咨询与建议

限定检索结果

文献类型

  • 1,916 篇 会议
  • 84 篇 期刊文献
  • 13 篇 学位论文
  • 9 册 图书

馆藏范围

  • 2,022 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,165 篇 工学
    • 946 篇 计算机科学与技术...
    • 565 篇 软件工程
    • 398 篇 信息与通信工程
    • 240 篇 电气工程
    • 61 篇 控制科学与工程
    • 51 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 33 篇 仪器科学与技术
    • 22 篇 机械工程
    • 22 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 13 篇 网络空间安全
    • 11 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 10 篇 航空宇航科学与技...
  • 255 篇 理学
    • 113 篇 数学
    • 110 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 27 篇 系统科学
    • 22 篇 生物学
    • 12 篇 化学
  • 207 篇 管理学
    • 140 篇 图书情报与档案管...
    • 72 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 143 篇 医学
    • 136 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 33 篇 教育学
    • 32 篇 教育学
  • 28 篇 法学
    • 21 篇 社会学
    • 7 篇 法学
  • 10 篇 文学
    • 9 篇 新闻传播学
  • 5 篇 经济学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 355 篇 multimedia syste...
  • 154 篇 multimedia commu...
  • 154 篇 streaming media
  • 136 篇 content based re...
  • 83 篇 internet
  • 77 篇 bandwidth
  • 73 篇 image retrieval
  • 71 篇 information retr...
  • 70 篇 content manageme...
  • 65 篇 quality of servi...
  • 63 篇 multimedia datab...
  • 63 篇 multimedia
  • 51 篇 computer science
  • 51 篇 indexing
  • 51 篇 delay
  • 50 篇 data mining
  • 50 篇 algorithm design...
  • 49 篇 feature extracti...
  • 46 篇 resource managem...
  • 46 篇 mobile communica...

机构

  • 5 篇 tsinghua univ de...
  • 5 篇 department of el...
  • 4 篇 ibm thomas j. wa...
  • 4 篇 school of comput...
  • 4 篇 beijing universi...
  • 3 篇 institute for in...
  • 3 篇 suv
  • 3 篇 ibm corp thomas ...
  • 3 篇 distributed mult...
  • 3 篇 univ chinese aca...
  • 3 篇 integrated media...
  • 3 篇 packetvideo finl...
  • 3 篇 department of ma...
  • 3 篇 univ milano bico...
  • 3 篇 open univ catalo...
  • 3 篇 school of electr...
  • 3 篇 fit dept informa...
  • 3 篇 computer school ...
  • 3 篇 university of br...
  • 3 篇 tsinghua univ gr...

作者

  • 7 篇 hellwagner herma...
  • 5 篇 li cs
  • 5 篇 smith jr
  • 5 篇 shu-ching chen
  • 5 篇 smith john r.
  • 4 篇 van de walle r
  • 4 篇 sun lifeng
  • 4 篇 de sutter r
  • 4 篇 liu zhu
  • 4 篇 hermann hellwagn...
  • 4 篇 li y
  • 4 篇 lerouge s
  • 4 篇 zeng wj
  • 4 篇 christodoulakis ...
  • 4 篇 r. luling
  • 4 篇 mylonas phivos
  • 4 篇 schedl markus
  • 4 篇 van de walle rik
  • 4 篇 ebrahimi touradj
  • 4 篇 wang zhi

语言

  • 1,995 篇 英文
  • 13 篇 中文
  • 12 篇 其他
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=Conference on Multimedia Content Access - Algorithms and Systems"
2022 条 记 录,以下是681-690 订阅
排序:
A New Security Architecture for BitTorrent
A New Security Architecture for BitTorrent
收藏 引用
Int Joint conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Bader, Firas Radoveneanu, Andra Ragab-Hassen, Hani Univ Kent Sch Comp Canterbury Kent England
With the proliferation of the use of Internet for distributing multimedia and software content, there is an increasing need for efficient and secure data distribution mechanisms that can scale to large numbers of user... 详细信息
来源: 评论
Modern B-tree techniques
Modern B-tree techniques
收藏 引用
IEEE 27th International conference on Data Engineering (ICDE 2011)
作者: Graefe, Goetz Kuno, Harumi Hewlett Packard Labs Palo Alto CA 94304 USA
In summary, the core design of B-trees has remained unchanged in 40 years: balanced trees, pages or other units of I/O as nodes, efficient root-to-leaf search, splitting and merging nodes, etc. On the other hand, an e... 详细信息
来源: 评论
IP storage and stored content management using SIP presence server with XML database
IP storage and stored content management using SIP presence ...
收藏 引用
2011 Australasian Telecommunication Networks And Applications conference, ATNAC 2011
作者: Nomoto, Yoshihiro Kuzukawa, Tomonori Ishibashi, Yutaka NTT Service Integration Laboratories NTT Corporation 9-11 Midori-Cho 3-Chome Musashino-Shi Tokyo 180-8585 Japan Graduate School of Engineering Nagoya Institute of Technology Gokiso-Cho Showa-Ku Nagoya 466-8555 Japan
There are few studies of content delivery systems specializing in consumer generated video (CGV) exchange, and as for the real exchange technique, exchange through the file server in a network has become mainstream. A... 详细信息
来源: 评论
Proceedings - 7th International conference on Signal Image Technology and Internet-Based systems, SITIS 2011
Proceedings - 7th International Conference on Signal Image T...
收藏 引用
7th International conference on Signal Image Technology and Internet-Based systems, SITIS 2011
The proceedings contain 68 papers. The topics discussed include: QoS routing for heterogeneous mobile ad hoc networks based on multiple exponents in the definition of the weighted connectivity index;a secure autonomou...
来源: 评论
Recommendation in the end-to-end encrypted domain  11
Recommendation in the end-to-end encrypted domain
收藏 引用
20th ACM conference on Information and Knowledge Management, CIKM'11
作者: Shieh, Jyh-Ren Lin, Ching-Yung Wu, Ja-Ling Graduate Institute of Networking and Multimedia National Taiwan University Taipei 10617 Taiwan IBM T. J. Waston Research Center New York NY 10532 United States Graduate Institute of Networking and Multimedia Department of CS National Taiwan University Taipei 10617 Taiwan
In recommendation systems, a central host typically requires access to user profiles in order to generate useful recommendations. This access, however, undermines user privacy;the more information is revealed to the h... 详细信息
来源: 评论
Securing IP-multimedia Subsystem (IMS) against anomalous message exploits by using machine learning algorithms
Securing IP-Multimedia Subsystem (IMS) against anomalous mes...
收藏 引用
作者: Rafique, M. Zubair Khan, Zeeshan Shafi Khan, Muhammad Khurram Alghatbar, Khaled King Saud University Riyadh Saudi Arabia
Modern communication infrastructure (IP multimedia Subsystem (IMS) and Voice over IP (VoIP)) are vulnerable to zero day attacks and unknown threats. Anomalous SIP requests can be used to remotely launch malicious acti... 详细信息
来源: 评论
A Concept for Monitoring Self-transforming Code Using Memory Page access Control Management
A Concept for Monitoring Self-transforming Code Using Memory...
收藏 引用
IEEE International Carnahan conference on Security Technology (ICCST)
作者: Maaser, Christian Baier, Harald Ctr Adv Secur Res Darmstadt CASED D-64293 Darmstadt Germany
Current antivirus software still focuses on using signature based algorithms on file content level to detect malware. Unfortunately, there is a simple way to circumvent this detection method: The malware author applie... 详细信息
来源: 评论
Proceedings - 2011 4th IEEE International conference on Utility and Cloud Computing, UCC 2011
Proceedings - 2011 4th IEEE International Conference on Util...
收藏 引用
4th IEEE/ACM International conference on Cloud and Utility Computing, UCC 2011
The proceedings contain 62 papers. The topics discussed include: information dispersion over redundant arrays of optimal cloud storage for desktop users;placement matters: replica placement in peer-assisted storage cl...
来源: 评论
Adapting Indexation to the content, Context and Queries Characteristics in Distributed multimedia systems
Adapting Indexation to the Content, Context and Queries Char...
收藏 引用
International IEEE conference on Signal-Image Technologies and Internet-Based System
作者: Mihaela Brut Dana Codreanu Ana-Maria Manzat Florence Sedes Institut de Recherche en Informatique de Toulouse Université Paul Sabatier Toulouse France
Due to the dramatically increasing amount of multimedia contents in several application domains, effective and flexible solutions for distributed data indexation are essential. In the management of these multimedia co... 详细信息
来源: 评论
Australasian Telecommunication Networks and Applications conference, ATNAC 2011
Australasian Telecommunication Networks and Applications Con...
收藏 引用
2011 Australasian Telecommunication Networks And Applications conference, ATNAC 2011
The proceedings contain 47 papers. The topics discussed include: a green and secure authentication for the 4th generation mobile network;DES-Chan: a framework for distributed channel assignment in wireless sensor netw...
来源: 评论