咨询与建议

限定检索结果

文献类型

  • 14,345 篇 会议
  • 353 册 图书
  • 222 篇 期刊文献

馆藏范围

  • 14,918 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 9,573 篇 工学
    • 8,538 篇 计算机科学与技术...
    • 4,618 篇 软件工程
    • 1,930 篇 信息与通信工程
    • 1,748 篇 电气工程
    • 1,034 篇 控制科学与工程
    • 338 篇 电子科学与技术(可...
    • 319 篇 生物工程
    • 291 篇 机械工程
    • 258 篇 动力工程及工程热...
    • 187 篇 网络空间安全
    • 180 篇 建筑学
    • 178 篇 仪器科学与技术
    • 178 篇 生物医学工程(可授...
    • 143 篇 安全科学与工程
    • 137 篇 环境科学与工程(可...
    • 129 篇 交通运输工程
    • 124 篇 化学工程与技术
  • 2,096 篇 理学
    • 1,251 篇 数学
    • 368 篇 物理学
    • 355 篇 生物学
    • 317 篇 系统科学
    • 287 篇 统计学(可授理学、...
  • 1,774 篇 管理学
    • 1,231 篇 管理科学与工程(可...
    • 695 篇 图书情报与档案管...
    • 665 篇 工商管理
  • 311 篇 法学
    • 256 篇 社会学
  • 302 篇 医学
    • 194 篇 临床医学
    • 153 篇 公共卫生与预防医...
    • 123 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 159 篇 应用经济学
  • 115 篇 教育学
  • 100 篇 文学
  • 44 篇 农学
  • 33 篇 艺术学
  • 11 篇 军事学

主题

  • 906 篇 distributed comp...
  • 792 篇 distributed comp...
  • 668 篇 cloud computing
  • 453 篇 computer science
  • 388 篇 concurrent compu...
  • 383 篇 application soft...
  • 374 篇 computer archite...
  • 287 篇 grid computing
  • 274 篇 computational mo...
  • 246 篇 resource managem...
  • 219 篇 protocols
  • 217 篇 peer to peer com...
  • 216 篇 computer network...
  • 205 篇 fault tolerance
  • 204 篇 scalability
  • 198 篇 bandwidth
  • 195 篇 real time system...
  • 187 篇 costs
  • 167 篇 parallel process...
  • 164 篇 internet of thin...

机构

  • 44 篇 institute of com...
  • 38 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 ibm thomas j. wa...
  • 19 篇 shanghai jiao to...
  • 19 篇 university of ch...
  • 17 篇 department of co...
  • 15 篇 univ chinese aca...
  • 15 篇 department of co...
  • 14 篇 irisa rennes
  • 14 篇 shandong fundame...
  • 13 篇 tsinghua univers...
  • 13 篇 guangzhou univ s...
  • 13 篇 cent s univ sch ...
  • 13 篇 department of co...
  • 13 篇 college of compu...
  • 13 篇 college of compu...
  • 12 篇 graduate univers...
  • 12 篇 department of co...
  • 11 篇 georgia inst tec...

作者

  • 43 篇 dustdar schahram
  • 27 篇 zomaya albert y.
  • 17 篇 wang guojun
  • 15 篇 xu jie
  • 13 篇 wehrle klaus
  • 13 篇 li dongsheng
  • 13 篇 liu ling
  • 12 篇 zhang lei
  • 12 篇 p.s. yu
  • 12 篇 raynal michel
  • 11 篇 liu yang
  • 11 篇 liu jie
  • 11 篇 wang wei
  • 10 篇 k.g. shin
  • 10 篇 wu jie
  • 10 篇 wang yang
  • 10 篇 anon
  • 10 篇 m. raynal
  • 10 篇 barolli leonard
  • 9 篇 james anne

语言

  • 14,551 篇 英文
  • 292 篇 其他
  • 56 篇 中文
  • 19 篇 俄文
  • 9 篇 葡萄牙文
  • 4 篇 法文
  • 1 篇 德文
  • 1 篇 乌克兰文
检索条件"任意字段=Proceedings of the 15th International Conference on Distributed Computing Systems"
14920 条 记 录,以下是331-340 订阅
排序:
Anomaly Detection for Log using AutoM and Auto-Sklearn Classification Algorithm  15
Anomaly Detection for Log using AutoM and Auto-Sklearn Class...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Karthik, G.M. Gupta, Ankur Gupta, Sh Rajesh Jha, Amaresh Sivasangari, A. Mishra, B.P. School of Computer Science and Engineering Vellore Institute of Technology Vellore632014 India Department of CSE RIMT University Godindgarh Mandi India Department of Management Sanskriti University Uttar Pradesh Mathura India School of Modern Media University of Petroleum and Energy Studies Dehradun India School of Computing Sathyabama Institute of Science and Technology Chennai India Department of Electronics JSS Academy of Technical Education NoidaSector-62 India
— In the realm of application development, logs represent a pivotal resource for the identification and comprehension of application performance, as well as the detection of anomalies, all of which are essential for ... 详细信息
来源: 评论
Enhanced Crop Yield Prediction using Machine Learning Techniques  15
Enhanced Crop Yield Prediction using Machine Learning Techni...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Nossam, Sri Chakradhar Katakam, Rishi Anirudh Pulastya, Gopa Venugopalan, Manju Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
In modern agriculture, accurately anticipating crop yield estimation is critical aids of sustainable resource management, efficient decision-making, and food security. this is therefore a process that includes a break... 详细信息
来源: 评论
Enhancing Oil Spill Detection Using Synthetic Aperture Radar With Dual Attention U-Net Model  15
Enhancing Oil Spill Detection Using Synthetic Aperture Radar...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Shanmukh, M. Phani Priya, S. Baghavathi Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Chennai India
Oil spills present a critical hazard in oceans, requiring advanced monitoring systems to rapidly detect and contain environmental damage. this work proposes a deep learning approach combining a UNet encoder-decoder ar... 详细信息
来源: 评论
Enhancing Fog/Edge computing Education using Extended Network Simulator Omnet plus plus (xFogSim)  15
Enhancing Fog/Edge Computing Education using Extended Networ...
收藏 引用
15th IEEE Global Engineering Education conference (IEEE EDUCON)
作者: Qayyum, Tariq Trabelsi, Zouheir Alomar, Ban Parambil, Medha Mohan Ambali United Arab Emirates Univ Coll Informat Technol Al Ain U Arab Emirates
Fog computing is a technology that brings computing, storage, and networking services closer to devices and systems, aiming to improve speed, efficiency, and data processing capabilities for various applications. the ... 详细信息
来源: 评论
Sentiment Analysis using YouTube Comments  15
Sentiment Analysis using YouTube Comments
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Bindhumol, M. Singh, Tripty Patra, Payel Amrita School of Computing Dept. of Computer Science and Engineering Bangalore India University Of L'Aquila Disim Department L'Aquila Italy
the 'AI-Enhanced Product Recommendation System using YouTube Comments Analysis' leverages advanced deep learning models, specifically the Complex Convolutional Long Short-Term Memory (CLSTM) and Gated Recurren... 详细信息
来源: 评论
Reinforcement Empowered Deep Network Enabled Optimal Controlled Environment For Crop Yield  15
Reinforcement Empowered Deep Network Enabled Optimal Control...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Gorantla, Snehitha Veluchamy, S. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering - Artificial Intelligence Chennai601103 India Amrita Vishwa Vidyapeetham Amrita School of Engineering Department of Electronics and Communication Engineering Chennai601103 India
this paper focuses on developing a comprehensive system for optimised climate control in a simulated greenhouse setting with complex environment modelling, communication-enabled agents, and hyperparameter optimisation... 详细信息
来源: 评论
Examining the Benefits of AI in Wearable Sensor-based Healthcare Solutions  15
Examining the Benefits of AI in Wearable Sensor-based Health...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Takkalapally, Prashamsh Kasula, Balaram Yadav Patil, Sachin C. Logeshwaran, J. Lewis University Computing and Mathematical Sciences Department of Engineering United States University Of The Cumberlands Dept of Information Technology WilliamsburgKY United States United States Department of Computer Science Karnataka Bengaluru560029 India
the emergence of the AI generation has introduced adjustments to the manner healthcare solutions are advanced and applied. Wearable sensor-based total healthcare answers were revolutionized by leveraging AI in diverse... 详细信息
来源: 评论
Comparative Deep Learning Approach for Intrusion Detection  15
Comparative Deep Learning Approach for Intrusion Detection
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Sah, Nabin Kumar Kolli, Mahi Dharmaraj, Kadam Prajwal Vishwas, H.N. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
In the modern world, the security of computer networks from harmful activities is very important since cyber threats keep changing from time to time. However, Intrusion Detection systems (IDS) have not been able to ma... 详细信息
来源: 评论
Smart Traffic Flow Optimization with IoT and Machine Learning  15
Smart Traffic Flow Optimization with IoT and Machine Learnin...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Poojitha, D. Darak, Tanmay Samaddar, Ushnish Khanna, Manju Amrita Vishwa Vidyapeetham Amrita School Of Computing Department of Computer Science and Engineering Bengaluru India
Traffic signal optimization is crucial for the effective traffic management within cities with the primary goals being the reduction of bottleneck occurrences, avoidance of the extension of travelling time, and improv... 详细信息
来源: 评论
Intrusion Detection System (IDS) in Cloud computing using Machine Learning Algorithms: A Comparative Study  15
Intrusion Detection System (IDS) in Cloud Computing using Ma...
收藏 引用
15th international conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2024
作者: Rathod, Ganesh Sabnis, Vikrant Jain, Jay Kumar Faculty of Engineering & Technology Mansarovar Global University Bhopal India Indian Institute of Information Technology Madhya Pradesh Bhopal India
Organizations have witnessed a significant transformation in the realm of data storage and processing owing to the advent of cloud computing. Nonetheless, with its advantages, cloud computing has also brought forth ne... 详细信息
来源: 评论