咨询与建议

限定检索结果

文献类型

  • 4,043 篇 会议
  • 2,101 篇 期刊文献
  • 26 篇 学位论文

馆藏范围

  • 6,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,869 篇 工学
    • 2,120 篇 计算机科学与技术...
    • 1,869 篇 电气工程
    • 957 篇 信息与通信工程
    • 902 篇 控制科学与工程
    • 389 篇 软件工程
    • 151 篇 仪器科学与技术
    • 147 篇 电子科学与技术(可...
    • 135 篇 机械工程
    • 70 篇 交通运输工程
    • 39 篇 石油与天然气工程
    • 21 篇 网络空间安全
    • 20 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 15 篇 测绘科学与技术
    • 11 篇 生物医学工程(可授...
    • 8 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
  • 654 篇 理学
    • 344 篇 数学
    • 269 篇 系统科学
    • 70 篇 物理学
    • 18 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 7 篇 化学
  • 234 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
  • 36 篇 医学
    • 31 篇 临床医学
    • 11 篇 特种医学
  • 20 篇 文学
    • 20 篇 新闻传播学
  • 10 篇 经济学
    • 7 篇 理论经济学
  • 6 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 教育学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 6,170 篇 distributed algo...
  • 552 篇 convergence
  • 544 篇 wireless sensor ...
  • 533 篇 algorithm design...
  • 414 篇 optimization
  • 382 篇 computer science
  • 366 篇 distributed comp...
  • 363 篇 network topology
  • 331 篇 routing
  • 279 篇 resource managem...
  • 217 篇 protocols
  • 215 篇 computational mo...
  • 210 篇 computer network...
  • 206 篇 costs
  • 202 篇 approximation al...
  • 197 篇 fault tolerance
  • 187 篇 ad hoc networks
  • 183 篇 bandwidth
  • 180 篇 peer to peer com...
  • 179 篇 interference

机构

  • 24 篇 carnegie mellon ...
  • 19 篇 univ illinois de...
  • 19 篇 cent south univ ...
  • 19 篇 nanyang technol ...
  • 19 篇 univ cyprus dept...
  • 16 篇 ege univ int com...
  • 16 篇 univ minnesota d...
  • 16 篇 mit cambridge ma...
  • 15 篇 univ liverpool d...
  • 14 篇 suny stony brook...
  • 14 篇 swiss fed inst t...
  • 14 篇 purdue univ sch ...
  • 13 篇 northeastern uni...
  • 12 篇 univ penn dept e...
  • 12 篇 department of el...
  • 12 篇 weizmann inst sc...
  • 11 篇 department of in...
  • 11 篇 georgia state un...
  • 11 篇 purdue univ sch ...
  • 11 篇 univ cyprus dept...

作者

  • 35 篇 hadjicostis chri...
  • 23 篇 kowalski dariusz...
  • 22 篇 notarstefano giu...
  • 21 篇 hong yiguang
  • 20 篇 dagdeviren orhan
  • 20 篇 scutari gesualdo
  • 18 篇 dominguez-garcia...
  • 17 篇 deng zhenhua
  • 17 篇 pandurangan gopa...
  • 17 篇 mosbah mohamed
  • 16 篇 christoforos n. ...
  • 16 篇 khan usman a.
  • 16 篇 schmid stefan
  • 16 篇 sharma gokarna
  • 15 篇 peleg david
  • 15 篇 korman amos
  • 15 篇 navarra alfredo
  • 15 篇 mou shaoshuai
  • 15 篇 zeng xianlin
  • 15 篇 cortes jorge

语言

  • 6,066 篇 英文
  • 59 篇 其他
  • 38 篇 中文
  • 3 篇 德文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"主题词=distributed algorithms"
6170 条 记 录,以下是1691-1700 订阅
排序:
ROBUST DIFFUSION RECURSIVE LEAST SQUARES ESTIMATION WITH SIDE INFORMATION FOR NETWORKED AGENTS
ROBUST DIFFUSION RECURSIVE LEAST SQUARES ESTIMATION WITH SID...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
作者: Yu, Yi Zhao, Haiquan de Lamare, Rodrigo C. Zakharov, Yuriy Southwest Jiaotong Univ Sch Elect Engn Chengdu Sichuan Peoples R China Univ York Dept Elect Engn York YO10 5DD N Yorkshire England Pontificia Univ Catolica Rio de Janeiro CETUC BR-22451900 Rio de Janeiro Brazil
This work develops a robust diffusion recursive least squares algorithm to mitigate the performance degradation often experienced in networks of agents in the presence of impulsive noise. This algorithm minimizes an e... 详细信息
来源: 评论
Brief Announcement: Space- Optimal Naming in Population Protocols  18
Brief Announcement: Space- Optimal Naming in Population Prot...
收藏 引用
37th ACM SIGACT-SIGOPS Symposium on Principles of distributed Computing (PODC)
作者: Burman, Janna Beauquier, Joffroy Sohier, Devan Univ Paris Saclay LRI CNRS Orsay France Univ Paris Saclay LI PaRAD Univ Versailles Versailles France
This paper gives a brief presentation of a comprehensive study on the necessary and sufficient state space conditions for the deterministic naming task in the population protocol model. This problem is studied under v... 详细信息
来源: 评论
Brief Announcement: Beeping a Time-Optimal Leader Election  18
Brief Announcement: Beeping a Time-Optimal Leader Election
收藏 引用
37th ACM SIGACT-SIGOPS Symposium on Principles of distributed Computing (PODC)
作者: Dufoulon, Fabien Burman, Janna Beauquier, Joffroy Univ Paris Saclay Univ Paris Sud CNRS LRI Orsay France
The beeping model is an extremely restrictive broadcast communication model that relies only on carrier sensing. In this model, we solve the deterministic leader election problem with an asymptotically optimal round c... 详细信息
来源: 评论
Window Based BFT Blockchain Consensus  11
Window Based BFT Blockchain Consensus
收藏 引用
IEEE International Congress on Cybermatics / IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology
作者: Jalalzai, Mohammad M. Busch, Costas Louisiana State Univ Comp Sci & Engn Div Baton Rouge LA 70803 USA
There is surge of interest to the blockchain technology not only in the scientific community but in the business community as well. Proof of Work (PoW) and Byzantine Fault Tolerant (BFT) are the two main classes of co... 详细信息
来源: 评论
Parallel Reachability in Almost Linear Work and Square Root Depth
Parallel Reachability in Almost Linear Work and Square Root ...
收藏 引用
Annual IEEE Symposium on Foundations of Computer Science
作者: Arun Jambulapati Yang P. Liu Aaron Sidford ICME Stanford University Palo Alto CA USA Stanford University Palo Alto CA USA MS&E Stanford University Palo Alto CA USA
In this paper we provide a parallel algorithm that given any n-node m-edge directed graph and source vertex s computes all vertices reachable from s with Õ(m) work and n {1/2 + o(1) } depth with high probability ... 详细信息
来源: 评论
On Maximum Elastic Scheduling of Virtual Machines for Cloud-based Data Center Networks
On Maximum Elastic Scheduling of Virtual Machines for Cloud-...
收藏 引用
IEEE International Conference on Communications (ICC) / Workshop on Integrating UAVs into 5G
作者: Wu, Jie Lu, Shuaibing Zheng, Huanyang Temple Univ Ctr Networked Comp Philadelphia PA 19122 USA Jilin Univ Coll Comp Sci & Technol Changchun Peoples R China
Task resource allocation has always been an important issue in cloud-based data center networks (DCNs). This paper considers provisioning the maximum admissible load (MAL) of virtual machines (VMs) in physical machine... 详细信息
来源: 评论
Risk and security tradeoffs in graphical coordination games
Risk and security tradeoffs in graphical coordination games
收藏 引用
IEEE Annual Conference on Decision and Control
作者: Keith Paarporn Mahnoosh Alizadeh Jason R. Marden
A system relying on the collective behavior of decision-makers can be vulnerable to a variety of adversarial attacks. How well can a system operator protect performance in the face of these risks? We frame this questi... 详细信息
来源: 评论
Mechanism Design for Network Utility Maximization with Private Constraint Information
Mechanism Design for Network Utility Maximization with Priva...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Meng Zhang Jianwei Huang Dept. of Information Engineering The Chinese University of Hong Kong Hong Kong China School of Engineering and Science The Chinese University of Hong Kong Shenzhen China
Network utility maximization (NUM) is a general framework for optimally allocating constrained resources in many networked applications. When agents have asymmetric and private information, a fundamental economic chal... 详细信息
来源: 评论
BEE'S STRATEGY AGAINST BYZANTINES Replacing Byzantine Participants (Extended Abstract)  1
收藏 引用
20th International Symposium on Stabilization, Safety, and Security of distributed Systems (SSS)
作者: Shaer, Amitay Dolev, Shlomi Bonomi, Silvia Raynal, Michel Baldoni, Roberto Ben Gurion Univ Negev Dept Comp Sci Beer Sheva Israel Sapienza Univ Roma Dept Comp Control & Management Engn A Ruberti Res Ctr Cyber Intelligence & Informat Secur CIS Via Ariosto 25 I-00185 Rome Italy Univ Rennes IRISA F-35042 Rennes France
Schemes for the identification and replacement of two-faced Byzantine processes are presented. The detection is based on the comparison of the (blackbox) decision result of a Byzantine consensus on input consisting of... 详细信息
来源: 评论
Simple Synchronous and Asynchronous algorithms for distributed Minimax Optimization
收藏 引用
SICE Journal of Control, Measurement, and System Integration 2017年 第6期10卷 557-562页
作者: Kenta Hanada Ryosuke Morita Takayuki Wada Yasumasa Fujisaki Graduate School of Information Science and Technology Osaka University Faculty of Engineering Gifu University
Synchronous and asynchronous algorithms are presented for distributed minimax optimization. The objective here is to realize the minimization of the maximum of component functions over the standard multi-agent network... 详细信息
来源: 评论