咨询与建议

限定检索结果

文献类型

  • 61 篇 会议
  • 22 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 56 篇 工学
    • 44 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 20 篇 信息与通信工程
    • 10 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 3 篇 仪器科学与技术
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 控制科学与工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 13 篇 理学
    • 9 篇 数学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 物理学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 11 篇 computer network...
  • 7 篇 fault tolerance
  • 4 篇 throughput
  • 4 篇 laboratories
  • 4 篇 protocols
  • 4 篇 telecommunicatio...
  • 3 篇 computer science
  • 3 篇 routing
  • 3 篇 clustering
  • 3 篇 scheduling algor...
  • 3 篇 application soft...
  • 3 篇 real time system...
  • 3 篇 quality of servi...
  • 3 篇 processor schedu...
  • 3 篇 wireless sensor ...
  • 3 篇 databases
  • 3 篇 algorithm design...
  • 3 篇 media access pro...
  • 3 篇 mobile communica...
  • 3 篇 hardware

机构

  • 6 篇 computer network...
  • 5 篇 computer network...
  • 4 篇 research center ...
  • 3 篇 department of co...
  • 3 篇 computer network...
  • 2 篇 faculty of compu...
  • 2 篇 computer network...
  • 2 篇 department of di...
  • 2 篇 department of di...
  • 2 篇 cse department u...
  • 2 篇 department of co...
  • 2 篇 computer network...
  • 2 篇 laboratory of ne...
  • 2 篇 siemens ag
  • 2 篇 mobile informati...
  • 1 篇 university of wü...
  • 1 篇 university of pa...
  • 1 篇 center for ubiqu...
  • 1 篇 department of co...
  • 1 篇 theory of distri...

作者

  • 7 篇 bharadwaj veerav...
  • 5 篇 mansouri houssem
  • 5 篇 de meer hermann
  • 4 篇 pathan al-sakib ...
  • 4 篇 patel ahmed
  • 4 篇 tutschku kurt
  • 3 篇 festin cedric an...
  • 3 篇 andersen frank-u...
  • 3 篇 badache nadjib
  • 3 篇 oberender jens o...
  • 3 篇 patel a
  • 3 篇 aliouat makhlouf
  • 3 篇 c.k. nguyen
  • 3 篇 hoßfeld tobias
  • 3 篇 cedric angelo m....
  • 3 篇 hummel karin ann...
  • 3 篇 tan wilson m.
  • 3 篇 hermann de meer
  • 3 篇 a. kumar
  • 2 篇 haddadi mohamed

语言

  • 81 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Networks and Distributed Systems"
84 条 记 录,以下是11-20 订阅
排序:
Analyzing the Effect of Taproot on Bitcoin Deanonymization
Analyzing the Effect of Taproot on Bitcoin Deanonymization
收藏 引用
International Conference on distributed Computing systems Workshop
作者: Felix Kleinwort Wolf Posdorfer Janick Edinger Department of Computer Science Distributed Operating Systems University of Hamburg Hamburg Germany Department of Computer Science Computer Networks University of Hamburg Hamburg Germany
Bitcoin was released in 2008 as an electronic peer-to-peer payment system. The aim was to enable financial transactions in an anonymous manner between participating parties. However, Bitcoin is considered a pseudonymo...
来源: 评论
Int-BEB: Enhanced Binary Exponential Backoff using Q-learning
Int-BEB: Enhanced Binary Exponential Backoff using Q-learnin...
收藏 引用
International Conference on Pattern Analysis and Intelligent systems (PAIS)
作者: N. Zerguine Department of Computer Science Networks and Distributed Systems Laboratory Ferhat Abbas Setif 1 University Setif Algeria
Because of their development and success, MANETs are now preferred alternatives in many fields of study and application. The IEEE 802.11 standard is the basis of most wireless technologies. To treat collisions in wire...
来源: 评论
HTTP Flood DOS Attack Detection on Big Data Using Data Mining  1
收藏 引用
13th International Conference on Information systems and Advanced Technologies, ICISAT 2023
作者: Haddadi, Mohamed Khiat, Abdelhamid Abidi, Yasmina Derradji, Yaakoub Department of Commercial Sciences Faculty of Economic Commercial and Management Sciences M’hamed BOUGARA University of Boumerdes Independence Avenue Boumerdes35000 Algeria Networks and Distributed Systems Division Research Center on Scientic and Technical Information Ben Aknoun Algeria Department of Computer Science Faculty of Sciences University of Ferhat Abbas Setif1 Setif Algeria
Nowadays, increasing use of Internet connection, security becomes a huge challenge for individuals as well as governments and organizations. Therefore, in the last decade, the world is moving towards green computing i... 详细信息
来源: 评论
PpNNT: Multiparty Privacy-Preserving Neural Network Training System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 370-383页
作者: Feng, Qi He, Debiao Shen, Jian Luo, Min Choo, Kim-Kwang Raymond Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China School of Information Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai201204 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
By leveraging smart devices [e.g., industrial Internet of Things (IIoT)] and real-time data analytics, organizations, such as production plants can benefit from increased productivity, reduced costs, enhanced self-mon... 详细信息
来源: 评论
Enhancing load balancing & Fault Tolerance in Real-Time Applications Using SD-WAN
Enhancing load balancing & Fault Tolerance in Real-Time Appl...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Mohammed A. Makarem Akram Q. Algaolahi Abdullrhman A. Alhajri Muneef A Razaz Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia Department of Computer Networks and Distributed Systems Taiz University Taiz Yemen Department of Electriacl Engineering King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia
Wide Area networks (WANs) are critical components of modern network architecture, connecting multiple locations within an organization, enabling Internet access, and supporting real-time data sharing and high availabi... 详细信息
来源: 评论
Assessing mowing intensity:A new index incorporating frequency,type of machinery,and technique
收藏 引用
Grassland Research 2024年 第3期3卷 264-274页
作者: Margarita Hartlieb Sebastian Raubitzek Johanna L.Berger Michael Staab Juliane Vogt Manfred Ayasse Andreas Ostrowski Wolfgang Weisser Nico Blüthgen Ecological Networks Department of BiologyTechnical University of DarmstadtDarmstadtGermany SBA-Research ViennaAustria Natura 2000-Station Unstrut-Hainich/Eichsfeld Wildtierland Hainich gGmbHHörselberg-HainichGermany Institute of Evolutionary Ecology and Conservation Genomics Ulm UniversityUlmGermany Heinz Nixdorf Chair for Distributed Information Systems Faculty of Mathematics and Computer ScienceFriedrich Schiller UniversityJenaGermany Department of Life Science Systems School of Life SciencesTechnical University of MunichTerrestrial Ecology Research GroupFreisingGermany
Background:Only a few decades ago,colorful,small-scale,heterogeneous,and species-rich hay meadows or extensive pastures were common,but have often been replaced by species-poor,uniform,large-scale multicut *** advance... 详细信息
来源: 评论
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in distributed Database systems  1
收藏 引用
8th International Symposium on Security in Computing and Communications, SSCC 2020
作者: Mansouri, Houssem Pathan, Al-Sakib Khan Laboratory of Networks and Distributed Systems Computer Science Department Faculty of Sciences Ferhat Abbas Setif University 1 Setif Algeria Department of Computer Science and Engineering Independent University Dhaka Bangladesh
For better protection of distributed systems, two well-known techniques are: checkpointing and rollback recovery. While failure protection is often considered a separate issue, it is crucial for establishing better se... 详细信息
来源: 评论
Hybrid-MELAu: A Hybrid Mixing Engineered Linguistic Features Framework Based on Autoencoder for Social Bot Detection
收藏 引用
Informatica (Slovenia) 2022年 第6期46卷 143-158页
作者: Hamida, Zineb Ferhat Refoufi, Allaoua Drif, Ahlem Giordano, Silvia Networks and Distributed Systems Laboratory Department of Computer Science University of Sétif 1 Sétif Algeria Networking Lab SUPSI University of Applied Sciences of Southern Switzerland Lugano Switzerland
Social bots are defined as computer algorithms that generate massive amounts of obnoxious or meaningful information. Most bot detection methods leverage multitudinous characteristics, from network features, temporal d... 详细信息
来源: 评论
distributed AI in Zero-touch Provisioning for Edge networks: Challenges and Research Directions
arXiv
收藏 引用
arXiv 2023年
作者: Hazra, Abhishek Morichetta, Andrea Murturi, Ilir Lovén, Lauri Dehury, Chinmaya Kumar Pujol, Víctor Casamayor Donta, Praveen Kumar Dustdar, Schahram Department of Computer Science and Engineering the Indian Institute of Information Technology Sri City India Communications & Networks Lab Department of Electrical and Computer Engineering National University of Singapore Singapore119260 Singapore Distributed Systems Group TU Wien Vienna1040 Austria Center for Ubiquitous Computing University of Oulu 90014 Finland Institute of Computer Science University of Tartu Tartu51009 Estonia
Zero-touch network is anticipated to inaugurate the generation of intelligent and highly flexible resource provisioning strategies where multiple service providers collaboratively offer computation and storage resourc... 详细信息
来源: 评论
A Resilient Hierarchical Checkpointing Algorithm for distributed systems Running on Cluster Federation  1
收藏 引用
7th International Symposium on Security in Computing and Communications, SSCC 2019
作者: Mansouri, Houssem Pathan, Al-Sakib Khan Laboratory of Networks and Distributed Systems Computer Science Department Faculty of Sciences Ferhat Abbas Setif University 1 Sétif Algeria Department of Computer Science and Engineering Southeast University Dhaka Bangladesh
In distributed systems, checkpointing method can be used to ensure fault-tolerance, which in turn could help the system’s security and stability. In simple terms, checkpointing means saving status information of a sy... 详细信息
来源: 评论