咨询与建议

限定检索结果

文献类型

  • 1,417 篇 会议
  • 44 册 图书
  • 28 篇 期刊文献

馆藏范围

  • 1,489 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 972 篇 工学
    • 891 篇 计算机科学与技术...
    • 487 篇 软件工程
    • 377 篇 信息与通信工程
    • 114 篇 电气工程
    • 89 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 31 篇 生物工程
    • 28 篇 动力工程及工程热...
    • 21 篇 机械工程
    • 20 篇 仪器科学与技术
    • 19 篇 生物医学工程(可授...
    • 18 篇 网络空间安全
    • 16 篇 环境科学与工程(可...
    • 15 篇 建筑学
    • 10 篇 安全科学与工程
    • 8 篇 化学工程与技术
  • 218 篇 管理学
    • 164 篇 管理科学与工程(可...
    • 78 篇 工商管理
    • 75 篇 图书情报与档案管...
  • 203 篇 理学
    • 124 篇 数学
    • 43 篇 系统科学
    • 34 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 11 篇 化学
  • 18 篇 法学
    • 14 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 教育学
    • 9 篇 教育学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 112 篇 distributed comp...
  • 92 篇 distributed comp...
  • 55 篇 computer science
  • 55 篇 cloud computing
  • 50 篇 application soft...
  • 48 篇 peer to peer com...
  • 44 篇 computer network...
  • 41 篇 computer archite...
  • 41 篇 mobile computing
  • 40 篇 conferences
  • 40 篇 costs
  • 40 篇 middleware
  • 35 篇 protocols
  • 33 篇 quality of servi...
  • 33 篇 computational mo...
  • 30 篇 software enginee...
  • 30 篇 bandwidth
  • 29 篇 internet
  • 29 篇 hardware
  • 28 篇 resource managem...

机构

  • 6 篇 college of compu...
  • 5 篇 seikei universit...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 inria rennes
  • 5 篇 3-30-1 wajiro-hi...
  • 4 篇 nanyang technol ...
  • 4 篇 universidad carl...
  • 4 篇 tokyo denki univ...
  • 4 篇 rissho universit...
  • 4 篇 school of electr...
  • 3 篇 college of compu...
  • 3 篇 school of big da...
  • 3 篇 department of co...
  • 3 篇 zhejiang univers...
  • 3 篇 department of co...
  • 3 篇 school of cybers...
  • 3 篇 ohio state univ ...
  • 3 篇 university of pi...
  • 3 篇 tennessee tech u...
  • 3 篇 rwth aachen univ...

作者

  • 8 篇 michael alexande...
  • 6 篇 stephen l. scott
  • 6 篇 barolli leonard
  • 6 篇 mario cannataro
  • 6 篇 takizawa makoto
  • 4 篇 xhafa fatos
  • 4 篇 alexandru costan
  • 4 篇 liu yh
  • 4 篇 emmanuel jeannot
  • 4 篇 shibata yoshitak...
  • 4 篇 marco danelutto
  • 4 篇 uehara minoru
  • 4 篇 mikkilineni rao
  • 4 篇 r. guerraoui
  • 4 篇 beniamino martin...
  • 4 篇 josef weidendorf...
  • 4 篇 durresi arjan
  • 3 篇 li zengxiang
  • 3 篇 alfredo cuzzocre...
  • 3 篇 m. takizawa

语言

  • 1,481 篇 英文
  • 5 篇 其他
  • 2 篇 俄文
  • 1 篇 中文
检索条件"任意字段=Proceedings - 24th International Conference on Distributed Computing Systems Workshops"
1489 条 记 录,以下是221-230 订阅
排序:
Extension Principle for Descriptor-type systems with distributed Time-delay
Extension Principle for Descriptor-type Systems with Distrib...
收藏 引用
international conference on System theory, Control, and computing (ICSTCC)
作者: Altuğ İftar Eskişehir Technical University Eskişehir Turkey
the principle of extension is defined for linear time-invariant descriptor-type distributed-time-delay systems. Necessary and sufficient conditions for one system being an extension of another are also presented.
来源: 评论
Intelligent Monitoring of IoT Devices using Neural Networks
Intelligent Monitoring of IoT Devices using Neural Networks
收藏 引用
international conference on Intelligence in Next Generation Networks (ICIN)
作者: Ashima Chawla Pradeep Babu Trushnesh Gawande Erik Aumayr Paul Jacob Sheila Fallon Software Research Institute Athlone Institute of Technology Athlone Ireland Cloud Pipeline Engineering Workday Dublin Ireland Application Development Platform Ericsson Athlone Ireland Network Management Lab Ericsson Athlone Ireland
the Internet of things (IoT) has seen expeditious growth in recent times with 7 billion connected devices in 2020, thus leading to the vital importance of real-time monitoring of IoT devices. through this paper, we de... 详细信息
来源: 评论
14th international conference on Risks and Security of Internet and systems, CRiSIS 2019
14th International Conference on Risks and Security of Inter...
收藏 引用
14th international conference on Risks and Security of Internet and systems, CRiSIS 2019
the proceedings contain 24 papers. the special focus in this conference is on Risks and Security of Internet and systems. the topics include: WPA3 Connection Deprivation Attacks;An Approach for thwarting Malicious Sec...
来源: 评论
proceedings - 24th IEEE international conference on High Performance computing workshops, HiPCW 2017
Proceedings - 24th IEEE International Conference on High Per...
收藏 引用
24th IEEE international conference on High Performance computing workshops, HiPCW 2017
the proceedings contain 9 papers. the topics discussed include: software troubleshooting using machine learning;the effect of non volatile memory on a distributed storage system;thermal profiling and modeling of Hadoo...
来源: 评论
An optimization method for resource allocation in fog computing  13
An optimization method for resource allocation in fog comput...
收藏 引用
2020 IEEE Congress on Cybermatics: 13th IEEE international conferences on Internet of things, ithings 2020, 16th IEEE international conference on Green computing and Communications, GreenCom 2020, 13th IEEE international conference on Cyber, Physical and Social computing, CPSCom 2020 and 6th IEEE international conference on Smart Data, SmartData 2020
作者: Yin, Chao Li, Tongfang Qu, Xiaoping Yuan, Sihao School of Information Science and Technology Jiujiang University Jiujiang332005 China
With the rapid development of the network, a huge amount of data will be generated. Existing technologies usually use cloud computing to process data. However, when all the data of users need to be transferred to the ... 详细信息
来源: 评论
SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering
SYN Flood Attack Detection and Mitigation using Machine Lear...
收藏 引用
international conference on Intelligence in Next Generation Networks (ICIN)
作者: Marinos Dimolianis Adam Pavlidis Vasilis Maglaris Network Management & Optimal Design Laboratory (NETMODE) School of Electrical & Computer Engineering National Technical University of Athens (NTUA) Greece
distributed Denial of Service (DDoS) attacks are widely used by malicious actors to disrupt network infrastructures/services. A common attack is TCP SYN Flood that attempts to exhaust memory and processing resources. ... 详细信息
来源: 评论
Cyber-Physical Production System Self-Description-Based Data Access Layer  24
Cyber-Physical Production System Self-Description-Based Data...
收藏 引用
24th IEEE international conference on Emerging Technologies and Factory Automation (ETFA)
作者: Stock, Daniel Schel, Daniel Bauernhansl, thomas Fraunhofer Inst Mfg Engn & Automat IPA Competence Ctr DigITools Mfg Stuttgart Germany
Cyber-Physical Production systems (CPPS) are Cyber-Physical systems (CPS), which are applied in manufacturing environments to carry out production related tasks, thus turning them into smart manufacturing environments... 详细信息
来源: 评论
distributed scheduling in Kubernetes based on MAS for Fog-in-the-loop applications  24
Distributed scheduling in Kubernetes based on MAS for Fog-in...
收藏 引用
24th IEEE international conference on Emerging Technologies and Factory Automation (ETFA)
作者: Casquero, Oskar Armentia, Aintzane Sarachaga, Isabel Perez, Federico Orive, Dario Marcos, Marga Univ Basque Country EIB Bilbao Dept Automat Control & Syst Engn Bilbao Spain
With cloud computing gaining momentum in industrial environments, the next step seems to move the computing infrastructure closer to the devices that collect the data at plant level. Fog computing is a paradigm that t... 详细信息
来源: 评论
Consistency of the Fittest: Towards Dynamic Staleness Control for Edge Data Analytics  24th
Consistency of the Fittest: Towards Dynamic Staleness Contro...
收藏 引用
24th international European conference on Parallel and distributed computing (Euro-Par)
作者: Aral, Atakan Brandic, Ivona Vienna Univ Technol Inst Informat Syst Engn Vienna Austria
A critical challenge for data stream processing at the edge of the network is the consistency of the machine learning models in distributed worker nodes. Especially in the case of non-stationary streams, which exhibit... 详细信息
来源: 评论
Adaptive Stream-based Shifting Bottleneck Detection in IoT-based computing Architectures  24
Adaptive Stream-based Shifting Bottleneck Detection in IoT-b...
收藏 引用
24th IEEE international conference on Emerging Technologies and Factory Automation (ETFA)
作者: Najdataei, Hannaneh Subramaniyan, Mukund Gulisano, Vincenzo Skoogh, Anders Papatriantafilou, Marina Chalmers Univ Technol Gothenburg Sweden
Cloud computing is revolutionizing the backbone of data analysis applications, including industrial ones. One of its main pillars is the separation of the logic with which data is accessed (e.g., to study the efficien... 详细信息
来源: 评论