×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [7]
内容类型
期刊论文 [5]
会议论文 [2]
发表日期
2019 [1]
2018 [1]
2013 [2]
2011 [2]
2008 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Modelling user pictures with hierarchical Dirichlet process of P2P lending market
期刊论文
International Journal of Computing Science and Mathematics, 2019, 卷号: 10, 期号: 3, 页码: 297-312
作者:
Li, Danyang
;
Liang, Yongquan
;
Liu, An
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
HDP
Hierarchical dirichlet process
P2P lending
Peer-to-peer
Prediction
User pictures
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
期刊论文
Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 2018, 页码: 283-288
作者:
Wang, Pengfei
;
Wang, Fengyu
;
Lin, Fengbo
;
Cao, Zhenzhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
botnet detection
P2P botnet
periodicity behavior
Spark
An actor network-based approach to pirates community discovery in peer-to-peer network
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 8178 LNAI, 页码: 204-213
作者:
Hou, Xiancheng
;
Shi, Bing
;
Niu, Wenjia
;
Feng, Qi
;
Qi, Ying
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/23
Actor network
Content similarity
GN algorithm
P2P network
Pirates community discovery
Dynamic user behavior-based piracy propagation monitoring in wireless peer-to-peer networks
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 8178 LNAI, 页码: 44-55
作者:
Qu, Benke
;
Niu, Wenjia
;
Zhu, Tianqing
;
Wu, Lei
;
Liu, Shijun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/23
Content similarity
Dynamic user behavior
Piracy propagation monitoring
Wireless P2P networks
On the security of peer-to-peer computing based on SPKI/SDSI
会议论文
2011 International Conference on Internet Technology and Applications, iTAP 2011, August 16, 2011 - August 18, 2011
作者:
Wang, Min
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
An Adaptive Distribution Model for Multi-dimensional Data in Decentralized Environments
会议论文
International Conference on Web Information Systems and Mining (WISM 2011), SEP 24-25, 2011
作者:
He, Wei
;
Cui, Lizhen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
Decentralized Environments
Cloud Computing
Peer-to-peer
Multi-dimensional Data
Data Distribution
Data Search
A true decentralized framework for smart-flow applications in pervasive computing environments
期刊论文
2008 3rd International Conference on Pervasive Computing and Applications, ICPCA08, 2008, 卷号: 2, 页码: 927-932
作者:
Wei, He
;
Haiyang, Wang
;
Lizhen, Cui
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
Decentralized workflow
Peer to peer
Pervasive computing
Web service
©版权所有 ©2017 CSpace - Powered by
CSpace