咨询与建议

限定检索结果

文献类型

  • 799 篇 会议
  • 223 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 570 篇 工学
    • 475 篇 计算机科学与技术...
    • 348 篇 软件工程
    • 132 篇 信息与通信工程
    • 65 篇 控制科学与工程
    • 54 篇 电气工程
    • 35 篇 生物工程
    • 26 篇 机械工程
    • 25 篇 电子科学与技术(可...
    • 23 篇 动力工程及工程热...
    • 20 篇 安全科学与工程
    • 18 篇 环境科学与工程(可...
    • 18 篇 生物医学工程(可授...
    • 16 篇 建筑学
    • 16 篇 网络空间安全
    • 15 篇 交通运输工程
    • 13 篇 力学(可授工学、理...
    • 13 篇 土木工程
  • 205 篇 理学
    • 129 篇 数学
    • 39 篇 系统科学
    • 36 篇 生物学
    • 28 篇 统计学(可授理学、...
    • 21 篇 物理学
  • 173 篇 管理学
    • 114 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 21 篇 法学
    • 13 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 17 篇 医学
    • 17 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 13 篇 教育学
    • 13 篇 教育学
  • 5 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 144 篇 computer science
  • 71 篇 application soft...
  • 57 篇 distributed comp...
  • 52 篇 quality of servi...
  • 44 篇 middleware
  • 43 篇 computer archite...
  • 42 篇 resource managem...
  • 40 篇 software enginee...
  • 40 篇 grid computing
  • 38 篇 laboratories
  • 38 篇 computational mo...
  • 36 篇 protocols
  • 35 篇 computer network...
  • 30 篇 educational inst...
  • 30 篇 cloud computing
  • 29 篇 bandwidth
  • 26 篇 monitoring
  • 25 篇 processor schedu...
  • 25 篇 telecommunicatio...
  • 24 篇 internet

机构

  • 33 篇 distributed syst...
  • 27 篇 grid computing a...
  • 18 篇 department of di...
  • 14 篇 distributed syst...
  • 12 篇 distributed syst...
  • 11 篇 distributed syst...
  • 10 篇 institute of par...
  • 9 篇 cloud computing ...
  • 7 篇 distributed syst...
  • 7 篇 grid computing a...
  • 7 篇 department of sy...
  • 7 篇 distributed syst...
  • 7 篇 department of di...
  • 7 篇 department of co...
  • 7 篇 department of di...
  • 7 篇 distributed syst...
  • 7 篇 parallel and dis...
  • 6 篇 computer network...
  • 6 篇 distributed syst...
  • 6 篇 crc for distribu...

作者

  • 65 篇 rajkumar buyya
  • 22 篇 cahill vinny
  • 22 篇 v. cahill
  • 22 篇 buyya rajkumar
  • 20 篇 dustdar schahram
  • 13 篇 lamersdorf winfr...
  • 12 篇 braubach lars
  • 12 篇 pokahr alexander
  • 11 篇 chen haibo
  • 11 篇 m. menth
  • 11 篇 ismail leila
  • 11 篇 lin jerry chun-w...
  • 10 篇 materwala huned
  • 10 篇 leila ismail
  • 9 篇 michael menth
  • 9 篇 schahram dustdar
  • 8 篇 menth michael
  • 7 篇 syu jia-hao
  • 7 篇 vinny cahill
  • 7 篇 winfried lamersd...

语言

  • 1,033 篇 英文
  • 21 篇 其他
  • 7 篇 中文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science Distributed Systems Programming"
1062 条 记 录,以下是71-80 订阅
排序:
Assessing mowing intensity:A new index incorporating frequency,type of machinery,and technique
收藏 引用
Grassland Research 2024年 第3期3卷 264-274页
作者: Margarita Hartlieb Sebastian Raubitzek Johanna L.Berger Michael Staab Juliane Vogt Manfred Ayasse Andreas Ostrowski Wolfgang Weisser Nico Blüthgen Ecological Networks Department of BiologyTechnical University of DarmstadtDarmstadtGermany SBA-Research ViennaAustria Natura 2000-Station Unstrut-Hainich/Eichsfeld Wildtierland Hainich gGmbHHörselberg-HainichGermany Institute of Evolutionary Ecology and Conservation Genomics Ulm UniversityUlmGermany Heinz Nixdorf Chair for Distributed Information Systems Faculty of Mathematics and Computer ScienceFriedrich Schiller UniversityJenaGermany Department of Life Science Systems School of Life SciencesTechnical University of MunichTerrestrial Ecology Research GroupFreisingGermany
Background:Only a few decades ago,colorful,small-scale,heterogeneous,and species-rich hay meadows or extensive pastures were common,but have often been replaced by species-poor,uniform,large-scale multicut *** advance... 详细信息
来源: 评论
Let me quickly share it - Time Pressure when Sharing on Social Media  24
Let me quickly share it - Time Pressure when Sharing on Soci...
收藏 引用
23rd International Conference on Mobile and Ubiquitous Multimedia, MUM 2024
作者: Panskus, Rebecca Tanni, Tangila Islam Ponticello, Alexander Meissner, Echo Solihin, Yan Krombholz, Katharina Marky, Karola Ruhr University Bochum Bochum Germany Department of Computer Science University of Central Florida Orlando United States CISPA Helmholtz Center for Information Security Saarland University Germany Saarbrücken Germany Institute of Distributed Systems Ulm University Ulm Germany CISPA Helmholtz Center for Information Security Saarbrücken Germany
Photo sharing has become an integral part of social media;many new platforms even prompt their users to share photos under time pressure. Yet, sharing photos can also affect the privacy of individuals in a negative wa... 详细信息
来源: 评论
Unveiling the Black Box: Neural Cryptanalysis with XAI
Unveiling the Black Box: Neural Cryptanalysis with XAI
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Yue-Tian Goi Shu-Min Leong Raphaël C.-W. Phan Shangqi Lai Ana Sălăgean School of Information Technology Monash University Distributed Systems Security Group CSIRO's Data61 Australia Department of Computer Science Loughborough University UK
At CRYPTO'19, Gohr[1] presented ResNet-based neural distinguishers (ND) for the round-reduced SPECK32/64 cipher. However, due to the black-box use of such deep learning models, it is hard for humans to understand ... 详细信息
来源: 评论
Emotion Classification Through Speech Data Analysis  23
Emotion Classification Through Speech Data Analysis
收藏 引用
Proceedings of the Winter Simulation Conference
作者: Luzalen Marcos Kristiina Valter Mai Abdolreza Abhari Resilience Engineering Lab Department of Electrical Computer and Biomedical Engineering Toronto Metropolitan University Toronto Canada Distributed Systems and Multimedia Processing (DSMP) Lab Department of Computer Science Toronto Metropolitan University Toronto Canada
Good quality healthcare services require effective communication between the patient and the healthcare provider. This work will help improve the areas of healthcare systems automation and optimization by applying Spe...
来源: 评论
Fourth Workshop on Big (and Small) Data in science and Humanities (BigDS 2023)
Fourth Workshop on Big (and Small) Data in Science and Human...
收藏 引用
2023 Datenbanksysteme fur Business, Technologie und Web, BTW 2023 - 2023 Database systems for Business, Technology and Web, BTW 2023
作者: Henrich, Andreas Karam, Naouel König-Ries, Birgitta Seeger, Bernhard University of Bamberg Media Informatics Bamberg96047 Germany Fraunhofer FOKUS & InfAI e.V. Berlin Germany University of Jena Heinz Nixdorf Chair for Distributed Information Systems Jena07743 Germany University of Marburg Department of Mathematics and Computer Science Marburg35032 Germany
来源: 评论
GPU-Based Efficient Parallel Heuristic Algorithm for High-Utility Itemset Mining in Large Transaction Datasets (Extended Abstract)
GPU-Based Efficient Parallel Heuristic Algorithm for High-Ut...
收藏 引用
International Conference on Data Engineering
作者: Wei Fang Haipeng Jiang Hengyang Lu Jun Sun Xiaojun Wu Jerry Chun-Wei Lin Department of Computer Science and Technology Jiangsu Provincial Engineering Laboratory of Pattern Recognition and Computational Intelligence Jiangnan University Wuxi China Department of Distributed Systems and IT Devices Silesian University of Technology Poland
Heuristic algorithms have been developed to find approximate solutions for high-utility itemset mining (HUIM) problems that compensate for the performance bottlenecks of exact algorithms. However, heuristic algorithms... 详细信息
来源: 评论
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in distributed Database systems  1
收藏 引用
8th International Symposium on Security in Computing and Communications, SSCC 2020
作者: Mansouri, Houssem Pathan, Al-Sakib Khan Laboratory of Networks and Distributed Systems Computer Science Department Faculty of Sciences Ferhat Abbas Setif University 1 Setif Algeria Department of Computer Science and Engineering Independent University Dhaka Bangladesh
For better protection of distributed systems, two well-known techniques are: checkpointing and rollback recovery. While failure protection is often considered a separate issue, it is crucial for establishing better se... 详细信息
来源: 评论
Securing ML-based Android Malware Detectors: A Defensive Feature Selection Approach against Backdoor Attacks
Securing ML-based Android Malware Detectors: A Defensive Fea...
收藏 引用
Cluster, Cloud and Internet Computing Workshops (CCGridW), IEEE/ACM International Symposium on
作者: Bartłomiej Marek Kacper Pieniążek Filip Ratajczak Wojciech Adamczyk Bartosz Bok Mateusz Krzysztoń Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wrocław Poland Department of Distributed Systems Research and Academic Computer Network (NASK-PIB) Warsaw Poland
This work investigates the vulnerability of ML-based Android malware detectors to backdoor attacks, and proposes a novel feature selection method to reduce system vulnerability. We present a realistic attack scenario ... 详细信息
来源: 评论
A New Approach for the Analysis of Resistance to Change in the Digital Transformation Context  11th
A New Approach for the Analysis of Resistance to Change in t...
收藏 引用
10th International Conference on Innovation and New Trends in Information Technology, INTIS 2022 and 11th International Conference on Innovation and New Trends in Information Technology, INTIS 2023
作者: El Karam, Bachira Abou Marghoubi, Rabia Khanboubi, Fadoua Allaki, Driss InnovatiVE REsearch on Software Systems and data INPT Rabat Morocco LIM Lab. IOS team Department of Computer Science FSTM Casablanca Morocco Smart Embedded Enterprise and Distributed Systems INPT Rabat Morocco
In a context marked by the rapid evolution of technologies and the omnipresence of IT at the heart of all activities, the digital transformation of companies is no longer a luxury but an absolute necessity. This techn... 详细信息
来源: 评论
Exploiting Open Data for Co2 Estimation Via Artificial Intelligence and Explainable Ai
SSRN
收藏 引用
SSRN 2024年
作者: Bilotta, Stefano Palesi, Luciano Alessandro Ipsaro Nesi, Paolo University of Florence Department of Mathematics and Computer Science "U. Dini" Firenze50134 Italy University of Florence Distributed Systems and Internet Technology DISIT Lab Firenze50139 Italy
In present paper, a general CO2 emission estimation approach is developed by means of a large range of open data as predictions. Such open data are related to human activity regarding services and (socio-economic) con... 详细信息
来源: 评论