咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 236 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 594 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 373 篇 工学
    • 265 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 85 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 51 篇 电气工程
    • 37 篇 机械工程
    • 31 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 24 篇 动力工程及工程热...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 8 篇 建筑学
    • 8 篇 环境科学与工程(可...
    • 7 篇 光学工程
  • 192 篇 理学
    • 124 篇 数学
    • 57 篇 系统科学
    • 34 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 20 篇 物理学
    • 11 篇 化学
  • 117 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 50 篇 工商管理
    • 38 篇 图书情报与档案管...
  • 21 篇 法学
    • 17 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 教育学
    • 10 篇 教育学
  • 10 篇 农学
  • 8 篇 医学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 33 篇 distributed comp...
  • 32 篇 computer science
  • 30 篇 laboratories
  • 20 篇 cloud computing
  • 16 篇 computer archite...
  • 13 篇 algorithm design...
  • 13 篇 computer network...
  • 12 篇 application soft...
  • 12 篇 machine learning
  • 12 篇 protocols
  • 11 篇 grid computing
  • 11 篇 resource managem...
  • 11 篇 educational inst...
  • 11 篇 quality of servi...
  • 11 篇 data mining
  • 11 篇 delay
  • 10 篇 routing
  • 10 篇 software enginee...
  • 10 篇 monitoring
  • 10 篇 artificial intel...

机构

  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 9 篇 shandong provinc...
  • 9 篇 school of cyber ...
  • 9 篇 science and tech...
  • 8 篇 college of compu...
  • 8 篇 national laborat...
  • 7 篇 department of co...
  • 7 篇 state key labora...
  • 6 篇 beijing key labo...
  • 6 篇 intelligent dist...
  • 6 篇 singapore univer...
  • 6 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 division of deci...
  • 6 篇 school of inform...
  • 5 篇 hubei key labora...
  • 5 篇 school of electr...
  • 5 篇 department of co...
  • 5 篇 the state key la...

作者

  • 14 篇 johansson karl h...
  • 13 篇 yi xinlei
  • 13 篇 yang tao
  • 11 篇 rajkumar buyya
  • 11 篇 buyya rajkumar
  • 10 篇 ismail leila
  • 10 篇 materwala huned
  • 9 篇 xiong zehui
  • 8 篇 dustdar schahram
  • 8 篇 zhigang luo
  • 8 篇 xuhui huang
  • 8 篇 junping du
  • 8 篇 duan zhisheng
  • 8 篇 chai tianyou
  • 8 篇 jin hai
  • 7 篇 niyato dusit
  • 7 篇 naiyang guan
  • 7 篇 shi ling
  • 7 篇 yingmin jia
  • 6 篇 hangjun zhou

语言

  • 534 篇 英文
  • 54 篇 其他
  • 6 篇 中文
检索条件"机构=Computer Networh and Distributed Systems Laboratory Department of Computer Science and Technology"
594 条 记 录,以下是501-510 订阅
排序:
Modelling code mobility and migration: An OPM/Web approach
收藏 引用
International Journal of Web Engineering and technology 2005年 第1期2卷 6-28页
作者: Reinhartz-Berger, Iris Dori, Dov Katz, Shmuel Technion Israel Institute of Technology Technion City Haifa 32000 Israel Department of Management Information Systems University of Haifa Israel Information Systems Engineering Area Faculty of Industrial Engineering and Management Technion Israel Institute of Technology Israel MIT Cambridge United States Computer Science Department Technion Israel Institute of Technology Israel Systems and Software Development Laboratory Israel
Web applications exhibit dynamic behaviour through such features as animation, rapidly changing presentations, and interactive forms. The growing complexity of web applications requires a rigorous modelling approach c... 详细信息
来源: 评论
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communications
High-Speed Networking: A Systematic Approach to High-Bandwid...
收藏 引用
13th Symposium on High Performance Interconnects, Hot Interconnects 13
作者: Sterbenz, James P. G. Department of Electrical Engineering and Computer Science Communications and Networking Systems Laboratory Information and Telecommunication Technology Center University of Kansas Lancaster University United Kingdom
This tutorial presents a comprehensive introduction to all aspects of high-speed networking, based on the book High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication, James P.G. Sterb... 详细信息
来源: 评论
Design and implementation of a highperformance network intrusion prevention system
Design and implementation of a highperformance network intru...
收藏 引用
20th IFIP International Information Security Conference, IFIP/SEC 2005
作者: Xinidis, Konstantinos Anagnostakis, Kostas G. Markatos, Evangelos P. Institute of Computer Science Foundation for Research and Technology Hellas P.0 Box 1385 Heraklio GR-711-10 Greece Distributed Systems Laboratory CIS Department Univ. of Pennsylvania 200 S. 33rd Street PhiladelphiaPA19104 United States
Network intrusion prevention systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusio... 详细信息
来源: 评论
Efficient content-based detection of zero-day worms
Efficient content-based detection of zero-day worms
收藏 引用
IEEE International Conference on Communications (ICC)
作者: P. Akritidis K. Anagnostakis E.P. Markatos Foundation for Research & Technology Hellas Institute for Computer Science Heraklion Greece Distributed Systems Laboratory CIS Department University of Pennsylvania Philadelphia PA USA
Recent cybersecurity incidents suggest that Internet worms can spread so fast that in-time human-mediated reaction is not possible, and therefore initial response to cyberattacks has to be automated. The first step to... 详细信息
来源: 评论
An analysis of expressiveness and design issues for the generalized temporal role-based access control model
An analysis of expressiveness and design issues for the gene...
收藏 引用
作者: Joshi, James B. D. Bertina, Elisa Ghafoor, Arif Department of Information Sciences and Telecommunications University of Pittsburgh Pittsburgh PA 15260 United States Department of Computer Science Purdue University West Lafayette IN 47907 United States School of Electrical and Computer Engineering Purdue University West Lafayette IN 47907 United States Department of Information Sciences and Telecommunications School of Information Sciences University of Pittsburgh United States University of Pittsburgh United States Computer Science Department Purdue University United States CERIAS United States San Jose CA United States Microelectronics and Computer Technology Corporation Rutgers University Telcordia Technologies United States School of Electrical and Computer Engineering Purdue University West Lafayette IN United States Distributed Multimedia Systems Laboratory Information Infrastructure Security Research Laboratory United States
The Generalized Temporal Role-Based Access Control (GTRBAC) model provides a comprehensive set of temporal constraint expressions which can facilitate the specification of fine-grained time-based access control polici... 详细信息
来源: 评论
Leveraging architectural models to inject trust into software systems
Leveraging architectural models to inject trust into softwar...
收藏 引用
2005 Workshop on Software Engineering for Secure systems - Building Trustworthy Applications, SESS 2005
作者: Banerjee, Somo Mattmann, Chris A. Medvidovic, Nenad Golubchik, Leana Computer Science Department University of Southern California Los AngelesCA90089 United States Jet Propulsion Laboratory California Institute of Technology PasadenaCA91109 United States EE-Systems Dept IMSC ISI University of Southern California Los AngelesCA90089 United States
Existing software systems have become increasingly durable and their lifetimes have significantly lengthened. They are increasingly distributed and decentralized. Our dependence on them has grown tremendously. As such... 详细信息
来源: 评论
Collaborative Filtering by Mining Association Rules from User Access Sequences
Collaborative Filtering by Mining Association Rules from Use...
收藏 引用
International Workshop on Challenges in Web Information Retrieval and Integration (WIRI)
作者: Mei-Ling Shyu C. Haruechaiyasak Shu-Ching Chen Na Zhao Department of Electrical and Computer Engineering University of Miami Coral Gables FL USA Information Research and Development Division National Electronics and Computer Technology Center Pathum Thani Thailand Distributed Multimedia Information System Laboratory School of Computer Science Florida International University Miami FL USA
Recent research in mining user access patterns for predicting Web page requests focuses only on consecutive sequential Web page accesses, i.e., pages which are accessed by following the hyperlinks. In this paper, we p... 详细信息
来源: 评论
Journal of Information science and Engineering: Editorial notice
收藏 引用
Journal of Information science and Engineering 2005年 第5期21卷 i-ii页
作者: Lee, Der-Tsai Amato, Nancy M. Chang, Shih-Fu Chen, Homer H. Chen, Tsuhan Hsu, Tsan-Sheng Hwang, Jenq-Neng Kuo, Sy-Yen Kuo, Tei-Wei Li, Chung-Sheng Tokuyama, Takeshi Wing, Jeannette Wu, Tzong-Chen Yen, John Computer Science at Texas A and M University United States Parasol Laboratory United States IEEE Transactions on Parallel and Distributed Systems Computing Research Association's Committee on the Status of Women in Computing Research CRA-W's Distributed Mentor Program United States Department of Electrical Engineering Columbia University United States Lab. United States College of Electrical Engineering and Computer Science National Taiwan University Taiwan IEEE Transactions on Circuits and Systems for Video Technology IEEE Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA United States ACM ACM SIGACT IEEE Computer Society IICM Austria Research and Development of the Department Multimedia Signal Processing Technical Committee IEEE Signal Processing Society United States IEEE Transactions on Circuits and systems for Video Technology College of Electrical Engineering and Computer Science National Taiwan Ocean University Keelung Taiwan Department of Electrical Engineering National Taiwan University Taiwan Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan IEEE Technical Committee on Real-Time Systems Computer Science Division IBM T.J. Watson Research Center United States IBM Research Division Graduate School of Information Sciences Tohoku University Japan ACM IPSJ Mathematical Society of Japan Japan Department of Computer Science Computer Science Department Carnegie Mellon University United States National Academies of Science's Computer Science and Telecommunications Board United States Microsoft's Trustworthy Academic Advisory Board Intel Research Pittsburgh's Advisory Board United States Dartmouth's Institute for Security Technology Studies Advisory Committee Canada Sloan Research Fellowships Program Committee United States ACM Taiwan China Information Sciences and Technology Pennsylvania State University United States Laboratory for Intelligent Agents Penn State's School of Info
No abstract available
来源: 评论
Processor allocation for tasks that is robust against errors in computation time estimates
Processor allocation for tasks that is robust against errors...
收藏 引用
International Symposium on Parallel and distributed Processing (IPDPS)
作者: P.V. Sugavanam H.J. Siegel A.A. Maciejewski S.A. Ali M. Al-Otaibi M. Aydin K. Guru A. Horiuchi Y.G. Krishnamurthy P. Lee A. Mehta O. Oltikar R. Pichel A.J. Pippin M. Raskey V. Shestak J. Zhang Department of Electrical & Computer Engineering Colorado State University Fort Collins CO USA Department of Electrical & Computer Engineering Department of Computer Science Colorado State University Fort Collins CO USA Systems & VLSI Technology Division Hewlett Packard Company Fort Collins CO USA Linux & Open Source Laboratory Colorado State University Fort Collins CO USA School of Computer Science Salt Lake UT USA
Heterogeneous computing systems composed of interconnected machines with varied computational capabilities often operate in environments where there may be sudden machine failures, higher than expected load, or inaccu... 详细信息
来源: 评论
Geometric spanners for routing in mobile networks
Geometric spanners for routing in mobile networks
收藏 引用
作者: Gao, Jie Guibas, Leonidas J. Hershberger, John Zhang, Li Zhu, An Department of Computer Science Stanford University Stanford CA 94305 United States Ctr. for the Math. of Information California Institute of Technology Pasadena CA 91125 United States Mentor Graphics Corporation Wilsonville OR 97070 United States Compaq Systems Research Center Palo Alto CA Information Dynamics Laboratory Hewlett Packard Laboratories Palo Alto CA 94304 United States
We propose a new routing graph, the restricted Delaunay graph (RDG), for mobile ad hoc networks. Combined with a node clustering algorithm, the RDG can be used as an underlying graph for geographic routing protocols. ... 详细信息
来源: 评论