咨询与建议

限定检索结果

文献类型

  • 435 篇 会议
  • 249 篇 期刊文献
  • 26 册 图书

馆藏范围

  • 710 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 408 篇 工学
    • 299 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 119 篇 信息与通信工程
    • 64 篇 电气工程
    • 53 篇 控制科学与工程
    • 52 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 25 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 17 篇 机械工程
    • 16 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 交通运输工程
    • 9 篇 网络空间安全
  • 169 篇 理学
    • 94 篇 数学
    • 42 篇 物理学
    • 40 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 21 篇 系统科学
    • 16 篇 化学
  • 98 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 23 篇 医学
    • 21 篇 临床医学
    • 19 篇 基础医学(可授医学...
    • 12 篇 药学(可授医学、理...
  • 19 篇 法学
    • 14 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 农学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 67 篇 computer science
  • 33 篇 computer archite...
  • 31 篇 real time system...
  • 30 篇 protocols
  • 21 篇 wireless sensor ...
  • 21 篇 ip networks
  • 21 篇 delay
  • 20 篇 application soft...
  • 20 篇 quality of servi...
  • 19 篇 computer communi...
  • 19 篇 neural networks
  • 19 篇 distributed comp...
  • 19 篇 computer network...
  • 18 篇 software enginee...
  • 18 篇 internet
  • 18 篇 artificial intel...
  • 17 篇 computational mo...
  • 15 篇 bandwidth
  • 14 篇 java
  • 14 篇 intelligent netw...

机构

  • 16 篇 distributed syst...
  • 11 篇 image speech and...
  • 10 篇 security and net...
  • 8 篇 school of electr...
  • 8 篇 real-time system...
  • 6 篇 computer network...
  • 6 篇 mta-elte numeric...
  • 6 篇 distributed syst...
  • 6 篇 service oriented...
  • 5 篇 school of electr...
  • 5 篇 department for c...
  • 5 篇 distributed syst...
  • 5 篇 real-time system...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 center for appli...
  • 4 篇 school of comput...
  • 4 篇 mta-bme informat...
  • 4 篇 grid computing a...
  • 4 篇 school of comput...

作者

  • 15 篇 dustdar schahram
  • 11 篇 cahill vinny
  • 10 篇 r.i. damper
  • 8 篇 v. cahill
  • 8 篇 a. burns
  • 7 篇 gyongyosi laszlo
  • 7 篇 c.j. harris
  • 7 篇 imre sandor
  • 6 篇 ultes-nitsche ul...
  • 6 篇 irwin barry
  • 6 篇 buyya rajkumar
  • 6 篇 burns a
  • 5 篇 erradi mohammed
  • 5 篇 a. boukerche
  • 5 篇 barry irwin
  • 4 篇 haqiq abdelkrim
  • 4 篇 rajkumar buyya
  • 4 篇 vinny cahill
  • 4 篇 c. blondia
  • 4 篇 rana omer

语言

  • 687 篇 英文
  • 15 篇 其他
  • 8 篇 中文
检索条件"机构=Computer Networks & Distributed Systems Research Group Department of Computer Science"
710 条 记 录,以下是491-500 订阅
排序:
Flexible application rights management in a pervasive environment
Flexible application rights management in a pervasive enviro...
收藏 引用
IEEE International Conference on e-Technology, e-Commerce and e-Service
作者: I. Dusparic D. Dahlem J. Dowling Distributed Systems Group Department of Computer Science Trinity College Dublin Ireland
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and enforcement on resource-constrained an... 详细信息
来源: 评论
A peer-to-peer mechanism for resource location and allocation over the grid
收藏 引用
2nd International Symposium on Parallel and distributed Processing and Applications, ISPA 2004
作者: Hsiao, Hung-Chang Baker, Mark King, Chung-Ta Computer and Communication Research Center National Tsing-Hua University 300 Taiwan The Distributed Systems Group University of Portsmouth PO1 2EG United Kingdom Department of Computer Science National Tsing-Hua University 300 Taiwan
Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resource discovery, these P2P substrates also offer me... 详细信息
来源: 评论
Model-checking inherently fair linear-time properties
Model-checking inherently fair linear-time properties
收藏 引用
作者: Nicola, Thierry Nießner, Frank Ultes-Nitsche, Ulrich Telecommunications Networks and Security Research Group Department of Computer Science University of Fribourg Chemin du Musée 3 1700 Fribourg Switzerland
The concept of linear-time verification with an inherent fairness condition has been studied under the names approximate satisfaction, satisfaction up to liveness, and satisfaction within fairness in several publicati... 详细信息
来源: 评论
A context-aware trust-based security system for ad hoc networks
A context-aware trust-based security system for ad hoc netwo...
收藏 引用
Workshop of the International Conference on Security and Privacy for Emerging Areas in Communication networks (SecureComm Workshop)
作者: M. Moloney S. Weber Distributed Systems Group Department of Computer Science Trinity College Dublin Dublin Ireland
Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new ... 详细信息
来源: 评论
A unit testing framework for network configurations
A unit testing framework for network configurations
收藏 引用
作者: Jungo, Dominik Buchmann, David Ultes-Nitsche, Ulrich Telecommunications Networks And. Security Research Group Department of Computer Science University of Fribourg Chemin du Musée 3 1700 Fribourg Switzerland
We present in this paper a unit testing framework for network configurations which verifies that the configuration meets prior defined requirements of the networks behavior. This framework increases the trust in the c...
来源: 评论
Towards flexible authorization management
Towards flexible authorization management
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: P.G. Argyroudis D. O'Mahony Networks and Telecommunications Research Group Department of Computer Science Trinity College Ireland
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details related to the exchange and negotiatio... 详细信息
来源: 评论
An adaptable middleware for personalizing Web applications
An adaptable middleware for personalizing Web applications
收藏 引用
1st International Conference on Web Information systems and Technologies, WEBIST 2005
作者: Jarir, Zahi Erradi, Mohammed Cadi Ayyad University Faculty of Sciences Semlalia Marrakech Department of Computer Science Bvd. Prince My Abdellah Marrakech Morocco Computer Networks and Multimedia Research Group UFR-RT Mohamed V. Souissi University B.P. 713 Agdal Rabat Morocco
The personalization is an important topic for the Web industry. It consists in providing the capabilities to accommodate Web applications to user's requirements such as defining preferences on the execution of the... 详细信息
来源: 评论
Temporal isolation in Ravenscar-Java
Temporal isolation in Ravenscar-Java
收藏 引用
International Symposium on Object-Oriented Real-Time distributed Computing
作者: H. Cai A. Wellings Real-time Systems Research Group Department of Computer Science University of York York UK
Ravenscar-Java is a subset of Java (augmented by the real-time specification for Java) targeted at high-integrity real-time systems. It has recently been extended to support multiple applications of mixed criticality ... 详细信息
来源: 评论
Automated detection of performance regressions: the mono experience
Automated detection of performance regressions: the mono exp...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of computer and Telecommunication systems (MASCOTS)
作者: T. Kalibera L. Bulej P. Tuma Distributed Systems Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Prague Czech Republic Institute of Computer Science Academy of Sciences of Czech Republic Czech Republic
Engineering a large software project involves tracking the impact of development and maintenance changes on the software performance. An approach for tracking the impact is regression benchmarking, which involves auto... 详细信息
来源: 评论
Efficient content-based detection of zero-day worms
Efficient content-based detection of zero-day worms
收藏 引用
IEEE International Conference on Communications (ICC)
作者: P. Akritidis K. Anagnostakis E.P. Markatos Foundation for Research & Technology Hellas Institute for Computer Science Heraklion Greece Distributed Systems Laboratory CIS Department University of Pennsylvania Philadelphia PA USA
Recent cybersecurity incidents suggest that Internet worms can spread so fast that in-time human-mediated reaction is not possible, and therefore initial response to cyberattacks has to be automated. The first step to... 详细信息
来源: 评论