咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是231-240 订阅
排序:
Enhancing focused crawling with genetic algorithms
Enhancing focused crawling with genetic algorithms
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Shokouhi P. Chubak Z. Raeesy School of Computer Science and IT RMIT University Melbourne Australia Department of Computer Engineering Sharif University of Technology Tehran Iran Department of Computer Engineering Bu-Ali Sina University Tehran Iran
Web crawlers are one of the most crucial components in search engines and their optimization would have a great effect on improving the searching efficiency. In this paper, we introduce an intelligent crawler called G... 详细信息
来源: 评论
Parallel multiple sequence alignment with dynamic scheduling
Parallel multiple sequence alignment with dynamic scheduling
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Jiancong Luo I. Ahmad M. Ahmed R. Paul Department of Computer Science and Engineering University of Technology Arlington TX USA Office of the Secretary of Defense Washington D.C. DC USA
This paper proposes a parallel implementation of the multiple sequence alignment algorithm, known as ClustalW, on distributed memory parallel machines. The proposed algorithm divides a progressive alignment into subta... 详细信息
来源: 评论
Layered MPEG video transmission over IP DiffServ
Layered MPEG video transmission over IP DiffServ
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Hong Zhao N. Ansari Y.Q. Shi College of Engineering Embrey-Riddle Aeronautical University Prescott AZ USA Advanced Networking Laboratory New Jersey Institute of Technology Newark NJ USA
Multimedia applications have become one of the major traffic to be transported through networks. These applications require high bandwidth and stringent quality of service (QoS). The end video quality is determined no... 详细信息
来源: 评论
Towards an intrusion detection system for pervasive computing environments
Towards an intrusion detection system for pervasive computin...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: P. Kannadiga M. Zulkernine S.I. Ahamed School of Computing Queen's University Kingston ONT Canada Department of Math Stat. and Com. Science Marquette University Milwaukee WI USA
A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activi... 详细信息
来源: 评论
Digital chips for an on-line casino
Digital chips for an on-line casino
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J. Castella-Roca G. Navarro J.A. Ortega-Ruiz J. Garcia ETSE-URV Catalonia Spain Universidad Autonoma de Barcelona Catalonia Spain
Unlike in traditional environments, e-gambling players must make a beforehand payment to start a game. Most on-line casinos currently solve this problem using prepayment systems where the on-line casino has absolute c... 详细信息
来源: 评论
Using RoleOf relationship in design pattern instantiation
Using RoleOf relationship in design pattern instantiation
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Chengwan He Keqing He F. He Feng Yao Jin Liu State key laboratory of Software Engineering Wuhan University of China China MDA Technology Department Fujitsu Laboratories Limited Shin-yokohama Japan Department of Computer Science and Technology Wuhan Institute of Chemical Technology China
The scattering of pattern logic (the attributes and methods of pattern role) is the most typical problem on design pattern instantiation, that is, pattern logic scatters across multiple business classes, which causes ... 详细信息
来源: 评论
AES power attack based on induced cache miss and countermeasure
AES power attack based on induced cache miss and countermeas...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: G. Bertoni V. Zaccaria L. Breveglieri M. Monchiero G. Palermo Advanced System Technology STMicroelectronics Agrate Milan Italy Dipartimento di Elettronica e Informazione Politecnico di Milano Milan Italy
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus inducing a cache miss during the encryption... 详细信息
来源: 评论
A proposal of short proxy signature using pairing
A proposal of short proxy signature using pairing
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: T. Okamoto A. Inomata E. Okamoto Graduate School of Systems and Information Engineering University of Tsukuba Tsukuba Ibaraki Japan Japan Science and Technology Agency Minato Tokyo Japan
In this paper, we propose a new pairing-based proxy signature. Most remarkable point in our proposal is that our scheme realizes short signature. More concretely, the explicit proxy signature consists of only one para... 详细信息
来源: 评论
Stateful Inspection firewall session table processing
Stateful Inspection firewall session table processing
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Xin Li Zheng-Zhou Ji Ming-Zeng Hu School of Computer Science and Technology Harbin Institute of Technology Harbin China
Stateful Inspection is a key technology to network devices such as routers and firewalls. Existed session table architectures of Stateful Inspection devices store all session information in a single entry, which cause... 详细信息
来源: 评论
Fast parallel table lookups to accelerate symmetric-key cryptography
Fast parallel table lookups to accelerate symmetric-key cryp...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Murat Fiskiran R.B. Lee Department of Electrical Engineering Princeton University USA
Table lookups are one of the most frequently-used operations in symmetric key ciphers. Particularly in the newer algorithms such as the advanced encryption standard (AES), we frequently find that the greatest fraction... 详细信息
来源: 评论