咨询与建议

限定检索结果

文献类型

  • 49,873 篇 会议
  • 21,980 篇 期刊文献
  • 460 篇 学位论文
  • 190 册 图书
  • 34 篇 科技报告
  • 13 篇 资讯
  • 6 件 标准

馆藏范围

  • 72,553 篇 电子文献
  • 13 种 纸本馆藏

日期分布

学科分类号

  • 46,359 篇 工学
    • 36,972 篇 计算机科学与技术...
    • 17,449 篇 电气工程
    • 10,869 篇 信息与通信工程
    • 10,070 篇 软件工程
    • 3,096 篇 控制科学与工程
    • 1,399 篇 电子科学与技术(可...
    • 1,234 篇 仪器科学与技术
    • 1,102 篇 机械工程
    • 925 篇 网络空间安全
    • 642 篇 交通运输工程
    • 634 篇 环境科学与工程(可...
    • 498 篇 测绘科学与技术
    • 487 篇 动力工程及工程热...
    • 471 篇 材料科学与工程(可...
    • 433 篇 石油与天然气工程
    • 422 篇 生物工程
  • 6,445 篇 管理学
    • 5,148 篇 管理科学与工程(可...
    • 1,583 篇 工商管理
    • 1,291 篇 图书情报与档案管...
  • 4,581 篇 理学
    • 1,731 篇 数学
    • 882 篇 生物学
    • 838 篇 化学
    • 669 篇 系统科学
    • 572 篇 物理学
    • 345 篇 地球物理学
  • 1,101 篇 医学
    • 552 篇 临床医学
    • 510 篇 基础医学(可授医学...
  • 846 篇 经济学
    • 764 篇 应用经济学
  • 643 篇 教育学
    • 593 篇 教育学
  • 595 篇 法学
    • 411 篇 社会学
  • 311 篇 农学
  • 207 篇 文学
  • 69 篇 艺术学
  • 45 篇 军事学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 72,556 篇 cloud computing
  • 7,391 篇 servers
  • 5,727 篇 computational mo...
  • 4,855 篇 security
  • 4,500 篇 computer archite...
  • 4,441 篇 internet of thin...
  • 3,985 篇 resource managem...
  • 3,063 篇 edge computing
  • 2,936 篇 big data
  • 2,931 篇 monitoring
  • 2,451 篇 quality of servi...
  • 2,365 篇 encryption
  • 2,229 篇 virtualization
  • 2,150 篇 task analysis
  • 2,035 篇 virtual machinin...
  • 2,033 篇 optimization
  • 1,978 篇 privacy
  • 1,884 篇 real-time system...
  • 1,704 篇 protocols
  • 1,613 篇 data models

机构

  • 84 篇 chinese acad sci...
  • 77 篇 univ chinese aca...
  • 75 篇 hong kong polyte...
  • 72 篇 beijing univ pos...
  • 70 篇 tsinghua univ de...
  • 56 篇 state key labora...
  • 55 篇 nanyang technol ...
  • 54 篇 shandong univ sc...
  • 52 篇 fudan univ sch c...
  • 49 篇 chongqing univ c...
  • 49 篇 xidian univ stat...
  • 46 篇 new jersey inst ...
  • 46 篇 school of comput...
  • 42 篇 thapar univ dept...
  • 38 篇 tsinghua univers...
  • 35 篇 sun yat sen univ...
  • 35 篇 school of comput...
  • 34 篇 chinese acad sci...
  • 34 篇 univ elect sci &...
  • 32 篇 dalian univ tech...

作者

  • 135 篇 buyya rajkumar
  • 87 篇 celesti antonio
  • 66 篇 ma jianfeng
  • 65 篇 rodrigues joel j...
  • 60 篇 yang yun
  • 59 篇 antonio puliafit...
  • 46 篇 singh ashutosh k...
  • 46 篇 li jin
  • 45 篇 wang lei
  • 41 篇 niyato dusit
  • 39 篇 hong-linh truong
  • 39 篇 li yang
  • 38 篇 li peng
  • 36 篇 dustdar schahram
  • 35 篇 wang ping
  • 35 篇 zomaya albert y.
  • 34 篇 zhang lei
  • 33 篇 fortino giancarl...
  • 32 篇 zhang tao
  • 32 篇 li xin

语言

  • 71,093 篇 英文
  • 929 篇 其他
  • 439 篇 中文
  • 29 篇 葡萄牙文
  • 23 篇 西班牙文
  • 22 篇 德文
  • 15 篇 法文
  • 9 篇 土耳其文
  • 7 篇 日文
  • 7 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 保加利亚文
  • 1 篇 克罗地亚文
  • 1 篇 意大利文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=CLOUD computing"
72556 条 记 录,以下是4991-5000 订阅
排序:
Secure Algorithm for cloud computing and Its Applications  6
Secure Algorithm for Cloud Computing and Its Applications
收藏 引用
6th International Conference on cloud System and Big Data Engineering (Confluence)
作者: Bhandari, Akshita Gupta, Ashutosh Das, Debasis NIIT Univ Dept CSE Alwar 301705 Rajasthan India NIIT Univ Dept BT Alwar 301705 Rajasthan India
cloud computing is a rising technology that is still unclear to many security issues. The most challenging issue today in cloud servers is to ensure data security and privacy of the users. The proposed schema presents... 详细信息
来源: 评论
Secure sharing with cryptography in cloud computing
Secure sharing with cryptography in cloud computing
收藏 引用
4th Nirma University International Conference on Engineering (NUiCONE)
作者: Chachapara, Kajal Bhadlawala, Sunny RGPV Univ Bhopal Dept Comp Sci & Engn TIT Engn & Technol Bhopal Madhya Pradesh India AISECT Univ Bhopal Dept Comp Sci & Engn Bhopal Madhya Pradesh India
cloud computing is buzz word now days. cloud providers try to provide security, sharing, authenticity and integrity. Under this research work, we have focused on adding new functionality for cloud providers that is se... 详细信息
来源: 评论
Federation and Revenue Sharing in cloud computing Environment  2
Federation and Revenue Sharing in Cloud Computing Environmen...
收藏 引用
IEEE International Conference on cloud Engineering (IC2E)
作者: El Zant, Bassem Amigo, Isabel Gagnaire, Maurice CNRS Inst TELECOM TELECOM Paristech LTCIUMR 5141 F-75013 Paris France
In cloud computing, resources such as CPU, RAM, and disk etc. are provided as a service via the Internet. Elasticity is a key feature of cloud computing. It aims to enabling a cloud Service Provider (CSP) to negotiate... 详细信息
来源: 评论
A Novel Parallel Jobs Scheduling Algorithm in The cloud computing  9
A Novel Parallel Jobs Scheduling Algorithm in The Cloud Comp...
收藏 引用
9th International Conference on Computer and Knowledge Engineering (ICCKE)
作者: Mohtajollah, Zahra Adibnia, Fazlollah Yazd Univ Dept Comp Engn Yazd Iran
cloud computing is a computational model that provides all computing services and its requirements over the Internet. So our computation is always available without burdens of carrying large-scale hardware and softwar... 详细信息
来源: 评论
To Reach The clouds: Application of Topic Models to the Meta-review on cloud computing Literature  49
To Reach The Clouds: Application of Topic Models to the Meta...
收藏 引用
49th Hawaii International Conference on System Sciences (HICSS)
作者: Upreti, Bikesh Raj Asatiani, Aleksandre Malo, Pekka Aalto Univ Espoo Finland
cloud computing remains an increasingly popular topic among practitioners as well as researchers. The literature spans across multiple disciplines, and the knowledge is fragmented and not systematized. To address this... 详细信息
来源: 评论
Effect of Third-Party cloud computing Usage on Intra-Organizational Coordination  21
Effect of Third-Party Cloud Computing Usage on Intra-Organiz...
收藏 引用
21st Americas Conference on Information Systems (AMCIS)
作者: Ayaburi, Emmanuel Univ Texas San Antonio San Antonio TX 78285 USA
Previous studies have established the impact of information technology on interdepartmental cooperation. However, the move from distributed computing to centralize computing as a result of cloud adoption is having an ... 详细信息
来源: 评论
Extending SOA to cloud computing In Higher Education
Extending SOA to Cloud Computing In Higher Education
收藏 引用
15th International-Business-Information-Management-Association Conference
作者: Mircea, Marinela Andreescu, Anca Ioana Acad Econ Studies Bucharest Romania
The financial crisis that the world's states are confronted with affects the national economies, leading to pressures with respect to costs cutting at the level of each organization. In the situation of budgetary ... 详细信息
来源: 评论
Building Adaptive User Interface using cloud computing  2
Building Adaptive User Interface using Cloud Computing
收藏 引用
2015 Second International Conference on Computer Science Computer Engineering, and Social Media (CSCESM)
作者: Dimokas, Nikos Kalogirou, Kostas Spanidis, Pavlos Bekiaris, Evangelos Ctr Res & Technol Hellas Hellen Inst Transport Thessaloniki Greece
Recent advances in cloud computing and ubiquitous computing have changed the computing paradigm rapidly. cloud computing is the computing that relies on a large pool of systems interconnected in private or public netw... 详细信息
来源: 评论
Congestion control method with fair resource allocation for cloud computing environments
Congestion control method with fair resource allocation for ...
收藏 引用
IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)
作者: Tomita, Takuro Kuribayashi, Shin-ichi Seikei Univ Musashino Tokyo 1808633 Japan
In a cloud computing environment, it is necessary to simultaneously allocate both processing ability and network bandwidth needed to access it. The authors proposed the congestion control method for a cloud computing ... 详细信息
来源: 评论
Effective Security Analysis for Combinations of MTD Techniques on cloud computing (Short Paper)  13th
Effective Security Analysis for Combinations of MTD Techniqu...
收藏 引用
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)
作者: Alavizadeh, Hooman Kim, Dong Seong Hong, Jin B. Jang-Jaccard, Julian Massey Univ Inst Nat & Math Sci Auckland New Zealand Univ Canterbury Dept Comp Sci & Software Engn Christchurch New Zealand
Moving Target Defense (MTD) is an emerging security solution based on continuously changing attack surface thus makes it unpredictable for attackers. cloud computing could leverage such MTD approaches to prevent its r... 详细信息
来源: 评论