咨询与建议

限定检索结果

文献类型

  • 4,215 篇 会议
  • 85 篇 期刊文献
  • 77 册 图书

馆藏范围

  • 4,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,406 篇 计算机科学与技术...
    • 1,339 篇 软件工程
    • 624 篇 电气工程
    • 540 篇 信息与通信工程
    • 353 篇 控制科学与工程
    • 150 篇 机械工程
    • 121 篇 动力工程及工程热...
    • 113 篇 电子科学与技术(可...
    • 76 篇 生物工程
    • 60 篇 仪器科学与技术
    • 55 篇 石油与天然气工程
    • 54 篇 环境科学与工程(可...
    • 51 篇 材料科学与工程(可...
    • 50 篇 建筑学
    • 50 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 46 篇 交通运输工程
    • 44 篇 安全科学与工程
  • 637 篇 理学
    • 370 篇 数学
    • 136 篇 物理学
    • 96 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 90 篇 系统科学
    • 43 篇 化学
  • 512 篇 管理学
    • 352 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 193 篇 工商管理
  • 70 篇 医学
    • 56 篇 临床医学
  • 67 篇 法学
    • 50 篇 社会学
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 31 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 221 篇 distributed comp...
  • 218 篇 distributed comp...
  • 82 篇 computer archite...
  • 78 篇 distributed data...
  • 72 篇 computer science
  • 69 篇 cloud computing
  • 68 篇 computer network...
  • 64 篇 application soft...
  • 60 篇 grid computing
  • 60 篇 distributed syst...
  • 53 篇 middleware
  • 51 篇 protocols
  • 49 篇 artificial intel...
  • 48 篇 concurrent compu...
  • 48 篇 software enginee...
  • 47 篇 real time system...
  • 47 篇 distributed powe...
  • 42 篇 costs
  • 41 篇 scalability
  • 41 篇 database systems

机构

  • 10 篇 distributed syst...
  • 7 篇 beijing hiwing s...
  • 7 篇 irisa rennes
  • 7 篇 unmanned system ...
  • 7 篇 nanjing universi...
  • 7 篇 college of intel...
  • 7 篇 beijing universi...
  • 7 篇 3-30-1 wajiro-hi...
  • 6 篇 shanghai jiao to...
  • 5 篇 tsinghua univ de...
  • 5 篇 ieee
  • 5 篇 carnegie mellon ...
  • 5 篇 sun yat-sen univ...
  • 5 篇 beijing univ pos...
  • 5 篇 national univers...
  • 5 篇 department of in...
  • 4 篇 ocean univ china...
  • 4 篇 china electric p...
  • 4 篇 beijing univ pos...
  • 4 篇 seikei universit...

作者

  • 14 篇 dustdar schahram
  • 12 篇 barolli leonard
  • 11 篇 xhafa fatos
  • 11 篇 anon
  • 8 篇 takizawa makoto
  • 7 篇 yifeng niu
  • 7 篇 wenxing fu
  • 7 篇 mancang gu
  • 7 篇 yi qu
  • 5 篇 li kuan-ching
  • 5 篇 enokido tomoya
  • 5 篇 segundo moisés t...
  • 5 篇 luis enrique maf...
  • 4 篇 kulla elis
  • 4 篇 decker christian
  • 4 篇 ikeda makoto
  • 4 篇 molina m. g.
  • 4 篇 truong hong-linh
  • 4 篇 liu feng
  • 4 篇 suresh chandra s...

语言

  • 4,280 篇 英文
  • 82 篇 其他
  • 24 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"任意字段=Proceedings - 3rd International Conference on Distributed Computing Systems."
4377 条 记 录,以下是111-120 订阅
排序:
An Efficient Penetration testing framework for Web Applications
An Efficient Penetration testing framework for Web Applicati...
收藏 引用
Advancements in Electrical, Electronics, Communication, computing and Automation (ICAECA), international conference on
作者: A. Roshini N. Suganthi Dhivakar. S Sai Sangeetha M K. Karthika Jayalakshmi. V Sriharisudhan P Computer Science and Engineering Kumaraguru College of Technology Coimbatore India
In the world currently networked, web applications play an important role in running businesses and are considered potential favourites for cyber-attacks. This paper incorporates an all-inclusive framework of web appl... 详细信息
来源: 评论
A Comprehensive Review of Swarm Intelligence-Based Meta-Heuristic Algorithms
A Comprehensive Review of Swarm Intelligence-Based Meta-Heur...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Abhineet Suman Gunjan Anupam Biswas Department of Computer Science and Engineering National Institute of Technology Delhi India Department of Computer Science and Engineering National Institute of Technology Silchar Assam India
Swarm Intelligence (SI) algorithms, motivated by the group actions of natural systems. offer robust and efficient solutions to complex optimization problems. This review explores several key SI algorithms, including C... 详细信息
来源: 评论
Brain Magnetic Resonance Imaging Segmentation System in MS with Deep Neural Networks  18th
Brain Magnetic Resonance Imaging Segmentation System in MS w...
收藏 引用
18th EAI international conference on Pervasive computing Technologies for Healthcare, PervasiveHealth 2024
作者: Adamides, Giorgos Panayides, Andreas Loizou, Christos P. Nicolaou, Andria Pantzaris, Marios Pattichis, Constantinos Department of Computer Science University of Cyprus Nicosia Cyprus 3AE HEALTH LTD Nicosia Cyprus CYENS CoE Nicosia Cyprus Department of Electrical Engineering and Computer Engineering and Informatics Cyprus University of Technology Limassol Cyprus School of Molecular Medicine The Cyprus Institute of Neurology and Genetics University of Cyprus Nicosia Cyprus
Multiple Sclerosis (MS) is a chronic autoimmune disease that affects the central nervous system. Nerves are covered by a layer called myelin, which is responsible for protecting and maintaining their functionality. In... 详细信息
来源: 评论
Non-Governmental Organization Funding with Blockchain
Non-Governmental Organization Funding with Blockchain
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Sumit Kumar Himanshu Vashistha Deepanshu Kumar Sharad Singhal Department of Information Technology ABES Institute of Technology Ghaziabad India
Although a relationship between NGOs and their donors is based more on trust, donors would expect N GOs to demonstrate legitimacy and accountability this time. Transparency is at the core of building such confidence, ... 详细信息
来源: 评论
High Performance Visualization for Astrophysics and Cosmology
High Performance Visualization for Astrophysics and Cosmolog...
收藏 引用
Euromicro conference on Parallel, distributed and Network-Based Processing
作者: Nicola Tuccari Eva Sciacca Fabio Vitello Iacopo Colonnelli Yolanda Becerra Enric Sosa Cintero Guillermo Marin Milan Jaros Lubomir Riha Petr Strakos Sebastian Trujillo-Gomez Emiliano Tramontana Robert Wissing Istituto Nazionale di Astrofisica Catania Italy Università di Torino Torino Italy Barcelona Supercomputing Center Barcelona Spain IT4Innovations National Supercomputing Center Ostrava Czech Republic Heidelberg Institute for Theoretical Studies Heidelberg Germany Università degli Studi di Catania Italy University of Oslo Institute of Theoretical Astrophysics Oslo Norway
Modern Astrophysics and Cosmology (A&C) projects produce immense data volumes, necessitating advanced software tools for data access, storage, and analysis. Visualization Interface for the Virtual Observatory (Vis... 详细信息
来源: 评论
A Hybrid Approach to Feature Selection for Cyber Threat Detection in IoT Networks
A Hybrid Approach to Feature Selection for Cyber Threat Dete...
收藏 引用
Device Intelligence, computing and Communication Technologies, (DICCT), international conference on
作者: Mohammad Ubaidullah Bokhari Mohd Zain Khan Faheem Syeed Masoodi Department of Computer Science Aligarh Muslim University Aligarh India School of ICT Bahrain Polytechnic Kingdom of Bahrain Research Fellow INTI International University Malaysia
The quick expansion of Internet of Things (IoT) devices have greatly impact multiple sectors, including healthcare, smart agriculture, and environmental monitoring, thereby impacting human lives. The heterogeneous nat... 详细信息
来源: 评论
Mitigating the Technological Challenges of Regenerative Farming with an Integrated Framework Merging IoT, Ontologies, and GIS  3rd
Mitigating the Technological Challenges of Regenerative Farm...
收藏 引用
3rd international conference on Advancements in Smart computing and Information Security, ASCIS 2024
作者: Mokgetse, Tshepiso L. Sridaran, Rajagopal Hlomani, Hlomani Botswana International University of Science and Technology Palapye Boseja Botswana Marwadi University Gujarat Rajkot India
Regenerative farming offers a sustainable approach to agriculture by promoting ecosystem restoration, soil health, and biodiversity conservation. However, the adoption of regenerative practices faces significant techn... 详细信息
来源: 评论
Scalable Intrusion Detection Using Recurrent Neural Networks in distributed Data Engineering systems  3rd
Scalable Intrusion Detection Using Recurrent Neural Networks...
收藏 引用
3rd international conference on Advancements in Smart computing and Information Security, ASCIS 2024
作者: Jeyaram, A. Muthukumaravel, A. Chennai India Chennai India
Traditional Intrusion Detection systems.(IDS) frequently rely on anomaly and signature-based methods, which have limits in terms of accuracy, scalability, and flexibility. Anomaly-based systems.generate a high number ... 详细信息
来源: 评论
Identifying Application-Level distributed Denial-of-Service (DDoS) Attacks with Machine Learning (ML)  3rd
Identifying Application-Level Distributed Denial-of-Service ...
收藏 引用
3rd international conference on Advancements in Smart computing and Information Security, ASCIS 2024
作者: Yaqub, Muhammad Atif Mustafa, Muzzamil Chuhan, Saad Hussain Sattar, Basit Hasan, Muhammad Zulkifl Hussain, Muhammad Zunnurain Qaiser, Muhammad Saad Abdin, Zain ul Bilal, Afshan Ali, Jibran Department of Computer Science National College of Business Administration and Economics Lahore Pakistan Department of Artificial Intelligence University of Management and Technology Lahore Pakistan Faculty of IT and Computer Science University of Central Punjab Lahore Pakistan Department of Computer Science Bahria University Lahore Campus Lahore Pakistan Premier Systems Karachi Pakistan
The modern digital age has seen an exponential growth in internet penetration, which in turn has increased the probability of a denial-of-service attack. When an evil user launches a Denial of Service (DoS) attack, it... 详细信息
来源: 评论
3rd international conference on Advancements in Smart computing and Information Security, ASCIS 2024
3rd International Conference on Advancements in Smart Comput...
收藏 引用
3rd international conference on Advancements in Smart computing and Information Security, ASCIS 2024
The proceedings contain 28 papers. The special focus in this conference is on Advancements in Smart computing and Information Security. The topics include: Prediction of Anti-Cholinesterase Inhibitor for Alzheimer Dis...
来源: 评论