咨询与建议

限定检索结果

文献类型

  • 1,610 篇 会议
  • 5 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,145 篇 工学
    • 1,029 篇 计算机科学与技术...
    • 617 篇 软件工程
    • 175 篇 电气工程
    • 161 篇 信息与通信工程
    • 127 篇 控制科学与工程
    • 42 篇 机械工程
    • 38 篇 土木工程
    • 33 篇 电子科学与技术(可...
    • 30 篇 建筑学
    • 29 篇 生物工程
    • 24 篇 动力工程及工程热...
    • 20 篇 石油与天然气工程
    • 20 篇 安全科学与工程
    • 15 篇 交通运输工程
    • 14 篇 仪器科学与技术
    • 14 篇 化学工程与技术
    • 13 篇 生物医学工程(可授...
  • 217 篇 理学
    • 115 篇 数学
    • 46 篇 系统科学
    • 37 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 23 篇 物理学
    • 16 篇 化学
  • 199 篇 管理学
    • 110 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 69 篇 工商管理
  • 35 篇 法学
    • 24 篇 社会学
    • 12 篇 法学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 19 篇 医学
    • 16 篇 基础医学(可授医学...
  • 12 篇 教育学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 36 篇 distributed comp...
  • 33 篇 distributed syst...
  • 27 篇 middleware
  • 27 篇 distributed comp...
  • 19 篇 computer systems...
  • 18 篇 quality of servi...
  • 18 篇 semantics
  • 16 篇 distributed data...
  • 15 篇 fault tolerance
  • 14 篇 event processing
  • 14 篇 blockchain
  • 14 篇 cloud computing
  • 14 篇 web services
  • 13 篇 real time system...
  • 13 篇 information mana...
  • 13 篇 wireless sensor ...
  • 13 篇 machine learning
  • 13 篇 ontology
  • 12 篇 internet of thin...
  • 12 篇 computer science

机构

  • 7 篇 college of compu...
  • 7 篇 fzi research cen...
  • 6 篇 institute of dis...
  • 5 篇 fzi research cen...
  • 5 篇 university of os...
  • 5 篇 university of st...
  • 5 篇 humboldt-univers...
  • 4 篇 carnegie mellon ...
  • 4 篇 ulm univ inst di...
  • 3 篇 inria
  • 3 篇 univ magdeburg c...
  • 3 篇 univ toronto on
  • 3 篇 institute of par...
  • 3 篇 osaka univ osaka
  • 3 篇 pacific northwes...
  • 3 篇 delft university...
  • 3 篇 department of ci...
  • 3 篇 grid computing a...
  • 3 篇 college of compu...
  • 3 篇 eth zurich

作者

  • 16 篇 rothermel kurt
  • 12 篇 koldehofe boris
  • 11 篇 jacobsen hans-ar...
  • 10 篇 dustdar schahram
  • 8 篇 ramachandran uma...
  • 7 篇 kargl frank
  • 7 篇 tariq muhammad a...
  • 7 篇 jerzak zbigniew
  • 6 篇 erb benjamin
  • 6 篇 zhou yongluan
  • 5 篇 ottenwälder beat...
  • 5 篇 stojanovic nenad
  • 5 篇 nenad stojanovic
  • 5 篇 fetzer christof
  • 5 篇 buyya rajkumar
  • 4 篇 meissner dominik
  • 4 篇 ziekow holger
  • 4 篇 margara alessand...
  • 4 篇 kosch harald
  • 4 篇 chen tianzhou

语言

  • 1,600 篇 英文
  • 16 篇 其他
  • 2 篇 俄文
  • 1 篇 中文
检索条件"任意字段=Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems"
1619 条 记 录,以下是231-240 订阅
排序:
X international conference on High-Performance Computing systems and Technologies in Scientific Research, Automation of Control and Production, HPCST 2020
X International Conference on High-Performance Computing Sys...
收藏 引用
10th international conference on High-Performance Computing systems and Technologies in Scientific Research, Automation of Control and Production, HPCST 2020
the proceedings contain 32 papers. the topics discussed include: VLSI architecture with a configurable data processing path based on serial distributed arithmetic;improving the performance of processing special comput...
来源: 评论
Managing the Security-Energy Tradeoff in distributed Cyber-physical systems  19
Managing the Security-Energy Tradeoff in Distributed Cyber-p...
收藏 引用
10th acm/IEEE international conference on Cyber-Physical systems (ICCPS)
作者: Anh-Duy Vu Medhat, Ramy Bonakdarpour, Borzoo McMaster Univ Hamilton ON Canada Univ Waterloo Waterloo ON Canada Iowa State Univ Ames IA USA Google Waterloo Kitchener ON Canada
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in order to improve the level of security of the system. this is in contrast to most existi... 详细信息
来源: 评论
Pushdown Automata Versioning Framework for Web-based Developmental Surveillance systems  10
Pushdown Automata Versioning Framework for Web-Based Develop...
收藏 引用
10th IEEE international conference on Control System, Computing and Engineering, ICCSCE 2020
作者: Ch'Ng, Yan Huan Osman, Mohd Azam Jong, Hui Ying Universiti Sains Malaysia School of Computer Sciences Gelugor Penang Malaysia Universiti Sains Malaysia School of Humanities Gelugor Penang Malaysia
the development of existing software system, including web-based developmental surveillance programs, adopt linear software versioning systems wherein all files associated to a particular software version is pre-packe... 详细信息
来源: 评论
Anomaly detection in traffic surveillance videos with GAN-based future frame prediction  20
Anomaly detection in traffic surveillance videos with GAN-ba...
收藏 引用
10th acm international conference on Multimedia Retrieval, ICMR 2020
作者: Nguyen, Khac-Tuan Dinh, Dat-thanh Do, Minh N. Tran, Minh-Triet University of Science Vietnam National University Ho Chi Minh City Viet Nam University of Illinois at Urbana-Champaign Urbana-Champaign United States
It is essential to develop efficient methods to detect abnormal events, such as car-crashes or stalled vehicles, from surveillance cameras to provide in-time help. this motivates us to propose a novel method to detect... 详细信息
来源: 评论
Static Termination Analysis for event-driven distributed Algorithms  19
Static Termination Analysis for Event-driven Distributed Alg...
收藏 引用
13th acm international conference on distributed and event-based systems (DEBS)
作者: Wiemuth, Felix Amthor, Peter Kuehnhauser, Winfried E. Tech Univ Ilmenau Ilmenau Germany
Termination is an important non-functional property of distributed algorithms. In an event-driven setting, the interesting aspect of termination is the possibility of control flow loops through communication, which th... 详细信息
来源: 评论
10th Annual international conference on Biologically Inspired Cognitive Architectures, BICA 2019
10th Annual International Conference on Biologically Inspire...
收藏 引用
10th Annual international conference on Biologically Inspired Cognitive Architectures, BICA 2019
the proceedings contain 79 papers. the special focus in this conference is on Biologically Inspired Cognitive Architectures. the topics include: Practical User and Entity Behavior Analytics Methods for Fraud Detection...
来源: 评论
Intrusion Detection Using Extremely Limited Data based on SDN  10
Intrusion Detection Using Extremely Limited Data Based on SD...
收藏 引用
10th IEEE international conference on Intelligent systems, IS 2020
作者: Banton, Matthew Shone, Nathan Hurst, William Shi, Qi Liverpool John Moores University Department of Computer Science Liverpool United Kingdom
In Western Europe, the number of Internet connected devices is expected to increase from the 2.3 billion devices in 2017, to 4 billion in 2022. Dealing with this growth is an increasing problem for administrators atte... 详细信息
来源: 评论
Correctness and consistency of event-based systems  19
Correctness and consistency of event-based systems
收藏 引用
13th acm international conference on distributed and event-based systems, DEBS 2019
作者: Etzion, Opher Information System Dept. Yezreel Valley College Israel
event-based systems encounter challenges of correctness and consistency. Correctness means that the execution results match the intention of the designer. Consistency means that different data elements that co-exist w... 详细信息
来源: 评论
On the need for distributed complex event processing with multiple sinks  19
On the need for distributed complex event processing with mu...
收藏 引用
13th acm international conference on distributed and event-based systems, DEBS 2019
作者: Akili, Samira Humboldt University of Berlin Germany
distributed complex event processing evaluates CEP-queries over data produced by geographically distributed sources. To cope with bandwith restrictions, it is common to employ in-network processing where the operators... 详细信息
来源: 评论
Identifying Security Challenges in Renewable Energy systems: A Wind Turbine Case Study  19
Identifying Security Challenges in Renewable Energy Systems:...
收藏 引用
10th acm international conference on Future Energy systems (e-Energy)
作者: Jindal, Anish Marnerides, Angelos K. Scott, Andrew Hutchison, David Univ Lancaster Sch Comp & Commun Lancaster England
distributed renewable energy systems (DRESs) and their interconnection network, typically using Internet-based protocols, are susceptible to a wide range of cyber-security and resilience challenges. these challenges h... 详细信息
来源: 评论