咨询与建议

限定检索结果

文献类型

  • 784 篇 会议
  • 212 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 1,030 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 540 篇 工学
    • 452 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 125 篇 信息与通信工程
    • 58 篇 控制科学与工程
    • 52 篇 电气工程
    • 32 篇 生物工程
    • 26 篇 机械工程
    • 24 篇 动力工程及工程热...
    • 24 篇 电子科学与技术(可...
    • 19 篇 安全科学与工程
    • 18 篇 环境科学与工程(可...
    • 17 篇 生物医学工程(可授...
    • 16 篇 交通运输工程
    • 15 篇 建筑学
    • 13 篇 力学(可授工学、理...
    • 12 篇 网络空间安全
    • 11 篇 化学工程与技术
  • 186 篇 理学
    • 118 篇 数学
    • 36 篇 系统科学
    • 34 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 10 篇 化学
  • 168 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 73 篇 工商管理
    • 68 篇 图书情报与档案管...
  • 22 篇 法学
    • 14 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 16 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 9 篇 教育学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 143 篇 computer science
  • 68 篇 application soft...
  • 57 篇 distributed comp...
  • 54 篇 quality of servi...
  • 46 篇 resource managem...
  • 43 篇 computer archite...
  • 42 篇 middleware
  • 40 篇 grid computing
  • 40 篇 protocols
  • 39 篇 laboratories
  • 39 篇 computational mo...
  • 36 篇 software enginee...
  • 34 篇 computer network...
  • 30 篇 bandwidth
  • 30 篇 educational inst...
  • 30 篇 cloud computing
  • 28 篇 monitoring
  • 27 篇 operating system...
  • 26 篇 processor schedu...
  • 25 篇 telecommunicatio...

机构

  • 33 篇 distributed syst...
  • 27 篇 grid computing a...
  • 18 篇 department of di...
  • 14 篇 distributed syst...
  • 12 篇 distributed syst...
  • 11 篇 distributed syst...
  • 10 篇 institute of par...
  • 9 篇 cloud computing ...
  • 7 篇 distributed syst...
  • 7 篇 grid computing a...
  • 7 篇 distributed syst...
  • 7 篇 department of di...
  • 7 篇 department of co...
  • 7 篇 department of di...
  • 7 篇 distributed syst...
  • 7 篇 parallel and dis...
  • 6 篇 computer network...
  • 6 篇 distributed syst...
  • 6 篇 crc for distribu...
  • 6 篇 school of electr...

作者

  • 65 篇 rajkumar buyya
  • 22 篇 cahill vinny
  • 22 篇 v. cahill
  • 22 篇 buyya rajkumar
  • 20 篇 dustdar schahram
  • 13 篇 lamersdorf winfr...
  • 12 篇 emilio luque
  • 12 篇 braubach lars
  • 12 篇 pokahr alexander
  • 11 篇 chen haibo
  • 11 篇 m. menth
  • 11 篇 ismail leila
  • 11 篇 lin jerry chun-w...
  • 10 篇 materwala huned
  • 10 篇 leila ismail
  • 9 篇 michael menth
  • 9 篇 schahram dustdar
  • 8 篇 francisco epelde
  • 8 篇 manel taboada
  • 8 篇 menth michael

语言

  • 1,003 篇 英文
  • 18 篇 其他
  • 8 篇 中文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science Distributed Systems and Operating Systems"
1030 条 记 录,以下是271-280 订阅
排序:
LSB and DCT steganographic detection using compressive sensing
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2014年 第1期5卷 20-32页
作者: Patsakis, Constantinos Aroukatos, Nikolaos G. Distributed Systems Group School of Computer Science and Statistics Trinity College College Green Dublin 2 Ireland Department of Informatics University of Piraeus 80 Karaoli and Dimitriou str 18534 Piraeus Greece
During the last years, a large number of information in digital form has been exchanged all over the world. Several techniques have been developed in order to protect the users' privacy of digital content. Stegano... 详细信息
来源: 评论
Uncertainty aware hybrid clock synchronisation in Wireless Sensor Networks  8
Uncertainty aware hybrid clock synchronisation in Wireless S...
收藏 引用
8th International Conference on Mobile Ubiquitous Computing, systems, Services and Technologies, UBICOMM 2014
作者: Steup, Christoph Zug, Sebastian Kaiser, Jörg Breuhan, Andy Department of Distributed Systems Faculty of Computer Science Otto-von-Guericke-University Magdeburg Germany Rohde and Schwarz DVS GmbH Germany
Wireless Sensor Networks, aiming to monitor the real world's phenomena reliably, need to combine and postprocess the detected individual events. This is not possible without reliable information of the context of ... 详细信息
来源: 评论
Using restricted transactional memory to build a scalable in-memory database  14
Using restricted transactional memory to build a scalable in...
收藏 引用
9th ACM European Conference on computer systems, EuroSys 2014
作者: Wang, Zhaoguo Qian, Hao Li, Jinyang Chen, Haibo School of Computer Science Fudan University China Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Department of Computer Science New York University United States
The recent availability of Intel Haswell processors marks the transition of hardware transactional memory from research toys to mainstream reality. DBX is an in-memory database that uses Intel's restricted transac... 详细信息
来源: 评论
Computation and communication efficient graph processing with distributed immutable view  14
Computation and communication efficient graph processing wit...
收藏 引用
23rd ACM Symposium on High-Performance Parallel and distributed Computing, HPDC 2014
作者: Chen, Rong Ding, Xin Wang, Peng Chen, Haibo Zang, Binyu Guan, Haibing Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science Shanghai Jiao Tong University China
Cyclops is a new vertex-oriented graph-parallel framework for writing distributed graph analytics. Unlike existing distributed graph computation models, Cyclops retains simplicity and computation-efficiency by synchro... 详细信息
来源: 评论
Correntropy Supervised Non-negative Matrix Factorization
Correntropy Supervised Non-negative Matrix Factorization
收藏 引用
International Joint Conference on Neural Networks
作者: Wenju Zhang Naiyang Guan Dacheng Tao Bin Mao Xuhui Huang Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan China 410073 Center for Quantum Computation and Intelligent Systems FEIT University of Technology Sydney Sydney NSW 2007 Australia College of Science National University of Defense Technology Changsha Hunan China 410073 Department of Computer Science and Technology College of Computer National University of Defense Technology Changsha Hunan China 410073
Non-negative matrix factorization (NMF) is a powerful dimension reduction method and has been widely used in many pattern recognition and computer vision problems. However, conventional NMF methods are neither robust ... 详细信息
来源: 评论
HSkip+: A self-stabilizing overlay network for nodes with heterogeneous bandwidths  14
HSkip+: A self-stabilizing overlay network for nodes with he...
收藏 引用
14th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2014
作者: Feldotto, Matthias Scheideler, Christian Graffi, Kalman Heinz Nixdorf Institute Department of Computer Science University of Paderborn Germany Theory of Distributed Systems Group Department of Computer Science University of Paderborn Germany Technology of Social Networks Group Department of Computer Science University of Düsseldorf Germany
In this paper we present and analyze HSkip+, a self-stabilizing overlay network for nodes with arbitrary heterogeneous bandwidths. HSkip+ has the same topology as the Skip+ graph proposed by Jacob et al. [1] but its s... 详细信息
来源: 评论
Bipartite-oriented distributed graph partitioning for big learning  14
Bipartite-oriented distributed graph partitioning for big le...
收藏 引用
5th ACM Asia-Pacific Workshop on systems, APSYS 2014
作者: Chen, Rong Shi, Jiaxin Zang, Binyu Guan, Haibing Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science Shanghai Jiao Tong University China
Many machine learning and data mining (MLDM) problems like recommendation, topic modeling and medical diagnosis can be modeled as computing on bipartite graphs. However, most distributed graph-parallel systems are obl... 详细信息
来源: 评论
Concurrent and consistent virtual machine introspection with hardware transactional memory
Concurrent and consistent virtual machine introspection with...
收藏 引用
20th IEEE International Symposium on High Performance computer Architecture, HPCA 2014
作者: Liu, Yutao Xia, Yubin Guan, Haibing Zang, Binyu Chen, Haibo Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science Shanghai Jiao Tong University China
Virtual machine introspection, which provides tamperresistant, high-fidelity 'out of the box' monitoring of virtual machines, has many prominent security applications including VM-based intrusion detection, ma... 详细信息
来源: 评论
Semantic self-management and mediation for home service platforms  44
Semantic self-management and mediation for home service plat...
收藏 引用
44. Jahrestagung der Gesellschaft fur Informatik INFORMATIK 2014 - Big Data - Komplexitat meistern - Big Data - Mastering Complexity: 44th Annual Meeting of the Society for computer science, INFORMATICS 2014
作者: Schaefer, Jan RheinMain University of Applied Sciences Design Computer Science Media Department Distributed Systems Lab. Unter den Eichen 5 WiesbadenD-65195 Germany
Service-oriented computing has long outgrown the enterprise. Today, personal livingenvironments feature an increasing number of convenience-, health-and securityrelatedapplications provided by distributed interacting ... 详细信息
来源: 评论
A Practitioner's Guide to Software-Based Soft-Error Mitigation Using AN-Codes
A Practitioner's Guide to Software-Based Soft-Error Mitigati...
收藏 引用
IEEE International Symposim on High Assurance systems Engineering
作者: Martin Hoffmann Peter Ulbrich Christian Dietrich Horst Schirmeier Daniel Lohmann Wolfgang Schröder-Preikschat Chair of Distributed Systems and Operating Systems Friedrich-Alexander University Erlangen-Nuremberg Germany Department of Computer Science 12 Technische Universität Dortmund Germany
Arithmetic error coding schemes (AN codes) are a well known and effective technique for soft error mitigation. Although coding theory being a rich area of mathematics, their implementation seems to be fairly easy. How... 详细信息
来源: 评论