咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是431-440 订阅
排序:
An approach to online text generation for e-learning purposes
An approach to online text generation for e-learning purpose...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M.T. Mahmoudi K. Badie Information Society Research Department Iran Telecom Research Center Iran
A text generation approach is proposed for e-learning purposes, based on the idea that the text should include some features in the way that its different perspectives can be described efficiently. In the meantime a m... 详细信息
来源: 评论
A game-theoretic model for two-party cryptographic protocols
A game-theoretic model for two-party cryptographic protocols
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: P. Caballero-Gil C. Hernandez-Goya C. Bruno-Castaneda Department of Statistics Operations Research and Computing University of La Laguna Tenerife Spain
We illustrate the close connection between cryptographic protocols and games. Several two-person game theoretic concepts and techniques are used here to model and analyze different two-party cryptographic protocols in... 详细信息
来源: 评论
On the matching of events in distributed brokering systems
On the matching of events in distributed brokering systems
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Pallickara G. Fox Community Grids Laboratory Indiana University USA
The Internet is currently being used to support increasingly complex interactions. The entities, with which applications and services need to interact, span a wide spectrum that includes desktops, PDAs, appliances, an... 详细信息
来源: 评论
Adaptive course creation for all
Adaptive course creation for all
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Cristea Info Systems Department of Mathematics & Computer Science Eindhovan University of Technology Netherlands
Personalization in education is supposed to be the answer to enhanced learning. Adaptive hypermedia (AH) is a means to this end. However, authoring of AH is still complicated. This paper presents a system that tries t... 详细信息
来源: 评论
Defeating the current steganalysis techniques (robust steganography)
Defeating the current steganalysis techniques (robust stegan...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.H. Sung G.R. Tadiparthi S. Mukkamala Department of Computer Science New Mexico Institute of Mining and Technology Socorro NM USA
A steganographic technique that uses animation to encode the message is proposed. When the technique is combined with cryptography (to encrypt the secret message before it is encoded into animation), error-control cod... 详细信息
来源: 评论
Fast modular multiplication by operand changing
Fast modular multiplication by operand changing
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Schimmler V. Bunimov Institute of Computer and Communication Network Engineering Technical University of Braunschweig Germany
A new algorithm for modular multiplication for public key cryptography is presented. The algorithm is optimised with respect to area and time by use of a combination of adders and fast lookup tables. This leads to a m... 详细信息
来源: 评论
Use of multiple algorithms in image content searches
Use of multiple algorithms in image content searches
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J.R. Parker B. Behm Digital Media Laboratory Department of Computer Science University of Calgary Canada Computer Science Department University of Calgary Calgary AB Canada
Statistical image analysis is simple to implement, but rarely achieves high levels of significance in image similarity searches except on contrived image collections. It is proposed that simple geometric features and ... 详细信息
来源: 评论
An informed operator approach to tackle diversity constraints in evolutionary search
An informed operator approach to tackle diversity constraint...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Bhattacharya Gippsland School of Computing and Information Technology Monash University Australia
As the evolutionary search progresses, it is important to avoid reaching a state where the genetic operators can no longer produce superior offspring, prematurely. This is likely to occur when the search space reaches... 详细信息
来源: 评论
Key agreement and identity authentication protocols for ad hoc networks
Key agreement and identity authentication protocols for ad h...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Jun Yao Guihua Zeng Department of Electronic Engineering Shanghai Jiaotong University Shanghai China
Key agreement and identity authentication protocols play important role in ad hoc networks. Two novel key agreement protocols are proposed and their security and efficiency are analyzed. Besides, an identity authentic... 详细信息
来源: 评论
Recurrent exercises for introductory human computer interaction courses
Recurrent exercises for introductory human computer interact...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R. Turban Department of Computer Science and Engineering Arizona State University USA
Introductory human computer interaction (HCI) courses are fundamental in the computer science curriculum as there is not only a need for teaching students to solve problems, but also to map their solutions to end-user... 详细信息
来源: 评论