咨询与建议

限定检索结果

文献类型

  • 60,568 篇 会议
  • 2,755 篇 期刊文献
  • 997 册 图书
  • 12 篇 学位论文
  • 1 件 标准
  • 1 篇 专利
  • 1 篇 科技报告

馆藏范围

  • 64,334 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 32,747 篇 工学
    • 26,934 篇 计算机科学与技术...
    • 15,229 篇 软件工程
    • 11,116 篇 信息与通信工程
    • 5,608 篇 电气工程
    • 3,653 篇 控制科学与工程
    • 2,803 篇 电子科学与技术(可...
    • 1,193 篇 动力工程及工程热...
    • 1,067 篇 机械工程
    • 895 篇 仪器科学与技术
    • 878 篇 生物工程
    • 670 篇 生物医学工程(可授...
    • 494 篇 安全科学与工程
    • 471 篇 光学工程
    • 465 篇 交通运输工程
    • 455 篇 网络空间安全
    • 425 篇 建筑学
    • 324 篇 材料科学与工程(可...
    • 324 篇 土木工程
  • 8,469 篇 理学
    • 5,966 篇 数学
    • 1,473 篇 统计学(可授理学、...
    • 1,183 篇 系统科学
    • 1,128 篇 物理学
    • 1,041 篇 生物学
  • 5,403 篇 管理学
    • 3,936 篇 管理科学与工程(可...
    • 1,965 篇 工商管理
    • 1,713 篇 图书情报与档案管...
  • 781 篇 法学
    • 496 篇 社会学
  • 617 篇 医学
    • 469 篇 临床医学
    • 400 篇 基础医学(可授医学...
  • 575 篇 经济学
    • 572 篇 应用经济学
  • 202 篇 文学
  • 187 篇 农学
  • 162 篇 教育学
  • 107 篇 军事学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 7,056 篇 computer network...
  • 4,674 篇 computer archite...
  • 4,373 篇 computer science
  • 4,159 篇 distributed comp...
  • 3,701 篇 wireless sensor ...
  • 2,957 篇 application soft...
  • 2,784 篇 protocols
  • 2,580 篇 computational mo...
  • 2,307 篇 hardware
  • 2,272 篇 neural networks
  • 2,191 篇 bandwidth
  • 2,152 篇 delay
  • 2,140 篇 distributed comp...
  • 2,037 篇 routing
  • 1,852 篇 costs
  • 1,609 篇 resource managem...
  • 1,608 篇 intelligent netw...
  • 1,512 篇 network topology
  • 1,422 篇 control systems
  • 1,402 篇 ip networks

机构

  • 93 篇 school of comput...
  • 66 篇 ibm thomas j. wa...
  • 60 篇 department of co...
  • 59 篇 department of co...
  • 49 篇 school of comput...
  • 45 篇 school of electr...
  • 36 篇 school of comput...
  • 36 篇 department of sy...
  • 32 篇 college of compu...
  • 32 篇 department of el...
  • 29 篇 inria
  • 29 篇 school of comput...
  • 29 篇 department of el...
  • 28 篇 department of el...
  • 28 篇 ibm thomas j. wa...
  • 28 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 department of sy...
  • 27 篇 department of co...
  • 27 篇 shandong provinc...

作者

  • 50 篇 m. takizawa
  • 26 篇 kowalski dariusz...
  • 26 篇 li li
  • 25 篇 santoro nicola
  • 24 篇 yu wang
  • 24 篇 s.k. das
  • 23 篇 k.g. shin
  • 23 篇 kuhn fabian
  • 23 篇 peleg david
  • 23 篇 p.k. srimani
  • 23 篇 jun wang
  • 23 篇 klaus wehrle
  • 23 篇 duato j.
  • 22 篇 dhabaleswar k. p...
  • 22 篇 l.m. ni
  • 21 篇 sens pierre
  • 21 篇 xiaodong lu
  • 19 篇 guohong cao
  • 19 篇 y. shibata
  • 18 篇 torsten hoefler

语言

  • 62,964 篇 英文
  • 923 篇 其他
  • 417 篇 中文
  • 49 篇 葡萄牙文
  • 7 篇 法文
  • 4 篇 西班牙文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 俄文
检索条件"任意字段=International Symposium on Computer Networks and Distributed Systems"
64336 条 记 录,以下是521-530 订阅
排序:
2025 IEEE 5th international Conference on Power, Electronics and computer Applications, ICPECA 2025
2025 IEEE 5th International Conference on Power, Electronics...
收藏 引用
5th IEEE international Conference on Power, Electronics and computer Applications, ICPECA 2025
The proceedings contain 154 papers. The topics discussed include: transient stability analysis of power system considering multiple inverter aggregation model;development of the safeguard companion for secondary safet...
来源: 评论
Leveraging Artificial Intelligence for Active Cyber Defense Against to Advanced Persistent Threats to Homeland Security
Leveraging Artificial Intelligence for Active Cyber Defense ...
收藏 引用
2024 international symposium on networks, computers and Communications, ISNCC 2024
作者: Özbay, Recep Yavanoǧlu, Uraz Graduate School of Informatics Gazi University Dept. Of Computer Forensics Ankara Turkey Gazi University Faculty of Engineering Dept. of Computer Engineering Ankara Turkey
Increasing cyber threats have rendered traditional security solutions such as firewalls and intrusion-detection/prevention systems insufficient in providing adequate protection against advanced persistent threats to h... 详细信息
来源: 评论
On the Integration of Ledger Technology and Edge Computing for Intelligent Transportation systems  20
On the Integration of Ledger Technology and Edge Computing f...
收藏 引用
20th ACM international symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous networks (PE-WASUN)
作者: Moura, Douglas L. L. Aquino, Andre L. L. Loureiro, Antonio A. F. Univ Fed Minas Gerais Dept Comp Sci Belo Horizonte MG Brazil Univ Fed Alagoas Comp Inst Maceio Alagoas Brazil
Intelligent Transportation systems (ITS) involve integrating information and communication technologies with traffic infrastructure and vehicles to support the development of more sustainable transportation systems. H... 详细信息
来源: 评论
Exponential Linear Unit and Swish with Deep Neural Network Based Resource Allocation in Wireless Communication systems
Exponential Linear Unit and Swish with Deep Neural Network B...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Manjula, B.M. Malathy, V. Kaur, Jagroop Abbas, Haider Mohammed Otoom, Mohammad Mahmood Nitte Meenakshi Institute of Technology Department of Ece Bengaluru India Sr University Department of Ece Warangal India Punjabi University Department of Computer Science and Engineering Patiala India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Majmaah University College of Science Department of Csi Al Majmaah Saudi Arabia
The Device-to-Device (D2D) communications in wireless communication system ensures the energy and spectral efficiency, data rates and total system capacity. However, the dynamic and complex nature of a 5G system, vari... 详细信息
来源: 评论
Efficient Implementation of 2-D Convolution on DRRA and DiMArch Architectures  23
Efficient Implementation of 2-D Convolution on DRRA and DiMA...
收藏 引用
13th international symposium on Highly Efficient Accelerators and Reconfigurable Technologies (HEART)
作者: Pudi, Dhilleswararao Ryansh, Rajeev Boppu, Srinivas Yang, Yu Hemani, Ahmed Indian Inst Technol Bhubaneswar Odisha India Royal Inst Technol KTH Kista Sweden
Convolution has been widely employed in image processing and computer vision applications such as picture augmentation, smoothing, and structure extraction. In addition, convolution operations are the most prevalent c... 详细信息
来源: 评论
Unveiling the Landscape of Network Architectures: A Deep Dive and Multi-Criteria Analysis of SDN and Traditional networks
Unveiling the Landscape of Network Architectures: A Deep Div...
收藏 引用
2024 international Conference on Circuit, systems and Communication, ICCSC 2024
作者: Belkhadim, Ahmed Maizate, Abderrahim Ettaoufik, Abdelaziz Batouta, Zouhair Ibn Ensem Hassan Ii University Ritm - ESTC/CED Casablanca Morocco Fs Ben m'Sik Hassan Ii University Ltim Casablanca Morocco Fs Ben m'Sik Hassan Ii University Lti Casablanca Morocco
The advancement of computer networks has resulted in the emergence of various networking architectures, including Software-Defined Networking (SDN) and traditional networks. While traditional networks use a distribute... 详细信息
来源: 评论
Remote Immersive Audio Production: State of the Art Implementation, Challenges, and Improvements  5
Remote Immersive Audio Production: State of the Art Implemen...
收藏 引用
5th IEEE international symposium on the Internet of Sounds (IEEE IS2)
作者: Giacomelli, Stefano Centofanti, Carlo Santos, Jose Galbiati, Mauro Salvi, Tiziano Graziosi, Fabio Rinaldi, Claudia DISIM Univ Laquila Laquila Italy Univ Ghent Imec IDLab Dept Informat Technol Ghent Belgium Independent Bergamo Italy Suonovivo Tecnol Bergamo Italy CNIT Interuniv Consortium Telecommun Laquila Italy
This paper addresses the increasing interest of industries in remote and distributed audio production applications. Specifically, it provides a detailed overview of the current state of the art in this domain, describ... 详细信息
来源: 评论
SYN Flood Attack Detection and Prevention Technique (SFaDMT) in distributed Environment  4
SYN Flood Attack Detection and Prevention Technique (SFaDMT)...
收藏 引用
4th international Conference on Emerging Trends in networks and computer Communications, ETNCC 2024
作者: Jalil Fufan, Halawati Abd Riskhan, Basheer Hussain, Khalid Jazri, Husin Bin Alajmani, Samah H. Sharma, Komal School of Computing and Informatics Albukhary International University Alor Setar Malaysia School of Computer Science Taylor's University Subang Jaya Malaysia Taif University Department of Information Technology Taif Saudi Arabia Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India
In the modern digital landscape, cyber-attacks have become highly advanced and difficult to detect, especially in distributed systems. These Denial of Service (DoS) or distributed Denial of Service (DDoS) attacks lead... 详细信息
来源: 评论
Towards Robust IoT Security: A Blockchain Design with Attribute-Based Encryption  1st
Towards Robust IoT Security: A Blockchain Design with Attrib...
收藏 引用
1st international symposium on Intelligent Computing and Networking, ISICN 2024
作者: Ikei, Bryan Thiry, Hanna Xu, Shengjie The Beacom College of Computer and Cyber Sciences Dakota State University MadisonSD57042 United States Department of Management Information Systems San Diego State University San DiegoCA92182 United States
Internet of Things (IoT) data and devices face significant security concerns. It is well-known that IoT security standards and frameworks have yet to be established due to variations with IoT developers and manufactur... 详细信息
来源: 评论
Step-Wise Model Aggregation for Securing Federated Learning  1
收藏 引用
20th international symposium on distributed Computing and Artificial Intelligence, DCAI 2023
作者: Magdy, Shahenda Bahaa, Mahmoud ElBolock, Alia German International University Cairo Egypt
Federated learning (FL) is a distributed machine learning technique that enables remote devices to share their local models without sharing their data. While this system benefits security, it still has many vulnerabil... 详细信息
来源: 评论