咨询与建议

限定检索结果

文献类型

  • 535 篇 会议
  • 176 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 738 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 419 篇 工学
    • 317 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 114 篇 信息与通信工程
    • 58 篇 控制科学与工程
    • 51 篇 电子科学与技术(可...
    • 32 篇 电气工程
    • 29 篇 生物工程
    • 22 篇 动力工程及工程热...
    • 21 篇 机械工程
    • 19 篇 建筑学
    • 18 篇 仪器科学与技术
    • 12 篇 土木工程
    • 12 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 10 篇 生物医学工程(可授...
    • 9 篇 力学(可授工学、理...
  • 155 篇 理学
    • 91 篇 数学
    • 30 篇 系统科学
    • 29 篇 生物学
    • 24 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 13 篇 化学
  • 122 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 17 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 5 篇 教育学
  • 5 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 computer science
  • 26 篇 routing
  • 26 篇 protocols
  • 24 篇 bandwidth
  • 23 篇 quality of servi...
  • 22 篇 monitoring
  • 20 篇 telecommunicatio...
  • 19 篇 application soft...
  • 19 篇 hardware
  • 18 篇 computer archite...
  • 18 篇 throughput
  • 18 篇 real time system...
  • 18 篇 computational mo...
  • 18 篇 distributed comp...
  • 17 篇 runtime
  • 17 篇 software enginee...
  • 15 篇 network topology
  • 15 篇 resource managem...
  • 15 篇 wireless sensor ...
  • 15 篇 vehicles

机构

  • 18 篇 department of di...
  • 15 篇 institute of par...
  • 8 篇 key laboratory o...
  • 8 篇 distributed syst...
  • 7 篇 chair for embedd...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 department of di...
  • 7 篇 school of comput...
  • 6 篇 microelectronics...
  • 6 篇 department of co...
  • 5 篇 school of electr...
  • 5 篇 institute of dis...
  • 5 篇 distributed and ...
  • 5 篇 embedded systems...
  • 5 篇 distributed embe...
  • 5 篇 swedish institut...
  • 5 篇 department of di...
  • 4 篇 institute of com...
  • 4 篇 center for appli...

作者

  • 16 篇 rajkumar buyya
  • 16 篇 dustdar schahram
  • 15 篇 chen haibo
  • 11 篇 m. menth
  • 11 篇 michael menth
  • 10 篇 jörg henkel
  • 10 篇 könig-ries birgi...
  • 10 篇 muhammad shafiqu...
  • 9 篇 babalou samira
  • 9 篇 menth michael
  • 9 篇 janakiram d.
  • 9 篇 bastian blywis
  • 9 篇 felix juraschek
  • 8 篇 jeon gwanggil
  • 8 篇 frank slomka
  • 8 篇 juraschek felix
  • 8 篇 özdenizci ozan
  • 7 篇 blywis bastian
  • 7 篇 sri parameswaran
  • 7 篇 zang binyu

语言

  • 712 篇 英文
  • 13 篇 中文
  • 10 篇 其他
  • 3 篇 德文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Computer Science-Distributed Embedded Systems"
738 条 记 录,以下是641-650 订阅
排序:
Generating realistic workloads for network intrusion detection systems
Generating realistic workloads for network intrusion detecti...
收藏 引用
Proceedings of the Fourth International Workshop on Software and Performance, WOSP'04
作者: Antonatos, Spyros Anagnostakis, Kostas G. Markatos, Eyangelos P. Institute of Computer Science Found. for Research and Technology Hellas Greece Distributed Systems Lab. CIS Department Univ. of Pennsylvania United States
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloa... 详细信息
来源: 评论
Music2Share - Copyright-compliant music sharing in P2P systems
Music2Share - Copyright-compliant music sharing in P2P syste...
收藏 引用
作者: Kalker, Ton Epema, Dick H. J. Hartel, Pieter H. Lagendijk, R.L. Van Steen, Maarten Philips Research Eindhoven Eindhoven 5656 AA Netherlands Technical University Eindhoven Eindhoven 5612 AZ Netherlands Parallel and Distributed Systems Group Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft 2600 GA Netherlands Distributed and Embedded Systems Group Department of Computer Science University of Twente Enschede 7500 AE Netherlands Delft University of Technology Delft 2628 CD Netherlands Department of Computer Science Vrije Universiteit Amsterdam 1081 HV Netherlands
Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for mus... 详细信息
来源: 评论
Programming software agents as designing executable business processes: A Model-driven perspective  1
Programming software agents as designing executable business...
收藏 引用
First International Workshop ProMAS 2003: Programming Multi-Agent systems
作者: Müller, Jörg P. Bauer, Bernhard Friese, Thomas Siemens AG Corporate Technology Intelligent Autonomous Systems Otto-Hahn-Ring 6 D-81739 München Germany Programming of Distributed Systems Institute of Computer Science University of Augsburg D-86135 Augsburg Dept. of Mathematics and Computer Science University of Marburg D-35032 Marburg Germany
The contribution of this paper is fourfold. First, we sketch an architecture of agent-enabled business process management that cleanly separates between agent capabilities, business process modeling, and the modeling ... 详细信息
来源: 评论
Experience-based admission control (EBAC)
Experience-based admission control (EBAC)
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: M. Menth J. Milbrandt S. Oechsner Department of Distributed Systems Institute of Computer Science University of Würzburg Germany
Classical admission control approaches take either descriptor or measurement based information about the traffic into account without relating them to each other. We propose a experience-based AC (EBAC) which uses an ... 详细信息
来源: 评论
Impact of routing and traffic distribution on the performance of network admission control
Impact of routing and traffic distribution on the performanc...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: M. Menth J. Milbrandt S. Kopf Department of Distributed Systems Institute of Computer Science University of Würzburg Germany
In contrast to link admission control (LAC), which limits the truffle on a single link, network admission control (NAC) methods limit the traffic within a network. In this paper we present four basic budget based NAC ... 详细信息
来源: 评论
A performance evaluation framework for network admission control methods
A performance evaluation framework for network admission con...
收藏 引用
IEEE Symposium on Network Operations and Management
作者: M. Menth S. Kopf J. Milbrandt Department of Distributed Systems Institute of Computer Science University of Würzburg Germany
We introduce the notion of link and network admission control (LAC, NAC) and present three fundamentally different budget based NAC methods which categorize most of today's implemented NAC approaches. We propose a... 详细信息
来源: 评论
An analytic model for deriving the node-B transmit power in heterogeneous UMTS networks
An analytic model for deriving the node-B transmit power in ...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: D. Staehle A. Mader Department of Distributed Systems Institute of Computer Science University of Würzburg Wurzburg Germany
UMTS operates with WCDMA over the air interface. Most studies dealing with the capacity of CDMA networks consider the uplink (reverse link) and evaluate the coverage or capacity of a cell or network. This focus on the... 详细信息
来源: 评论
Performance analysis of content matching intrusion detection systems
Performance analysis of content matching intrusion detection...
收藏 引用
Symposium on Applications and the Internet (SAINT)
作者: S. Antonatos K.G. Anagnostakis E.P. Markatos M. Polychronakis Institute of Computer Science Foundation for Research and Technology Hellas Heraklion Greece Distributed Systems Laboratory CIS Department University of Pennsylvania Philadelphia PA USA
Although network intrusion detection systems (nIDS) are widely used, there is limited understanding of how these systems perform in different settings and how they should be evaluated. This paper examines how nIDS per... 详细信息
来源: 评论
Generic Environment for Full Automation of Benchmarking  1
Generic Environment for Full Automation of Benchmarking
收藏 引用
Testing of Component-Based systems and Software Quality, 1st International Workshop on Software Quality, SOQUA 2004 and Workshop Testing Component-Based systems, TECOS 2004
作者: Kalibera, Tomáš Bulej, Lubomír Tůma, Petr Distributed Systems Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Malostranské nám. 25 Prague118 00 Czech Republic Institute of Computer Science Czech Academy of Sciences Pod Vodárenskou věží 2 Prague182 07 Czech Republic
Regression testing is an important part of software quality assurance. We work to extend regression testing to include regression benchmarking, which applies benchmarking to detect regressions in performance. Given th... 详细信息
来源: 评论
A model-driven approach to designing cross-enterprise business processes
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3292卷 544-555页
作者: Bauer, Bernhard Müller, Jörg P. Roser, Stephan Programming of Distributed Systems Institute of Computer Science University of Augsburg D-86135 Augsburg Germany Siemens AG Corporate Technology Intelligent Autonomous Systems Otto-Hahn-Ring 6 D-81739 München Germany
Modeling and managing business processes that span multiple organizations involves new challenges, mainly regarding the ability to cope with change, decentralization, and the required support for interoperability. In ... 详细信息
来源: 评论