咨询与建议

限定检索结果

文献类型

  • 60,568 篇 会议
  • 2,755 篇 期刊文献
  • 997 册 图书
  • 12 篇 学位论文
  • 1 件 标准
  • 1 篇 专利
  • 1 篇 科技报告

馆藏范围

  • 64,334 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 32,747 篇 工学
    • 26,934 篇 计算机科学与技术...
    • 15,229 篇 软件工程
    • 11,116 篇 信息与通信工程
    • 5,608 篇 电气工程
    • 3,653 篇 控制科学与工程
    • 2,803 篇 电子科学与技术(可...
    • 1,193 篇 动力工程及工程热...
    • 1,067 篇 机械工程
    • 895 篇 仪器科学与技术
    • 878 篇 生物工程
    • 670 篇 生物医学工程(可授...
    • 494 篇 安全科学与工程
    • 471 篇 光学工程
    • 465 篇 交通运输工程
    • 455 篇 网络空间安全
    • 425 篇 建筑学
    • 324 篇 材料科学与工程(可...
    • 324 篇 土木工程
  • 8,469 篇 理学
    • 5,966 篇 数学
    • 1,473 篇 统计学(可授理学、...
    • 1,183 篇 系统科学
    • 1,128 篇 物理学
    • 1,041 篇 生物学
  • 5,403 篇 管理学
    • 3,936 篇 管理科学与工程(可...
    • 1,965 篇 工商管理
    • 1,713 篇 图书情报与档案管...
  • 781 篇 法学
    • 496 篇 社会学
  • 617 篇 医学
    • 469 篇 临床医学
    • 400 篇 基础医学(可授医学...
  • 575 篇 经济学
    • 572 篇 应用经济学
  • 202 篇 文学
  • 187 篇 农学
  • 162 篇 教育学
  • 107 篇 军事学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 7,056 篇 computer network...
  • 4,674 篇 computer archite...
  • 4,373 篇 computer science
  • 4,159 篇 distributed comp...
  • 3,701 篇 wireless sensor ...
  • 2,957 篇 application soft...
  • 2,784 篇 protocols
  • 2,580 篇 computational mo...
  • 2,307 篇 hardware
  • 2,272 篇 neural networks
  • 2,191 篇 bandwidth
  • 2,152 篇 delay
  • 2,140 篇 distributed comp...
  • 2,037 篇 routing
  • 1,852 篇 costs
  • 1,609 篇 resource managem...
  • 1,608 篇 intelligent netw...
  • 1,512 篇 network topology
  • 1,422 篇 control systems
  • 1,402 篇 ip networks

机构

  • 93 篇 school of comput...
  • 66 篇 ibm thomas j. wa...
  • 60 篇 department of co...
  • 59 篇 department of co...
  • 49 篇 school of comput...
  • 45 篇 school of electr...
  • 36 篇 school of comput...
  • 36 篇 department of sy...
  • 32 篇 college of compu...
  • 32 篇 department of el...
  • 29 篇 inria
  • 29 篇 school of comput...
  • 29 篇 department of el...
  • 28 篇 department of el...
  • 28 篇 ibm thomas j. wa...
  • 28 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 department of sy...
  • 27 篇 department of co...
  • 27 篇 shandong provinc...

作者

  • 50 篇 m. takizawa
  • 26 篇 kowalski dariusz...
  • 26 篇 li li
  • 25 篇 santoro nicola
  • 24 篇 yu wang
  • 24 篇 s.k. das
  • 23 篇 k.g. shin
  • 23 篇 kuhn fabian
  • 23 篇 peleg david
  • 23 篇 p.k. srimani
  • 23 篇 jun wang
  • 23 篇 klaus wehrle
  • 23 篇 duato j.
  • 22 篇 dhabaleswar k. p...
  • 22 篇 l.m. ni
  • 21 篇 sens pierre
  • 21 篇 xiaodong lu
  • 19 篇 guohong cao
  • 19 篇 y. shibata
  • 18 篇 torsten hoefler

语言

  • 62,964 篇 英文
  • 923 篇 其他
  • 417 篇 中文
  • 49 篇 葡萄牙文
  • 7 篇 法文
  • 4 篇 西班牙文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 俄文
检索条件"任意字段=International Symposium on Computer Networks and Distributed Systems"
64336 条 记 录,以下是491-500 订阅
排序:
Research on distributed relational database based on MySQL
Research on distributed relational database based on MySQL
收藏 引用
2023 international Conference on computer, Artificial Intelligence, and Control Engineering, CAICE 2023
作者: Shi, Lanying Wang, Kai Li, Man Tong, Jiangang Qiao, Hongming Jiang, Yiquan China Research Institute of China Telecom Co. Ltd. Guangzhou510000 China China Mobile Information Technology Co. Ltd. Guangzhou510000 China China Research Institute of China Telecom Co. Ltd. Shanghai200000 China
With the rapid development of big data, cloud computing, artificial intelligence and other technologies, the expansion of database application requirements and the change of computer hardware environment, especially t... 详细信息
来源: 评论
Modern smart distribution network coordination planning technology and examples of distributed power source access planning  9
Modern smart distribution network coordination planning tech...
收藏 引用
9th international symposium on Advances in Electrical, Electronics, and computer Engineering, ISAEECE 2024
作者: Zhao, Zihao Zhao, Ziheng Liu, Yanru Guo, Yue Bai, Yu Distribution Network Planning Department of State Grid HEBEI Economic Research Institute Co. Ltd Hebei Province Shijiazhuang050000 China Distribution Network Planning Department of State Grid Economic and Technological Research Institute Co. Ltd Beijing102200 China
Due to the introduction of a large number of distributed resources and other new elements, the distribution network presents new characteristics that are different from traditional power grids, thus posing new require... 详细信息
来源: 评论
Formally verified asymptotic consensus in robust networks  30th
Formally verified asymptotic consensus in robust networks
收藏 引用
30th international Conference on Tools and Algorithms for the Construction and Analysis of systems (TACAS) Held as Part of the 27th European Joint Conferences on Theory and Practice of Software (ETAPS)
作者: Tekriwal, Mohit Tachna-Fram, Avi Jeannin, Jean-Baptiste Kapritsos, Manos Panagou, Dimitra Univ Michigan Ann Arbor MI 48109 USA
distributed architectures are used to improve performance and reliability of various systems. Examples include drone swarms and load-balancing servers. An important capability of a distributed architecture is the abil... 详细信息
来源: 评论
Brief Announcement: Understanding Self-stabilizing Node-Capacitated Overlay networks Through Simulation  1
收藏 引用
25th international symposium on Stabilization, Safety, and Security of distributed systems, SSS 2023
作者: Afeaneku, Winfred Berns, Andrew Kuchenberg, Weston Leisinger, Sara Liu, Cedric Department of Computer Science University of Northern Iowa Cedar FallsIA United States Cedar Falls High School Cedar FallsIA United States
Overlay networks, where connections are made over logical links composed of zero or more physical links, are a popular paradigm in modern distributed computing. The use of logical links allows the creation of a variet... 详细信息
来源: 评论
Topology identification of distribution network based on feature selection and convolutional neural network  9
Topology identification of distribution network based on fea...
收藏 引用
9th international symposium on Advances in Electrical, Electronics, and computer Engineering, ISAEECE 2024
作者: Zhao, Zihui Cheng, Shun Wu, Weiyi Gao, Xueying Zhang, Huimin Zhou, Xinghua Li, Panni Sun, Jie Zhuhai Power Supply Bureau of Guangdong Power Grid Co. Ltd Guangdong Zhuhai519075 China Beijing Join Bright Digital Power Technology Co. Ltd. Beijing100085 China
In the context of smart grid and new power system, distributed generations, energy storage systems, electric vehicles and other new power equipment are connected to the distribution network on a large scale, which mak... 详细信息
来源: 评论
DNS Covert Channel Attack Detection Based on Spatio-Temporal Feature Fusion  22
DNS Covert Channel Attack Detection Based on Spatio-Temporal...
收藏 引用
22nd IEEE international symposium on Parallel and distributed Processing with Applications, ISPA 2024
作者: You, Wei Zhao, Chunlei Shan, Chao Dong, Guozhong Yu, Jie Guan, Yong Tianjin University of Technology Tianjin Key Laboratory of Intelligent Computing and Software New Technology Tianjin China Coordination Center of China Hubei Branch of National Computer Network Emergency Response Technical Team HuBei China Pengcheng Laboratory Department of New Networks Shenzhen China
An increasing number of Advanced Persistent Threat (APT) organizations are utilizing DNS (Domain Name System) covert channels to evade network intrusion detection systems and establish private authoritative servers fo... 详细信息
来源: 评论
Safeguarding E Commerce and Preventing Financial Fraud with AdaBoost CNN Cybersecurity Approach
Safeguarding E Commerce and Preventing Financial Fraud with ...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Malathi, V. Shammi, L. Unni, Manu Vasudevan Babulal Nadaf, Akabarsaheb Devi, S. Rukmani Thangam, E. Dr. N.G.P Arts and Science College Department of Computer Science with Cyber Security Coimbatore India East Point College of Engineering and Technology Deptartment of Computer Science Bengaluru India St. Claret College Autonomous Department of Management Bangalore India Abhijit Kadam Institute of Management Ame Social Sciences Solapur India Saveetha College of Liberal Arts and Sciences Simats Deemed to Be University Department of Computer Science Chennai India Ramco Institute of Technology Department of Eee Rajapalayam India
Examining the cyber security risks faced by companies and e-commerce platforms is the focus of this research. People in the corporate world and those in academia are curious about the technology applications of e-comm... 详细信息
来源: 评论
A Multi-agent Model for Opinion Evolution in Social networks Under Cognitive Biases  44th
A Multi-agent Model for Opinion Evolution in Social Networks...
收藏 引用
44th international Conference on Formal Techniques for distributed Objects, Components and systems (FORTE)
作者: Alvimi, Mario S. da Silva, Artur Gaspar Knight, Sophia Valencia, Frank Univ Fed Minas Gerais Dept Comp Sci Belo Horizonte MG Brazil Univ Minnesota Duluth Dept Comp Sci Duluth MN USA Ecole Polytech Paris CNRS LIX Palaiseau France Pontificia Univ Javeriana Cali Cali Colombia
We generalize the DeGroot model for opinion dynamics to better capture realistic social scenarios. We introduce a model where each agent has their own individual cognitive biases. Society is represented as a directed ... 详细信息
来源: 评论
Diverse Recommendations With Maximum Entropy Neighbor Selection and Graph Contrast Learning  22
Diverse Recommendations With Maximum Entropy Neighbor Select...
收藏 引用
22nd IEEE international symposium on Parallel and distributed Processing with Applications, ISPA 2024
作者: Zhou, Jinhao Chen, Pinghua Chen, Yunhua Zhou, Honghong Guangdong University of Technology School of Computer Science and Technology Guangzhou China Innovation Monitoring and Research Center Guangdong Science & Technology Guangzhou China
It has become a great challenge to balance accuracy and diversity in recommendation systems. Graph Neural networks (GNNs), while powerful, can lead to node representation homogeneity and information redundancy due to ... 详细信息
来源: 评论
VANETGuard: A Secure Hybrid Trust Management System for VANETs  16
VANETGuard: A Secure Hybrid Trust Management System for VANE...
收藏 引用
16th international Conference on Ambient systems, networks and Technologies networks, ANT 2025 / 8th international Conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Almaziad, Reem Kurdi, Heba Department of Computer Science King Saud University Riyadh Saudi Arabia
This study introduces a secure and scalable hybrid trust management system for Vehicular Ad Hoc networks (VANETs), designed to detect and mitigate diverse malicious activities, including Sybil attacks, Denial of Servi... 详细信息
来源: 评论