咨询与建议

限定检索结果

文献类型

  • 385 篇 会议
  • 7 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 396 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 265 篇 工学
    • 238 篇 计算机科学与技术...
    • 148 篇 软件工程
    • 67 篇 信息与通信工程
    • 65 篇 电气工程
    • 46 篇 控制科学与工程
    • 15 篇 生物工程
    • 14 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 仪器科学与技术
    • 11 篇 机械工程
    • 10 篇 交通运输工程
    • 10 篇 环境科学与工程(可...
    • 9 篇 电子科学与技术(可...
    • 8 篇 建筑学
    • 7 篇 材料科学与工程(可...
    • 7 篇 生物医学工程(可授...
    • 7 篇 网络空间安全
  • 69 篇 理学
    • 33 篇 数学
    • 17 篇 生物学
    • 13 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 8 篇 大气科学
  • 53 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 19 篇 法学
    • 12 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
  • 8 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 6 篇 经济学
  • 2 篇 教育学

主题

  • 67 篇 internet of thin...
  • 42 篇 cloud computing
  • 24 篇 internet
  • 13 篇 computer archite...
  • 12 篇 distributed comp...
  • 12 篇 edge computing
  • 10 篇 computer science
  • 10 篇 security
  • 10 篇 web and internet...
  • 9 篇 resource managem...
  • 9 篇 real-time system...
  • 9 篇 protocols
  • 9 篇 fog computing
  • 9 篇 distributed data...
  • 8 篇 application soft...
  • 8 篇 costs
  • 8 篇 mobile computing
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 software enginee...

机构

  • 5 篇 college of techn...
  • 5 篇 sr university de...
  • 4 篇 chitkara univers...
  • 4 篇 school of comput...
  • 3 篇 nitte meenakshi ...
  • 3 篇 uttaranchal inst...
  • 3 篇 dept. of cs geor...
  • 3 篇 school of electr...
  • 3 篇 department of co...
  • 2 篇 department of op...
  • 2 篇 department of cs...
  • 2 篇 state grid econo...
  • 2 篇 school of geomat...
  • 2 篇 department of cs...
  • 2 篇 peking univ shen...
  • 2 篇 panimalar engine...
  • 2 篇 college of compu...
  • 2 篇 kiet school of m...
  • 2 篇 international un...
  • 2 篇 graduate school ...

作者

  • 3 篇 pareek piyush ku...
  • 3 篇 yi pan
  • 2 篇 jianhua sun
  • 2 篇 ding runwei
  • 2 篇 shu-ching wang
  • 2 篇 h. le
  • 2 篇 rahul jagtap
  • 2 篇 sonia
  • 2 篇 sudhakar k.
  • 2 篇 himanshu
  • 2 篇 runwei ding
  • 2 篇 a. simmonds
  • 2 篇 chauhan rahul
  • 2 篇 gyankamal chhaje...
  • 2 篇 wang shun-sheng
  • 2 篇 kwei-jay lin
  • 2 篇 dineshkumar r.
  • 2 篇 wang meng
  • 2 篇 yan kuo-qin
  • 2 篇 liu fang

语言

  • 382 篇 英文
  • 14 篇 其他
  • 3 篇 中文
检索条件"任意字段=3rd International Conference on Distributed Computing and Internet Technology, ICDCIT 2006"
396 条 记 录,以下是311-320 订阅
排序:
distributed multi-lingual content based text mining DML - CBTM
Distributed multi-lingual content based text mining DML - CB...
收藏 引用
3rd IASTED international conference on Advances in Computer Science and technology, ACST 2007
作者: Chitrakala, S. Manjula, D. Department of Computer Science and Engineering Easwari Engineering College Ramapuram Anna University Chennai Tamil Nadu India Department of Computer Science and Engineering College of Engineering Guindy Anna University Chennai Tamil Nadu India
With the explosion in information over the internet, extracting knowledge from media-based data in the form of images, audio streams and videos replacing textual ones is getting more complex. So a comprehensive method... 详细信息
来源: 评论
XSS application worms: New internet infestation and optimized protective measures
XSS application worms: New Internet infestation and optimize...
收藏 引用
8th ACIS international conference on Software Engineering, Artificial Intelligence, Networking and Parallel/distributed computing/3rd ACIS international Workshop on Self-Assembling Wireless Networks
作者: Shanmugam, Jayarnsakthi Ponnavaikko, M. SRM Univ Madras Tamil Nadu India
There has been considerable increase in Application layer attacks in the recent years. Research surveys show that the cross site scripting (XSS) attack is most common among all the application layer attacks. Ajax web ... 详细信息
来源: 评论
Net-centric computing: The future of computers and networking  3rd
收藏 引用
3rd international conference on distributed computing and internet technology
作者: Somani, Arun K. Kher, Shubhalaxmi Iowa State Univ Dependable Comp & Networking Lab Ames IA 50011 USA
Futuristic computers will only be thought of in the context of their ubiquitous connectivity. Net-centric computing isn't communications or networking per se, although it certainly includes both. With the changes ... 详细信息
来源: 评论
Multicontext-aware recommendation for ubiquitous commerce  3rd
收藏 引用
3rd international conference on distributed computing and internet technology
作者: Kwon, Joonhee Kim, Sungrim Kyonggi Univ Dept Comp Sci San 94-6 Suwon South Korea Seoil Coll Dept Internet Informat Seoul South Korea
Recommender systems address a variety of ubiquitous commerce needs. In ubiquitous commerce, contextual information must be incorporated into the recommendation process. The total amount of information is larger due to... 详细信息
来源: 评论
Modified Raymond's Algorithm for priority (MRA-P) based mutual exclusion in distributed systems  3rd
收藏 引用
3rd international conference on distributed computing and internet technology
作者: Kanrar, S. Chaki, N. Narasingha Dutta Coll Dept Comp Sci Howrah India Univ Calcutta Dept Comp Sci Kolkata W Bengal India
The traditional approaches towards implementing mutual exclusion can not be applied for distributed systems where nodes are loosely coupled. The existing algorithms typically follow either a symmetric or a token based... 详细信息
来源: 评论
Lossless data hiding for high embedding capacity  3rd
收藏 引用
3rd international conference on distributed computing and internet technology
作者: Lee, Hyeran Rhee, Kyunghyune Pukyong Natl Univ Dept Comp Sci 599-1 Daeyeon 3Dong Pusan 608737 South Korea Pukyong Natl Univ Comp & Telecommun Engn Div Elect Busan South Korea
Embedding distortions create problems in some areas such as medical, astronomical, and military imagery. Lossless data hiding is an exact restoration approach for recovering the original image from the stego image. In... 详细信息
来源: 评论
Ticket-based binding update protocol for Mobile IPv6  3rd
收藏 引用
3rd international conference on distributed computing and internet technology
作者: Kim, Sangjin Koo, Jungdoo Oh, Heekuck Korea University of Technology and Education School of Internet Media Engineering South Korea Hanyang University Department of Computer Science and Engineering South Korea
In this paper, we propose a new ticket based binding update protocol for Mobile IPv6. This protocol uses CGA (Cryptographically Generated Address) to provide mutual authentication between a mobile node and its corresp... 详细信息
来源: 评论
Implementing diverse messaging models with self-managing properties using IFLOW
Implementing diverse messaging models with self-managing pro...
收藏 引用
3rd international conference on Autonomic computing, ICAC 2006
作者: Kumar, Vibhore Cai, Zhongtang Cooper, Brian F. Eisenhauer, Greg Schwan, Rarsten Mansour, Mohamed Seshasayee, Balasubramanian Widener, Patrick College of Computing Georgia Institute of Technology
Implementing se if-management is hard, especially when building large scale distributed systems. Publish/subscribe middlewares, scientific visualization and collaboration tools, and corporate operational information s... 详细信息
来源: 评论
Improving the deployability of existing Windows-based client/server business information systems using ActiveX  3rd
收藏 引用
3rd international conference on distributed computing and internet technology
作者: Chyou, Jonathan Jiin-Tian Cheng, Bill Yu-Fan Natl Chengchi Univ Dept Management Informat Syst 64Sec 2Zhinan Rd Taipei 11605 Taiwan
Today, increasingly large and complex business information systems (BISs) are being built as client/server (C/S) applications. Unfortunately, for the most common C/S BISs, that is, the Windows-based C/S BISs (WinBISs)... 详细信息
来源: 评论
Performance estimation of overlaid lightpath networks for Lambda users
Performance estimation of overlaid lightpath networks for La...
收藏 引用
3rd international conference on Broadband Communications Networks and Systems
作者: Harai, Hiroaki Tachibana, Takuji Natl Inst Informat & Commun Technol 4-2-1 Nukuikitamachi Koganei Tokyo 1848795 Japan Nara Inst Sci & Technol Nara Japan
In future, lightpaths will be dynamically provided to users by the use of GMPLS but lightpath networks may be overlaid to the users. When the users want to find idle wavelengths by probing for lightpath provisioning, ... 详细信息
来源: 评论