咨询与建议

限定检索结果

文献类型

  • 604 篇 会议
  • 114 册 图书

馆藏范围

  • 707 篇 电子文献
  • 12 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 9 篇 计算机科学与技术...
    • 8 篇 电子科学与技术(可...
    • 6 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 风景园林学(可授工...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 1 篇 农林经济管理
    • 1 篇 公共管理
  • 6 篇 经济学
    • 4 篇 应用经济学
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 政治学
    • 2 篇 公安学
    • 1 篇 社会学
    • 1 篇 马克思主义理论
  • 3 篇 农学
    • 2 篇 畜牧学
    • 1 篇 林学
  • 1 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 1 篇 理学
    • 1 篇 生态学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学

主题

  • 95 篇 mobile robots
  • 84 篇 robot sensing sy...
  • 75 篇 humans
  • 61 篇 control systems
  • 60 篇 hardware
  • 56 篇 orbital robotics
  • 51 篇 computer science
  • 45 篇 cameras
  • 44 篇 robot vision sys...
  • 44 篇 robot kinematics
  • 43 篇 robot control
  • 42 篇 robots
  • 42 篇 navigation
  • 42 篇 costs
  • 40 篇 manipulators
  • 39 篇 application soft...
  • 36 篇 motion control
  • 35 篇 intelligent robo...
  • 35 篇 robotics and aut...
  • 34 篇 kinematics

机构

  • 6 篇 the robotics ins...
  • 5 篇 department of me...
  • 4 篇 university colle...
  • 4 篇 robotics institu...
  • 3 篇 manchester visua...
  • 3 篇 institute of ind...
  • 3 篇 department of me...
  • 3 篇 school of engine...
  • 3 篇 department of co...
  • 3 篇 mechanical engin...
  • 3 篇 department of ae...
  • 3 篇 department of co...
  • 3 篇 intelligent auto...
  • 3 篇 jet propulsion l...
  • 3 篇 department of el...
  • 3 篇 department of sy...
  • 3 篇 institute of tel...
  • 3 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 department of el...

作者

  • 6 篇 l. jozwiak
  • 5 篇 m. asada
  • 5 篇 yangsheng xu
  • 4 篇 y. shirai
  • 4 篇 d.m. howard
  • 3 篇 c. laugier
  • 3 篇 m. hebert
  • 3 篇 t. shibata
  • 3 篇 s. payandeh
  • 3 篇 t. fukuda
  • 3 篇 hyung suck cho
  • 3 篇 m. kaneko
  • 3 篇 b. hannaford
  • 3 篇 p.d. lawrence
  • 3 篇 s.k. tso
  • 3 篇 k. kuchcinski
  • 3 篇 andy oram
  • 3 篇 y. kuno
  • 3 篇 d.n. nenchev
  • 3 篇 y. nakamura

语言

  • 683 篇 英文
  • 34 篇 中文
  • 1 篇 其他
检索条件"丛书名=Theory in Practice"
718 条 记 录,以下是111-120 订阅
排序:
Randomness in self-healing key distribution schemes
Randomness in self-healing key distribution schemes
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: C. Blundo Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno Baronissi Salerno Italy
Self-healing key distribution schemes allow group managers to broadcast session keys to dynamic groups of users over unreliable channels. The main property of the scheme is that, if during a certain session some broad... 详细信息
来源: 评论
Organizing committee
Organizing committee
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
Provides a listing of current committee members.
来源: 评论
Authenticated encryption and steganography in unconditional security setting
Authenticated encryption and steganography in unconditional ...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: T. Matsumoto J. Shikata Graduate School of Environment and Information Sciences Yokohama National University Yokohama Japan
We address authenticated encryption, the cryptographic technique that simultaneously provides both confidentiality and authenticity, and steganography that hides the very existence of messages. We focus on the securit... 详细信息
来源: 评论
On extractors, error-correction and hiding all partial information
On extractors, error-correction and hiding all partial infor...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: Y. Dodis Department of Computer Science New York University USA
Randomness extractors (Nisan and Zuckerman, 1996) allow one to obtain nearly perfect randomness from highly imperfect sources randomness, which are only known to contain "scattered" entropy. Not surprisingly... 详细信息
来源: 评论
Temporary assumptions - quantum and classical
Temporary assumptions - quantum and classical
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: J. Muller-Quade E.I.S.S. Fakultt für Informatik Universität Karlsruhe Germany
Long-term security is achieved by protocols which use computational assumptions only during the execution of the protocol and become information theoretically secure afterwards. Coin flipping protocols and zero knowle... 详细信息
来源: 评论
Provably unbreakable hyper-encryption in the limited access model
Provably unbreakable hyper-encryption in the limited access ...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: M.O. Rabin DEAS Harvard University Cambridge MA USA
Encryption is a fundamental building block for computer and communications technologies. Existing encryption methods depend for their security on unproven assumptions. We propose a new model, the limited access model ... 详细信息
来源: 评论
Textual difference visualization of multiple search results utilizing detail in context
Textual difference visualization of multiple search results ...
收藏 引用
theory and practice of Computer Graphics
作者: E. Suvanaphen J.C. Roberts Computing Laboratory University of Kent Kent UK
While searching documents on the Web users often refine their query terms, to generate new result lists and explore different pages, thus they end up with several result sets. Experience suggests that users compare th... 详细信息
来源: 评论
Shell creation, representation and visualisation from an arbitrary f(x,y,z) = 0 polynomial shape description
Shell creation, representation and visualisation from an arb...
收藏 引用
theory and practice of Computer Graphics
作者: M.J. Turner Virtual Environment Centre School of Computing De Montfort University Leicester UK
This paper demonstrates a software and hardware implementation for creating and visualising a three dimensional voxel based model for any arbitrary polynomial function. Preliminary results demonstrate its use from the... 详细信息
来源: 评论
A model for virtual suturing in vascular surgery
A model for virtual suturing in vascular surgery
收藏 引用
theory and practice of Computer Graphics
作者: R. Holbrey A. Bulpitt K. Brodlie M. Walkley J. Scott School of Computing University of Leeds UK Dept. of Vascular Surgery St. James' University Leeds UK
Vascular surgery is a technically demanding surgical speciality, one component of which is the accurate placement of sutures through a diseased vessel wall. Minor errors can result in thrombosis and failure of the pro... 详细信息
来源: 评论
Electronic simulation for virtual reality: virtual prototyping
Electronic simulation for virtual reality: virtual prototypi...
收藏 引用
theory and practice of Computer Graphics
作者: P.F. Lister P.L. Watten M.R. Lewis P.F. Newbury M. White M.C. Bassett B.J.C. Jackson V. Trignano The Centre for VLSI and Computer Graphics Department of Informatics University of Sussex UK
This paper examines a virtual prototyping system for electronic devices which incorporate visualisation using a novel integrated development environment that combines user interaction with photorealistic 2D and 3D mod... 详细信息
来源: 评论