咨询与建议

限定检索结果

文献类型

  • 1,927 篇 会议
  • 142 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,078 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 1,184 篇 计算机科学与技术...
    • 861 篇 软件工程
    • 225 篇 信息与通信工程
    • 169 篇 控制科学与工程
    • 128 篇 电气工程
    • 77 篇 电子科学与技术(可...
    • 73 篇 生物医学工程(可授...
    • 72 篇 生物工程
    • 40 篇 建筑学
    • 36 篇 动力工程及工程热...
    • 35 篇 机械工程
    • 34 篇 光学工程
    • 29 篇 仪器科学与技术
    • 29 篇 化学工程与技术
    • 27 篇 力学(可授工学、理...
    • 27 篇 土木工程
  • 498 篇 理学
    • 377 篇 数学
    • 100 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 75 篇 生物学
    • 26 篇 化学
    • 23 篇 系统科学
  • 276 篇 管理学
    • 168 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 88 篇 工商管理
  • 66 篇 教育学
    • 64 篇 教育学
  • 63 篇 医学
    • 61 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
  • 28 篇 法学
    • 23 篇 社会学
  • 18 篇 经济学
  • 9 篇 农学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 91 篇 mobile computing
  • 73 篇 distributed comp...
  • 70 篇 computer science
  • 52 篇 grid computing
  • 47 篇 application soft...
  • 40 篇 concurrent compu...
  • 39 篇 computational mo...
  • 36 篇 computer network...
  • 34 篇 computer archite...
  • 32 篇 cloud computing
  • 29 篇 virtual reality
  • 29 篇 ubiquitous compu...
  • 27 篇 internet
  • 26 篇 costs
  • 25 篇 laboratories
  • 23 篇 peer to peer com...
  • 23 篇 middleware
  • 20 篇 parallel process...
  • 20 篇 hardware
  • 20 篇 delay

机构

  • 20 篇 the hong kong po...
  • 18 篇 hong kong polyte...
  • 18 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 12 篇 institute of com...
  • 12 篇 department of co...
  • 10 篇 nit calicut
  • 10 篇 depauw universit...
  • 10 篇 national institu...
  • 9 篇 school of comput...
  • 8 篇 college of compu...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 university of lo...
  • 6 篇 pablo de olavide...
  • 6 篇 department of co...
  • 6 篇 college of compu...
  • 6 篇 department of co...
  • 6 篇 school of comput...

作者

  • 25 篇 hong va leong
  • 18 篇 leong hong va
  • 15 篇 alvin chan
  • 12 篇 hong jiman
  • 11 篇 hung chih-cheng
  • 11 篇 chan alvin t.s.
  • 10 篇 liu ling
  • 10 篇 gloria childress...
  • 10 篇 george roussos
  • 8 篇 umesh bellur
  • 8 篇 song enmin
  • 7 篇 rajiv ramnath
  • 7 篇 pu calton
  • 7 篇 si antonio
  • 7 篇 ahamed sheikh iq...
  • 7 篇 chandran priya
  • 6 篇 federico divina
  • 6 篇 sheikh iqbal aha...
  • 6 篇 madhu kumar s.d.
  • 6 篇 raúl giráldez ro...

语言

  • 2,067 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 2 篇 葡萄牙文
检索条件"任意字段=Applied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing"
2078 条 记 录,以下是111-120 订阅
排序:
Controlling data movement in global computing applications  04
Controlling data movement in global computing applications
收藏 引用
applied computing 2004 - proceedings of the 2004 acm symposium on applied computing
作者: Gorla, Daniele Pugliese, Rosario Dipartimento di Informatica Univ. di Roma La Sapienza Italy Dipartimento di Sistemi Università di Firenze Italy
We present a programming notation aiming at protecting the secrecy of both host and agent data in global computing applications. The approach exploits annotations with sets of node addresses, called regions. A datum c... 详细信息
来源: 评论
Towards Semantic tuplespace computing: The Semantic web spaces system
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
proceedings of the acm symposium on applied computing 2007年 360-365页
作者: Nixon, Lyndon Antonechko, Olena Simperl, Elena Paslaru Bontas Tolksdorf, Robert Freie Universität Berlin Institut für Informatik Takustr. 9 14195 Berlin Germany
In this paper we introduce Semantic Web Spaces, a middleware for coordinating knowledge processes on the Semantic Web. Co-ordination is an important aspect of any type of interaction between computer agents, but we fi... 详细信息
来源: 评论
Agent oriented logic programming in jinni 2004  05
Agent oriented logic programming in jinni 2004
收藏 引用
20th Annual acm symposium on applied computing
作者: Tarau, Paul Department of Computer Science and Engineering University of North Texas P.O. Box 311366 Denton TX 76203
Jinni 2004 [1, 2, 3] (available from http ://***/Jinni) expresses various agent programming constructs in terms of an Object Oriented Logic Programming layer implemented on top of a Java-based Prolog compiler. The arc... 详细信息
来源: 评论
Cookies on-the-move: Managing cookies on a smart card
Cookies on-the-move: Managing cookies on a smart card
收藏 引用
applied computing 2004 - proceedings of the 2004 acm symposium on applied computing
作者: Chan, Alvin T.S. Department of Computing Hong Kong Polytechnic University Hung Hom Kowloon SAR Hong Kong
Despite the widespread use and adoption of cookies as the basis for web applications to keep state information, cookies present some design issues that are yet to be fully addressed. The fact that cookies are stored o... 详细信息
来源: 评论
Analytical modelling of priority commit protocol for reliable Web applications  04
Analytical modelling of priority commit protocol for reliabl...
收藏 引用
applied computing 2004 - proceedings of the 2004 acm symposium on applied computing
作者: Awan, I. Younas, M. Department of Computing University of Bradford Bradford United Kingdom School of MIS Coventry University Coventry United Kingdom
Web applications are vulnerable to failures and low performance due to the large population of users and the widespread distribution of Internet. Transaction technology provides Web applications with high reliability ... 详细信息
来源: 评论
Computational analysis of microwave heating patterns in resonant multimode cavities  04
Computational analysis of microwave heating patterns in reso...
收藏 引用
applied computing 2004 - proceedings of the 2004 acm symposium on applied computing
作者: Dincov, Dusko D. Parrott, Kevin A. University of Westminster Harrow School of Computer Science Watford Road Northwick Park Harrow HT1 3TP United Kingdom University of Greenwich School of Computing and Mathematics 30 Park Row London SE10 9LS United Kingdom
Computational results for the microwave heating patterns in singlefed multimode empty and loaded cavities are presented in this paper. Combined Finite Difference Time Domain (FDTD) and Finite Volume (FV) methods are u... 详细信息
来源: 评论
A new signature scheme: Joint-signature
A new signature scheme: Joint-signature
收藏 引用
applied computing 2004 - proceedings of the 2004 acm symposium on applied computing
作者: He, Li-Sha Zhang, Ning Department of Computer Science University of Manchester Manchester United Kingdom
A number of asymmetrical payment methods have been developed to enable mobile users to buy goods online by charging them to their mobile phone bills by their network operators. It has been recognized that these method... 详细信息
来源: 评论
FAT-miner: Mining frequent attribute trees
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
proceedings of the acm symposium on applied computing 2007年 417-422页
作者: De Knijf, Jeroen Utrecht University Institute of Information and Computing Sciences PO Box 80.089 3508 TB Utrecht Netherlands
Data that can conceptually be viewed as tree structures abounds in domains such as bio-informatics, web logs, XML databases and multi-relational databases. Besides structural information such as nodes and edges, tree ... 详细信息
来源: 评论
Towards secure resource sharing for impromptu collaboration in pervasive computing
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
proceedings of the acm symposium on applied computing 2007年 940-946页
作者: Claycomb, William Shin, Dongwan New Mexico Tech. 801 Leroy Place Socorro NM United States
Access control in mobile and pervasive computing is a complex issue, with many aspects relating to the establishment, management, and enforcement of methods and policies that allow mobile devices to share resources wi... 详细信息
来源: 评论
Towards security monitoring patterns
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
proceedings of the acm symposium on applied computing 2007年 1518-1525页
作者: Spanoudakis, George Kloukinas, Christos Androutsopoulos, Kelly Department of Computing City University Northampton Square London EC1V 0HB United Kingdom
Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that... 详细信息
来源: 评论