咨询与建议

限定检索结果

文献类型

  • 1,451 篇 期刊文献
  • 1,156 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 2,610 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,094 篇 工学
    • 1,529 篇 计算机科学与技术...
    • 692 篇 电气工程
    • 577 篇 软件工程
    • 306 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 102 篇 石油与天然气工程
    • 56 篇 仪器科学与技术
    • 47 篇 动力工程及工程热...
    • 43 篇 机械工程
    • 40 篇 航空宇航科学与技...
    • 39 篇 电子科学与技术(可...
    • 34 篇 土木工程
    • 34 篇 交通运输工程
    • 28 篇 建筑学
    • 22 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 19 篇 测绘科学与技术
    • 10 篇 材料科学与工程(可...
    • 10 篇 环境科学与工程(可...
  • 703 篇 理学
    • 617 篇 数学
    • 106 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 32 篇 物理学
    • 21 篇 化学
    • 20 篇 生物学
  • 208 篇 管理学
    • 130 篇 管理科学与工程(可...
    • 82 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 20 篇 经济学
    • 19 篇 应用经济学
  • 11 篇 法学
    • 9 篇 社会学
  • 10 篇 医学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 2,610 篇 consensus algori...
  • 417 篇 blockchain
  • 187 篇 blockchains
  • 142 篇 security
  • 128 篇 scalability
  • 102 篇 heuristic algori...
  • 99 篇 convergence
  • 87 篇 fault tolerant s...
  • 86 篇 throughput
  • 85 篇 fault tolerance
  • 85 篇 multi-agent syst...
  • 79 篇 privacy
  • 76 篇 microgrids
  • 75 篇 consensus protoc...
  • 74 篇 distributed cont...
  • 73 篇 internet of thin...
  • 73 篇 peer-to-peer com...
  • 71 篇 protocols
  • 66 篇 topology
  • 62 篇 delays

机构

  • 9 篇 xidian univ sch ...
  • 8 篇 southeast univ s...
  • 8 篇 google research ...
  • 7 篇 columbia univers...
  • 7 篇 aalborg univ dep...
  • 7 篇 mit united state...
  • 7 篇 shanghai jiao to...
  • 6 篇 beihang univ sch...
  • 6 篇 carnegie mellon ...
  • 6 篇 southeast univ s...
  • 6 篇 university of to...
  • 5 篇 shanghai univ sc...
  • 5 篇 beijing inst tec...
  • 5 篇 shandong univ sc...
  • 5 篇 school of mathem...
  • 5 篇 nanyang technol ...
  • 5 篇 north china elec...
  • 5 篇 dalian maritime ...
  • 5 篇 qufu normal univ...
  • 4 篇 massachusetts in...

作者

  • 13 篇 guerrero josep m...
  • 12 篇 li junmin
  • 8 篇 chen jiaxi
  • 7 篇 dragicevic tomis...
  • 7 篇 du yuhua
  • 7 篇 chow mo-yuen
  • 7 篇 kim hak-man
  • 7 篇 schulz christian
  • 6 篇 ding zhengtao
  • 6 篇 li jinsha
  • 6 篇 meng lexuan
  • 6 篇 wen guanghui
  • 6 篇 wang jianan
  • 6 篇 burgos-mellado c...
  • 6 篇 hadjicostis chri...
  • 5 篇 fischer nick
  • 5 篇 chae kijoon
  • 5 篇 wang jing
  • 5 篇 fu xiang
  • 5 篇 zhang qinjin

语言

  • 2,204 篇 英文
  • 397 篇 其他
  • 9 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"主题词=Consensus Algorithm"
2610 条 记 录,以下是2311-2320 订阅
排序:
Distributed Formation Control of Autonomous Underwater Vehicles Based on Flocking and consensus algorithms  10th
Distributed Formation Control of Autonomous Underwater Vehic...
收藏 引用
10th International Conference on Intelligent Robotics and Applications (ICIRA
作者: Pan, Wuwei Jiang, Dapeng Pang, Yongjie Qi, Yuda Luo, Daichao Harbin Engn Univ Sci & Technol Underwater Vehicle Lab Harbin 150001 Peoples R China
In this paper, a distributed formation controller of autonomous underwater vehicles is presented. An artificial potential field is proposed based on the Lennard-Jones potential. A weight function is designed to make t... 详细信息
来源: 评论
Distributed Ledger Technologies for M2M Communications  33
Distributed Ledger Technologies for M2M Communications
收藏 引用
33rd International Conference on Information Networking (ICOIN)
作者: Zivic, Natasa Ruland, Christoph Sassmannshausen, Jochen Carmeq GmbH Berlin Germany Univ Siegen Siegen Germany
Distributed Ledger Technologies (DLT) are seen as data bases of the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments. They are considered as one of t... 详细信息
来源: 评论
Zero-determinant Strategy for the algorithm optimize of Blockchain PoW consensus  36
Zero-determinant Strategy for the Algorithm optimize of Bloc...
收藏 引用
第36届中国控制会议
作者: Yang Zhen Miao Yue Chen Zhong-yu Tang Chang-bing Chen Xin College of Mathematics Physics & Information EngineeringZhejiang Normal University
The Proof of Work(Po W) consensus algorithm guarantees the safety and dependability of Blockchain systems. Miners can achieve a consensus through the Po W algorithm during the mining process, that is mutual attacking.... 详细信息
来源: 评论
Atomic Appends in Asynchronous Byzantine Distributed Ledgers
Atomic Appends in Asynchronous Byzantine Distributed Ledgers
收藏 引用
European Dependable Computing Conference (EDCC)
作者: Vicent Cholvi Antonio Fernandez Anta Chryssis Georgiou Nicolas Nicolaou Michel Raynal Universitat Jaume I Spain IMDEA Networks Institute Madrid Spain University of Cyprus Cyprus Algolysis Ltd Cyprus IRISA France & PolyU Hong Kong
The following topics are dealt with: security of data; formal specification; safety-critical software; risk analysis; fault tolerant computing; genetic algorithms; finite state machines; automata theory; distributed p... 详细信息
来源: 评论
Blockchain for Increased Cyber-Resiliency of Industrial Edge Environments
Blockchain for Increased Cyber-Resiliency of Industrial Edge...
收藏 引用
International Conference on Smart Computing (SMARTCOMP)
作者: Eugenio Balistri Francesco Casellato Carlo Giannelli Cesare Stefanelli University of Ferrara Ferrara Italy
The advent of the Internet of Things (IoT) together with its spread in industrial environments have changed pro-duction lines, by dramatically fostering the dynamicity of data sharing and the openness of machines. How... 详细信息
来源: 评论
Reducing Redundant Control Messaging for Fast Response in SDN
Reducing Redundant Control Messaging for Fast Response in SD...
收藏 引用
IEEE/CIC International Conference on Communications in China (ICCC)
作者: Wu, Gang Yang, Peng Luo, Jingjing Yu, Li Huazhong Univ Sci & Technol Sch Elect Informat & Commun Wuhan Peoples R China
The control mechanism of SDN tends to be distributed when the network scale expands. As the number of controllers grows, how to efficiently respond to network events in a timely fashion becomes challenging. Specifical... 详细信息
来源: 评论
Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems
Proof-of-Authentication for Scalable Blockchain in Resource-...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Puthal, Deepak Mohanty, Saraju P. Nanda, Priyadarsi Kougianos, Elias Das, Gautam Univ Technol Sydney Fac Engn & Informat Technol Sydney NSW Australia Univ North Texas Dept Comp Sci & Engn Denton TX 76203 USA Univ North Texas Dept Engn Denton TX 76203 USA Univ Texas Arlington Dept Comp Sci & Engn Arlington TX 76019 USA
Resource-constrained distributed systems such as the Internet of Things (IoT), edge computing and fog computing are deployed for real-time monitoring and evaluation. Current security solutions are problematic when the... 详细信息
来源: 评论
A Distributed Scheme for Economic Optimization Operation and Voltage Recovery with Constant Power Loads(CPLs) in DC Microgrids
A Distributed Scheme for Economic Optimization Operation and...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Beibei Liu Jian Yang Wendong Feng Ya Li Lingqi Fang Quanxu Lv School of Automation Central South University Changsha China
A fully distributed control scheme is proposed to simultaneously realize optimized economic operation of the DC microgrid with constant power loads (CPLs) and voltage recovery of DC bus. Considering CPL characteristic... 详细信息
来源: 评论
Preliminary Results of a Multi-Vocal Literature Review of Blockchain Networks
Preliminary Results of a Multi-Vocal Literature Review of Bl...
收藏 引用
Computer Science Society (SCCC) International Conference Chilean FLAGGED
作者: Juan Manuel Sobral Martin Solari Santiago Matalonga Universidad ORT Uruguay Montevideo Uruguay University of the West of Scotland Glasgow United Kingdom
Blockchain technology has fostered many projects, which have seen in it an alternative to carry out data management without relying on a trusted third party. However, business are failing to adopt this technology, and... 详细信息
来源: 评论
Resilient asynchronous rendezvous of second-order agents under communication noise
Resilient asynchronous rendezvous of second-order agents und...
收藏 引用
IEEE Conference on Decision and Control
作者: Mingming Shi
In this paper, we investigate the problem of rendezvous of second-order agents considering two issues: a) misbehaving agents that make update abnormally and can send arbitrary information to neighbors; b) unknown but ... 详细信息
来源: 评论