咨询与建议

限定检索结果

文献类型

  • 1,624 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,646 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 916 篇 工学
    • 838 篇 计算机科学与技术...
    • 323 篇 软件工程
    • 211 篇 信息与通信工程
    • 133 篇 电气工程
    • 63 篇 控制科学与工程
    • 31 篇 生物工程
    • 22 篇 生物医学工程(可授...
    • 17 篇 电子科学与技术(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 183 篇 理学
    • 89 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 134 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 经济学
    • 15 篇 应用经济学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 113 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 39 篇 distributed comp...
  • 38 篇 social networkin...

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,636 篇 英文
  • 8 篇 中文
  • 5 篇 其他
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1646 条 记 录,以下是1581-1590 订阅
排序:
Gradients and intensity modulated radiotherapy
Gradients and intensity modulated radiotherapy
收藏 引用
Annual international conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: J.M. Kapatoes G. Olivera P. Reckwerdt H. Keller J. Balog T.R. Mackie Department of Medical Physics University of Wisconsin Madison WI USA Tomotherapy Inc. Middleton WI USA
A consequence of the advent of intensity modulated radiation therapy (IMRT) is the presence of large dose gradients surrounding the tumor, and the regions at risk (RAR's) near the tumor. Unlike standard radiothera... 详细信息
来源: 评论
Sinhala Hate Speech Detection in Social Media Using Machine Learning and Deep Learning
Sinhala Hate Speech Detection in Social Media Using Machine ...
收藏 引用
international conference on Advances in ICT for Emerging Regions
作者: W.S.S. Fernando Ruvan Weerasinghe E.R.A.D. Bandara Department of Statistics Faculty of Science University of Colombo Colombo Sri Lanka School of Computing 35 Reid Avenue University of Colombo Colombo Sri Lanka
Communication and presentation of beliefs became easier than in previous decades due to the rapid rise of information technology and computer science. Because social media is accessible worldwide via the internet, any... 详细信息
来源: 评论
Building multicast trees in ad-hoc networks  08
Building multicast trees in ad-hoc networks
收藏 引用
proceedings of the 2nd international conference on Autonomic computing and Communication Systems
作者: Raphaël Kummer Peter Kropf Pascal Felber University of Neuchâtel Emile-Argand Neuchâtel Switzerland
Multicast trees are used in a variety of applications, such as publish/subscribe systems or content distribution networks. Existing algorithms for ad-hoc networks typically produce multicast trees requiring many nodes... 详细信息
来源: 评论
Histopathological Image Classification and Vulnerability Analysis using Federated Learning
Histopathological Image Classification and Vulnerability Ana...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Sankalp Vyas Amar Nath Patra Raj Mani Shukla Computing and Information Science Anglia Ruskin University Cambridge Radford University Radford USA
Healthcare is one of the foremost applications of machine learning (ML). Traditionally, ML models are trained by central servers, which aggregate data from various distributed devices to forecast the results for newly... 详细信息
来源: 评论
SCATMAN: A Framework for Enhancing Trustworthiness in Digital Supply Chains
SCATMAN: A Framework for Enhancing Trustworthiness in Digita...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Michael Eckel Anirban Basu Satoshi Kai Hervais Simo Fhom Siniša Ðukanović Henk Birkholz Shingo Hane Matthias Lieske Fraunhofer Institute SIT | ATHENE Center Darmstadt Germany Hitachi Ltd. Yokohama Japan Hitachi Ltd. Tokyo Japan Hitachi Europe GmbH Düsseldorf Germany
In this paper, we present a framework and an architecture that aim to enable and manage trust in supply chains. Our architecture addresses the authenticity and integrity of devices and processes within heterogeneous s... 详细信息
来源: 评论
Designing and Implementing Communication-efficient Model of distributed System for Real-time Electromagnetic Transient Simulation
Designing and Implementing Communication-efficient Model of ...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Qi Guo Binjiang Hu Zeqi Hong Yanjun Zhao Shuyong Li Liang Tu State Key Laboratory of HVDC Electric Power Research Institute China Southern Power Grid Guangdong Provincial Key Laboratory of Intelligent Operation and Control for New Energy Power System CSG Key Laboratory for Power System Simulation Electric Power Research Institute China Southern Power Grid China Southern Power Grid Co. Ltd
This paper introduces CM-RETS, a 4-Level address Communication Model designed specifically for real-time simulation of electromagnetic transients in power systems. CM-RETS incorporates a unique 4-Level address scheme ... 详细信息
来源: 评论
PrivOff: Secure and Privacy-Preserving Data Management for distributed Off-Chain Networks
PrivOff: Secure and Privacy-Preserving Data Management for D...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Htet Htet Hlaing Hitoshi Asaeda National Institute of Information and Communications Technology (NICT) Japan
In today’s healthcare landscape, emerging technologies serve as crucial foundations, and the integration of blockchain technology into this rapidly evolving digital framework is invaluable. However, the healthcare in... 详细信息
来源: 评论
Computer networking for Management Information System of Unmanned Vehicles
Computer Networking for Management Information System of Unm...
收藏 引用
international conference on Transparent Optical Networks
作者: Sergey Sokolov Andrey Boguslavsky Keldysh Institute of Applied Mathematics RAS Miusskaya Square 4 Moscow Russia
The ever-increasing need for the large-scale implementation of unmanned vehicles requires situational awareness of such vehicles. In this case two general directions are possible. The first: simplification and fixing ... 详细信息
来源: 评论
Multiple distributed energy storage scheduling using constructive evolutionary programming
Multiple distributed energy storage scheduling using constru...
收藏 引用
Power Industry Computer Application conference (PICA)
作者: Thai Doan Hoang Cau R.J. Kaye Australian Graduate School of Management University of New South Wales Sydney Australia School of Electrical Engineering & Telecommunication University of New South Wales Sydney Australia
Deregulation of the electricity supply industry is promoting the increased use of electrical energy storage. However, to achieve the system-wide benefits of competition, techniques for optimal scheduling of distribute... 详细信息
来源: 评论
Analysis of the Applicability of Cloud computing Scaling Techniques for Real-Time Workloads of Industrial Control Systems
Analysis of the Applicability of Cloud Computing Scaling Tec...
收藏 引用
IEEE international conference on Industrial Informatics (IndIN)
作者: Rebekka Neumann Florian Frick Armin Lechler Alexander Verl Institute for Control Engineering of Machine Tools and Manufacturing Units (ISW) University of Stuttgart Stuttgart Germany
A key feature of cloud computing is elasticity, which enables resources to be allocated and de-allocated according to dynamic application demands. The evolution of Industrial Control Systems (ICS) is moving towards a ... 详细信息
来源: 评论