咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是261-270 订阅
排序:
Exploring price and product information search behavior in e-market
Exploring price and product information search behavior in e...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: T. Han Department of Management Information Systems University of Nevada Las Vegas Las Vegas NV USA
Many have expected that the increased availability of price and product information over a wide range of vendors and low search costs on the Web would increase price competition, reduce price dispersion, and eventuall... 详细信息
来源: 评论
A specialization in information and knowledge management systems for the undergraduate computer science curriculum
A specialization in information and knowledge management sys...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Argamon N. Goharian D. Grossman O. Frieder N. Raju Department of Computer Science Illinois Institute of Technology Chicago IL USA Institute of Psychology Illinois Institute of Technology Chicago IL USA
The authors described the progress extending the undergraduate computer science (CS) curriculum to include a deep understanding of techniques for information and knowledge management systems (IKMS). In a novel five-co... 详细信息
来源: 评论
Performance evaluation of ad-hoc WLAN by M/G/1 queueing model
Performance evaluation of ad-hoc WLAN by M/G/1 queueing mode...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Sheng-Tzong Cheng Mingzoo Wu Department of Computer Science and Information Engineering National Cheng Kung University Tainan County Taiwan
The distributed coordination function (DCF) is specified for both ad-hoc and infrastructure network configurations in the IEEE 802.11 standard. In this paper, we present an analytic model for evaluating the performanc... 详细信息
来源: 评论
Secure group communication with multiplicative one-way functions
Secure group communication with multiplicative one-way funct...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Heeyoul Kim Seong-min Hong H. Yoon J.W. Cho CS Division Korea Advanced Institute of Science and Technology South Korea
Secure group communication enables only the users in that group securely communicate with each other. Because the users can join or leave the group dynamically, scalability is a major concern. In this paper, we propos... 详细信息
来源: 评论
Tracking of unusual events in wireless sensor networks based on artificial neural-networks algorithms
Tracking of unusual events in wireless sensor networks based...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Kulakov D. Davcev Computer Science Department Faculty of Electrical Engineering Skopje Macedonia
Some of the algorithms developed within the artificial neural-networks tradition can be easily adopted to wireless sensor network platforms and will meet the requirements for sensor networks like: simple parallel dist... 详细信息
来源: 评论
Disciplined methods of software specification: a case study
Disciplined methods of software specification: a case study
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R.L. Baber D.L. Parnas S.A. Vilkomir P. Harrison T. O'Connor Software Quality Research Laboratory (SQRL) Department of Computer Science and Information Systems University of Limerick Ireland Dell Products Limerick Ireland
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and to help practitioners who want to app... 详细信息
来源: 评论
Applications of the Montgomery exponent
Applications of the Montgomery exponent
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Gueron O. Zuk Department of Mathematics University of Haifa Israel Department of Physics of Complex Systems Weizmann Institute of Science Israel
We define here the Montgomery exponent of order s, modulo the odd integer N, by MEXP = MEXP(A,X,N,s) = A/sup X/2/sup -s(X-1)/ (mod N), and illustrate some properties and usage of this operator. We show how A/sup X/ (m... 详细信息
来源: 评论
An adaptive scalable multiuser-OFDM system for multimedia transmission over fading channels
An adaptive scalable multiuser-OFDM system for multimedia tr...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.M.M. Nadhim Jianhua He Jiangtao Xi Zongkai Yang Electronics and Information Engineering Department Huazhong University of Science and Technology Wuhan China School of Electrical Computer and Telecommunications Engineering University of Wollongong Wollongong Australia
In this paper, an adaptive scalable multiuser-OFDM system was proposed for multimedia transmission over fading channels. The proposed adaptive algorithm can adapt according to the channel status information of each us... 详细信息
来源: 评论
Replica placement in data grid: considering utility and risk
Replica placement in data grid: considering utility and risk
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R.M. Rahman K. Barker R. Alhajj Department of Computer Science University of Calgary Calgary AB Canada
Grid computing emerges from the need to integrate a collection of distributed computing resources to offer performance unattainable by any single machine. Grid technology facilitates data sharing across many organizat... 详细信息
来源: 评论
Practical evaluation of a radial soft hash algorithm
Practical evaluation of a radial soft hash algorithm
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: F.-X. Standaert E. Lefebvre G. Rouvroy B. Macq J.-J. Quisquater J.-D. Legat Crypto Group Univ. Catholique de Louvain Belgium Laboratoire de Télécommunications et Télédétection Université Catholique de Louvain Belgium Laboratoire de Microélectronique Université Catholique de Louvain Belgium
This paper presents a practical evaluation of a radial soft hash algorithm, an image hashing technique used for image and visual content authentication. First we evaluate its collision resistance and susceptibility to... 详细信息
来源: 评论