咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 50 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 109 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 63 篇 工学
    • 50 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 15 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 6 篇 电气工程
    • 6 篇 环境科学与工程(可...
    • 5 篇 动力工程及工程热...
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 网络空间安全
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
  • 22 篇 理学
    • 15 篇 数学
    • 6 篇 统计学(可授理学、...
    • 4 篇 化学
    • 4 篇 系统科学
    • 3 篇 物理学
    • 1 篇 大气科学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 18 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 11 篇 distributed comp...
  • 9 篇 laboratories
  • 7 篇 concurrent compu...
  • 6 篇 computational mo...
  • 6 篇 machine learning
  • 5 篇 computer science
  • 5 篇 intrusion detect...
  • 5 篇 computer network...
  • 4 篇 fault tolerance
  • 4 篇 feature extracti...
  • 4 篇 wireless network...
  • 4 篇 distributed data...
  • 3 篇 computer simulat...
  • 3 篇 scalability
  • 3 篇 traffic control
  • 3 篇 quality of servi...
  • 3 篇 performance anal...
  • 3 篇 concurrency cont...
  • 3 篇 artificial intel...
  • 3 篇 parallel intelli...

机构

  • 9 篇 ieee
  • 6 篇 guangxi intellig...
  • 5 篇 intelligent dist...
  • 5 篇 state key labora...
  • 4 篇 qingdao academy ...
  • 4 篇 department of el...
  • 4 篇 school of comput...
  • 4 篇 research center ...
  • 4 篇 research center ...
  • 4 篇 national water a...
  • 3 篇 center for appli...
  • 3 篇 machine intellig...
  • 3 篇 department of co...
  • 3 篇 laboratory schoo...
  • 3 篇 school of electr...
  • 3 篇 school of comput...
  • 3 篇 raygun performan...
  • 3 篇 faculty of compu...
  • 3 篇 department of co...
  • 3 篇 the state key la...

作者

  • 13 篇 fei-yue wang
  • 9 篇 a. boukerche
  • 7 篇 ismail leila
  • 7 篇 materwala huned
  • 5 篇 leila ismail
  • 4 篇 ningjiang chen
  • 4 篇 dustdar schahram
  • 4 篇 jun jason zhang
  • 3 篇 chen shu-ching
  • 3 篇 mansouri houssem
  • 3 篇 chen ningjiang
  • 3 篇 parlikad ajith k...
  • 3 篇 arora priyansh
  • 3 篇 rajkumar buyya
  • 3 篇 badache nadjib
  • 3 篇 lutfiyya hanan
  • 3 篇 rana omer
  • 3 篇 aliouat makhlouf
  • 3 篇 mei-ling shyu
  • 3 篇 wu huaming

语言

  • 106 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Parallel and Distributed Systems Laboratory Research Computer Center"
109 条 记 录,以下是71-80 订阅
A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classifier
A distributed agent-based approach to intrusion detection us...
收藏 引用
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
作者: Zongxing Xie Thiago Quirino Mei-Ling Shyu Shu-Ching Chen LuWu Chang Department of Electrical and Computer Engineering University of Miami Coral Gables FL USA Distributed Multimedia Information System Laboratory Florida International University Miami FL USA Center for High Assurance Computer Systems Naval Research Laboratory Inc. Washington D.C. DC USA
In this paper, a novel agent-based distributed intrusion detection system (IDS) is proposed, which integrates the desirable features provided by the distributed agent-based design methodology with the high accuracy an... 详细信息
来源: 评论
A Fault Classification Prediction Model Based on Loose-Type Wavelet Neural Network for Server Health Management
A Fault Classification Prediction Model Based on Loose-Type ...
收藏 引用
Cloud Computing, Big Data Applications and Software Engineering (CBASE), International Conference on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Xiaoqi Lu Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China School of Computer Electronics and Information Guangxi University Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Nanning China
To prevent the serious impact on production efficiency caused by service interruption, data loss, and other issues resulting from server faults, this paper proposes a server fault prediction model named Wavelet Packet...
来源: 评论
A Deep Belief Networks Intrusion Detection Method Based on Generative Adversarial Networks
A Deep Belief Networks Intrusion Detection Method Based on G...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Zezhang Zheng Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing School of Computer Electronics and Information Guangxi University (Guangxi University) Nanning China
In response to the substantial threat that Internet attacks pose to data center network security, researchers have proposed several deep learning-based methods for detecting network intrusions. However, while algorith... 详细信息
来源: 评论
Collateral Representative Subspace Projection Modeling for Supervised Classification
Collateral Representative Subspace Projection Modeling for S...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Thiago Quirino Zongxing Xie Mei-ling Shyu Shu-ching Chen Liwu Chang Department of Electrical and Computer Engineering University of Miami Coral Gables FL USA Distributed Multimedia Information System Laboratory School of Computing and Information Sciences Florida International University Miami FL USA Naval Research Laboratory Center for High Assurance Computer Systems Washington D.C. USA
In this paper, a novel supervised classification approach called collateral representative subspace projection modeling (C-RSPM) is presented. C-RSPM facilitates schemes for collateral class modeling, class-ambiguity ... 详细信息
来源: 评论
+Spaces: Intelligent Virtual Spaces for eGovernment
+Spaces: Intelligent Virtual Spaces for eGovernment
收藏 引用
International Conference on Intelligent Environments (IE)
作者: Konstantinos Tserpes Michal Jacovi Michael Gardner Anna Triantafillou Benjamin Cohen Distributed Knowledge and Media Systems Lab National and Technical University of Athens Athens Greece School of Computer Science and Electronic Engineering University of Essex Colchester UK IBM Research Laboratory Haifa Israel Athens Technology Center Athens Greece
Intelligent Environments most commonly take a physical form such as homes, offices, hotels, restaurants, shops, that are equipped with advanced networked computer based systems, which enable better or new lifestyles f... 详细信息
来源: 评论
PerMTL: A Multi-Task Learning Framework for Skilled Human Performance Assessment
PerMTL: A Multi-Task Learning Framework for Skilled Human Pe...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Indrajeet Ghosh Avijoy Chakma Sreenivasan Ramasamy Ramamurthy Nirmalya Roy Nicholas Waytowich Department of Information Systems University of Maryland Baltimore County Center for Real-Time Distributed Sensing and Autonomy (CARDS) University of Maryland Baltimore County Department of Computer Science Bowie State University DEVCOM Army Research Laboratory United States
Intelligent and complex human motion analysis can help design the next generation IoT and AR/VR systems for automated human performance assessment. Such an automated system can help advocate the interpretability and t... 详细信息
来源: 评论
UNPCC: A Novel Unsupervised Classification Scheme for Network Intrusion Detection
UNPCC: A Novel Unsupervised Classification Scheme for Networ...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Zongxing Xie Thiago Quirino Mei-ling Shyu Shu-ching Chen Liwu Chang Department of Electrical and Computer Engineering University of Miami Coral Gables FL USA Distributed Multimedia Information System Laboratory School of Computing and Information Sciences Florida International University Miami FL USA Center for High Assurance Computer Systems Naval Research Laboratory Washington D.C. DC USA
The development of effective classification techniques, particularly unsupervised classification, is important for real-world applications since information about the training data before classification is relatively ... 详细信息
来源: 评论
Adaptive Fault Tolerant Checkpointing Algorithm for Cluster Based Mobile Ad Hoc Networks
收藏 引用
Procedia computer Science 2015年 73卷 40-47页
作者: Houssem Mansouri Nadjib Badache Makhlouf Aliouat Al-Sakib Khan Pathan Department of Computer Science Faculty of Exact Sciences University of Bejaia 06000 Bejaia Algeria Research Center on Scientific and Technical Information CERIST Ben-Aknoun Algiers 16000 Algeria Laboratory of Networks and Distributed Systems Computer Science Department University of Ferhat Abbas Sétif1 Setif 19000 Algeria Department of Computer Science International Islamic University Malaysia Kuala Lumpur 53100 Malaysia
Mobile Ad hoc NETwork (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastruct... 详细信息
来源: 评论
Performance and energy-aware bi-objective tasks scheduling for cloud data centers
收藏 引用
Procedia computer Science 2022年 197卷 238-246页
作者: Huned Materwala Leila Ismail Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi 15551 United Arab Emirates National Water and Energy Center United Arab Emirates University Al Ain Abu Dhabi United Arab Emirates
Cloud computing enables remote execution of users’ tasks. The pervasive adoption of cloud computing in smart cities’ services and applications requires timely execution of tasks adhering to Quality of Services (QoS)... 详细信息
来源: 评论
Correntropy Supervised Non-negative Matrix Factorization
Correntropy Supervised Non-negative Matrix Factorization
收藏 引用
International Joint Conference on Neural Networks
作者: Wenju Zhang Naiyang Guan Dacheng Tao Bin Mao Xuhui Huang Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan China 410073 Center for Quantum Computation and Intelligent Systems FEIT University of Technology Sydney Sydney NSW 2007 Australia College of Science National University of Defense Technology Changsha Hunan China 410073 Department of Computer Science and Technology College of Computer National University of Defense Technology Changsha Hunan China 410073
Non-negative matrix factorization (NMF) is a powerful dimension reduction method and has been widely used in many pattern recognition and computer vision problems. However, conventional NMF methods are neither robust ... 详细信息
来源: 评论