咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是211-220 订阅
排序:
Distributed content adaptation for pervasive systems
Distributed content adaptation for pervasive systems
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: G. Berhe L. Brunie J.-M. Pierson Lyon Research Center for Images and Intelligent Information Systems Institut National des Sciences Appliquées de Lyon France
Pervasive systems are created by introducing wireless communication into distributed multimedia systems. These systems facilitate mobile data access to applications such as health care, tourism and emergency. However ... 详细信息
来源: 评论
Language discrimination via PPM model
Language discrimination via PPM model
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: E. Celikel International Computer Institute Ege University Izmir Turkey
In this study, the lossless compression tool employing an adaptive statistical modeling technique called prediction by partial matching (PPM) is used for written language discrimination. PPM can well serve as a crypto... 详细信息
来源: 评论
Misuse case-based design and analysis of secure software architecture
Misuse case-based design and analysis of secure software arc...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J.J. Pauli D. Xu College of Business and Information Systems Dakota State University Madison SD USA Department of Computer Science North Dakota State University Fargo ND USA
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse cases. We identify architectural compon... 详细信息
来源: 评论
NIPPERS: network of interpolated PeERS for Web service discovery
NIPPERS: network of interpolated PeERS for Web service disco...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: C. Makris E. Sakkopoulos S. Sioutas P. Triantafillou A. Tsakalidis B. Vassiliadis Computer Engineering & Informatics Department University of Patras Patras Greece Internet and Multimedia Technologies Research Unit RA Computer Technology Institute Patras Greece Computer Science Digital Systems & Media Computing Laboratory Hellenic Open University Patras Greece
Web services are becoming an important enabler of the semantic Web. Besides the need for a rich description mechanism, Web service information should be made available in an accessible way for machine processing. In t... 详细信息
来源: 评论
A grid-enabled Web map server
A grid-enabled Web map server
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: G. Aloisio M. Cafaro D. Conte S. Fiore I. Epicoco G.P. Marra G. Quarta Center for Advanced Computational Technologies/ISUFI University of Lecce Lecce Italy Institute of Atmospheric Sciences Climate of the Italian National Research Council Lecce Italy
Today Geographic information Systems (GIS) provide several tools for studying and analyzing varied human and natural phenomena, therefore GIS and geospatial data has grown so much in both public and private organizati... 详细信息
来源: 评论
Semantic grid - interoperability solution for construction VO?
Semantic grid - interoperability solution for construction V...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Z. Turk M. Dolenc V. Stankovski E. Petrinja Construction Informatics University of Ljubljana Slovenia
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collaboration and the sharing of informatio... 详细信息
来源: 评论
A PCA-wavelet based coding scheme for distance learning image compression
A PCA-wavelet based coding scheme for distance learning imag...
收藏 引用
Fourth IASTED international conference on Communications, Internet, and information technology, CIIT 2005
作者: Li, Qin Fan, Qing Fu You, Jane Bhattacharya, Prabir Henan Provincial Key Lab on Information Network Hong Kong Logistics Group Ltd Zhengzhou University Zhengzhou China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Concordia Institute for Information Systems Engineering Concordia University Canada
The large volume of images used in Distance Learning System are desirable to be compressed in a proper ratio to reduce the storage loading of computer servers and provide better VOD (Video on demand) services. A new P... 详细信息
来源: 评论
Elimination of redundant information for Web data mining
Elimination of redundant information for Web data mining
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S.M. Taib Soon-Ja Yeom Byeong-Ho Kang School of Computing University of Tasmania Australia
These days, billions of Web pages are created with HTML or other markup languages. They only have a few uniform structures and contain various authoring styles compared to traditional text-based documents. However, us... 详细信息
来源: 评论
The grid-DBMS: towards dynamic data management in grid environments
The grid-DBMS: towards dynamic data management in grid envir...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: G. Aloisio M. Cafaro S. Fiore M. Mirto Center for Advanced Computational Technologies University of Lecce Italy
Nowadays many data grid applications need to manage and process a huge amount of data distributed across multiple grid nodes and stored into heterogeneous databases. Grids encourage the publication of scientific data ... 详细信息
来源: 评论
Formalisation and implementation of access control models
Formalisation and implementation of access control models
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Jaume C. Morisset SPI LIP6 University of Paris 6 Paris France
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies between the model and the code. In thi... 详细信息
来源: 评论