咨询与建议

限定检索结果

文献类型

  • 1,624 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,646 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 916 篇 工学
    • 838 篇 计算机科学与技术...
    • 323 篇 软件工程
    • 211 篇 信息与通信工程
    • 133 篇 电气工程
    • 63 篇 控制科学与工程
    • 31 篇 生物工程
    • 22 篇 生物医学工程(可授...
    • 17 篇 电子科学与技术(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 183 篇 理学
    • 89 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 134 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 经济学
    • 15 篇 应用经济学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 113 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 39 篇 distributed comp...
  • 38 篇 social networkin...

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,636 篇 英文
  • 8 篇 中文
  • 5 篇 其他
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1646 条 记 录,以下是1611-1620 订阅
排序:
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis
Detecting DDoS Attacks on the Network Edge: An Information-T...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Ryosuke Araki Kshira Sagar Sahoo Yuzo Taenaka Youki Kadobayashi Erik Elmroth Monowar Bhuyan Division of Information Science Nara Institute of Science and Technology Ikoma Japan Department of Computing Science Umeå University Umeå Sweden
Nowadays, edge computing has become part of the Internet of Things (IoT) that plays a vital role in developing smart applications. As the usage of IoT devices significantly increases, at the same time, network edge in... 详细信息
来源: 评论
Enhancing Training Efficiency for Cloud-Edge Collaboration in the Industrial Internet of Things: A Transmission-Centric Approach
Enhancing Training Efficiency for Cloud-Edge Collaboration i...
收藏 引用
IEEE international conference on Industrial Informatics (IndIN)
作者: Jia Zhang Tao Zheng Binjie Lu Huan Yin Kyi Thar Mikael Gidlund Mohsen Guizani School of Electronic and Information Engineering Beijng Jiaotong University China Department of Computer and Electrical Engineering Mid Sweden University Sweden Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence(MBZUAI) Abu Dhabi UAE
With the development of intelligent edge computing (IEC) in industrial IoT (IIoT), there is a growing number of service providers trying to leverage computing resources in the cloud and at the edge to meet the users‘... 详细信息
来源: 评论
Absolute and relative dose distribution comparisons for convolution/superposition and Monte Carlo based treatment planning
Absolute and relative dose distribution comparisons for conv...
收藏 引用
Annual international conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: N. Papanikolaou S. Stathakis C. Kappas School of Medicine Lexington Department of Radiation Medicine University of Kentucky Lexington KY USA School of Medicine Patras Department of Medical Physics University of Patras Patras Greece
Historically, the algorithms used for dose computation in radiotherapy treatment planning (RTP) have been based on measured data in water. The so-called model based algorithms (convolution, Monte Carlo) are now emergi... 详细信息
来源: 评论
PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph
PDG2Vec: Identify the Binary Function Similarity with Progra...
收藏 引用
IEEE international conference on Software Quality, Reliability and Security (QRS)
作者: Yuntao Zhang Yanhao Wang Yuwei Liu Zhengyuan Pang Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China QI-ANXIN Technology Group Inc. Beijing China Chinese Academy of Sciences Institute of Software Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Binary code similarity identification is an important technique applied to many security applications (e.g., plagiarism detection, bug search). The primary challenge of this research topic is how to extract sufficient... 详细信息
来源: 评论
DDS for middleware researchers: a gentle introduction to the leading distributed connectivity framework for autonomous systems  21
DDS for middleware researchers: a gentle introduction to the...
收藏 引用
proceedings of the 22nd international Middleware conference: Tutorials
作者: Kyle Benson RTI
Are you working on an edge computing, publish/subscribe, or real-time systems middleware research prototype? Maybe you're exploring robotics and looking to open up the hood on ROS2 to tinker with the underlying co...
来源: 评论
Towards Survivable In-Memory Stores with Parity Coded NVRAM
Towards Survivable In-Memory Stores with Parity Coded NVRAM
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Zhixuan Wang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Engineering University of Bristol Bristol U.K.
Erasure codes have been widely applied to in-memory key-value storage systems for high reliability and low redundancy. In distributed in-memory key-value storage systems, update operations are relatively frequent, esp... 详细信息
来源: 评论
A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework
A Novel Blockchain-based Decentralized Multi-party Certifica...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shalitha Wijethilaka Awaneesh Kumar Yadav An Braeken Madhusanka Liyanage School of Computer Science University College Dublin Ireland Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee Uttarakhand India Department of Engineering Technology (INDI) Vrije Universiteit Brussel Belgium Centre for Wireless Communications University of Oulu Finland
Digital certificates play a significant role in the current communication systems. However, with the limitations in the existing Certificate Management Frameworks (CMFs), such as single point of failure, the profound ... 详细信息
来源: 评论
Studies of distributed energy supply systems using an innovative energy management system
Studies of distributed energy supply systems using an innova...
收藏 引用
Power Industry Computer Application conference (PICA)
作者: H. Muller A. Rudolf G. Aumayr Department of Electric Power Systems University of Technology Vienna Vienna Austria Program and System Engineering Energy & Information Siemens Ag Austria Program and System Engineering Energy & Information Siemens Ag Germany
The liberalization of energy markets and the aims of the climate protection promote distributed systems. These systems permit inclusion of all practicable energy resources in the energy mix in connection with storage ... 详细信息
来源: 评论
Zero Trust Score-based Network-level Access Control in Enterprise Networks
Zero Trust Score-based Network-level Access Control in Enter...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Leonard Bradatsch Oleksandr Miroshkin Nataša Trkulja Frank Kargl Institute of Distributed Systems Ulm University Ulm Germany KIZ Ulm University Ulm Germany
Zero Trust security has recently gained attention in enterprise network security. One of its key ideas is making network-level access decisions based on trust scores. However, score-based access control in the enterpr... 详细信息
来源: 评论
Grading and Calculation of Synchronic Distance in Petri Nets for Trustworthy Modeling and analyzing
Grading and Calculation of Synchronic Distance in Petri Nets...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yumeng Cheng Wangyang Yu Xiaojun Zhai Fei Hao Yuan Liu School of Computer Science Shaanxi Normal University Xi’an China School of Computer Science and Electronic Engineering University of Essex Colchester UK
Synchronization plays a crucial role in computer systems, providing support for system security, data consistency, and coordination. It contributes to the establishment and application of trust, security, and dependab... 详细信息
来源: 评论