咨询与建议

限定检索结果

文献类型

  • 612 篇 期刊文献
  • 587 篇 会议
  • 20 册 图书

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 779 篇 工学
    • 550 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 140 篇 信息与通信工程
    • 95 篇 控制科学与工程
    • 87 篇 电气工程
    • 83 篇 生物工程
    • 60 篇 机械工程
    • 57 篇 电子科学与技术(可...
    • 54 篇 光学工程
    • 54 篇 生物医学工程(可授...
    • 41 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 安全科学与工程
    • 22 篇 仪器科学与技术
  • 419 篇 理学
    • 188 篇 数学
    • 120 篇 物理学
    • 96 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 29 篇 化学
    • 25 篇 大气科学
  • 212 篇 管理学
    • 134 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 59 篇 医学
    • 52 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 25 篇 法学
  • 17 篇 教育学
  • 15 篇 农学
  • 6 篇 军事学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 40 篇 cloud computing
  • 38 篇 computational mo...
  • 25 篇 machine learning
  • 23 篇 deep learning
  • 22 篇 feature extracti...
  • 21 篇 training
  • 19 篇 reinforcement le...
  • 19 篇 computer archite...
  • 19 篇 semantics
  • 19 篇 artificial intel...
  • 18 篇 distributed comp...
  • 17 篇 laboratories
  • 16 篇 grid computing
  • 16 篇 resource managem...
  • 16 篇 accuracy
  • 15 篇 internet of thin...
  • 14 篇 quality of servi...
  • 14 篇 trajectory
  • 13 篇 learning systems
  • 13 篇 edge computing

机构

  • 51 篇 school of comput...
  • 39 篇 yunnan key labor...
  • 32 篇 laboratory schoo...
  • 29 篇 school of inform...
  • 24 篇 laboratory schoo...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...
  • 16 篇 kamioka branch n...
  • 16 篇 the university o...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...

作者

  • 93 篇 buyya rajkumar
  • 56 篇 rajkumar buyya
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 ismail leila
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno
  • 17 篇 g. hemming
  • 17 篇 f. muciaccia
  • 17 篇 b. garaventa

语言

  • 1,158 篇 英文
  • 48 篇 其他
  • 13 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems"
1219 条 记 录,以下是1031-1040 订阅
排序:
SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions
SLA-oriented resource provisioning for cloud computing: Chal...
收藏 引用
International Conference on cloud and Service computing (CSC)
作者: Rajkumar Buyya Saurabh Kumar Garg Rodrigo N. Calheiros Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computing and Information Systems University of Melbourne Australia
cloud computing systems promise to offer subscription-oriented, enterprise-quality computing services to users worldwide. With the increased demand for delivering services to a large number of users, they need to offe... 详细信息
来源: 评论
Analysis on Token-Controlled Public Key Encryption
Analysis on Token-Controlled Public Key Encryption
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Changlu Lin Yong Li Sriramkrishnan Srinivasan Li Lu Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Key Laboratory of Communication & Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China Department of Computing University of Surrey Guildford UK School of Computer Science University of Electronic Science and Technology Chengdu China
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example... 详细信息
来源: 评论
Integration Framework of Augmented Reality and Tangible Interfaces for Enhancing the User Interaction
Integration Framework of Augmented Reality and Tangible Inte...
收藏 引用
Symposium on Virtual Reality (SVR)
作者: F'bio Rodigues Fernando Sato Leonardo Botega Allan Oliveira Comput. & Inf. Syst. Res. Lab. Centro Univ. Euripides de Marilia Marilia Brazil Wireless Networks and Distributed Interactive Simulations Laboratory Universidade Federal de São Carlos São Carlos SP Brazil Computing and Information Systems Research Lab Campus Universitário Marília SP
The integration of post-wimp computer interfaces arises as an alternative to meet the individual limitations of each modality, considering both interaction components and the feedbacks to users. Tangible interfaces ca... 详细信息
来源: 评论
Combining static and dynamic analysis to discover software vulnerabilities
Combining static and dynamic analysis to discover software v...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous computing, IMIS 2011
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibin School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
Dynamic taint analysis has been proved to be very effective in solving security problems recently, especially in software vulnerability detection and malicious behavior prevention. Unfortunately, most of current resea... 详细信息
来源: 评论
DsVD: An effective low-overhead dynamic software vulnerability discoverer
DsVD: An effective low-overhead dynamic software vulnerabili...
收藏 引用
International Workshop on Assurance in distributed systems and Networks
作者: Wang, Zhuo Tang, Zhushou Zhou, Kan Zhang, Ruoyu Qi, Zhengwei Guan, Haibin School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
Dynamic taint analysis based software vulnerability and malware detection is an effective method to detect a wide range of vulnerabilities. Unfortunately, existing systems suffer from requirement of source code, high ... 详细信息
来源: 评论
VASP: Virtualization assisted security monitor for cross-platform protection  11
VASP: Virtualization assisted security monitor for cross-pla...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied computing
作者: Zhu, Min Yu, Miao Xia, Mingyuan Li, Bingyu Yu, Peijie Gao, Shang Qi, Zhengwei Liu, Liang Chen, Ying Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China IBM Research China China
Numerous operating systems have been designed to manage and control system resources with large and complicated features, so they need high security protection. However, previous security applications can not provide ... 详细信息
来源: 评论
Reports of the AAAI 2011 conference workshops
Reports of the AAAI 2011 conference workshops
收藏 引用
作者: Agmon, Noa Agrawal, Vikas Aha, David W. Aloimonos, Yiannis Buckley, Donagh Doshi, Prashant Geib, Christopher Grasso, Floriana Green, Nancy Johnston, Benjamin Kaliski, Burt Kiekintveld, Christopher Law, Edith Lieberman, Henry Mengshoel, Ole J. Metzler, Ted Modayil, Joseph Oard, Douglas W. Onder, Nilufer O'Sullivan, Barry Pastra, Katerina Precup, Doina Ramachandran, Sowmya Reed, Chris Sariel-Talay, Sanem Selker, Ted Shastri, Lokendra Singh, Satinder Smith, Stephen F. Srivastava, Siddharth Sukthankar, Gita Uthus, David C. Williams, Mary-Anne Department of Computer Science University of Texas at Austin United States Center for Knowledge Driven Information Systems Infosys Labs India Adaptive Systems Section Naval Research Laboratory Washington DC United States Department of Computer Science University of Maryland College Park United States EMC's Center of Excellence in Ireland Research Europe at EMC Ireland Department of Computer Science University of Georgia United States School of Informatics University of Edinburgh United Kingdom Department of Computer Science University of Liverpool United Kingdom Department of Computer Science University of North Carolina Greensboro United States Faculty of Engineering and Information Technology University of Technology Sydney Australia VeriSign Inc. United States Department of Computer Science University of Texas at El Paso United States Machine Learning Department Carnegie Mellon University United States Massachusetts Institute of Technology Media Laboratory United States Carnegie Mellon University's Silicon Valley Campus United States Darrell W. Hughes Program for Religion and Science Dialogue Oklahoma City University United States Department of Computing Science University of Alberta Canada College of Information Studies Institute for Advanced Computer Studies University of Maryland College Park United States Department of Computer Science Michigan Technological University United States Department of Computer Science University College Cork Ireland Cognitive Systems Research Insitute Athens Greece School of Computer Science McGill University Canada Stottler Henke Inc. United States School of Computing University of Dundee United Kingdom Department of Computer Engineering Istanbul Technical University Turkey Convergence Lab Infosys Technologies Ltd. United States Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor United States Robotics Institute Carnegie Mellon University United States University of Wisconsin
The AAAI-11 workshop program was held Sunday and Monday, August 7-18, 2011, at the Hyatt Regency San Francisco in San Francisco, California USA. The AAAI-11 workshop program included 15 workshops covering a wide range... 详细信息
来源: 评论
A COMPARATIVE REVIEW OF JOB SCHEDULING FOR MAPREDUCE
A COMPARATIVE REVIEW OF JOB SCHEDULING FOR MAPREDUCE
收藏 引用
2011 IEEE International Conference on cloud computing and Intelligence systems(CCIS2011)
作者: Dongjin Yoo Kwang Mong Sim Multi-Agent and Cloud Computing Systems Laboratory School of Information and CommunicationGwangju Institute of Science and Technology(GIST)
MapReduce is an emerging paradigm for data intensive processing with support of cloud computing *** provides convenient programming interfaces to distribute data intensive works in a cluster *** strengths of MapReduce... 详细信息
来源: 评论
Tags weighting based on user profile
Tags weighting based on user profile
收藏 引用
Lecture Notes in Computer Science
作者: Kichou, Saida Mellah, Hakima Amghar, Youssef Dahak, Fouad Benaknoun Algiers Algeria INSA of Lyon Computing on Images and Information Systems Laboratory Lyon France National Hight School of Computer Science ESI Oued Smar Algiers Algeria
The 'Collaborative Tagging' is gaining popularity on Web 2.0, this new generation of Web which makes user reader/writer. The 'Tagging' is a mean for users to express themselves freely through additions... 详细信息
来源: 评论
An energy-efficient scheduling algorithm for sporadic real-time tasks in multiprocessor systems
An energy-efficient scheduling algorithm for sporadic real-t...
收藏 引用
13th IEEE International Workshop on FTDCS 2011, the 8th International Conference on ATC 2011, the 8th International Conference on UIC 2011 and the 13th IEEE International Conference on HPCC 2011
作者: Zhang, Dong-Song Chen, Fang-Yuan Li, Hong-Hua Jin, Shi-Yao Guo, De-Ke National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China School of Computing Science Simon Fraser University 8888 University Drive Burnaby BC V5A 1S6 Canada National Laboratory for Information System Engineering School of Information Systems and Management National University of Defense Technology Changsha 410073 China
As the energy consumption of embedded multiprocessor systems becomes increasingly prominent, the real-time energy-efficient scheduling in multiprocessor systems becomes an urgent problem to reduce the system energy co... 详细信息
来源: 评论