咨询与建议

限定检索结果

文献类型

  • 1,627 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 921 篇 工学
    • 843 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 218 篇 信息与通信工程
    • 141 篇 电气工程
    • 71 篇 控制科学与工程
    • 31 篇 生物工程
    • 25 篇 电子科学与技术(可...
    • 22 篇 生物医学工程(可授...
    • 22 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 182 篇 理学
    • 88 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 53 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 16 篇 经济学
    • 14 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 114 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 38 篇 social networkin...
  • 38 篇 edge computing

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,629 篇 英文
  • 15 篇 其他
  • 8 篇 中文
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1649 条 记 录,以下是1581-1590 订阅
排序:
Sinhala Hate Speech Detection in Social Media Using Machine Learning and Deep Learning
Sinhala Hate Speech Detection in Social Media Using Machine ...
收藏 引用
international conference on Advances in ICT for Emerging Regions
作者: W.S.S. Fernando Ruvan Weerasinghe E.R.A.D. Bandara Department of Statistics Faculty of Science University of Colombo Colombo Sri Lanka School of Computing 35 Reid Avenue University of Colombo Colombo Sri Lanka
Communication and presentation of beliefs became easier than in previous decades due to the rapid rise of information technology and computer science. Because social media is accessible worldwide via the internet, any... 详细信息
来源: 评论
PrivOff: Secure and Privacy-Preserving Data Management for distributed Off-Chain Networks
PrivOff: Secure and Privacy-Preserving Data Management for D...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Htet Htet Hlaing Hitoshi Asaeda National Institute of Information and Communications Technology (NICT) Japan
In today’s healthcare landscape, emerging technologies serve as crucial foundations, and the integration of blockchain technology into this rapidly evolving digital framework is invaluable. However, the healthcare in... 详细信息
来源: 评论
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
In-Network Compute Extensions for Rate-Adaptive Content Deli...
收藏 引用
international conference on Network Protocols
作者: Francesco Bronzino Chao Han Yang Chen Kiran Nagaraja Xiaowei Yang Ivan Seskar Dipankar Raychaudhuri WINLAB Rutgers University North Brunswick NJ USA Department of Computer Science Duke University Durham NC USA
Traffic from mobile wireless networks has been growing at a fast pace in recent years and is expected to surpass wired traffic very soon. Service providers face significant challenges at such scales including providin... 详细信息
来源: 评论
Multiple distributed energy storage scheduling using constructive evolutionary programming
Multiple distributed energy storage scheduling using constru...
收藏 引用
Power Industry Computer Application conference (PICA)
作者: Thai Doan Hoang Cau R.J. Kaye Australian Graduate School of Management University of New South Wales Sydney Australia School of Electrical Engineering & Telecommunication University of New South Wales Sydney Australia
Deregulation of the electricity supply industry is promoting the increased use of electrical energy storage. However, to achieve the system-wide benefits of competition, techniques for optimal scheduling of distribute... 详细信息
来源: 评论
distributed Dependent Task Offloading in CPU-GPU Heterogenous MEC: A Federated Reinforcement Learning Approach
Distributed Dependent Task Offloading in CPU-GPU Heterogenou...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Hualong Huang Zhekai Duan Wenhan Zhan Yichen Liu Zhi Wang Zitian Zhao University of Electronic Science and Technology of China Chengdu China University of Edinburgh Edinburgh UK
Mobile edge computing (MEC) has emerged as a promising paradigm to enable computation-intensive and latency-sensitive mobile applications by offloading tasks to proximal edge servers. This paper proposes a novel feder... 详细信息
来源: 评论
Analysis of the Applicability of Cloud computing Scaling Techniques for Real-Time Workloads of Industrial Control Systems
Analysis of the Applicability of Cloud Computing Scaling Tec...
收藏 引用
IEEE international conference on Industrial Informatics (IndIN)
作者: Rebekka Neumann Florian Frick Armin Lechler Alexander Verl Institute for Control Engineering of Machine Tools and Manufacturing Units (ISW) University of Stuttgart Stuttgart Germany
A key feature of cloud computing is elasticity, which enables resources to be allocated and de-allocated according to dynamic application demands. The evolution of Industrial Control Systems (ICS) is moving towards a ... 详细信息
来源: 评论
Let's wait awhile: how temporal workload shifting can reduce carbon emissions in the cloud  21
Let's wait awhile: how temporal workload shifting can reduce...
收藏 引用
proceedings of the 22nd international Middleware conference
作者: Philipp Wiesner Ilja Behnke Dominik Scheinert Kordian Gontarska Lauritz Thamsen Technische Universität Berlin Berlin Germany University of Potsdam Potsdam Germany
Depending on energy sources and demand, the carbon intensity of the public power grid fluctuates over time. Exploiting this variability is an important factor in reducing the emissions caused by data centers. However,... 详细信息
来源: 评论
Constellation Autonomy Modeling for Agile on-Orbit Communication and computing
Constellation Autonomy Modeling for Agile on-Orbit Communica...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shoufeng Wang Hua-Min Chen Ye Ouyang Fan Li Xuan Chen Jianchao Guo Yun Li Sen Bian Xidong Wang Zhidong Ren AsiaInfo Technologies (China) INC. Beijing China Beijing University of Technology Beijing China China Unicom Beijing Branch Beijing China China Unicom Beijing China
With the growing demand for mobile communication services and continuous advances in communication technologies, ubiquitous coverage and Internet of Everything have become basic capabilities required for 5G, 6G and fu... 详细信息
来源: 评论
Building multicast trees in ad-hoc networks  08
Building multicast trees in ad-hoc networks
收藏 引用
proceedings of the 2nd international conference on Autonomic computing and Communication Systems
作者: Raphaël Kummer Peter Kropf Pascal Felber University of Neuchâtel Emile-Argand Neuchâtel Switzerland
Multicast trees are used in a variety of applications, such as publish/subscribe systems or content distribution networks. Existing algorithms for ad-hoc networks typically produce multicast trees requiring many nodes... 详细信息
来源: 评论
LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT
LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Himanshu Goyal Krishna Kodali Sudipta Saha School of Electrical Sciences Indian Institute of Technology Bhubaneswar India
The ability of IoT devices to sense and share various physical parameters plays a key role in a smart system. Along side benefits, it also bears the potential to cause a breach of privacy for the users of the smart-sy... 详细信息
来源: 评论