咨询与建议

限定检索结果

文献类型

  • 1,627 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 921 篇 工学
    • 843 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 218 篇 信息与通信工程
    • 141 篇 电气工程
    • 71 篇 控制科学与工程
    • 31 篇 生物工程
    • 25 篇 电子科学与技术(可...
    • 22 篇 生物医学工程(可授...
    • 22 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 182 篇 理学
    • 88 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 53 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 16 篇 经济学
    • 14 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 114 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 38 篇 social networkin...
  • 38 篇 edge computing

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,629 篇 英文
  • 15 篇 其他
  • 8 篇 中文
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1649 条 记 录,以下是1591-1600 订阅
排序:
Histopathological Image Classification and Vulnerability Analysis using Federated Learning
Histopathological Image Classification and Vulnerability Ana...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Sankalp Vyas Amar Nath Patra Raj Mani Shukla Computing and Information Science Anglia Ruskin University Cambridge Radford University Radford USA
Healthcare is one of the foremost applications of machine learning (ML). Traditionally, ML models are trained by central servers, which aggregate data from various distributed devices to forecast the results for newly... 详细信息
来源: 评论
SCATMAN: A Framework for Enhancing Trustworthiness in Digital Supply Chains
SCATMAN: A Framework for Enhancing Trustworthiness in Digita...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Michael Eckel Anirban Basu Satoshi Kai Hervais Simo Fhom Siniša Ðukanović Henk Birkholz Shingo Hane Matthias Lieske Fraunhofer Institute SIT | ATHENE Center Darmstadt Germany Hitachi Ltd. Yokohama Japan Hitachi Ltd. Tokyo Japan Hitachi Europe GmbH Düsseldorf Germany
In this paper, we present a framework and an architecture that aim to enable and manage trust in supply chains. Our architecture addresses the authenticity and integrity of devices and processes within heterogeneous s... 详细信息
来源: 评论
An Automatic Generation Method for Path Expressions of CPN Model Focus on Tested Behaviors
An Automatic Generation Method for Path Expressions of CPN M...
收藏 引用
international conference on Computer Supported Cooperative Work in Design
作者: Sun Tao Linjing Zhang Huiping Ma College of Computer Science Inner Mongolia University Hohhot China
With the gradually development of distributed software, collaborative work became a trend. At the same time, due to the continuous improvement of software complexity, software testing is highly susceptible to the stat... 详细信息
来源: 评论
Designing and Implementing Communication-efficient Model of distributed System for Real-time Electromagnetic Transient Simulation
Designing and Implementing Communication-efficient Model of ...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Qi Guo Binjiang Hu Zeqi Hong Yanjun Zhao Shuyong Li Liang Tu State Key Laboratory of HVDC Electric Power Research Institute China Southern Power Grid Guangdong Provincial Key Laboratory of Intelligent Operation and Control for New Energy Power System CSG Key Laboratory for Power System Simulation Electric Power Research Institute China Southern Power Grid China Southern Power Grid Co. Ltd
This paper introduces CM-RETS, a 4-Level address Communication Model designed specifically for real-time simulation of electromagnetic transients in power systems. CM-RETS incorporates a unique 4-Level address scheme ... 详细信息
来源: 评论
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain
A Commitment and Ring Signature based Scheme for Amount and ...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shiyong Huang Haocong Li Ruoting Xiong Wei Ren Jie He Yi Ren School of Computer Science China University of Geosciences Wuhan China Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University China School of Computer Science Beijing Jiaotong University Beijing China School of Computing Science University of East Anglia Norwich UK Beijing Key Laboratory of Urban Spatial Information Engineering Beijing China
Blockchain has been envisioned as an anonymous cryptocurrency framework and can be applied in various applications such as e-payment, share economics, and distributed ledger. Although an account is anonymous, privacy ... 详细信息
来源: 评论
Reference Architecture for a Collaborative Predictive Platform for Smart Maintenance in Manufacturing
Reference Architecture for a Collaborative Predictive Platfo...
收藏 引用
IEEE international conference on Intelligent Engineering Systems
作者: Z. Balogh E. Gatial J. Barbosa P. Leitao T. Matejka Department of Parallel and Distributed Computing Institute of Informatics Bratislava Slovakia Polytechnic Institute of Bragança Bragança Portugal Mat-obaly s.r.o. Prievidza Slovakia
Maintenance is a key factor to ensure the production efficiency, since the occurrence of unexpected failures leads to a degradation of the system performance, causing the loss of productivity and business opportunitie... 详细信息
来源: 评论
Gradients and intensity modulated radiotherapy
Gradients and intensity modulated radiotherapy
收藏 引用
Annual international conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: J.M. Kapatoes G. Olivera P. Reckwerdt H. Keller J. Balog T.R. Mackie Department of Medical Physics University of Wisconsin Madison WI USA Tomotherapy Inc. Middleton WI USA
A consequence of the advent of intensity modulated radiation therapy (IMRT) is the presence of large dose gradients surrounding the tumor, and the regions at risk (RAR's) near the tumor. Unlike standard radiothera... 详细信息
来源: 评论
Differential Privacy Frequent Closed Itemset Mining over Data Stream
Differential Privacy Frequent Closed Itemset Mining over Dat...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Xuebin Ma Shengyi Guan Yanan Lang Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University Hohhot China
As the most common technique for mining and analyzing massive data, frequent itemset mining is widely used in various scenarios. However, when the data contains sensitive information, it will bring serious privacy lea... 详细信息
来源: 评论
Computer networking for Management Information System of Unmanned Vehicles
Computer Networking for Management Information System of Unm...
收藏 引用
international conference on Transparent Optical Networks
作者: Sergey Sokolov Andrey Boguslavsky Keldysh Institute of Applied Mathematics RAS Miusskaya Square 4 Moscow Russia
The ever-increasing need for the large-scale implementation of unmanned vehicles requires situational awareness of such vehicles. In this case two general directions are possible. The first: simplification and fixing ... 详细信息
来源: 评论
On the Adoption of Homomorphic Encryption by Financial Institutions*
On the Adoption of Homomorphic Encryption by Financial Insti...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Michela Iezzi Carsten Maple Danilo A. Giannone Bank of Italy Italy The Alan Turing Institute U.K Gener8 U.K
Financial institutions collect, control and process sensitive data, either personally or commercially. These data are vital for many purposes, including business process optimisation, tailored services to individuals ... 详细信息
来源: 评论