咨询与建议

限定检索结果

文献类型

  • 4,684 篇 会议
  • 223 册 图书
  • 32 篇 期刊文献

馆藏范围

  • 4,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,852 篇 工学
    • 3,372 篇 计算机科学与技术...
    • 2,596 篇 软件工程
    • 1,039 篇 信息与通信工程
    • 538 篇 控制科学与工程
    • 479 篇 电气工程
    • 379 篇 生物工程
    • 347 篇 动力工程及工程热...
    • 310 篇 生物医学工程(可授...
    • 276 篇 电子科学与技术(可...
    • 241 篇 机械工程
    • 218 篇 仪器科学与技术
    • 210 篇 环境科学与工程(可...
    • 202 篇 安全科学与工程
    • 151 篇 交通运输工程
    • 150 篇 网络空间安全
  • 1,429 篇 理学
    • 674 篇 数学
    • 408 篇 生物学
    • 251 篇 物理学
    • 204 篇 统计学(可授理学、...
    • 170 篇 大气科学
    • 150 篇 系统科学
    • 136 篇 化学
  • 1,069 篇 管理学
    • 792 篇 管理科学与工程(可...
    • 492 篇 工商管理
    • 358 篇 图书情报与档案管...
  • 309 篇 医学
    • 286 篇 临床医学
    • 279 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
    • 151 篇 药学(可授医学、理...
  • 202 篇 法学
  • 175 篇 经济学
    • 175 篇 应用经济学
  • 82 篇 农学
  • 65 篇 教育学
  • 10 篇 军事学
  • 8 篇 文学
  • 2 篇 艺术学

主题

  • 581 篇 cloud computing
  • 292 篇 internet of thin...
  • 127 篇 computer communi...
  • 97 篇 artificial intel...
  • 96 篇 edge computing
  • 93 篇 information syst...
  • 86 篇 fog computing
  • 78 篇 big data
  • 77 篇 software enginee...
  • 73 篇 cryptography
  • 61 篇 machine learning
  • 59 篇 servers
  • 56 篇 cloud security
  • 55 篇 blockchain
  • 53 篇 monitoring
  • 48 篇 algorithm analys...
  • 45 篇 virtual machine
  • 44 篇 security
  • 44 篇 cloud storage
  • 42 篇 deep learning

机构

  • 22 篇 sternberg astron...
  • 18 篇 institute for nu...
  • 15 篇 service de physi...
  • 13 篇 center for astro...
  • 13 篇 department of ph...
  • 13 篇 department of ph...
  • 13 篇 the graduate sch...
  • 13 篇 graduate school ...
  • 13 篇 department of ph...
  • 13 篇 graduate school ...
  • 13 篇 department of ph...
  • 13 篇 institute of par...
  • 13 篇 information engi...
  • 13 篇 academic assembl...
  • 13 篇 department of ph...
  • 13 篇 interdisciplinar...
  • 13 篇 faculty of engin...
  • 13 篇 graduate school ...
  • 13 篇 ceico institute ...
  • 13 篇 department of ph...

作者

  • 24 篇 jui c.c.h.
  • 24 篇 oshima a.
  • 24 篇 tsuda r.
  • 24 篇 kim j.h.
  • 24 篇 bergman d.r.
  • 24 篇 allen m.
  • 24 篇 matsuyama t.
  • 24 篇 wong t.
  • 24 篇 ishii t.
  • 24 篇 kim s.w.
  • 24 篇 takamura m.
  • 24 篇 yashiro k.
  • 24 篇 kadota k.
  • 24 篇 mayta r.
  • 24 篇 ozawa s.
  • 24 篇 ikeda d.
  • 24 篇 belz j.w.
  • 24 篇 kasami s.
  • 24 篇 tameda y.
  • 24 篇 rodriguez d.c.

语言

  • 4,695 篇 英文
  • 226 篇 其他
  • 19 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=Proceedings of the 2019 International Communication Engineering and Cloud Computing Conference"
4939 条 记 录,以下是101-110 订阅
排序:
Survey on edge computing and its evolution
Survey on edge computing and its evolution
收藏 引用
2024 international conference on Optics, Electronics, and communication engineering, OECE 2024
作者: Zhu, Hongmei Lin, Yilin Qin, Zeng China Telecom Research Institute Guangdong Guangzhou510630 China
Edge computing is the key technology for 5G to achieve high bandwidth and low latency. It has been widely applied in vertical industries. However, with the fast development of various intelligent application services,... 详细信息
来源: 评论
Physiological Data-Based Stress Detection: From Wrist Sensors to cloud computing and User Feedback Integration
Physiological Data-Based Stress Detection: From Wrist Sensor...
收藏 引用
2024 international conference on Smart Systems for Electrical, Electronics, communication and Computer engineering, ICSSEEC 2024
作者: Karpagam, G.R. Harsha Vardhan, V.M. Kabilan, K.K. Pranav, P. Ramesh, Prednya Suvan Sathyendira, B. PSG College of Technology Computer Science & Engineering Coimbatore India
Stress Detection employing physiological data desires to grasp and apprehend physical and physiological signals. Skin conductance, three axes acceleration and temperature data are gathered by the system using various ... 详细信息
来源: 评论
FUZZY RULE-BASED TRUST MANAGEMENT FOR cloud SECURITY
FUZZY RULE-BASED TRUST MANAGEMENT FOR CLOUD SECURITY
收藏 引用
2024 international conference on Sustainable computing and Integrated communication in Changing Landscape of AI, ICSCAI 2024
作者: Loonkar, Shweta Taneja, Neeti Beemkumar, N. Department of ISME ATLAS SkillTech University Maharashtra Mumbai India Department of Computer Science and Engineering Noida Institute of Engineering & Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India
The growing need to solve large-scale computing problems has spurred the creation of multi cloud infrastructures in recent years. The complexity of trust-related problems has increased in this field, calling for creat... 详细信息
来源: 评论
Data Encryption in 6G Networks: A Zero- Knowledge Proof Model  8
Data Encryption in 6G Networks: A Zero- Knowledge Proof Mode...
收藏 引用
8th international conference on I-SMAC (IoT in Social, Mobile, Analytics and cloud), I-SMAC 2024
作者: Khamesra, Aryan Selvaraj, P. Singh, Isha Srm Institute of Science and Technology Faculty of Engineering and Technology School of Computing Department of Computing Technologies Chennai Tamil Nadu Kattankulathur603203 India
This work presents an innovative algorithm demonstrating the effectiveness of zero-knowledge proofs (ZKPs) in network security. By integrating Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) for key... 详细信息
来源: 评论
cloud computing Based Blended Learning: Quality Assurance Challenges
Cloud Computing Based Blended Learning: Quality Assurance Ch...
收藏 引用
2024 international conference on communication, Computer Sciences and engineering, IC3SE 2024
作者: Lata, Manju Sharma, Vibhu Uie Chandigarh University Cse Department Punjab Mohali India Chitkara University Institute Of Engineering And Technology Chitkara University Punjab India
As learning institutions increasingly adopt cloud-based blended learning models of integrating technology into traditional pedagogical approaches brings forth a myriad of challenges in ensuring quality assurance. This... 详细信息
来源: 评论
Security sharing of smart city communication data based on blockchain technology  10
Security sharing of smart city communication data based on b...
收藏 引用
10th IEEE international conference on Cyber Security and cloud computing and 9th IEEE international conference on Edge computing and Scalable cloud, CScloud-EdgeCom 2023
作者: Jun, Guo Liming, Zhong Yuxia, Dong Junjie, Wu QuanZhou University of Information Engineering Software College College of software engineering QuanZhou China
When the smart city communication data is safely shared, the sharing process is mainly realized through single authorization attribute base encryption, and the key and ciphertext cannot be updated in time, which makes... 详细信息
来源: 评论
Edge computing Resource Allocation Method Based on Federated Reinforcement Learning  2
Edge Computing Resource Allocation Method Based on Federated...
收藏 引用
2nd international conference on Signal Processing and Intelligent computing, SPIC 2024
作者: Huang, Yingchun Xie, Tao Shenyang Ligong University School of Information Science and Engineering Shenyang China
With the increase in the number of smart devices, the data generated is growing exponentially, leading to a large amount of data flowing to the cloud and causing congestion in core network communication. Edge computin... 详细信息
来源: 评论
Evolving Towards Optimal cloud Resource Allocation and Cost Management: An In-depth Analysis  1
Evolving Towards Optimal Cloud Resource Allocation and Cost ...
收藏 引用
1st IEEE international conference on Advances in computing, communication and Networking, ICAC2N 2024
作者: Pal, Sourabh Agrawal, Krishna Kant Kasi, Baskar Galgotias University School of Computing Science and Engineering Greater Noida India
This research paper explores the field of cloud computing optimisation, with the goal of tackling the two-fold difficulty of efficiently allocating resources and effectively managing costs. The primary objective is to... 详细信息
来源: 评论
Comprehensive Review on Fog computing: Obstacles, Feature Traits, Limitations, and Potential Leverages on Application  4
Comprehensive Review on Fog Computing: Obstacles, Feature Tr...
收藏 引用
4th international conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Sarkar, Tiyas Rakhra, Manik Singh, Pritpal Angra, Prikshat Kumar Cheema, Gagandeep Singh Mathur, Neeraj School of Computer Science and Engineering Lovely Professional University Punjab Phagwara India Mittal School of Business Lovely Professional University Punjab Phagwara India School of Computer Applications Lovely Professional University Punjab Phagwara India
A paradigm known as 'Fog computing' makes use of the benefits that come from using both cloud and edge devices to help contemporary computer systems by lowering latency, enhancing mobility, offering quality se... 详细信息
来源: 评论
A Systematic Literature Review on Continuous Integration and Deployment (CI/CD) for Secure cloud computing  20
A Systematic Literature Review on Continuous Integration and...
收藏 引用
20th international conference on Web Information Systems and Technologies, WEBIST 2024
作者: Saleh, Sabbir M. Madhavji, Nazim Steinbacher, John Department of Computer Science University of Western Ontario LondonON Canada IBM Canada Lab MarkhamON Canada
As cloud environments become widespread, cybersecurity has emerged as a top priority across areas such as networks, communication, data privacy, response times, and availability. Various sectors, including industries,... 详细信息
来源: 评论