咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 236 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 594 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 373 篇 工学
    • 265 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 85 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 51 篇 电气工程
    • 37 篇 机械工程
    • 31 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 24 篇 动力工程及工程热...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 8 篇 建筑学
    • 8 篇 环境科学与工程(可...
    • 7 篇 光学工程
  • 192 篇 理学
    • 124 篇 数学
    • 57 篇 系统科学
    • 34 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 20 篇 物理学
    • 11 篇 化学
  • 117 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 50 篇 工商管理
    • 38 篇 图书情报与档案管...
  • 21 篇 法学
    • 17 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 教育学
    • 10 篇 教育学
  • 10 篇 农学
  • 8 篇 医学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 33 篇 distributed comp...
  • 32 篇 computer science
  • 30 篇 laboratories
  • 20 篇 cloud computing
  • 16 篇 computer archite...
  • 13 篇 algorithm design...
  • 13 篇 computer network...
  • 12 篇 application soft...
  • 12 篇 machine learning
  • 12 篇 protocols
  • 11 篇 grid computing
  • 11 篇 resource managem...
  • 11 篇 educational inst...
  • 11 篇 quality of servi...
  • 11 篇 data mining
  • 11 篇 delay
  • 10 篇 routing
  • 10 篇 software enginee...
  • 10 篇 monitoring
  • 10 篇 artificial intel...

机构

  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 9 篇 shandong provinc...
  • 9 篇 school of cyber ...
  • 9 篇 science and tech...
  • 8 篇 college of compu...
  • 8 篇 national laborat...
  • 7 篇 department of co...
  • 7 篇 state key labora...
  • 6 篇 beijing key labo...
  • 6 篇 intelligent dist...
  • 6 篇 singapore univer...
  • 6 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 division of deci...
  • 6 篇 school of inform...
  • 5 篇 hubei key labora...
  • 5 篇 school of electr...
  • 5 篇 department of co...
  • 5 篇 the state key la...

作者

  • 14 篇 johansson karl h...
  • 13 篇 yi xinlei
  • 13 篇 yang tao
  • 11 篇 rajkumar buyya
  • 11 篇 buyya rajkumar
  • 10 篇 ismail leila
  • 10 篇 materwala huned
  • 9 篇 xiong zehui
  • 8 篇 dustdar schahram
  • 8 篇 zhigang luo
  • 8 篇 xuhui huang
  • 8 篇 junping du
  • 8 篇 duan zhisheng
  • 8 篇 chai tianyou
  • 8 篇 jin hai
  • 7 篇 niyato dusit
  • 7 篇 naiyang guan
  • 7 篇 shi ling
  • 7 篇 yingmin jia
  • 6 篇 hangjun zhou

语言

  • 534 篇 英文
  • 54 篇 其他
  • 6 篇 中文
检索条件"机构=Computer Networh and Distributed Systems Laboratory Department of Computer Science and Technology"
594 条 记 录,以下是131-140 订阅
排序:
A clustering-based approach for mining dockerfile evolutionary trajectories
收藏 引用
science China(Information sciences) 2019年 第1期62卷 211-213页
作者: Yang ZHANG Huaimin WANG Vladimir FILKOV Key Laboratory of Parallel and Distributed Computing National University of Defense Technology College of Computer National University of Defense Technology DECAL Lab University of California Computer Science Department University of California
Dear editor,Docker1), as a de-facto industry standard [1], enables the packaging of an application with all its dependencies and execution environment in a light-weight, self-contained unit, i.e., *** launching the co... 详细信息
来源: 评论
Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs
arXiv
收藏 引用
arXiv 2022年
作者: Sasahara, Hampei Dán, György Amin, Saurabh Sandberg, Henrik The Department of Systems and Control Engineering School of Engineering Tokyo Institute of Technology Tokyo152-8552 Japan The Division of Network and Systems Engineering School of Electrical Engineering and Computer Science Kth Royal Institute of Technology StockholmSE-100 44 Sweden The Laboratory for Information and Decision Systems Massachusetts Institute of Technology CambridgeMA02139 United States The Division of Decision and Control Systems School of Electrical Engineering and Computer Science Kth Royal Institute of Technology StockholmSE-100 44 Sweden
This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each playe... 详细信息
来源: 评论
A Novel & Innovative Blockchain-Empowered Federated Learning Approach for Secure Data Sharing in Smart City Applications  1
收藏 引用
International Conference on Advances in Communication technology and computer Engineering, ICACTCE 2023
作者: Hai, Tao Wang, Dan Seetharaman, Tamizharasi Amelesh, M. Sreejith, P.M. Sharma, Vandana Ibeke, Ebuka Liu, Hong School of Computer and Information Qiannan Normal University for Nationalities Guizhou Duyun558000 China Key Laboratory of Advanced Manufacturing Technology of the Ministry of Education Guizhou University Guizhou Guizhou550025 China School of Information and Artificial Intelligence Nanchang Institute of Science and Technology Nanchang China School of Mathematics and Statistics Qiannan Normal University for Nationalities Guizhou Duyun558000 China Key Laboratory of Complex Systems and Intelligent Optimization of Guizhou Province Guizhou Duyun558000 China Department of AI & ML Acharya Institute of Technology Bangalore India Amity Institute of Information Technology Amity University Noida Campus Noida India School of Creative and Cultural Business Robert Gordon University AberdeenAB10 7AQ United Kingdom
The very existence of smart cities forms the stepping stone in the evolution of many technological advancements in the future era. While smart cities have already grown in their way, the tremendous amount of data gene... 详细信息
来源: 评论
The Age of Generative AI and AI-Generated Everything
arXiv
收藏 引用
arXiv 2023年
作者: Du, Hongyang Niyato, Dusit Kang, Jiawen Xiong, Zehui Zhang, Ping Cui, Shuguang Shen, Xuemin Mao, Shiwen Han, Zhu Jamalipour, Abbas Vincent Poor, H. Kim, Dong In School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Automation Guangdong University of Technology Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore487372 Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Chinese University of Hong Kong Shenzhen China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States Department of Electrical and Computer Engineering University of Houston HoustonTX77004 United States Department of Computer Science and Engineering Kyung Hee University Seoul446-701 Korea Republic of School of Electrical and Information Engineering University of Sydney SydneyNSW2006 Australia Department of Electrical and Computer Engineering Princeton University PrincetonNJ08544 United States Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of
Generative AI (GAI) has emerged as a significant advancement in artificial intelligence, renowned for its language and image generation capabilities. This paper presents "AIGenerated Everything" (AIGX), a co... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Reduced Network Cumulative Constraint Violation for distributed Bandit Convex Optimization under Slater’s Condition
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Kunpeng Yi, Xinlei Ding, Jinliang Cao, Ming Johansson, Karl H. Yang, Tao State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang110819 China Department of Control Science and Engineering College of Electronics and Information Engineering Tongji University Shanghai201800 China Engineering and Technology Institute Groningen Faculty of Science and Engineering University of Groningen GroningenAG 9747 Netherlands Division of Decision and Control Systems School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Sweden Digital Futures Stockholm10044 Sweden
This paper studies the distributed bandit convex optimization problem with time-varying inequality constraints, where the goal is to minimize network regret and cumulative constraint violation. To calculate network cu... 详细信息
来源: 评论
Provably Convergent Federated Trilevel Learning
arXiv
收藏 引用
arXiv 2023年
作者: Jiao, Yang Yang, Kai Wu, Tiancheng Jian, Chengtao Huang, Jianwei Department of Computer Science and Technology Tongji University China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University China Shanghai Research Institute for Intelligent Autonomous Systems China School of Science and Engineering The Chinese University of Hong Kong Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Trilevel learning, also called trilevel optimization (TLO), has been recognized as a powerful modelling tool for hierarchical decision process and widely applied in many machine learning applications, such as robust n... 详细信息
来源: 评论
Cross View Capture for distributed Image Compression with Decoder Side Information
Cross View Capture for Distributed Image Compression with De...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Yankai Yin Zhe Sun Peiying Ruan Feng Duan Ruidong Li Chi Zhu Tianjin Key Laboratory of Interventional Brain-Computer Interface and Intelligent Rehabilitation Nankai University Tianjin China Institute of Natural Sciences Kanazawa University Ishikawa Japan Faculty of Health Data Science and Graduate School of Medicine Juntendo University Chiba Japan NVIDIA AI Technology Center NVIDIA Japan Tokyo Japan Department of Systems Life Engineering Maebashi Institute of Technology Maebashi Japan
Image compression is increasingly important in applications like intelligent driving and smart surveillance systems. This study presents a novel cross view capture distributed image compression network (CVCDIC) to imp... 详细信息
来源: 评论
METHODOLOGY OF MODELING THE DETECTION OF LIMESCALE DEPOSITS IN SANITARY INSTALLATIONS  21
METHODOLOGY OF MODELING THE DETECTION OF LIMESCALE DEPOSITS ...
收藏 引用
21st International Multidisciplinary Scientific Geoconference: Water Resources, Forest, Marine and Ocean Ecosystems, SGEM 202
作者: Czajkowski, Adrian Remiorz, Leszek Pawlak, Sebastian Remiorz, Eryk Szygula, Jakub Miscea.pl Engineering Sp. z o.o. Poland Department of Power Engineering and Turbomachinery Faculty of Energy and Environmental Engineering Silesian University of Technology Poland Doctoral School The Silesian University of Technology Poland Faculty of Mechanical Engineering Scientific and Didactic Laboratory of Nanotechnology and Materials Technologies Poland Department of Mining Mechanization and Robotisation Faculty of Mining Safety Engineering and Industrial Automation Silesian University of Technology Poland Department of Distributed Systems and Informatic Devices Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Poland
The article presents the issue of scale deposits in sanitary installations. Scale contributes to improper operation of sanitary devices and leads to their degradation. Scale build-up in pipes and measuring elements re... 详细信息
来源: 评论
Blockchain technology for Secure Shared Medical Data
Blockchain Technology for Secure Shared Medical Data
收藏 引用
Information technology (ACIT)
作者: M'hamed Mancer Khelili Mohamed Akram Ezedin Barka Kazar Okba Slatnia Sihem Saad Harous Belkacem Athamena Zina Houhamdi Department of Computer Science Smart computer science laboratory Biskra Algeria University of Mohamed Khider Biskra Algeria Numidia Institute of Technology Algeria Algeria Department of Information Systems and Security UAE University Al Ain UAE Department of Information Systems and Security College of Information Technology United Arab Emirate University United Arab Emirate Department of Computer Science College of Computing and Informatics AL Ain United Arab Emirates University of Sharjah Al Ain United Arab Emirate College of Business Al Ain University Al Ain UAE University of Al Ain Al Ain UAE
A blockchain is a shared database allowing trust to be created between individuals without using intermediaries. The architecture here is decentralized, the data is distributed among the users, and therefore the infor... 详细信息
来源: 评论