咨询与建议

限定检索结果

文献类型

  • 616 篇 期刊文献
  • 585 篇 会议
  • 20 册 图书

馆藏范围

  • 1,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 789 篇 工学
    • 559 篇 计算机科学与技术...
    • 458 篇 软件工程
    • 144 篇 信息与通信工程
    • 97 篇 控制科学与工程
    • 94 篇 电气工程
    • 83 篇 生物工程
    • 60 篇 机械工程
    • 59 篇 电子科学与技术(可...
    • 56 篇 光学工程
    • 55 篇 生物医学工程(可授...
    • 41 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 安全科学与工程
    • 22 篇 仪器科学与技术
  • 422 篇 理学
    • 189 篇 数学
    • 123 篇 物理学
    • 95 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 29 篇 化学
    • 25 篇 大气科学
  • 216 篇 管理学
    • 137 篇 管理科学与工程(可...
    • 93 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 59 篇 医学
    • 52 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 25 篇 法学
  • 17 篇 教育学
  • 15 篇 农学
  • 6 篇 军事学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 40 篇 cloud computing
  • 38 篇 computational mo...
  • 25 篇 machine learning
  • 23 篇 deep learning
  • 22 篇 feature extracti...
  • 20 篇 artificial intel...
  • 20 篇 training
  • 19 篇 reinforcement le...
  • 19 篇 computer archite...
  • 19 篇 semantics
  • 18 篇 distributed comp...
  • 17 篇 laboratories
  • 16 篇 grid computing
  • 16 篇 resource managem...
  • 16 篇 accuracy
  • 15 篇 internet of thin...
  • 14 篇 quality of servi...
  • 14 篇 trajectory
  • 13 篇 learning systems
  • 13 篇 edge computing

机构

  • 51 篇 school of comput...
  • 38 篇 yunnan key labor...
  • 32 篇 laboratory schoo...
  • 28 篇 school of inform...
  • 24 篇 laboratory schoo...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...
  • 16 篇 kamioka branch n...
  • 16 篇 the university o...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...
  • 16 篇 università di tr...

作者

  • 93 篇 buyya rajkumar
  • 56 篇 rajkumar buyya
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 ismail leila
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno
  • 17 篇 g. hemming
  • 17 篇 f. muciaccia
  • 17 篇 b. garaventa

语言

  • 1,157 篇 英文
  • 51 篇 其他
  • 13 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems"
1221 条 记 录,以下是101-110 订阅
排序:
Preemption-Aware Energy Management in Virtualized Data Centers
Preemption-Aware Energy Management in Virtualized Data Cente...
收藏 引用
IEEE International Conference on cloud computing, cloud
作者: Mohsen Amini Salehi P. Radha Krishna Krishnamurty Sai Deepak Rajkumar Buyya Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computing and Information Systems The University of Melbourne Australia Infosys Research Laboratories India
Energy efficiency is one of the main challenge hat data centers are facing nowadays. A considerable portion of the consumed energy in these environments is wasted because of idling resources. To avoid wastage, offerin... 详细信息
来源: 评论
Machine Learning in Energy and Thermal-aware Resource Management of cloud Data Centers: A Taxonomy and Future Directions
Machine Learning in Energy and Thermal-aware Resource Manage...
收藏 引用
Federated Conference on Computer Science and information systems (FedCSIS)
作者: Shashikant Ilager Rajkumar Buyya Cloud Computing and Distributed Systems (CLOUDS) Lab School of Computing and Information Systems University of Melbourne Australia Institute of Information Systems Engineering TU Wien Austria
cloud data centres (CDCs) are the backbone infrastructures of modern digital society, but they also consume huge amounts of energy and generate heat. To manage CDC resources efficiently, we must consider the complex i... 详细信息
来源: 评论
Computational Offloading or Data Binding? Bridging the cloud Infrastructure to the Proximity of the Mobile User
Computational Offloading or Data Binding? Bridging the Cloud...
收藏 引用
IEEE International Conference on Mobile cloud computing, Services, and Engineering
作者: Huber Flores Satish Narayana Srirama Rajkumar Buyya University of Tartu Institute of Computer Science Mobile Cloud Lab University of Melbourne Department of Computing and Information Systems Cloud Computing and Distributed Systems Laboratory (CLOUDS)
Mobile and cloud computing are converging as the prominent technologies that are leading the change to the post personal computing (PC) era. Computational offloading and data binding are the core techniques that foste... 详细信息
来源: 评论
Towards automatic update of access control policy  24
Towards automatic update of access control policy
收藏 引用
24th Large Installation System Administration Conference, LISA 2010
作者: Hu, Jinwei Zhang, Yan Li, Ruixuan Intelligent Systems Laboratory School of Computing and Mathematics University of Western Sydney Sydney1797 Australia Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are subject to changes, so that the associated configuration... 详细信息
来源: 评论
Progress in Advanced computing and Intelligent Engineering  1
收藏 引用
丛书名: Advances in Intelligent systems and computing
1000年
作者: Chhabi Rani Panigrahi Bibudhendu Pati Prasant Mohapatra Rajkumar Buyya Kuan-Ching Li
This book features high-quality research papers presented at the 4th International Conference on Advanced computing and Intelligent Engineering (ICACIE 2019), Department of Computer Science, Rama Devi Women’s Univers... 详细信息
来源: 评论
Metamaterial absorbers realized in an X-band rectangular waveguide
收藏 引用
Chinese Physics B 2012年 第11期21卷 474-478页
作者: 黄勇军 文光俊 李建 钟靖平 王平 孙元华 O.Gordon 朱卫仁 Key Laboratory of Broadband Optical Fiber Transmission&Communication Networks School of Communication and Information EngineeringUniversity of Electronic Science and Technology of China Advanced Computing and Simulation Laboratory(AχL) Department of Electrical and Computer Systems EngineeringMonash University
In this paper, we demonstrate six types of metamaterial absorbers (MMAs) by measuring their absorptivities in an X-band (8 12 GHz) rectangular waveguide. Some of the MMAs have been demonstrated previously by using... 详细信息
来源: 评论
Real-time enhancement for Xen hypervisor
Real-time enhancement for Xen hypervisor
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Yu, Peijie Xia, Mingyuan Lin, Qian Zhu, Min Gao, Shang Qi, Zhengwei Chen, Kai Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
System virtualization, which provides good isolation, is now widely used in server consolidation. Meanwhile, one of the hot topics in this field is to extend virtualization for embedded systems. However, current popul... 详细信息
来源: 评论
Combining static and dynamic analysis to discover software vulnerabilities
Combining static and dynamic analysis to discover software v...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous computing, IMIS 2011
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibin School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
Dynamic taint analysis has been proved to be very effective in solving security problems recently, especially in software vulnerability detection and malicious behavior prevention. Unfortunately, most of current resea... 详细信息
来源: 评论
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
Static program analysis assisted dynamic taint tracking for ...
收藏 引用
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
The evolution of computer science has exposed us to the growing gravity of security problems and threats. Dynamic taint analysis is a prevalent approach to protect a program from malicious behaviors, but fails to prov... 详细信息
来源: 评论
Towards a descriptive view of context usage in context-aware U-learning system
Towards a descriptive view of context usage in context-aware...
收藏 引用
21st International Conference on Computers in Education, ICCE 2013
作者: Souabni, Raoudha Saâdi, Inès Bayoudh Kinshuk, K. Ben Ghezala, Henda RIADI Research Laboratory - ENSI Manouba University Tunisia School of Computing and Information Systems Athabasca University Canada
Research in ubiquitous learning (U-learning) has gained attention of a large number of researchers and a number of ubiquitous learning systems are now available in the literature. Majority of these systems have been d... 详细信息
来源: 评论