咨询与建议

限定检索结果

文献类型

  • 434 篇 会议
  • 250 篇 期刊文献
  • 26 册 图书

馆藏范围

  • 710 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 407 篇 工学
    • 299 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 118 篇 信息与通信工程
    • 64 篇 电气工程
    • 53 篇 控制科学与工程
    • 52 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 24 篇 光学工程
    • 24 篇 生物医学工程(可授...
    • 17 篇 机械工程
    • 16 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 交通运输工程
    • 9 篇 网络空间安全
  • 168 篇 理学
    • 94 篇 数学
    • 42 篇 物理学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 21 篇 系统科学
    • 16 篇 化学
  • 98 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 23 篇 医学
    • 21 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 12 篇 药学(可授医学、理...
  • 19 篇 法学
    • 14 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 农学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 67 篇 computer science
  • 34 篇 computer archite...
  • 31 篇 real time system...
  • 30 篇 protocols
  • 21 篇 wireless sensor ...
  • 21 篇 ip networks
  • 21 篇 delay
  • 20 篇 application soft...
  • 20 篇 quality of servi...
  • 19 篇 computer communi...
  • 19 篇 distributed comp...
  • 19 篇 computer network...
  • 18 篇 software enginee...
  • 18 篇 neural networks
  • 18 篇 internet
  • 18 篇 artificial intel...
  • 17 篇 computational mo...
  • 15 篇 bandwidth
  • 14 篇 java
  • 14 篇 intelligent netw...

机构

  • 16 篇 distributed syst...
  • 11 篇 image speech and...
  • 10 篇 security and net...
  • 8 篇 school of electr...
  • 8 篇 real-time system...
  • 6 篇 computer network...
  • 6 篇 mta-elte numeric...
  • 6 篇 distributed syst...
  • 6 篇 service oriented...
  • 5 篇 school of electr...
  • 5 篇 department for c...
  • 5 篇 distributed syst...
  • 5 篇 real-time system...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 center for appli...
  • 4 篇 school of comput...
  • 4 篇 mta-bme informat...
  • 4 篇 grid computing a...
  • 4 篇 school of comput...

作者

  • 15 篇 dustdar schahram
  • 11 篇 cahill vinny
  • 10 篇 r.i. damper
  • 8 篇 v. cahill
  • 8 篇 a. burns
  • 7 篇 gyongyosi laszlo
  • 7 篇 c.j. harris
  • 7 篇 imre sandor
  • 6 篇 ultes-nitsche ul...
  • 6 篇 irwin barry
  • 6 篇 buyya rajkumar
  • 6 篇 burns a
  • 5 篇 erradi mohammed
  • 5 篇 a. boukerche
  • 5 篇 barry irwin
  • 4 篇 haqiq abdelkrim
  • 4 篇 rajkumar buyya
  • 4 篇 vinny cahill
  • 4 篇 c. blondia
  • 4 篇 rana omer

语言

  • 689 篇 英文
  • 13 篇 其他
  • 8 篇 中文
检索条件"机构=Computer Networks & Distributed Systems Research Group Department of Computer Science"
710 条 记 录,以下是241-250 订阅
排序:
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROscience 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
Oxidative Species-Induced Excitonic Transport in Tubulin Aromatic networks: Potential Implications for Neurodegenerative Disease
arXiv
收藏 引用
arXiv 2017年
作者: Kurian, P. Obisesan, T.O. Craddock, T.J.A. National Human Genome Center Howard University College of Medicine WashingtonDC20060 United States Department of Medicine Howard University College of Medicine WashingtonDC20060 United States Computational Physics Laboratory Howard University WashingtonDC20059 United States Georgetown-Howard Universities Center for Clinical and Translational Science Clinical Research Unit Howard University College of Medicine WashingtonDC20060 United States Departments of Psychology & Neuroscience Computer Science and Clinical Immunology Nova Southeastern University Fort LauderdaleFL33314 United States Clinical Systems Biology Group Institute for Neuro-Immune Medicine Nova Southeastern University Fort LauderdaleFL33328 United States
Oxidative stress is a pathological hallmark of neurodegenerative tauopathic disorders such as Alzheimer’s disease and Parkinson’s disease-related dementia, which are characterized by altered forms of the microtubule... 详细信息
来源: 评论
Assessing the benefits of search-based approaches when designing self-adaptive systems: a controlled experiment
收藏 引用
Journal of Software Engineering research and Development 2015年 第1期3卷 1-27页
作者: Sandro S Andrade Raimundo J de A Macêdo Distributed Systems Laboratory (LaSiD) Federal University of Bahia (UFBa) Institute of Mathematics Department of Computer Science Salvador-BA Brazil GSORT Distributed Systems Group Federal Institute of Education Science and Technology of Bahia (IFBa) Department of Computer Science Salvador-BA Brazil
The well-orchestrated use of distilled experience, domain-specific knowledge, and well-informed trade-off decisions is imperative if we are to design effective architectures for complex software-intensive systems. In ...
来源: 评论
Security modeling and analysis of an intrusion tolerant cloud data center  3
Security modeling and analysis of an intrusion tolerant clou...
收藏 引用
3rd IEEE World Conference on Complex systems, WCCS 2015
作者: Mir, Iman El Kim, Dong Seong Haqiq, Abdelkrim Computer Networks Mobility and Modeling Laboratory FST Hassan 1 University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand E-NGN Research Group Africa and Middle East Morocco
It is important to protect a Cloud Data Center even if there are attacks by an adversary. In order to improve the security of a Cloud Data Center (CDC) in particular, system availability, a proactive approach named SC... 详细信息
来源: 评论
Security modeling and analysis of a self-cleansing intrusion tolerance technique  11
Security modeling and analysis of a self-cleansing intrusion...
收藏 引用
11th International Conference on Information Assurance and Security, IAS 2015
作者: Mir, Iman El Kim, Dong Seong Haqiq, Abdelkrim Computer Networks Mobility and Modeling Laboratory FST Hassan 1 University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand E-NGN Research Group Africa and Middle East South Africa
Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems again... 详细信息
来源: 评论
A novel collaborative approach for sinkhole detection in MANETs  13
A novel collaborative approach for sinkhole detection in MAN...
收藏 引用
13th International Conference on Ad-hoc networks and Wireless, ADHOC-NOW 2014 accompanied by 2nd International Workshop on Emerging Technologies for Smart Devices, ETSD 2014, 2nd International Workshop on Marine Sensors and systems, MARSS 2014, Multimedia Wireless ad hoc networks, MWaoN 2014, Security in Ad Hoc networks, SecAN 2014, 2nd Smart Sensor Protocols and Algorithms, SSPA 2014 and 8th International Workshop on Wireless Sensor, Actuator and Robot networks, WiSARN 2014
作者: Sánchez-Casado, Leovigildo Maciá-Fernández, Gabriel García-Teodoro, Pedro Aschenbruck, Nils Department of Signal Theory Telematics and Communications School of Computer Science and Telecommunications CITIC-UGR University of Granada C/Periodista Daniel Saucedo Aranda S/n Granada18071 Spain Distributed Systems Group Institute of Computer Science University of Osnabrück Albrechtstr. 28 Osnabrück49076 Germany
This paper presents a novel approach intended to detect sinkholes in MANETs running AODV. The study focuses on the detection of thewell-known sinkhole attack, devoted to attractmost of the surrounding network traffic ... 详细信息
来源: 评论
MASAT: Model-based automated security assessment tool for cloud computing  11
MASAT: Model-based automated security assessment tool for cl...
收藏 引用
11th International Conference on Information Assurance and Security, IAS 2015
作者: Mjihil, Oussama Kim, Dong Seong Haqiq, Abdelkrim Computer Networks Mobility and Modeling Laboratory FST Hassan 1st University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand E-NGN Research Group Africa and Middle East South Africa
Security assessment and mitigation have gained considerable attention over the recent years according to the information technology evolution and its broad adoption. Organizations are more aware of their data security... 详细信息
来源: 评论
curlX: A middleware to enforce access control policies within a cloud environment
curlX: A middleware to enforce access control policies withi...
收藏 引用
IEEE Conference on Communications and Network Security (CNS)
作者: Meryeme Ayache Mohammed Erradi Bernd Freisleben Networking & Distributed Systems Research Group Mohammed V University Rabat Morocco Department of Mathematics & Computer Science University of Marburg Germany
Today cloud security and privacy concerns pose significant challenges. One particular challenge consists in how to take into consideration the user's security policies while accessing the outsourced data. In fact,... 详细信息
来源: 评论
Utilizing reconfigurable hardware to optimizeworkflows in networked nodes: Deploying partial reconfiguration to optimize load and dependability in constrained networks
IFIP Advances in Information and Communication Technology
收藏 引用
IFIP Advances in Information and Communication Technology 2015年 231卷 373-386页
作者: Murr, Dominik Mühlbauer, Felix Dressler, Falko Bobda, Christophe Self-Organizing Embedded Systems Group Department of Computer Science Kaiserslautern University of Technology Germany Computer Networks and Communication Systems Department of Computer Science Friedrich-Alexander University Erlangen-Nuremberg Germany
This work investigates the use of reconfigurable devices as computing platform for self-organizing embedded systems. Those usually consist of a set of distributed, autonomous nodes interacting with each other in order... 详细信息
来源: 评论
Experimental evaluation of RF-based indoor localization algorithms under RF interference
Experimental evaluation of RF-based indoor localization algo...
收藏 引用
International Conference on Localization and GNSS (ICL-GNSS)
作者: Filip Lemic Vlado Handziski Adam Wolisz Timotheos Constambeys Christos Laoudias Stephan Adler Simon Schmitt Yuan Yang Telecommunication Networks Group Technische Universität Berlin Department of Computer Science University of Cyprus KIOS Research Center for Intelligent Systems and Networks University of Cyprus Department of Mathematics and Computer Science Freie Universität Berlin
In the current practice, the performance evaluation of RF-based indoor localization solutions is typically realized in non-standardized environments and following ad-hoc procedures, which hampers objective comparison ... 详细信息
来源: 评论