咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是181-190 订阅
排序:
A dynamic method for handling the inference problem in multilevel secure databases
A dynamic method for handling the inference problem in multi...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: X. Chen R. Wei Department of Computer Science Lakehead University Thunder Bay ONT Canada
The inference problem exits when users can infer sensitive data classified at higher security levels from the knowledge of data at their level by performing inference. Inference problems greatly compromise database se... 详细信息
来源: 评论
A conceptual model for distributed aspect-oriented software architectures
A conceptual model for distributed aspect-oriented software ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: N. Ali I. Ramos J.A. Carsi Department of Information Systems and Computation Valencia University of Technology Valencia Spain
Distribution has become a fundamental requirement for information systems and not an auxiliary. We believe it is important to consider distribution from early stages of the life cycle of software development and deal ... 详细信息
来源: 评论
Security design and evaluation in a VoIP secure infrastracture: a policy based approach
Security design and evaluation in a VoIP secure infrastractu...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: V. Casola M. Rak A. Mazzeo N. Mazzoccca Dipartimento di Ingegneria dellInformazione Seconda Universitá di Napoli Aversa Italy Dipartimento di informatica e Sistemistica Universitá degli Studi di Napoli Federico II Napoli Italy
This paper aims at defining security levels of a voice over IP infrastructure during its design phase. The proposed technique uses security policies to express the security statements that could be adopted, and the po... 详细信息
来源: 评论
Pareto-optimal hardware for substitution boxes
Pareto-optimal hardware for substitution boxes
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: N. Nedjah L. de Macedo Mourelle Department of Electronics Engineering and Telecommunications State University of Rio de Janeiro Brazil Department of Systems Engineering and Computation State University of Rio de Janeiro Brazil
In this paper, we propose a methodology based on genetic programming to automatically generate hardware designs of substitution boxes necessary for many cryptosystems such as DES encryption system. We aim at evolving ... 详细信息
来源: 评论
A survey on data compression in wireless sensor networks
A survey on data compression in wireless sensor networks
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: N. Kimura S. Latifi Electrical and Computer Engineering University of Nevada Las Vegas USA
Wireless sensor networks (WSNs) are resource constraint: limited power supply, bandwidth for communication, processing speed, and memory space. One possible way of achieve maximum utilization of those resource is appl... 详细信息
来源: 评论
Comparison of Web services technologies from a developer's perspective
Comparison of Web services technologies from a developer's p...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S.P. Ahuja R. Clark Department of Computer and Information Sciences University of North Florida Jacksonville FL USA
Two main technologies that stand out for the implementation of enterprise applications and Web services are Sun Microsystems' Java 2 Enterprise Edition (J2EE) and Microsoft's .NET framework. These two are comp... 详细信息
来源: 评论
Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks
Verifying physical presence of neighbors against replay-base...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: T. Korkmaz Department of Computer Science University of Technology San Antonio USA
Verifying physical presence of a neighbor in wireless ad hoc networks is one of the key components in developing protocols resilient to replay-based attacks. For this, we first consider RTT-based and power-based appro... 详细信息
来源: 评论
Integration of digital rights management into learning content management system
Integration of digital rights management into learning conte...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zongkai Yang Qingtang Liu Kun Yan Wanting Deng Jing Jin Huazhong University of Science and Technology Wuhan China Central China Normal University Wuhan China
With the rapid increase of learning resources, the contradiction between learning content intelligent properties and its share and reuse becomes an outstanding event. In order to solve the problem, the authors probed ... 详细信息
来源: 评论
Mobile Web services discovery and invocation through auto-generation of abstract multimodal interface
Mobile Web services discovery and invocation through auto-ge...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R. Steele K. Khankan T. Dillon University of Technology Sydney Australia
With the advancement in wireless technologies in general and mobile devices capabilities in particular, ubiquitous access of mobile Web services continues to be in the focal point of research. This paper presents a no... 详细信息
来源: 评论
An image sensor node for wireless sensor networks
An image sensor node for wireless sensor networks
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zhi-Yan Cao Zheng-Zhou Ji Ming-Zeng Hu School of Computer Science and Technology Harbin Institute of Technology Harbin China
Visual information is the most intuitive information perceived by human. Image sensors are able to provide the visual information for recognition, monitoring and surveillance. Networks of visual sensors are the soluti... 详细信息
来源: 评论