咨询与建议

限定检索结果

文献类型

  • 57 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 76 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 30 篇 计算机科学与技术...
    • 22 篇 软件工程
    • 15 篇 信息与通信工程
    • 8 篇 电气工程
    • 5 篇 动力工程及工程热...
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 控制科学与工程
    • 3 篇 土木工程
    • 3 篇 航空宇航科学与技...
    • 3 篇 环境科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 水利工程
    • 2 篇 轻工技术与工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
  • 17 篇 理学
    • 10 篇 数学
    • 4 篇 生物学
    • 4 篇 系统科学
    • 3 篇 大气科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 10 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 computer archite...
  • 6 篇 web services
  • 5 篇 computer network...
  • 4 篇 laboratories
  • 4 篇 quality of servi...
  • 3 篇 computer network...
  • 3 篇 knowledge manage...
  • 3 篇 intelligent netw...
  • 3 篇 computational mo...
  • 3 篇 protocols
  • 3 篇 hardware
  • 3 篇 equations
  • 3 篇 cryptography
  • 3 篇 availability
  • 3 篇 user interfaces
  • 2 篇 internet of thin...
  • 2 篇 computer science
  • 2 篇 indexes
  • 2 篇 application soft...
  • 2 篇 throughput

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 institute of com...
  • 5 篇 nanjing universi...
  • 4 篇 state key labora...
  • 3 篇 beijing universi...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing laborato...
  • 3 篇 beijing universi...
  • 3 篇 beijing key labo...
  • 2 篇 universidad de c...
  • 2 篇 division of nava...
  • 2 篇 department of co...
  • 2 篇 v. a. trapezniko...
  • 2 篇 danang architect...
  • 2 篇 institute for sy...
  • 2 篇 nanjing universi...
  • 2 篇 school of scienc...
  • 2 篇 institute of com...
  • 2 篇 institute of com...

作者

  • 8 篇 yang yang
  • 7 篇 schill alexander
  • 6 篇 alexander schill
  • 5 篇 guo caili
  • 5 篇 springer thomas
  • 5 篇 huang haiping
  • 5 篇 chen mingzhe
  • 4 篇 zhu jie
  • 4 篇 chen chen
  • 4 篇 thomas springer
  • 3 篇 li zengzhi
  • 3 篇 hu yu-pu
  • 3 篇 zengzhi li
  • 3 篇 jie zhu
  • 3 篇 haiping huang
  • 2 篇 gerald hubsch
  • 2 篇 zhu zhiyu
  • 2 篇 yingmeng gao
  • 2 篇 zeng-zhi li
  • 2 篇 caili guo

语言

  • 69 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"机构=Institute of Computer Architecture and Networks"
76 条 记 录,以下是61-70 订阅
排序:
Modeling for Web Services Composition System with Restricted Resources
Modeling for Web Services Composition System with Restricted...
收藏 引用
International Conference on Advances in System Simulation, SIMUL
作者: Huaizhou Yang Zengzhi Li State key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Institute of Computer Architecture & Networks Xi'an Jiaotong University Xi'an China
The Web services composition system usually has restricted resources in many practical applications. The system performance is closely related to the system resource. Firstly, a basic generalized stochastic Petri net ... 详细信息
来源: 评论
Smallest Enclosing Circle Based Localization Approach for Wireless Sensor networks
Smallest Enclosing Circle Based Localization Approach for Wi...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Quan Zhou Xiaowei Li Yongjun Xu Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences Beijing China Laboratory of Sensor Networks Institute of Computing Technology Chinese Academy and Sciences Beijing China
A novel range-free localization approach, smallest enclosing Circle based Localization (SECL), has been proposed. This approach uses the center of smallest enclosing circle of neighboring anchor nodes to estimate the ... 详细信息
来源: 评论
A feedback-aware binding component
A feedback-aware binding component
收藏 引用
1st Internet of Services Doctoral Symposium 2008 - At International Conference on Interoperability of Enterprise Systems and Applications, I-ESA 2008
作者: Strunk, Anja Technical University of Dresden Institute of Systems Architecture Department of Computer Networks 01063 Dresden Germany
The QoS-aware web service composition is an important topic that is intensively discussed in the last ten years. The approach of Canfora, for example, solves this problem in an acceptable time period. The lack of most... 详细信息
来源: 评论
A service-oriented approach for increasing flexibility in manufacturing
A service-oriented approach for increasing flexibility in ma...
收藏 引用
IEEE International Workshop on Factory Communication Systems (WFCS)
作者: Christin Groba Iris Braun Thomas Springer Martin Wollschlaeger Institute for Systems Architecture Computer Networks Group Technische Universität Germany Institute for Applied Computer Science Industrial Communications Group Technische Universität Germany
Manufacturing environments are characterized by a multitude of heterogeneous devices, networks, specific protocols and applications. Therefore, static structures, close coupling and vendor-specific solutions have been...
来源: 评论
Design and Implementation of QoS Management and the Reduction of Evaluation Indexes
Design and Implementation of QoS Management and the Reductio...
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Haping Zhu Yunlan Wang Zengzhi Li Hong Xia Institute of Computer Architecture and Networks Xi'an Jiaotong University Xi'an China Center for High Performance Computing Northwestern Polytechnical University Xi'an China
The basic purpose of QoS management is to provide differentiated services and quality guarantee for users. Then how to evaluate the services provided by the system is very important. In the paper, a multi-level QoS ma... 详细信息
来源: 评论
Attack and improve of a group signature scheme based on Chinese remainder theorem
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology 2007年 第1期29卷 182-184页
作者: Wang, Feng-He Hu, Yu-Pu Wang, Chun-Xiao Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710071 China Dept. of Mathematics Taishan Collage Taian 271000 China Dept. of Math. and Phys. Shandong Institute of Architecture and Engineering Jinan 250014 China
An attack is mounted on a group signature ncncmc bnscd on Cliincso Remainder Theory (Chen-Scheme). It shows the Chen-Scheme is insecure: A colluding subset of group members can find the private key of other members an... 详细信息
来源: 评论
An Efficient Pricing Based Protocol for Broadcasting in Wireless Ad hoc networks
An Efficient Pricing Based Protocol for Broadcasting in Wire...
收藏 引用
International Conference on Communication Systems Software and Middleware (COMSWARE)
作者: N.R. Suri Y. Narahari D. Manjunath Department of Computer Science and Automation Indian Institute of Science Bangalore India Networks Architecture Laboratory Electrical and Communications Engineering Indian Institute of Science Bangalore India
In many applications of wireless ad hoc networks, wireless nodes are owned by rational and intelligent users. In this paper, we call nodes selfish if they are owned by independent users and their only objective is to ... 详细信息
来源: 评论
Algorithm partitioning and optimization for network processors
Algorithm partitioning and optimization for network processo...
收藏 引用
Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology
作者: Lehmann, Ralf Schill, Alexander Institute for System Architecture Department of Computer Networks Technische Universität Dresden 01062 Dresden Germany
Current high speed networks cannot be fully utilized by today's high end systems. The processing requirements of next generation network protocols require intelligent network cards with network protocol offload en... 详细信息
来源: 评论
IPsec protocol acceleration using network processors
IPsec protocol acceleration using network processors
收藏 引用
Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology
作者: Lehmann, Ralf Benz, Mirko Groß, Stephan Hampel, Maik Institute for System Architecture Department of Computer Networks Technische Universität Dresden 01062 Dresden Germany
Gigabit networks can not be fully utilized by today's end systems. The processing requirements of next generation network protocols with enabled encryption features will aggravate this situation. To overcome these... 详细信息
来源: 评论
Optical burst and packet switching: Node and network design, contention resolution and quality of service - Results from the study in COST 266  7
Optical burst and packet switching: Node and network design,...
收藏 引用
7th International Conference on Telecommunications, ConTEL 2003
作者: Bjørnstad, Steinar Nord, Martin Hjelme, Dag.R. Stol, Norvald Callegati, Franco Cerroni, Walter Raffaelli, Carla Zaffoni, Paolo Gauger, Christoph M. Develder, Chris Cheyns, Jan Van Breusegem, Erik Baert, Elise Colle, Didier Pickavet, Mario Demeester, Piet Lacković, Marko Careglio, Davide Junyent, Gabriel Klinkowski, Miroslaw Marciniak, Marian Kowalewski, Marian Internet Network Architecture Telenor R and D Oslo Norway Department of Physical Electronics NTNU/UNIK Trondheim Norway Department of Telematics NTNU/UNIK Trondheim Norway Research Center COM DTU Lyngby Denmark DEIS University of Bologna Bologna Italy University of Stuttgart Institute of Communication Networks and Computer Engineering Stuttgart Germany Ghent University IMEC Ghent Belgium Department of Telecommunications Faculty of Electrical Engineering and Computing Unska 3 Zagreb Croatia Universitat Politècnica de Catalunya Advanced Broadband Communications Labs. CatalunyaBarcelona Spain National Institute of Telecommunications Department of Transmission and Fiber Technology Warsaw Poland
Future network should be able to efficiently serve packet-based networks, such as the Internet. In this paper, based on results from COST 266, we explore characteristics of Optical Burst switching (OBS) and Optical Pa... 详细信息
来源: 评论