咨询与建议

限定检索结果

文献类型

  • 1,627 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 921 篇 工学
    • 843 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 218 篇 信息与通信工程
    • 141 篇 电气工程
    • 71 篇 控制科学与工程
    • 31 篇 生物工程
    • 25 篇 电子科学与技术(可...
    • 22 篇 生物医学工程(可授...
    • 22 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 182 篇 理学
    • 88 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 53 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 16 篇 经济学
    • 14 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 114 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 38 篇 social networkin...
  • 38 篇 edge computing

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,629 篇 英文
  • 15 篇 其他
  • 8 篇 中文
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1649 条 记 录,以下是11-20 订阅
排序:
Consensus in the Presence of Overlapping Faults and Total Omission  22nd
Consensus in the Presence of Overlapping Faults and Tota...
收藏 引用
22nd Theory of Cryptography conference, TCC 2024
作者: Loss, Julian Shi, Kecheng Stern, Gilad CISPA Helmholtz Center for Information Security Saarbrücken Germany Tel Aviv University Tel Aviv Israel Saarland University Saarbrücken Germany
Understanding the fault tolerance of Byzantine Agreement protocols is an important question in distributed computing. While the setting of Byzantine faults has been thoroughly explored in the literature, the (arguably... 详细信息
来源: 评论
POSEIDON: Efficient Function Placement at the Edge Using Deep Reinforcement Learning  22nd
POSEIDON: Efficient Function Placement at the Edge Using Dee...
收藏 引用
22nd international conference on Service Oriented computing
作者: Jain, Prakhar Singhal, Prakhar Pandey, Divyansh Quatrocchi, Giovanni Vaidhyanathan, Karthik Int Inst Informat Technol Software Engn Res Ctr Hyderabad India Politecn Milan Dipartimento Elettron Informaz & Bioingn Milan Italy
Edge computing allows for reduced latency and operational costs compared to centralized cloud systems. In this context, serverless functions are emerging as a lightweight and effective paradigm for managing computatio... 详细信息
来源: 评论
False Data Injection Attack Detection in Edge-Based Smart Metering Networks with Federated Learning  22
False Data Injection Attack Detection in Edge-Based Smart Me...
收藏 引用
22nd IEEE Consumer Communications and networking conference, CCNC 2025
作者: Uddin, Md Raihan Rahman, Ratun Nguyen, Dinh C. The University of Alabama in Huntsville Department of Electrical and Computer Engineering United States
Smart metering networks are increasingly susceptible to cyber threats, where false data injection (FDI) appears as a critical attack. Data-driven-based machine learning (ML) methods have shown immense benefits in dete... 详细信息
来源: 评论
distributed Denial of Service Attack Detection by Machine Learning Techniques  22
Distributed Denial of Service Attack Detection by Machine Le...
收藏 引用
22nd international Learning and Technology conference, L and T 2025
作者: Jewani, Varkha K. Ajmire, Prafulla E. Atique, Mohd. Sharma, Bhisham Dhaou, Imed Ben Awadhesh Chaurasia, Suhashini Sant Gadge Baba Amravati University Amravati India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura140401 India Dar Al-Hekma University Hekma School of Engineering Computing and Design Department of Computer Science Jeddah Saudi Arabia RTM Nagpur University Department of Computer Science Nagpur India
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ... 详细信息
来源: 评论
A Preliminary Study on Performance Modeling at Scale for Geophysical Applications  33
A Preliminary Study on Performance Modeling at Scale for Geo...
收藏 引用
33rd Euromicro international conference on Parallel, distributed, and Network-Based Processing, PDP 2025
作者: Dupros, Fabrice Jubertie, Sylvain Aochi, Hideo Intel Corporation Paris France Brgm Orléans France
Modeling the performance of real-world applications at scale is essential for designing next-generation platforms and shaping the development of future algorithms. However, accurately capturing the complexity of appli... 详细信息
来源: 评论
Federated Learning as a Service for Hierarchical Edge Networks with Heterogeneous Models  22nd
Federated Learning as a Service for Hierarchical Edge Networ...
收藏 引用
22nd international conference on Service Oriented computing
作者: Gao, Wentao Tavallaie, Omid Chen, Shuaijun Zomaya, Albert Univ Sydney Sch Comp Sci Sydney NSW Australia Univ Oxford Dept Engn Sci Oxford England
Federated learning (FL) is a distributed Machine Learning (ML) framework that is capable of training a new global model by aggregating clients' locally trained models without sharing users' original data. Fede... 详细信息
来源: 评论
Pricing Strategies in Cybersecurity Markets with Network Effects  22
Pricing Strategies in Cybersecurity Markets with Network Eff...
收藏 引用
22nd IEEE Consumer Communications and networking conference, CCNC 2025
作者: Hou, Jing Wang, Xuyu Zeng, Amy Z. California State University San Marcos Department of Computer Science and Information Systems San Marcos 92096 CA United States School of Computing and Information Sciences Florida International University Miami 33199 FL United States Sawyer Business School Suffolk University Boston 02108 MA United States
The cybersecurity market is rapidly growing in the face of ubiquitous vulnerabilities, with vendors delivering solutions ranging from basic software-based approaches to high-end services for diverse business needs. Th... 详细信息
来源: 评论
Network Anomaly Detection in distributed Edge computing Infrastructure
Network Anomaly Detection in Distributed Edge Computing Infr...
收藏 引用
22nd IEEE Consumer Communications and networking conference, CCNC 2025
作者: Marfo, William Rico, Enrique A. Tosh, Deepak K. Moore, Shirley V. University of Texas at El Paso Department of Computer Science El Paso United States
As networks continue to grow in complexity and scale, detecting anomalies has become increasingly challenging, particularly in diverse and geographically dispersed environments. Traditional approaches often struggle w... 详细信息
来源: 评论
Balancing computing and networking in Autonomous Edge Clouds  22
Balancing Computing and Networking in Autonomous Edge Clouds
收藏 引用
22nd IEEE Consumer Communications and networking conference, CCNC 2025
作者: Masuda, Shinnosuke Hasegawa, Tsuyoshi Shudo, Kazuyuki Cho, Kenjiro Kyoto University Japan Iij Japan
In the ever-changing environment of edge cloud systems, it is necessary to allocate diverse cloud resources in an efficient manner, at the same time, reducing energy consumption. A simple distributed resource allocati... 详细信息
来源: 评论
proceedings - 2018 IEEE 22nd international Enterprise distributed Object computing conference, EDOC 2018
Proceedings - 2018 IEEE 22nd International Enterprise Distri...
收藏 引用
22nd IEEE international Enterprise distributed Object computing conference, EDOC 2018
The proceedings contain 25 papers. The topics discussed include: enterprise architecture 4.0 – a vision, an approach and software tool support;formalizing application integration patterns;FEDSA: a data federation pla...
来源: 评论