咨询与建议

限定检索结果

文献类型

  • 741 篇 会议
  • 41 篇 期刊文献

馆藏范围

  • 782 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 607 篇 工学
    • 593 篇 计算机科学与技术...
    • 344 篇 软件工程
    • 93 篇 信息与通信工程
    • 67 篇 控制科学与工程
    • 64 篇 电气工程
    • 40 篇 网络空间安全
    • 12 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 农业工程
    • 2 篇 建筑学
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
  • 234 篇 理学
    • 218 篇 数学
    • 61 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 6 篇 系统科学
    • 4 篇 化学
    • 3 篇 大气科学
    • 3 篇 生物学
  • 48 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 22 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 4 篇 法学
    • 3 篇 社会学
    • 1 篇 法学
  • 3 篇 农学
    • 3 篇 作物学
  • 1 篇 医学

主题

  • 224 篇 distributed comp...
  • 35 篇 distributed algo...
  • 26 篇 distributed comp...
  • 25 篇 computer systems...
  • 17 篇 algorithms
  • 15 篇 consensus
  • 15 篇 distributed syst...
  • 14 篇 fault tolerance
  • 12 篇 distributed algo...
  • 11 篇 computer network...
  • 10 篇 message passing
  • 10 篇 approximation al...
  • 9 篇 self-stabilizati...
  • 9 篇 shared memory
  • 8 篇 cloud computing
  • 8 篇 randomized algor...
  • 6 篇 parallel algorit...
  • 6 篇 computation theo...
  • 6 篇 coloring
  • 6 篇 sensor networks

机构

  • 7 篇 ben gurion univ ...
  • 5 篇 technion
  • 5 篇 department of co...
  • 4 篇 technion haifa
  • 4 篇 college of compu...
  • 4 篇 department of co...
  • 4 篇 eth comp engn & ...
  • 4 篇 yale univ dept c...
  • 3 篇 univ of californ...
  • 3 篇 univ of toronto ...
  • 3 篇 computer enginee...
  • 3 篇 cispa helmholtz ...
  • 3 篇 yale university
  • 3 篇 university of fr...
  • 3 篇 technion israel ...
  • 3 篇 hebrew univ jeru...
  • 3 篇 mit cambridge ma...
  • 3 篇 irisa rennes
  • 3 篇 eth zurich
  • 3 篇 cnrs university ...

作者

  • 13 篇 kuhn fabian
  • 13 篇 awerbuch baruch
  • 13 篇 raynal michel
  • 12 篇 peleg david
  • 12 篇 kutten shay
  • 11 篇 toueg sam
  • 11 篇 patt-shamir boaz
  • 11 篇 wattenhofer roge...
  • 10 篇 guerraoui rachid
  • 10 篇 gafni eli
  • 10 篇 dolev danny
  • 9 篇 elkin michael
  • 9 篇 rajsbaum sergio
  • 9 篇 attiya hagit
  • 8 篇 khandekar rohit
  • 8 篇 pandurangan gopa...
  • 8 篇 aspnes james
  • 8 篇 fraigniaud pierr...
  • 7 篇 korman amos
  • 7 篇 herlihy maurice

语言

  • 775 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing"
782 条 记 录,以下是141-150 订阅
排序:
Brief announcement: Achieving reliability in master-worker computing via evolutionary dynamics  12
Brief announcement: Achieving reliability in master-worker c...
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Christoforou, Evgenia Fernández Anta, Antonio Georgiou, Chryssis Mosteiro, Miguel A. Sanchez, Angel University of Cyprus Cyprus Institute IMDEA Networks Spain Univ. Rey Juan Carlos Spain Rutgers University United States Matemáticas Univ. Carlos III Spain BIFI Univ. Zaragoza Spain
This work considers Internet-based task computations in which a master process assigns tasks, over the Internet, to rational workers and collect their responses. The objective is for the master to obtain the correct t... 详细信息
来源: 评论
distributed maximal matching: Greedy is optimal  12
Distributed maximal matching: Greedy is optimal
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Hirvonen, Juho Suomela, Jukka Helsinki Institute for Information Technology HIIT Department of Computer Science University of Helsinki P.O. Box 68 FI-00014 Helsinki Finland
We study distributed algorithms that find a maximal matching in an anonymous, edge-coloured graph. If the edges are properly coloured with k colours, there is a trivial greedy algorithm that finds a maximal matching i... 详细信息
来源: 评论
Optimal distributed all pairs shortest paths and applications  12
Optimal distributed all pairs shortest paths and application...
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Holzer, Stephan Wattenhofer, Roger ETH Zurich Switzerland
We present an algorithm to compute All Pairs Shortest Paths (APSP) of a network in a distributed way. The model of distributed computation we consider is the message passing model: in each synchronous round, every nod... 详细信息
来源: 评论
Brief announcement: There are plenty of tasks weaker than perfect renaming and stronger than set agreement  12
Brief announcement: There are plenty of tasks weaker than pe...
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Castãeda, Armando Rajsbaum, Sergio Raynal, Michel INRIA Campus de Beaulieu 35042 Rennes Cedex France Instituto de Matemáticas UNAM Mexico City Mexico Institut Universtaire de France IRISA Campus de Beaulieu 35042 Rennes Cedex France
In the asynchronous wait-free shared memory model, two families of tasks play a central role because of their implications in theory and in practice: k-set agreement and M-renaming. Let n denote the number of processe... 详细信息
来源: 评论
distributed connectivity of wireless networks  12
Distributed connectivity of wireless networks
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Halldórsson, Magnús M. Mitra, Pradipta ICE-TCS School of Computer Science Reykjavik University 101 Reykjavik Iceland
We consider the problem of constructing a communication infrastructure from scratch, for a collection of identical wireless nodes. Combinatorially, this means a) finding a set of links that form a strongly connected s... 详细信息
来源: 评论
Weak models of distributed computing, with connections to modal logic  12
Weak models of distributed computing, with connections to mo...
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Hella, Lauri Järvisalo, Matti Kuusisto, Antti Laurinharju, Juhana Lempiäinen, Tuomo Luosto, Kerkko Suomela, Jukka Virtema, Jonni School of Information Sciences University of Tampere Finland Helsinki Institute for Information Technology HIIT Department of Computer Science University of Helsinki Finland Department of Mathematics and Statistics University of Helsinki Finland
This work presents a classification of weak models of distributed computing. We focus on deterministic distributed algorithms, and we study models of computing that are weaker versions of the widely-studied port-numbe... 详细信息
来源: 评论
distributed selfish load balancing with weights and speeds  12
Distributed selfish load balancing with weights and speeds
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Adolphs, Clemens P.J. Berenbrink, Petra University of British Columbia 6224 Agricultural Road Vancouver BC V6T 1Z1 Canada Simon Fraser University 8888 University Drive Burnaby BC V5A 1S6 Canada
In this paper we consider neighborhood load balancing in the context of selfish clients. We assume that a network of n processors is given, with m tasks assigned to the processors. The processors may have different sp... 详细信息
来源: 评论
Creating mobile ad hoc workflows with Twitter  12
Creating mobile ad hoc workflows with Twitter
收藏 引用
27th annual acm symposium on Applied computing, SAC 2012
作者: Treiber, Martin Schall, Daniel Dustdar, Schahram Scherling, Christian Distributed Systems Group TU Vienna Argentinierstrasse 8 A-1040 Wien Austria Ikangai Solutions Treustrasse 59/5/20 A-1220 Wien Austria
The wide-spread adoption of powerful mobile devices allows for the design of workflows while on the move. In this paper, we leverage established SOA principles towards mobility in design and execution. For this purpos... 详细信息
来源: 评论
distributed algorithms for scheduling on line and tree networks  12
Distributed algorithms for scheduling on line and tree netwo...
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Chakaravarthy, Venkatesan T. Roy, Sambuddha Sabharwal, Yogish IBM Research - India New Delhi India
We have a set of processors (or agents) and a set of graph networks defined over some vertex set. Each processor can access a subset of the graph networks. Each processor has a demand specified as a pair of vertices 〈... 详细信息
来源: 评论
distributed public key schemes secure against continual leakage  12
Distributed public key schemes secure against continual leak...
收藏 引用
2012 acm symposium on principles of distributed computing, PODC'12
作者: Akavia, Adi Goldwasser, Shafi Hazay, Carmit Tel-Aviv Academic College Israel Weizmann Institute MIT United States Aarhus University Denmark
In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation... 详细信息
来源: 评论