咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是301-310 订阅
排序:
A time series data management framework
A time series data management framework
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Matus-Castillejos R. Jentzsch School of Information Sciences & Engineering University of Canberra Canberra ACT Australia
In the real world there are thousands of time series data that coexists with other data. Every day tons of data is collected in the form of time series. Time series is a collection of observations that is recorded or ... 详细信息
来源: 评论
Mining biomedical images with density-based clustering
Mining biomedical images with density-based clustering
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M.E. Celebi Y.A. Aslandogan P.R. Bergstresser Department of Computer Science & Engineering University of Technology Arlington TX USA Department of Dermatology University of Texas Southwestern Medical Centre Dallas TX USA
Density-based clustering algorithms have recently gained popularity in the data mining field due to their ability to discover arbitrary shaped clusters while preserving spatial proximity of data points. In this work w... 详细信息
来源: 评论
CompChall: addressing password guessing attacks
CompChall: addressing password guessing attacks
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: V. Goyal V. Kumar M. Singh A. Abraham S. Sanyal OSP Global Mumbai India Crypto Group Institute of Technology Banaras Hindu University India School of Computer Science and Engineering Chung Ang University South Korea School of Technology & Computer Science Tata Institute of Fundamental Research India
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary... 详细信息
来源: 评论
StackOFFence: a technique for defending against buffer overflow attacks
StackOFFence: a technique for defending against buffer overf...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: B.B. Madan S. Phoha K.S. Trivedi IST Division ARL Pennsylvania State University PA USA Information Technology Laboratory National Institute for Standards and Technology Gaithersburg MD USA Pratt School of Engn. EC&E Department Duke University Durham NC USA
Software coding practices, in the interest of efficiency, often ignore to enforce strict bound checking on buffers, arrays and pointers. This results in software code that is more vulnerable to security intrusions exp... 详细信息
来源: 评论
Resisting flooding attacks in ad hoc networks
Resisting flooding attacks in ad hoc networks
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Ping Yi Zhoulin Dai Yiping Zhong Shiyong Zhang Department of Computing and Information Technology Fudan University Shanghai China
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus su... 详细信息
来源: 评论
Customizing a geographical routing protocol for wireless sensor networks
Customizing a geographical routing protocol for wireless sen...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J. Chen Y. Guan U. Pooch Department of Computer Science Texas A and M University College Station TX USA Department of Electrical & Computer Engineering Iowa State University Ames IA USA
Several problems are required to be fixed in order to apply geographical routing protocol greedy perimeter stateless routing (GPSR) in wireless sensor networks. First, GPSR is designed under the assumption of symmetri... 详细信息
来源: 评论
A new region of interest image coding for narrowband network: Partial bitplane alternating shift  1
收藏 引用
IFIP international conference on Network and Parallel computing, NPC 2005
作者: Zhang, Li-Bao College of Information Science and Technology Beijing Normal University Beijing 100875 China
Regions Of Interest (ROI) image coding is one of the most significant features in JPEG2000. It allows ROIs of the image are of higher importance than background (BG). In this paper, a new and efficient scaling-based m... 详细信息
来源: 评论
Analysis, specification and generation of mobile computer data synchronisation  4
Analysis, specification and generation of mobile computer da...
收藏 引用
4th Annual international conference on Mobile Business, ICMB 2005
作者: Ye, Qingsong Sloane, Anthony M. Verity, Dominic R. Department of Computing Macquarie University SydneyNSW2109 Australia
In current technologies, mobile computer data synchronisation protocols are typically programmed at a low-level. The disadvantages of this are that they are error-prone and time consuming. This paper analyses current ... 详细信息
来源: 评论
Implementation of a fast square in RSA encryption/decryption architecture
Implementation of a fast square in RSA encryption/decryption...
收藏 引用
2005 international conference on Security and Management, SAM'05
作者: Thapliyal, Himanshu Srinivas, M.B. Arabnia, Hamid R. Center for VLSI and Embedded System Technologies International Institute of Information Technology Hyderabad-500019 India University of Georgia Department of Computer Science 415 Graduate Studies Research Center Athens GA 30602-7404 United States
This paper proposes the hardware implementation of RSA encryption algorithm using the recently proposed square architecture. It is an object of the present paper to provide a RSA encryption/ decryption circuit which c... 详细信息
来源: 评论
Wavelet-based image compression using support vector machine learning and encoding techniques
Wavelet-based image compression using support vector machine...
收藏 引用
Eighth IASTED international conference on Computer Graphics and Imaging, CGIM 2005
作者: Ahmed, Rakib Gippsland School of Computing and Information Technology Monash University Gippsland Campus Australia
This paper presents a method of compressing still images combining the powerful features of support vector machine (SVM) for machine learning with discrete wavelet transform (DWT) in image transformation. DWT, based o... 详细信息
来源: 评论