咨询与建议

限定检索结果

文献类型

  • 1,624 篇 会议
  • 13 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,646 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 916 篇 工学
    • 838 篇 计算机科学与技术...
    • 323 篇 软件工程
    • 211 篇 信息与通信工程
    • 133 篇 电气工程
    • 63 篇 控制科学与工程
    • 31 篇 生物工程
    • 22 篇 生物医学工程(可授...
    • 17 篇 电子科学与技术(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 10 篇 交通运输工程
    • 9 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 183 篇 理学
    • 89 篇 数学
    • 68 篇 物理学
    • 33 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 134 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 经济学
    • 15 篇 应用经济学
  • 17 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 156 篇 distributed comp...
  • 113 篇 cloud computing
  • 78 篇 peer to peer com...
  • 74 篇 application soft...
  • 67 篇 protocols
  • 67 篇 computer network...
  • 64 篇 computational mo...
  • 63 篇 mobile computing
  • 56 篇 computer science
  • 56 篇 computer archite...
  • 49 篇 high performance...
  • 47 篇 routing
  • 46 篇 bandwidth
  • 45 篇 internet
  • 45 篇 middleware
  • 43 篇 privacy
  • 40 篇 costs
  • 39 篇 resource managem...
  • 39 篇 distributed comp...
  • 38 篇 social networkin...

机构

  • 14 篇 state key labora...
  • 10 篇 gansu provincial...
  • 9 篇 beijing universi...
  • 7 篇 institute of com...
  • 7 篇 cern geneva
  • 6 篇 college of compu...
  • 6 篇 shenzhen institu...
  • 6 篇 tokyo denki univ...
  • 5 篇 department of ph...
  • 5 篇 dept. of astrono...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 iii. physikalisc...
  • 5 篇 erlangen centre ...
  • 5 篇 département de p...
  • 5 篇 school of physic...
  • 5 篇 dept. of physics...
  • 5 篇 dept. of physics...
  • 5 篇 department of ph...
  • 5 篇 institut für phy...

作者

  • 8 篇 takizawa makoto
  • 6 篇 huang lican
  • 6 篇 enokido tomoya
  • 6 篇 makoto takizawa
  • 5 篇 de ridder s.
  • 5 篇 choi k.
  • 5 篇 an r.
  • 5 篇 haungs a.
  • 5 篇 fürst p.
  • 5 篇 cross r.
  • 5 篇 bradascio f.
  • 5 篇 fan k.l.
  • 5 篇 bourbeau e.
  • 5 篇 fritz a.
  • 5 篇 bastian b.
  • 5 篇 gündüz m.
  • 5 篇 dvorak e.
  • 5 篇 halve l.
  • 5 篇 gonzalez j.g.
  • 5 篇 de clercq c.

语言

  • 1,636 篇 英文
  • 8 篇 中文
  • 5 篇 其他
检索条件"任意字段=Proceedings of the 22nd International Conference on Distributed Computing and Networking"
1646 条 记 录,以下是21-30 订阅
排序:
distributed Dependent Task Offloading in CPU-GPU Heterogenous MEC: A Federated Reinforcement Learning Approach  22
Distributed Dependent Task Offloading in CPU-GPU Heterogenou...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Huang, Hualong Duan, Zhekai Zhan, Wenhan Liu, Yichen Wang, Zhi Zhao, Zitian Univ Elect Sci & Technol China Chengdu 611731 Peoples R China Univ Edinburgh Edinburgh Midlothian Scotland
Mobile edge computing (MEC) has emerged as a promising paradigm to enable computation-intensive and latency-sensitive mobile applications by offloading tasks to proximal edge servers. This paper proposes a novel feder... 详细信息
来源: 评论
Byzantine-Robust Federated Learning through Dynamic Clustering  22
Byzantine-Robust Federated Learning through Dynamic Clusteri...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Wang, Hanyu Wang, Liming Li, Hongjia Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Federated learning enables distributed and collaborative learning among multiple participants while protecting their privacy. However, due to its distributed nature, federated learning is vulnerable to Byzantine attac... 详细信息
来源: 评论
VXLAN - A practical approach to cloud computing scalability  22
VXLAN - A practical approach to cloud computing scalability
收藏 引用
22nd RoEduNet conference: networking in Education and Research, RoEduNet 2023
作者: Traistaru, Claudiu Universitatea din Craiova Departamentul de Calculatoare si Tehnologia Informatiei Craiova Romania
In this paper, we present a simple practical approach to using network virtualization technology in an ecosystem that is mainly composed of open-source software and operating systems. © 2023 IEEE.
来源: 评论
Research on Assessment System for Blockchain  22
Research on Assessment System for Blockchain
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Pang, Weiwei Wei, Kai Zhang, Yihui Jiang, Chunyu Cheng, Yang Zhang, Qi Liu, Bin Zhang, Lifeng Liu, Tingting Wu, Yinqian China Acad Informat & Commun Technol Cloud Comp & Big Data Res Inst Beijing Peoples R China
Blockchain assessment is a key method to evaluate the quality of blockchain products. Blockchain assessment can effectively address the problem of application systems breaking down due to poor quality of blockchain pr... 详细信息
来源: 评论
Constellation Autonomy Modeling for Agile on-Orbit Communication and computing  22
Constellation Autonomy Modeling for Agile on-Orbit Communica...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Wang, Shoufeng Chen, Hua-Min Ouyang, Ye Li, Fan Chen, Xuan Guo, Jianchao Li, Yun Bian, Sen Wang, Xidong Ren, Zhidong AsiaInfo Technol China INC Beijing Peoples R China Beijing Univ Technol Beijing Peoples R China China Unicom Beijing Branch Beijing Peoples R China China Unicom Beijing Beijing Peoples R China
With the growing demand for mobile communication services and continuous advances in communication technologies, ubiquitous coverage and Internet of Everything have become basic capabilities required for SG, 6G and fu... 详细信息
来源: 评论
A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash Function  22
A Secure Contactless Payment System with Bidirectional Block...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Rongali, Bhaskar Mohapatra, Satyajit Nayak, Sanjeet Kumar Indian Inst Informat Technol Design & Mfg Dept Comp Sci & Engn Chennai Tamil Nadu India
The growth of the Internet of Things (IoT) has led to an increased demand for contactless payment via IoT devices. However, machine-to-machine (M2M) payment in the IoT has been limited by poor centralized transaction ... 详细信息
来源: 评论
Differential Privacy Frequent Closed Itemset Mining over Data Stream  22
Differential Privacy Frequent Closed Itemset Mining over Dat...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Ma, Xuebin Guan, Shengyi Lang, Yanan Inner Mongolia Univ Inner Mongolia Key Lab Wireless Networking & Mobi Hohhot Peoples R China
As the most common technique for mining and analyzing massive data, frequent itemset mining is widely used in various scenarios. However, when the data contains sensitive information, it will bring serious privacy lea... 详细信息
来源: 评论
Zero Trust Score-based Network-level Access Control in Enterprise Networks  22
Zero Trust Score-based Network-level Access Control in Enter...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Bradatsch, Leonard Miroshkin, Oleksandr Trkulja, Natasa Kargl, Frank Ulm Univ Inst Distributed Syst Ulm Germany Ulm Univ KIZ Ulm Germany
Zero Trust security has recently gained attention in enterprise network security. One of its key ideas is making network-level access decisions based on trust scores. However, score-based access control in the enterpr... 详细信息
来源: 评论
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection  22
TGCN-DA: A Temporal Graph Convolutional Network with Data Au...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Li, Ximing Li, Linghui Li, Xiaoyong Cai, Binsi Li, Bingyu Beijing Univ Posts & Telecommun Key Lab Trustworthy Distributed Comp & Serv Minist Educ Beijing Peoples R China Beihang Univ Sch Cyber Sci & Technol Beijing Peoples R China
Insider threats present a formidable challenge to cybersecurity, as insiders possess the privileges and information necessary to execute diverse attacks. A comprehensive analysis of user behavior, including behavioral... 详细信息
来源: 评论
Secure Synchronized Spatio-Temporal Trajectory Similarity Search  22
Secure Synchronized Spatio-Temporal Trajectory Similarity Se...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Teng, Yiping Qi, Jiawei Liu, Lei Wang, Shiqing Xu, Li Fan, Chunlong Shenyang Aerosp Univ Sch Comp Large Scale Distributed Syst Lab Shenyang Liaoning Peoples R China
Attracting research interests and applications in academic and industrial community due to the proliferation of mobile devices, computation and processing services on spatio-temporal trajectory data has usually been o... 详细信息
来源: 评论