咨询与建议

限定检索结果

文献类型

  • 50,047 篇 会议
  • 21,955 篇 期刊文献
  • 459 篇 学位论文
  • 185 册 图书
  • 34 篇 科技报告
  • 13 篇 资讯
  • 6 件 标准

馆藏范围

  • 72,697 篇 电子文献
  • 10 种 纸本馆藏

日期分布

学科分类号

  • 46,356 篇 工学
    • 37,006 篇 计算机科学与技术...
    • 17,538 篇 电气工程
    • 10,941 篇 信息与通信工程
    • 10,039 篇 软件工程
    • 3,098 篇 控制科学与工程
    • 1,377 篇 电子科学与技术(可...
    • 1,240 篇 仪器科学与技术
    • 1,092 篇 机械工程
    • 928 篇 网络空间安全
    • 644 篇 交通运输工程
    • 638 篇 环境科学与工程(可...
    • 501 篇 测绘科学与技术
    • 492 篇 动力工程及工程热...
    • 467 篇 材料科学与工程(可...
    • 433 篇 石油与天然气工程
    • 420 篇 生物工程
  • 6,410 篇 管理学
    • 5,127 篇 管理科学与工程(可...
    • 1,576 篇 工商管理
    • 1,278 篇 图书情报与档案管...
  • 4,575 篇 理学
    • 1,732 篇 数学
    • 886 篇 生物学
    • 839 篇 化学
    • 666 篇 系统科学
    • 565 篇 物理学
    • 347 篇 地球物理学
  • 1,110 篇 医学
    • 558 篇 临床医学
    • 518 篇 基础医学(可授医学...
  • 838 篇 经济学
    • 755 篇 应用经济学
  • 643 篇 教育学
    • 593 篇 教育学
  • 586 篇 法学
    • 406 篇 社会学
  • 312 篇 农学
  • 206 篇 文学
  • 67 篇 艺术学
  • 45 篇 军事学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 72,699 篇 cloud computing
  • 7,447 篇 servers
  • 5,778 篇 computational mo...
  • 4,897 篇 security
  • 4,530 篇 computer archite...
  • 4,485 篇 internet of thin...
  • 4,034 篇 resource managem...
  • 3,099 篇 edge computing
  • 2,961 篇 monitoring
  • 2,934 篇 big data
  • 2,463 篇 quality of servi...
  • 2,391 篇 encryption
  • 2,236 篇 virtualization
  • 2,151 篇 task analysis
  • 2,071 篇 optimization
  • 2,035 篇 virtual machinin...
  • 1,996 篇 privacy
  • 1,965 篇 real-time system...
  • 1,715 篇 protocols
  • 1,637 篇 data models

机构

  • 84 篇 chinese acad sci...
  • 78 篇 univ chinese aca...
  • 76 篇 hong kong polyte...
  • 72 篇 beijing univ pos...
  • 69 篇 tsinghua univ de...
  • 55 篇 nanyang technol ...
  • 55 篇 state key labora...
  • 54 篇 shandong univ sc...
  • 53 篇 fudan univ sch c...
  • 50 篇 chongqing univ c...
  • 49 篇 xidian univ stat...
  • 47 篇 new jersey inst ...
  • 47 篇 school of comput...
  • 42 篇 thapar univ dept...
  • 39 篇 tsinghua univers...
  • 37 篇 sun yat sen univ...
  • 35 篇 chinese acad sci...
  • 35 篇 school of comput...
  • 35 篇 univ elect sci &...
  • 32 篇 dalian univ tech...

作者

  • 134 篇 buyya rajkumar
  • 87 篇 celesti antonio
  • 67 篇 ma jianfeng
  • 65 篇 rodrigues joel j...
  • 60 篇 yang yun
  • 59 篇 antonio puliafit...
  • 46 篇 singh ashutosh k...
  • 45 篇 wang lei
  • 45 篇 li jin
  • 41 篇 niyato dusit
  • 39 篇 hong-linh truong
  • 39 篇 li yang
  • 38 篇 li peng
  • 36 篇 dustdar schahram
  • 35 篇 zhang lei
  • 35 篇 wang ping
  • 33 篇 zhang tao
  • 33 篇 fortino giancarl...
  • 33 篇 zomaya albert y.
  • 32 篇 li xin

语言

  • 71,248 篇 英文
  • 916 篇 其他
  • 432 篇 中文
  • 29 篇 葡萄牙文
  • 22 篇 西班牙文
  • 18 篇 德文
  • 15 篇 法文
  • 9 篇 土耳其文
  • 7 篇 俄文
  • 2 篇 阿拉伯文
  • 2 篇 日文
  • 1 篇 保加利亚文
  • 1 篇 克罗地亚文
  • 1 篇 意大利文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=CLOUD computing"
72699 条 记 录,以下是101-110 订阅
排序:
Enabling Industrial Internet of Things by Leveraging Distributed Edge-to-cloud computing: Challenges and Opportunities
收藏 引用
IEEE ACCESS 2024年 12卷 127294-127308页
作者: Jamil, Mohammad Newaj Schelen, Olov Monrat, Ahmed Afif Andersson, Karl Lulea Univ Technol Dept Comp Sci Elect & Space Engn S-93187 Lulea Sweden
The Industrial Internet of Things (IIoT) promises automation, efficiency, and data-driven decision-making by real-time data collection and analysis. However, traditional IIoT architectures are cloud-centric and, there... 详细信息
来源: 评论
MCWOA Scheduler:Modified Chimp-Whale Optimization Algorithm for Task Scheduling in cloud computing
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2593-2616页
作者: Chirag Chandrashekar Pradeep Krishnadoss Vijayakumar Kedalu Poornachary Balasundaram Ananthakrishnan School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India Center for Cyber Physical Systems School of Computer Science and EngineeringVellore Institute of TechnologyChennai600127India
cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can ha... 详细信息
来源: 评论
Determinants of cloud computing deployment in South African construction organisations using structural equation modelling and machine learning technique
收藏 引用
ENGINEERING CONSTRUCTION AND ARCHITECTURAL MANAGEMENT 2024年 第3期31卷 1037-1060页
作者: Aghimien, Douglas Aigbavboa, Clinton Ohis Chan, Daniel W. M. Aghimien, Emmanuel Imuetinyan Univ Johannesburg Fac Engn & Built Environm Dept Civil Engn Technol Johannesburg South Africa Univ Johannesburg Fac Engn & Built Environm Cidb Ctr Excellence Johannesburg South Africa Hong Kong Polytech Univ Dept Bldg & Real Estate Kowloon Hong Kong Peoples R China City Univ Hong Kong Dept Architecture & Civil Engn Kowloon Tong Hong Kong Peoples R China Purdue Univ Lyles Sch Civil Engn W Lafayette IN 47907 USA
Purpose This paper presents the findings from the assessment of the determinants of cloud computing (CC) deployment by construction organisations. Using the technology-organisation-environment (TOE) framework, the stu... 详细信息
来源: 评论
Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile cloud computing
收藏 引用
IEEE TRANSACTIONS ON cloud computing 2024年 第2期12卷 659-670页
作者: Wu, Axin Zhang, Yinghui Zhu, Jianhao Zhao, Qiuxia Zhang, Yu State Key Lab Cryptol Beijing 100878 Peoples R China Xian Univ Posts & Telecommun Natl Engn Res Ctr Secured Wireless NERCSW Sch Cyberspace Secur Xian 710121 Peoples R China Jinan Univ Coll Cyber Secur Guangzhou 510632 Guangdong Peoples R China Qinghai Normal Univ Sch Comp Sci Xining 810001 Peoples R China Yuncheng Univ Maths & Informat Technol Sch Yuncheng 044000 Peoples R China
Mobile cloud computing (MCC) integrates the advantages of mobile networks and cloud computing, enabling users to enjoy personalized services without constraints and restrictions of time and place. While this brings co... 详细信息
来源: 评论
Binarized Spiking Neural Network with blockchain based intrusion detection framework for enhancing privacy and security in cloud computing environment
收藏 引用
APPLIED SOFT computing 2024年 154卷
作者: Sarveshwaran, Velliangiri Pandiaraj, Shanthini Bindu, Garikapati Ganesan, Vithya Swamidason, Iwin Thanakumar Joseph SRM Inst Sci & Technol Dept Comp Intelligence Kattankulathur Campus Chennai Tamil Nadu India Karunya Inst Technol & Sci Dept Elect & Commun Engn Coimbatore Tamil Nadu India Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Vaddeswaram Andhra Pradesh India
cloud computing (CC) is prone to attacks, which upsurges complication and erudition. By this, its origins provocative implications can enterprise data veracity, concealment, and accessibility. To overwhelm these issue... 详细信息
来源: 评论
A novel strategy for deterministic workflow scheduling with load balancing using modified min-min heuristic in cloud computing environment
收藏 引用
CLUSTER computing-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2024年 第5期27卷 6985-7006页
作者: Choudhary, Anjali Rajak, Ranjit Dr Harisingh Gour Cent Univ Dept Comp Sci & Applicat Sagar India
cloud computing Environment (CCE) has gained considerable attention in recent years because of scalability, flexibility, and cost-effectiveness. Workflow scheduling, a critical aspect of CCE, involves assigning tasks ... 详细信息
来源: 评论
Exponential Squirrel Search Algorithm-Based Deep Classifier for Intrusion Detection in cloud computing with Big Data Assisted Spark Framework
收藏 引用
CYBERNETICS AND SYSTEMS 2024年 第2期55卷 331-350页
作者: Polepally, Vijayakumar Jagannadha Rao, D. B. Kalpana, Parsi Nagendra Prabhu, S. Kakatiya Inst Technol & Sci Dept Comp Sci & Engn Warangal Telangana India Shri Jagdishprasad Jhabarmal Tibrewala Univ Dept Comp Sci & Engn Jhunjhunu Rajasthan India St Francis Coll Women Dept Comp Sci Hyderabad Telangana India Malla Reddy Coll Engn & Technol Dept Comp Sci & Engn Dhulapally Telangana India Kakatiya Inst Technol & Sci Dept Comp Sci & Engn Warangal 506015 Telangana India Malla Reddy Univ Hyderabad Dept Comp Sci & Engn Data Sci Hyderabad 500043 Telangana India Vasavi Coll Engn Dept Comp Sci & Engn Hyderabad 500031 Telangana India SRM Inst Sci & Technol Sch Comp Dept Computat Intelligence Chennai 603203 Tamilanadu India
Intrusion detection systems (IDS) are extensively employed for detecting suspicious behaviors in hosts. The ability of distributed IDS solutions makes it viable to combine and handle various kinds of sensors and gener... 详细信息
来源: 评论
Exploring Social Credit for Fairness in cloud computing Networks
收藏 引用
IETE TECHNICAL REVIEW 2024年 第5期41卷 578-591页
作者: Saxena, Navrati Huang, Kaiyi Roy, Abhishek San Jose State Univ Dept Comp Sci San Jose CA 95112 USA MediaTek Adv Commun Technol San Jose CA 95134 USA
cloud-based computing networks have taken over the digital landscape. From small non-profits to large multinational corporations, more and more entities have been offloading computing effort to the cloud in order to t... 详细信息
来源: 评论
Energy Efficient Resource Allocation and Latency Reduction in Mobile cloud computing Environments
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2024年 第2期136卷 657-687页
作者: Rathika, J. Soranamageswari, M. Coimbatore Inst Technol Dept Comp Data Sci Coimbatore 641014 Tamil Nadu India Govt Arts Coll Dept Informat Technol Coimbatore 641018 Tamil Nadu India
Each mobile user in a typical multi-user mobile cloud computing (MCC) system has a number of independent tasks to do. In the modern world of finite resources and growing demands, it is critical to make the best use of... 详细信息
来源: 评论
Enhancing the Swimmer Movement Techniques Using cloud computing and Artificial Intelligence
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2024年 第2期29卷 433-447页
作者: Liu, Xurui Zhang, Guobao Beijing Sport Univ China Swimming Coll Beijing Peoples R China
Nowadays, miniature sensors can communicate with intelligent tools and pervasive computing devices to analyze and assess sports and physical activities. These sensors allow us to collect data from various physical act... 详细信息
来源: 评论