咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 17 篇 期刊文献

馆藏范围

  • 75 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 29 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 16 篇 信息与通信工程
    • 5 篇 光学工程
    • 4 篇 电气工程
    • 4 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 14 篇 理学
    • 10 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 大气科学
    • 1 篇 生物学
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 1 篇 医学

主题

  • 6 篇 bandwidth
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 6 篇 computer network...
  • 5 篇 computer archite...
  • 5 篇 laboratories
  • 5 篇 humans
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 3 篇 public key crypt...
  • 3 篇 information anal...
  • 3 篇 proposals
  • 3 篇 application soft...
  • 3 篇 wdm networks
  • 3 篇 network topology
  • 3 篇 resource managem...
  • 3 篇 computer securit...
  • 3 篇 information secu...
  • 3 篇 multiprotocol la...
  • 3 篇 hardware

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 nanjing universi...
  • 4 篇 ericsson researc...
  • 4 篇 state key labora...
  • 4 篇 beijing laborato...
  • 4 篇 beijing key labo...
  • 4 篇 school of scienc...
  • 3 篇 beijing universi...
  • 3 篇 laboratory of co...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing universi...
  • 3 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 beijing key labo...
  • 2 篇 university of sã...
  • 2 篇 institute of com...
  • 2 篇 department of ma...
  • 2 篇 laboratory of co...
  • 2 篇 the beijing key ...

作者

  • 11 篇 yang yang
  • 6 篇 guo caili
  • 6 篇 chen mingzhe
  • 5 篇 nelson mimura go...
  • 5 篇 huang haiping
  • 4 篇 zhu jie
  • 4 篇 chen chen
  • 4 篇 wang yan
  • 4 篇 tereza cristina ...
  • 4 篇 wilson vicente r...
  • 3 篇 davide careglio
  • 3 篇 ruggiero wilson ...
  • 3 篇 zhu zhiyu
  • 3 篇 caili guo
  • 3 篇 regina melo silv...
  • 3 篇 rosangela de fat...
  • 3 篇 ines brosso
  • 3 篇 walter akio goya
  • 3 篇 josep solé-paret...
  • 3 篇 hu yu-pu

语言

  • 70 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Laboratory of Computer Architecture and Networks"
75 条 记 录,以下是31-40 订阅
排序:
Set of model reduction rules and algorithms for web services composition under orchestration pattern
收藏 引用
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University 2009年 第6期43卷 20-23+47页
作者: Yang, Huaizhou Li, Zengzhi Institute of Computer Architecture and Networks Xi'an Jiaotong University Xi'an 710049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
The performance calculation of Web services composition process in large state space is time-consuming, and is difficult to fulfill the real-time performance analysis. Therefore, a process reduction algorithm is prese... 详细信息
来源: 评论
Distributed Processing from Large Scale Sensor Network Using Hadoop
Distributed Processing from Large Scale Sensor Network Using...
收藏 引用
IEEE International Conference on Services Economics (SE)
作者: Rosangela de Fatima Pereira Marcelo Risse de Andrade Artur Carvalho Zucchi Karen Langona Walter Akio Goya Nelson Mimura Gonzalez Tereza Cristina Melo Brito de Carvalho Jan-Erik Mangs Azimeh Sefidcon Universidade de Sao Paulo Sao Paulo São Paulo BR Laboratory of Computer Networks and Architecture Universidade de Sao Paulo Sao Paulo São Paulo BR Laboratory of Computer Networks and Architecture University of São Paulo Brazil Ericsson Research Sweden
Big data refers to large amounts of data, normally in unstructured forms, such as text, sensor data, audio, video, log files, and more. When collecting from a large number of nodes, sensor networks can produce large d... 详细信息
来源: 评论
Latency-aware Partial Task Offloading in Collaborative Edge Computing  26
Latency-aware Partial Task Offloading in Collaborative Edge ...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Gao, Yingmeng Zhu, Jie Huang, Haiping Chen, Chen Nanjing University of Posts & Telecommunications Nanjing210003 China Academy of Sciences State Key Laboratory Chinese of Computer Architecture Institute of Computing Technology Beijing100864 China Jiangsu High Technology Reasearch Key Laboratory of Wireless Sensor Networks Nanjing210023 China Nanjing University of Aeronautics and Astronautics Nanjing210016 China
When it comes to the fifth generation, collaborative edge computing is preferred for offloading computation-intensive tasks of low-latency applications in Internet of Things. In this paper, we consider the partial tas... 详细信息
来源: 评论
Server of quality system for video on demand over ATM
Server of quality system for video on demand over ATM
收藏 引用
IEEE International Conference on ATM
作者: R.M. Silveira W.V. Ruggiero LARC-Laboratory of Computer Architecture and Networks PCS-Department of Computer and Digital System Engineering EPUSP Polytechnic School University of Sao Paulo Sao Paulo Brazil
Considering video transmission over an ATM network for a video on demand system, we propose a server of quality (SoQ) that has the main function of fitting the video transmission rate to the available network bandwidt... 详细信息
来源: 评论
Exploiting Hadoop Topology in Virtualized Environments
Exploiting Hadoop Topology in Virtualized Environments
收藏 引用
IEEE World Congress on Services (SERVICES)
作者: Rosangela de Fatima Pereira Walter Akio Goya Karen Langona Nelson Mimura Gonzalez Tereza Cristina Melo de Brito Carvalho Jan-Erik Mangs Azimeh Sefidcon Laboratory of Computer Networks and Architecture Escola Politecnica University of sao Paulo sao Paulo Brazil Ericsson Research Sweden Stockholm Sweden
Virtualization is a key technique to make an environment easier to manage in terms of resource allocation. MapReduce is a programming model that provides an abstraction to perform distributed computation for large dat... 详细信息
来源: 评论
Application of machine learning to manufacturing: results from metal etch
Application of machine learning to manufacturing: results fr...
收藏 引用
IEEE/CHMT(CPMT) International Electronics Manufacturing Technology Symposium
作者: A. Chatterjee D. Croley V. Ramamurti Kui-Yu Chang Advanced Computer Architecture Laboratory Motorola Inc. Austin TX USA Laboratory for Artificial Neural Networks University of Texas Austin Austin TX USA
With the increasing availability of huge quantities of manufacturing data, and the pressures of continuous process improvement and scrap reduction, engineers are beginning to use machine learning techniques along with... 详细信息
来源: 评论
PCE QoS tools and related scalability in WDM networks
PCE QoS tools and related scalability in WDM networks
收藏 引用
International Conference on Transparent Optical networks
作者: Joana Sócrates Dantas Davide Careglio Regina Melo Silveira Wilson Vicente Ruggiero Josep Solé-Pareta University of São Paulo LARC - Computer Networks and Architecture Laboratory Brazil Technical University of Catalonia (UPC) Barcelona Catalonia Spain
The virtual circuit characteristic of MPLS and GMPLS architectures has enabled the implement of Traffic Engineering (TE) and Differentiated Services (Diff-Serv) profile to networks. Both schemes are possible by the ap... 详细信息
来源: 评论
A Framework for Authentication and Authorization Credentials in Cloud Computing
A Framework for Authentication and Authorization Credentials...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Nelson Mimura Gonzalez Marco Antônio Torrez Rojas Marcos Vinícius Maciel da Silva Fernando Redígolo Tereza Cristina Melo de Brito Carvalho Charles Christian Miers Mats Näslund Abu Shohel Ahmed Laboratory of Computer Networks and Architecture University of São Paulo Brazil State University of Santa Catarina Joinville Brazil Ericsson Research
Security is a key concern when adopting cloud technology. Cloud solutions include not only issues inherited from related technologies, such as virtualization and distributed computing, but also new concerns associated... 详细信息
来源: 评论
Security Analysis of Projected C*- Scheme
Security Analysis of Projected C*- Scheme
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Feng Yuan Yupu Hu Yan Wang Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China School of Science Xi'an University of Architecture and Technology Xi'an China
This paper investigates the security of the projected C* - cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weak... 详细信息
来源: 评论
On the nonlinearity of some T-functions
收藏 引用
Journal of Information and Computational Science 2011年 第11期8卷 2231-2237页
作者: Wang, Yan Hu, Yupu Li, Shunbo Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Single cycle T-functions are newly proposed components in stream cipher. In order to verify if such function is suitable for cipher design, the cryptographic properties of single cycle T-function are discussed. Nonlin... 详细信息
来源: 评论