咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 15 篇 期刊文献

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 28 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 15 篇 信息与通信工程
    • 4 篇 光学工程
    • 4 篇 控制科学与工程
    • 3 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 水利工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 10 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 大气科学
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 6 篇 bandwidth
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 6 篇 computer network...
  • 5 篇 computer archite...
  • 5 篇 laboratories
  • 5 篇 humans
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 3 篇 public key crypt...
  • 3 篇 information anal...
  • 3 篇 proposals
  • 3 篇 application soft...
  • 3 篇 wdm networks
  • 3 篇 network topology
  • 3 篇 resource managem...
  • 3 篇 computer securit...
  • 3 篇 information secu...
  • 3 篇 multiprotocol la...
  • 3 篇 hardware

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 nanjing universi...
  • 4 篇 ericsson researc...
  • 4 篇 state key labora...
  • 4 篇 school of scienc...
  • 3 篇 laboratory of co...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing laborato...
  • 3 篇 beijing key labo...
  • 3 篇 key laboratory o...
  • 2 篇 beijing universi...
  • 2 篇 beijing universi...
  • 2 篇 key laboratory o...
  • 2 篇 beijing key labo...
  • 2 篇 university of sã...
  • 2 篇 institute of com...
  • 2 篇 department of ma...
  • 2 篇 laboratory of co...
  • 2 篇 the beijing key ...

作者

  • 9 篇 yang yang
  • 6 篇 huang haiping
  • 5 篇 zhu jie
  • 5 篇 nelson mimura go...
  • 4 篇 chen chen
  • 4 篇 wang yan
  • 4 篇 guo caili
  • 4 篇 tereza cristina ...
  • 4 篇 chen mingzhe
  • 4 篇 wilson vicente r...
  • 3 篇 davide careglio
  • 3 篇 ruggiero wilson ...
  • 3 篇 zhu zhiyu
  • 3 篇 caili guo
  • 3 篇 regina melo silv...
  • 3 篇 rosangela de fat...
  • 3 篇 ines brosso
  • 3 篇 walter akio goya
  • 3 篇 josep solé-paret...
  • 3 篇 hu yu-pu

语言

  • 70 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Laboratory of Computer Networks and Architecture"
73 条 记 录,以下是21-30 订阅
排序:
PCE algorithm for traffic grooming and QoS in multi-layer/multi-domain IP over WDM networks
PCE algorithm for traffic grooming and QoS in multi-layer/mu...
收藏 引用
2011 13th International Conference on Transparent Optical networks, ICTON 2011
作者: Sócrates Dantas, Joana Careglio, Davide Melo Silveira, Regina Ruggiero, Wilson Vicente Solé-Pareta, Josep University of Sã o Paulo LARC Computer Networks and Architecture Laboratory Brazil c/Jordi Girona 1-3 08034 Barcelona Spain
Differentiated services provision according to clients or applications is an added feature that network operators ambition to fully provide. One of the possible approaches is to map DiffServ into MPLS based network. H... 详细信息
来源: 评论
PCE QoS tools and related scalability in WDM networks
PCE QoS tools and related scalability in WDM networks
收藏 引用
14th International Conference on Transparent Optical networks, ICTON 2012
作者: Dantas, Joana Socrates Careglio, Davide Silveira, Regina Melo Ruggiero, Wilson Vicente Sole-Pareta, Josep University of São Paulo LARC - Computer Networks and Architecture Laboratory Brazil c/ Jordi Girona 1-3 08034 Barcelona Catalonia Spain
The virtual circuit characteristic of MPLS and GMPLS architectures has enabled the implement of Traffic Engineering (TE) and Differentiated Services (Diff-Serv) profile to networks. Both schemes are possible by the ap... 详细信息
来源: 评论
Methodology for IT Governance assessment and design
Methodology for IT Governance assessment and design
收藏 引用
6th IFIP International Conference on e-Commerce, e-Business, and e-Government, I3E 2006
作者: Clementi, Sérgio Carvalho, Tereza Cristina M. B. Fundação Santo André Brazil Laboratory of Computer Architecture and Networks - Escola Politécnica University of São Paulo Brazil
IT Governance has become an increasingly important process in delivering business value from IT, A number of IT governance frameworks have been proposed as the MIT - CISR framework and COBIT. However, there is no prop... 详细信息
来源: 评论
Implementation of data survival in unattended wireless sensor networks using cryptography
Implementation of data survival in unattended wireless senso...
收藏 引用
35th Annual IEEE Conference on Local computer networks, LCN 2010
作者: Mateus, A. S. Santos Margi, Cíntia Borges Simplício Jr., Marcos A. Geovandro, C. C. F. Pereira De Oliveira, Bruno Trevizan Laboratory of Computer Architecture and Networks Departamento de Engenharia Da Computação e Sistemas Digitais Escola Politécnica Da Universidade de São Paulo Brazil
Security in Wireless Sensor networks (WSNs) is highly dependent on the behavior of the base station. This happens because, if the network is left unattended, sensor nodes cannot offload data to the (secure) base stati... 详细信息
来源: 评论
Protection and restoration scheme for light-trail WDM ring networks
Protection and restoration scheme for light-trail WDM ring n...
收藏 引用
International Conference on Optical Network Design and Modeling, ONDM
作者: A. Gumaste Si Qing Zheng Advanced Computer Networks and Architecture Laboratory University of Technology Dallas TX USA
来源: 评论
A FIWARE-Based Component for Data Analysis in Smart Mobility Context  1
A FIWARE-Based Component for Data Analysis in Smart Mobility...
收藏 引用
1st IEEE Summer School on Smart Cities, S3C 2017
作者: De Fatima Pereira Marquesone, Rosangela De Brito Carvalho, Tereza Cristina Melo Guimaraes, Lucas Batista Dias, Eduardo Mario Laboratory of Computer Networks and Architecture LARC Polytechnic School University of São Paulo São Paulo Brazil Department of Energy Engineering and Automation Polytechnic University of São Paulo São Paulo Brazil
Smart mobility is an emerging concept characterized by the use of disruptive technologies, such as cloud computing, Big Data and artificial intelligence. In this paper we propose a FIWARE-based component focus on impr... 详细信息
来源: 评论
Energy-Constrained Task Scheduling in Heterogeneous Distributed Systems  26
Energy-Constrained Task Scheduling in Heterogeneous Distribu...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chen, Chen Zhu, Jie Huang, Haiping Gao, Yingmeng Nanjing University of Posts & Telecommunications Nanjing210003 China Institute of Computing Technology Academy of Sciences State Key Laboratory Chinese of Computer Architecture Beijing100864 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210003 China
The resource-constrained task scheduling problem has been one of the popular research topics in cloud computing systems. By employing the dynamic voltage and frequency scaling (DVFS) techniques, the task scheduling ca... 详细信息
来源: 评论
Vehicular Computation Offloading in UAV-enabled MEC Systems  25
Vehicular Computation Offloading in UAV-enabled MEC Systems
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Junfeng Feng, Dayu Zhu, Jie Huang, Haiping Nanjing University of Posts and Telecommunications Nanjing210003 China Institute of Computing Technology Chinese Academy of Sciences State Key Laboratory Chinese of Computer Architecture Beijing100864 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210003 China
The UAV-enable Mobile Edge Computing (MEC) systems and Vehicular Ad-hoc Network (VANET)-supported applications are very popular topics these days. The paper considers the vehicular task offloading problems for the Sof... 详细信息
来源: 评论
Known User Continuous Authentication System
Known User Continuous Authentication System
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Ines Brosso Fernando Ferreira Graca Bressan Wilson V. Ruggiero College of Computation and Informatics Mackenzie Presbyterian University Sao Paulo Brazil Laboratory of Computer Architecture and Networks Polytechnic School of São Paulo University Brazil Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Polytechnic of São Paulo University Brazil
This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users in software application. The KUCAS system makes use o... 详细信息
来源: 评论
Incident Scene Mobility Analysis
Incident Scene Mobility Analysis
收藏 引用
IEEE Conference on Technologies for Homeland Security
作者: Ying Huang Wenbo He Klara Nahrstedt Whay C. Lee Department of Computer Science University of Illinois Urbana-Champaign USA Motorola Laboratories Networks Research and Architecture Laboratory
In an incident scene ad hoc network, mobility of on-scene first responders induces dynamic topology for their carried communication devices. This dynamics has significant impact on network connectivity, quality of com... 详细信息
来源: 评论