咨询与建议

限定检索结果

文献类型

  • 1,624 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,646 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 916 篇 工学
    • 838 篇 计算机科学与技术...
    • 323 篇 软件工程
    • 211 篇 信息与通信工程
    • 133 篇 电气工程
    • 63 篇 控制科学与工程
    • 31 篇 生物工程
    • 22 篇 生物医学工程(可授...
    • 17 篇 电子科学与技术(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 183 篇 理学
    • 89 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 134 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 经济学
    • 15 篇 应用经济学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 113 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 39 篇 distributed comp...
  • 38 篇 social networkin...

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,636 篇 英文
  • 8 篇 中文
  • 5 篇 其他
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1646 条 记 录,以下是1631-1640 订阅
排序:
Measured vs. calculated off-axis wedged dose distributions
Measured vs. calculated off-axis wedged dose distributions
收藏 引用
Annual international conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: A. Sethi L. Leybovich N. Dogan G. Glasgow Department of Radiation Oncology Loyola University Medical Center Maywood IL USA
Wedge filters are frequently used in the clinic to improve target dose homogeneity. All physical wedges have a uniform thickness along the non-wedged direction. Therefore wedged field profiles show a "sagging eff... 详细信息
来源: 评论
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model
FineCTI: A Framework for Mining Fine-grained Cyber Threat In...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Chunyan Ma Jun Jiang Kai Zhang Zhengwei Jiang Peian Yang Xuren Wang Huamin Feng Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Information Engineering College Capital Normal University Beijing China Beijing Electronic Science and Technology Institute Beijing China
To timely respond to cyber threats related to a specific IT infrastructure called fine-grained (e.g., Windows or Linux), security analysts need to require timely and comprehensive threat information. Twitter, as a vit... 详细信息
来源: 评论
Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake
Generating Optimized Universal Adversarial Watermark for Pre...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Kaiqi Lv Weiguo Lin Junfeng Xu Wanshan Xu Shuren Chen Shengwei Yi School of Computer and Cyber Sciences Communication University of China Beijing China IT System Evaluation Dept. CNITSEC Beijing China
With the increasing development of deepfake in facial editing and the easy accessibility of image and video content on the internet, the security risks of spreading false personal information through social media plat... 详细信息
来源: 评论
HIGH PERFORMANCE computing And COMMUNICATIONS TECHNOLOGY SOLUTIONS FOR FUTURE SMART DISTRIBUTION NETWORK OPERATION
HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS TECHNOLOGY SOL...
收藏 引用
international conference and Exhibition on Electricity Distribution
作者: Leticia DE ALVARO GARCIA Gidon GERSHINSKY Gareth A. TAYLOR Angel YUNTA HUETE David C. H. WALLOM Konrad DIWOLD EDF R&D IBM Brunel University Union Fenosa Distribucion University of Oxford Fraunhofer IWES
To improve the integration of distributed energy resources on distribution networks, new DMS functionalities need to be developed. To run near-to-real time DMS applications novel high performance computing and communi...
来源: 评论
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack
MPS: A Multiple Poisoned Samples Selection Strategy in Backd...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weihong Zou Shigeng Zhang Weiping Wang Jian Zhang Xuan Liu Schoosl of Computer Science and Engineering Central South University Science and Technology on Parallel and Distributed Processing Laboratory (PDL) College of Computer Science and Electronic Engineering Hunan University
Recently there has been many studies on backdoor attacks, which involve injecting poisoned samples into the training set in order to embed backdoors into the model. Existing multiple poisoned samples attacks usually r... 详细信息
来源: 评论
Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News Detection
Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News Detec...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Sheetal Harris Jinshuo Liu Hassan Jalil Hadi Yue Cao School of Cyber Science and Engineering Wuhan University Wuhan China
Misinformation can seriously impact society, affecting anything from public opinion to institutional confidence and the political horizon of a state. Fake News (FN) proliferation on online websites and Online Social N... 详细信息
来源: 评论
22nd international conference on computing in High Energy and Nuclear Physics (CHEP 2016)
收藏 引用
Journal of Physics: conference Series 2017年 第1期898卷
CHEP 2016: Preface to the proceedings Richard Mount and Craig Tull, CHEP 2016 Co-Chairs Takanori Hara, Oksana Smirnova and Jan Strube, CHEP 2016 Program Committee Chairs The CHEP conferences address challenges in comp...
来源: 评论
Improving the Network Energy Efficiency in MapReduce Systems
Improving the Network Energy Efficiency in MapReduce Systems
收藏 引用
international conference on Computer Communications and Networks
作者: Lin Wang Fa Zhang Zhiyong Liu Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese State Key Laboratory for Computer Architecture ICT Chinese Academy of Sciences Beijing China
Apart from servers, the energy consumed by enormous amount of network devices in data centers also emerges as a big problem. Existing work on energy-efficient data center networking primarily focuses on traffic engine... 详细信息
来源: 评论
Preface
收藏 引用
Leibniz international proceedings in Informatics, LIPIcs 2019年 125卷 IX-X页
作者: Cao, Jiannong Ellen, Faith Rodrigues, Luis Ferreira, Bernardo Department of Computing The Hong Kong Polytechnic University Hong Kong Department of Computer Science University of Toronto Canada Instituto Superior Técnico Universidade de Lisboa Portugal Faculdade de Ciências e Tecnologia Universidade Nova de Lisboa Portugal
来源: 评论
A Mediation Layer for Connecting Data-Intensive Applications to Reconfigurable Data Nodes
A Mediation Layer for Connecting Data-Intensive Applications...
收藏 引用
international conference on Computer Communications and Networks
作者: Mohamad Jomaa Khaleel Mershad Noor Abbani Yaman Sharaf-Dabbagh Bashar Romanous Hassan Artail Mazen A. R. Saghir Hazem Hajj Haitham Akkary Mariette Awad Department of Electrical and Computer Engineering American University of Beirut Beirut Lebanon Electrical and Computer Engineering Program Texas A&M University at Qatar Doha Qatar
A novel and rapidly growing area of research concerns data-intensive applications and the technical challenges that accompany it. One of those challenges is developing approaches and mechanisms that render high perfor... 详细信息
来源: 评论