咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是221-230 订阅
排序:
A P2P approach for membership management and resource discovery in grids
A P2P approach for membership management and resource discov...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: C. Mastroianni D. Talia O. Verta ICAR-CNR Rende Italy DEIS University of Calabria Rende Italy
As deployed grids increase from tens to thousands of nodes, peer-to-peer (P2P) techniques and protocols can be used to implement scalable services and application in grids. This paper proposes a P2P approach for handl... 详细信息
来源: 评论
Fuzzy image segmentation combining ring and elliptic shaped clustering algorithms
Fuzzy image segmentation combining ring and elliptic shaped ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M.A. Ali L.S. Dooley G.C. Karmakar Gippsland School of Computing & Information Technology Monash University Australia
Results from any existing clustering algorithm that are used for segmentation are highly sensitive to features that limit their generalization. Shape is one important attribute of an object. The detection and separati... 详细信息
来源: 评论
A rate control algorithm for wireless video transmission using perceptual tuning
A rate control algorithm for wireless video transmission usi...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Yu Sun Dongdong Li I. Ahmad Jiancong Luo Department of Computer Science University of Central Arkansas USA Department of Electrical Engineering University of Technology Arlington USA
In video transmission over two-way wireless channel automatic repeat request (ARQ) retransmission has been used to protect packets from losing, which also causes the channel throughput varying and brings more challeng... 详细信息
来源: 评论
Real stock trading using soft computing models
Real stock trading using soft computing models
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: B. Doeksen A. Abraham J. Thomas M. Paprzycki Computer Science Department Oklahoma State University OK USA School of Computer Science and Engineering Chung Ang University South Korea
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intelligence techniques were used to predict... 详细信息
来源: 评论
Application of loop reduction to learning program behaviors for anomaly detection
Application of loop reduction to learning program behaviors ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Jidong Long D.G. Schwartz S. Stoecklin M.K. Patel Department of Computer Science Florida State University Tallahassee FL USA Rivermine Software Fairfax VA USA
Evidence of some attacks can be manifested by abnormal sequences of system calls of programs. Most approaches that have been developed so far mainly concentrate on some program-specific behaviors and ignore some plain... 详细信息
来源: 评论
Autonomous and dynamic Web service composition in wireless grids
Autonomous and dynamic Web service composition in wireless g...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Haoming Guo M. Yang X. Wu Y. Jiang Shilong Ma Guoshun Hao National Laboratory of Software Development Environment Beijing Aeronautics and Astronautics University Beijing China Department of Electrical & Computer Engineering University of Nevada Las Vegas Las Vegas NV USA
In combination of Web service and wireless technology, grid computing is evolved into a de facto standard for shared-resource computations. Although numerous efforts have been made on the construction of grid systems,... 详细信息
来源: 评论
Development and evaluation of a slicing-based C++ debugger
Development and evaluation of a slicing-based C++ debugger
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: W. Wichaipanitch M.H. Samadzadeh S. Tangsripairoj Rajamangala University of Technology Klong Luang Pathum Thani Thailand Computer Science Department Oklahoma State University Stillwater OK USA Department of Computer Science Mahidol University Bangkok Thailand
The main objective of this work was to develop a debugging tool for C++ programs called C++Debug that uses program slicing and dicing techniques. The incremental development started by including simple statements firs... 详细信息
来源: 评论
XML schema re-engineering using a conceptual schema approach
XML schema re-engineering using a conceptual schema approach
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: O.Y. Yuliana S. Chittayasothorn Assumption University Thailand and Petro Christian University Indonesia Faculty of Engineering King Mongkut's Institute of Technology Bangkok Thailand
At present, the Extensible Markup Language (XML) is popular for both data presentation and data transfer activities. XML Documents follow XML Schemas. It is possible to use them as database schemas and databases. An X... 详细信息
来源: 评论
Design of middleware platform to enhance abilities of application systems integration
Design of middleware platform to enhance abilities of applic...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: V. Chang Department of Information Management Chinese Cultural University Sijhih Taiwan
This research describes a Linux/Unix base middleware platform and GUI operating interface that has been created to help developer overcome the difficulties associated with existing software editing, upgrading, updatin... 详细信息
来源: 评论
Conversion and proxy functions for symmetric key ciphers
Conversion and proxy functions for symmetric key ciphers
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: D.L. Cool A.D. Keromytis Dept. of Comput. Sci. Columbia Univ. New York NY USA Department of Computer Science Columbia University USA
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is des... 详细信息
来源: 评论