovations in Intelligent systems and Applications (INISTA)
作者: Edinc, Eren Berk Bayazit, Ulug Istanbul Tech Univ Dept Comp Engn Istanbul Turkiye
After a natural disaster, it is very important to be able to make a building damage assessment quickly and accurately. Considering real-world scenarios, one of the most important issues related to the deep learning ba... 详细信息
来源: 评论
Research on Graph Injection Attack Method Based on Multi Objective Feature Optimization in the Electric Power Field  1
Research on Graph Injection Attack Method Based on Multi Obj...
收藏 引用
1st international symposium on Parallel Computing and distributed systems, PCDS 2024
作者: Ji, Runyang State Grid Nantong Power Supply Company Jiangsu Nantong China
In the field of electricity, in response to the problem of graph neural networks having both significant performance and poor robustness, this may lead to poor recommendation performance or affect social evaluation, p... 详细信息
来源: 评论
AI in the Detection and Prevention of distributed Denial of Service (DDoS) Attacks
收藏 引用
international JOURNAL OF ADVANCED computer SCIENCE AND APPLICATIONS 2024年 第10期15卷 23-29页
作者: Ahmadi, Sina Natl Coalit Independent Scholars NCIS Seattle WA 98188 USA
distributed Denial of Service (DDoS) attacks are malicious attacks that aim to disrupt the normal flow of traffic to the targeted server or network by manipulating the server's infrastructure with overflowing inte... 详细信息
来源: 评论
A Novel Fault-Tolerant Method for Securing IoT networks Against DDoS Attacks  11
A Novel Fault-Tolerant Method for Securing IoT Networks Agai...
收藏 引用
11th international symposium on Telecommunication, IST 2024
作者: Abdi, Hashem Shahrokhzadeh, Behrooz Sadeghi, Mohammad Mehdi Gilanian Islamic Azad University Qazvin Branch Department of Computer and Information Technology Engineering Qazvin Iran
distributed denial-of-service (DDoS) attacks disrupt communication between nodes in distributed Internet of Things (IoT) networks. Numerous protocols have been proposed to detect and prevent these attacks, but most fo... 详细信息
来源: 评论