咨询与建议

限定检索结果

文献类型

  • 4,676 篇 会议
  • 223 册 图书
  • 32 篇 期刊文献

馆藏范围

  • 4,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,844 篇 工学
    • 3,365 篇 计算机科学与技术...
    • 2,591 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 476 篇 电气工程
    • 379 篇 生物工程
    • 347 篇 动力工程及工程热...
    • 310 篇 生物医学工程(可授...
    • 275 篇 电子科学与技术(可...
    • 241 篇 机械工程
    • 218 篇 仪器科学与技术
    • 210 篇 环境科学与工程(可...
    • 201 篇 安全科学与工程
    • 149 篇 交通运输工程
    • 148 篇 网络空间安全
  • 1,428 篇 理学
    • 673 篇 数学
    • 408 篇 生物学
    • 250 篇 物理学
    • 204 篇 统计学(可授理学、...
    • 170 篇 大气科学
    • 150 篇 系统科学
    • 136 篇 化学
  • 1,067 篇 管理学
    • 791 篇 管理科学与工程(可...
    • 492 篇 工商管理
    • 356 篇 图书情报与档案管...
  • 309 篇 医学
    • 286 篇 临床医学
    • 279 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
    • 151 篇 药学(可授医学、理...
  • 201 篇 法学
  • 175 篇 经济学
    • 175 篇 应用经济学
  • 82 篇 农学
  • 65 篇 教育学
  • 10 篇 军事学
  • 8 篇 文学
  • 2 篇 艺术学

主题

  • 581 篇 cloud computing
  • 292 篇 internet of thin...
  • 127 篇 computer communi...
  • 97 篇 artificial intel...
  • 96 篇 edge computing
  • 93 篇 information syst...
  • 86 篇 fog computing
  • 78 篇 big data
  • 77 篇 software enginee...
  • 73 篇 cryptography
  • 61 篇 machine learning
  • 59 篇 servers
  • 56 篇 cloud security
  • 55 篇 blockchain
  • 53 篇 monitoring
  • 48 篇 algorithm analys...
  • 45 篇 virtual machine
  • 44 篇 security
  • 44 篇 cloud storage
  • 42 篇 quality of servi...

机构

  • 22 篇 sternberg astron...
  • 18 篇 institute for nu...
  • 15 篇 service de physi...
  • 13 篇 center for astro...
  • 13 篇 department of ph...
  • 13 篇 department of ph...
  • 13 篇 the graduate sch...
  • 13 篇 graduate school ...
  • 13 篇 department of ph...
  • 13 篇 graduate school ...
  • 13 篇 department of ph...
  • 13 篇 institute of par...
  • 13 篇 information engi...
  • 13 篇 academic assembl...
  • 13 篇 department of ph...
  • 13 篇 interdisciplinar...
  • 13 篇 faculty of engin...
  • 13 篇 graduate school ...
  • 13 篇 ceico institute ...
  • 13 篇 department of ph...

作者

  • 24 篇 jui c.c.h.
  • 24 篇 oshima a.
  • 24 篇 tsuda r.
  • 24 篇 kim j.h.
  • 24 篇 bergman d.r.
  • 24 篇 allen m.
  • 24 篇 matsuyama t.
  • 24 篇 wong t.
  • 24 篇 ishii t.
  • 24 篇 kim s.w.
  • 24 篇 takamura m.
  • 24 篇 yashiro k.
  • 24 篇 kadota k.
  • 24 篇 mayta r.
  • 24 篇 ozawa s.
  • 24 篇 ikeda d.
  • 24 篇 belz j.w.
  • 24 篇 kasami s.
  • 24 篇 tameda y.
  • 24 篇 rodriguez d.c.

语言

  • 4,797 篇 英文
  • 116 篇 其他
  • 19 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=Proceedings of the 2019 International Communication Engineering and Cloud Computing Conference"
4931 条 记 录,以下是51-60 订阅
排序:
Research on anti-jamming technology of pseudo-code phase modulation fuse pulse based on CPOKF
Research on anti-jamming technology of pseudo-code phase mod...
收藏 引用
2024 international conference on cloud computing and communication engineering, CCCE 2024
作者: Zhang, Zheng Wei, Daozhi Wang, Jinze Zhu, Bingchen Air Defense and Antimissile School Air Force Engineering University Xi’an710051 China
At present, it is critical to protect radar and communication systems from interference. As technology continues to advance, ensuring the stability and security of these systems is becoming more and more important to ... 详细信息
来源: 评论
Enhancing the Security of Virtualized Infrastructure through Big Data Analytics in cloud computing  1
Enhancing the Security of Virtualized Infrastructure through...
收藏 引用
1st IEEE international conference on Advances in computing, communication and Networking, ICAC2N 2024
作者: Bisen, Anand Singh Kumar, Ravi Hema, B. Jenasamanta, Abhinash Shakya, Lalit Mohan Shanthi, R. Vikrant University Dept. of CSE and IT Gwalior India ITM Skill University Dept of CSE Mumbai India Dhanalakshmi Srinivasan College of Engineering Dept. of Electronics and Communication Engineering Coimbatore India Usha Martin University Dept. of CSE Jharkhand India Science J.S. University Dept. of Computer Shikohabad India Meenakshi A.H.E.R Dept. of Mathematics Chennai India
This research paper presents a novel approach to enhancing the security of virtualized environments through big data analytics in cloud computing. While virtualization and cloud computing provide flexibility and cost-... 详细信息
来源: 评论
Enhancing the Security and Integrity of Intrusion Detection Systems based on CNN and LSTM Approach for cloud computing  5
Enhancing the Security and Integrity of Intrusion Detection ...
收藏 引用
5th international conference on Smart Electronics and communication, ICOSEC 2024
作者: Arunkumar, K. Kumar, S. Sai Vulapula, Sridhar Reddy Inayathulla, Mohammed Venkatesh, N. Babu, G. Charles Malla Reddy Engineering college Department of Cse Telangana Secunderabad India Pvp Siddhartha Institute of Technology Department of It Andhrapradesh Vijayawada India Vignana Bharathi Institute of Technology Department of It Telangana Hyderabad India Gates Institute of Technology Department of Cse Andhra Pradesh Gooty India Sr University School of Computer Science and Artificial Intelligence Telangana Warangal506371 India Gokaraju Rangaraju Institute of Engineering and Technology Department of Cse Telangana Hyderabad India
As cloud computing environments become increasingly prevalent, ensuring the security and integrity of these systems is paramount. Traditional intrusion detection systems (IDS) often fall short in addressing the dynami... 详细信息
来源: 评论
Application and Optimization Algorithms of Multi-Party Secure computing in Information communication
Application and Optimization Algorithms of Multi-Party Secur...
收藏 引用
2024 international conference on Power, Electrical engineering, Electronics and Control, PEEEC 2024
作者: Ye, Lu Tang, Yi Sun, Jun State Grid Hubei Electric Power Co. Ltd. Information & Communication Branch Hubei Wuhan430077 China
With the rapid growth of information technology (IT), the amount of data generated by various industries in modern society is exploding. However, while enjoying the convenience brought by data, how to ensure the priva... 详细信息
来源: 评论
Feature as a Service (FaaS): Customized Service in cloud computing  1
Feature as a Service (FaaS): Customized Service in Cloud Com...
收藏 引用
1st IEEE international conference on Advances in computing, communication and Networking, ICAC2N 2024
作者: Sharma, Aditi Kaushik, Deepti Maurya, Santosh Kumar Malik, Suraj Kumar, Gaurav Asim, Mohammad IIMT University Computer Science and Engineering Department Uttar Pradesh Meerut India Sharda University Department of Computer Science and Engineering Uttar Pradesh Greater Noida India
The world is changing due to technological changes. Like the business approach, there is a need to maintain tremendous pressure for reliable service architecture. Features of trust may include cost-effectiveness, reli... 详细信息
来源: 评论
Federated Learning Strategies for Privacy-Preserving Machine Learning Models in cloud computing Environments
Federated Learning Strategies for Privacy-Preserving Machine...
收藏 引用
2024 international conference on communication, Computer Sciences and engineering, IC3SE 2024
作者: Tiwari, Shashank Shekhar Dhasmana, Gulshan Al-Jawahry, Hassan M. Rana, Aditya Bhardwaj, Garima Srivastava, Arun Pratap Rec Department Of Information Technology U.P Ambedkar Nagar India Dr. Abdul Kalam Technical University Lucknow India Graphic Era Deemed To Be University Department Of Computer Science & Engineering Dehradun India College Of Technical Engineering The Islamic University Department Of Computers Techniques Engineering Najaf Iraq Amity Business School Amity University Greater Noida India Lloyd Institute Of Engineering & Technology Greater Noida India
Federated learning presents a promising approach for preparing machine learning models while protecting information protection in cloud computing situations. This investigation examines the adequacy of different unifi... 详细信息
来源: 评论
Optimised Load Balancing for Green cloud computing  13
Optimised Load Balancing for Green Cloud Computing
收藏 引用
13th international conference on cloud computing, Data Science and engineering, Confluence 2023
作者: Girsa, Deepanshu Chauhan, Devansh Sharma, Dolly Amity Univeristy Amity School of Engineering Noida India
Consumption of energy accounts for a significant portion of the costs associated with carrying out any activity. cloud computing has seen spectacular development in network technology because of the advancements in co... 详细信息
来源: 评论
A change detection method for multi-source heterogeneous images using a refined hierarchical clustering approach
A change detection method for multi-source heterogeneous ima...
收藏 引用
2024 international conference on cloud computing and communication engineering, CCCE 2024
作者: Xu, Junfeng Yang, Na Lou, Yilan Zhang, Chenhui School of Non-Commissioned Officer Space Engineering University No.7 Fuxue Road Changping District Beijing102249 China
For change detection in multi-source heterogeneous images, this paper proposes a change detection method using a refined hierarchical clustering approach. For multi-source heterogeneous multi-temporal images, Stacked ... 详细信息
来源: 评论
1st international conference on Innovation in Electrical Power engineering, communication, and computing Technology, IEPCCT 2019
1st International Conference on Innovation in Electrical Pow...
收藏 引用
1st international conference on Innovation in Electrical Power engineering, communication, and computing Technology, IEPCCT 2019
The proceedings contain 58 papers. The special focus in this conference is on Innovation in Electrical Power engineering, communication, and computing Technology. The topics include: Studies on off-grid solar photovol...
来源: 评论
Hybrid Machine Learning Approach for Enhanced Vulnerability Detection in cloud Environments Using NIST and MITRE Frameworks  5
Hybrid Machine Learning Approach for Enhanced Vulnerability ...
收藏 引用
5th international conference on Advanced Research in computing, ICARC 2025
作者: Lasantha, N W Chanaka Maduranga, M.W.P. Abeysekara, Ruvan Tilwari, Valmik Chakraborty, Nilotpal Sharma, Debashree Iic University of Technology Faculty of Graduate Studies Phnom Penh Cambodia University of Sri Jayewardenepura Department of Electrical and Electronic Engineering Nugegoda Sri Lanka Bcas Campus Faculty of Computing Colombo Sri Lanka Indian Institute of Information Technology Department of Computer Science Engineering Guwahati India Indian Institute of Information Technology Department of Electronics & Communication Engineering Guwahati India
cloud security is challenged by constant adaptive cyber threats and traditional detection methods lack real time adaptability. In this paper, we propose a new hybrid ML approach stitching data from National Institute ... 详细信息
来源: 评论