咨询与建议

限定检索结果

文献类型

  • 1,624 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,646 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 916 篇 工学
    • 838 篇 计算机科学与技术...
    • 323 篇 软件工程
    • 211 篇 信息与通信工程
    • 133 篇 电气工程
    • 63 篇 控制科学与工程
    • 31 篇 生物工程
    • 22 篇 生物医学工程(可授...
    • 17 篇 电子科学与技术(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 183 篇 理学
    • 89 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 134 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 经济学
    • 15 篇 应用经济学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 113 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 39 篇 distributed comp...
  • 38 篇 social networkin...

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,636 篇 英文
  • 8 篇 中文
  • 5 篇 其他
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1646 条 记 录,以下是1591-1600 订阅
排序:
Let's wait awhile: how temporal workload shifting can reduce carbon emissions in the cloud  21
Let's wait awhile: how temporal workload shifting can reduce...
收藏 引用
proceedings of the 22nd international Middleware conference
作者: Philipp Wiesner Ilja Behnke Dominik Scheinert Kordian Gontarska Lauritz Thamsen Technische Universität Berlin Berlin Germany University of Potsdam Potsdam Germany
Depending on energy sources and demand, the carbon intensity of the public power grid fluctuates over time. Exploiting this variability is an important factor in reducing the emissions caused by data centers. However,... 详细信息
来源: 评论
LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT
LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Himanshu Goyal Krishna Kodali Sudipta Saha School of Electrical Sciences Indian Institute of Technology Bhubaneswar India
The ability of IoT devices to sense and share various physical parameters plays a key role in a smart system. Along side benefits, it also bears the potential to cause a breach of privacy for the users of the smart-sy... 详细信息
来源: 评论
TrustedBench: An Efficient and User-friendly distributed Performance Testing Tool for Blockchain System
TrustedBench: An Efficient and User-friendly Distributed Per...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yang Cheng Kai Wei Yihui Zhang Chunyu Jiang Weiwei Pang Qi Zhang Bin Liu Lifeng Zhang Tingting Liu Yinqian Wu Cloud. Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Performance is a crucial indicator for the blockchain system evaluation. However, it is difficult to measure and comprehensively evaluate the performance of blockchain systems, particularly due to their complexity and... 详细信息
来源: 评论
An Automatic Generation Method for Path Expressions of CPN Model Focus on Tested Behaviors
An Automatic Generation Method for Path Expressions of CPN M...
收藏 引用
international conference on Computer Supported Cooperative Work in Design
作者: Sun Tao Linjing Zhang Huiping Ma College of Computer Science Inner Mongolia University Hohhot China
With the gradually development of distributed software, collaborative work became a trend. At the same time, due to the continuous improvement of software complexity, software testing is highly susceptible to the stat... 详细信息
来源: 评论
FedRSM: Representational-Similarity-Based Secured Model Uploading for Federated Learning
FedRSM: Representational-Similarity-Based Secured Model Uplo...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Gengxiang Chen Sheng Liu Xu Yang Tao Wang Linlin You Feng Xia School of Intelligent Systems Engineering Sun Yat-Sen University Shenzhen China School of Computing Technologies Royal Melbourne Institute of Technology Melbourne Australia
As a novel learning paradigm, Federated learning (FL) aims at protecting privacy by avoiding raw data shifting between distributed clients and central servers. However, recent researches demonstrate the vulnerability ... 详细信息
来源: 评论
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain
A Commitment and Ring Signature based Scheme for Amount and ...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shiyong Huang Haocong Li Ruoting Xiong Wei Ren Jie He Yi Ren School of Computer Science China University of Geosciences Wuhan China Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University China School of Computer Science Beijing Jiaotong University Beijing China School of Computing Science University of East Anglia Norwich UK Beijing Key Laboratory of Urban Spatial Information Engineering Beijing China
Blockchain has been envisioned as an anonymous cryptocurrency framework and can be applied in various applications such as e-payment, share economics, and distributed ledger. Although an account is anonymous, privacy ... 详细信息
来源: 评论
Reference Architecture for a Collaborative Predictive Platform for Smart Maintenance in Manufacturing
Reference Architecture for a Collaborative Predictive Platfo...
收藏 引用
IEEE international conference on Intelligent Engineering Systems
作者: Z. Balogh E. Gatial J. Barbosa P. Leitao T. Matejka Department of Parallel and Distributed Computing Institute of Informatics Bratislava Slovakia Polytechnic Institute of Bragança Bragança Portugal Mat-obaly s.r.o. Prievidza Slovakia
Maintenance is a key factor to ensure the production efficiency, since the occurrence of unexpected failures leads to a degradation of the system performance, causing the loss of productivity and business opportunitie... 详细信息
来源: 评论
Differential Privacy Frequent Closed Itemset Mining over Data Stream
Differential Privacy Frequent Closed Itemset Mining over Dat...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Xuebin Ma Shengyi Guan Yanan Lang Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University Hohhot China
As the most common technique for mining and analyzing massive data, frequent itemset mining is widely used in various scenarios. However, when the data contains sensitive information, it will bring serious privacy lea... 详细信息
来源: 评论
FaaSTCC: efficient transactional causal consistency for serverless computing  21
FaaSTCC: efficient transactional causal consistency for serv...
收藏 引用
proceedings of the 22nd international Middleware conference
作者: Taras Lykhenko Rafael Soares Luis Rodrigues Universidade de Lisboa Portugal
In this paper we study mechanisms that permit to augment the FaaS middleware with support for Transactional Causal Consistency (TCC). At first glance, it may seem that offering TCC to FaaS applications can trivially b... 详细信息
来源: 评论
Evaluation of distributed Collaborative Learning Approach for 5G Network Data Analytics Function
Evaluation of Distributed Collaborative Learning Approach fo...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shoufeng Wang Hua-Min Chen Ye Ouyang Fan Li Xuan Chen Limeng Ma Zhanwu Li Sen Bian Zhidong Ren Asiainfo Technologies (China) INC. China Faculty of Information Technology Beijing University of Technology Beijing China Network Optimization Center China Unicom Beijing Branch Beijing China China Unicom Beijing China
As a key role in the future network functionalities, artificial intelligence (AI) has been studied widely. To match the envisioned traffic evolution trend and communication requirement, Network Data Analytic Function(... 详细信息
来源: 评论