咨询与建议

限定检索结果

文献类型

  • 57 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 76 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 30 篇 计算机科学与技术...
    • 22 篇 软件工程
    • 15 篇 信息与通信工程
    • 8 篇 电气工程
    • 5 篇 动力工程及工程热...
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 控制科学与工程
    • 3 篇 土木工程
    • 3 篇 航空宇航科学与技...
    • 3 篇 环境科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 水利工程
    • 2 篇 轻工技术与工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
  • 17 篇 理学
    • 10 篇 数学
    • 4 篇 生物学
    • 4 篇 系统科学
    • 3 篇 大气科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 10 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 computer archite...
  • 6 篇 web services
  • 5 篇 computer network...
  • 4 篇 laboratories
  • 4 篇 quality of servi...
  • 3 篇 computer network...
  • 3 篇 knowledge manage...
  • 3 篇 intelligent netw...
  • 3 篇 computational mo...
  • 3 篇 protocols
  • 3 篇 hardware
  • 3 篇 equations
  • 3 篇 cryptography
  • 3 篇 availability
  • 3 篇 user interfaces
  • 2 篇 internet of thin...
  • 2 篇 computer science
  • 2 篇 indexes
  • 2 篇 application soft...
  • 2 篇 throughput

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 institute of com...
  • 5 篇 nanjing universi...
  • 4 篇 state key labora...
  • 3 篇 beijing universi...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing laborato...
  • 3 篇 beijing universi...
  • 3 篇 beijing key labo...
  • 2 篇 universidad de c...
  • 2 篇 division of nava...
  • 2 篇 department of co...
  • 2 篇 v. a. trapezniko...
  • 2 篇 danang architect...
  • 2 篇 institute for sy...
  • 2 篇 nanjing universi...
  • 2 篇 school of scienc...
  • 2 篇 institute of com...
  • 2 篇 institute of com...

作者

  • 8 篇 yang yang
  • 7 篇 schill alexander
  • 6 篇 alexander schill
  • 5 篇 guo caili
  • 5 篇 springer thomas
  • 5 篇 huang haiping
  • 5 篇 chen mingzhe
  • 4 篇 zhu jie
  • 4 篇 chen chen
  • 4 篇 thomas springer
  • 3 篇 li zengzhi
  • 3 篇 hu yu-pu
  • 3 篇 zengzhi li
  • 3 篇 jie zhu
  • 3 篇 haiping huang
  • 2 篇 gerald hubsch
  • 2 篇 zhu zhiyu
  • 2 篇 yingmeng gao
  • 2 篇 zeng-zhi li
  • 2 篇 caili guo

语言

  • 69 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"机构=Institute of Computer Architecture and Networks"
76 条 记 录,以下是11-20 订阅
排序:
A feedback-aware binding component
A feedback-aware binding component
收藏 引用
1st Internet of Services Doctoral Symposium 2008 - At International Conference on Interoperability of Enterprise Systems and Applications, I-ESA 2008
作者: Strunk, Anja Technical University of Dresden Institute of Systems Architecture Department of Computer Networks 01063 Dresden Germany
The QoS-aware web service composition is an important topic that is intensively discussed in the last ten years. The approach of Canfora, for example, solves this problem in an acceptable time period. The lack of most... 详细信息
来源: 评论
Algorithm partitioning and optimization for network processors
Algorithm partitioning and optimization for network processo...
收藏 引用
Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology
作者: Lehmann, Ralf Schill, Alexander Institute for System Architecture Department of Computer Networks Technische Universität Dresden 01062 Dresden Germany
Current high speed networks cannot be fully utilized by today's high end systems. The processing requirements of next generation network protocols require intelligent network cards with network protocol offload en... 详细信息
来源: 评论
IPsec protocol acceleration using network processors
IPsec protocol acceleration using network processors
收藏 引用
Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology
作者: Lehmann, Ralf Benz, Mirko Groß, Stephan Hampel, Maik Institute for System Architecture Department of Computer Networks Technische Universität Dresden 01062 Dresden Germany
Gigabit networks can not be fully utilized by today's end systems. The processing requirements of next generation network protocols with enabled encryption features will aggravate this situation. To overcome these... 详细信息
来源: 评论
An annotation tool for enhancing the user interface generation process for services
An annotation tool for enhancing the user interface generati...
收藏 引用
KpbiMuKo 2009 CriMiCo - 2009 19th International Crimean Conference Microwave and Telecommunication Technology
作者: Izquierdo, Paoli Janeiro, Jordan Hübsch, Gerald Springer, Thomas Schill, Alexander Department of Computer Science Institute of System Architecture Chair of Computer Networks Dresden Technical University Dresden Sachsen 01187 Germany
The user interface generation process is still a complex issue. The manual creation process is time consuming and complex because it requires the combination of the application developer work and the user interface de...
来源: 评论
Decentralised approach for a reusable crowdsourcing platform utilising standard web servers
Decentralised approach for a reusable crowdsourcing platform...
收藏 引用
2013 ACM Conference on Ubiquitous Computing, UbiComp 2013
作者: Hara, Tenshi Springer, Thomas Bombach, Gerd Schill, Alexander Department of Computer Networks Institute of Systems Architecture Technische Universität Dresden 01062 Dresden Germany TUD Germany
Crowdsourcing has gained increasing interest during the last years as means for solving complex tasks with the help of a flexible group of contributors. The crowd can contribute with collecting data in the field, comp... 详细信息
来源: 评论
A novel ISAR alogrithm for the imaging of ship targets based on AM-LFM model
A novel ISAR alogrithm for the imaging of ship targets based...
收藏 引用
International Conference on Signal Processing Proceedings (ICSP)
作者: Zhang, Long Si, Dong Sen College of Electronics and Information Xi'an Polytechnic University Xi'an China Institute of Computer Architecture and Networks Xi'an Jiaotong University Xi'an China
Rang-Instaneous-Doppler (RID) processing is widely used in ISAR imaging of maneuvering target and acceptable image can be achieved when the amplitude modulation effect of scatterers echoes can be neglected during inte... 详细信息
来源: 评论
A monitoring and adaptation architecture for the future Internet of Services
A monitoring and adaptation architecture for the future Inte...
收藏 引用
IADIS International Conference WWW/Internet 2009, ICWI 2009
作者: Braun, Iris Wauer, Matthias Reichert, Sandro Spillner, Josef Strunk, Anja Schill, Alexander Technische Universität Dresden Faculty of Computer Science Institute of Systems Architecture Department of Computer Networks Nöthnitzer Str. 46 Dresden01187 Germany
The article presents the architecture of a distributed platform for the future Internet of Services, where services can be provided and sold over so-called service market places. We focus on the description of the mon... 详细信息
来源: 评论
CASEMANS 2009: The 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems  09
CASEMANS 2009: The 3rd ACM International Workshop on Context...
收藏 引用
3rd ACM International Workshop on Context-Awareness for Self-Managing Systems, Casemans 2009
作者: Dargie, Waltenegus Kuwahara, Noriaki Technical University of Dresden Institute for Systems Architecture Department of Computer Networks Dresde Germany Kyoto Institute of Technology Graduate School of Science and Technology Kyoto Japan
This year, the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems (Devices, Applications and networks) (CASEMANS 2009) is organized in Nara, Japan. This article summarizes the objectives of ...
来源: 评论
Middleware Support for Transparent Client-Side Caching
收藏 引用
Electronic Notes in Theoretical computer Science 2002年 第4期65卷 34-44页
作者: Christoph Pohl Alexander Schill Dresden University of Technology Institute for System Architecture Chair for Computer Networks Germany
This paper reflects on existing caching concepts in proxies and stubs of component technologies and lines out their advantages and deficiencies. A new concept is introduced that averts proliferation of component stubs...
来源: 评论
Cryptanalysis of dragon scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第4期17卷 80-87页
作者: YUAN Feng HU Yu-pu WANG Yan OU Hai-wen Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Science Xi'an University of Architecture and Technology Xi'an 710055 China Key Laboratory of Information Security Beijing Electronic Science and Technology Institute Beijing 100070 China
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an ... 详细信息
来源: 评论