咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是601-610 订阅
排序:
Component-based embedded database for mobile embedded systems
Component-based embedded database for mobile embedded system...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S.I. Ahamed S. Vallecha Marquette University Milwaukee WI USA
Recent developments in portable devices and growing wireless communication networks have evolved mobile computing during the last few years. Mobile computing enlarges the usability of computers by allowing low powered... 详细信息
来源: 评论
Measuring the scalability of relationally mapped semistructured queries
Measuring the scalability of relationally mapped semistructu...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R.J. Cathey S.M. Beitzel E.C. Jensen A.J. Pilotto D. Grossman Information Retrieval Laboratory Department of Computer Science Illinois Institute of Technology Chicago IL USA
The explosive growth of XML has led to an increasing need for scalable XML retrieval systems. Our XML retrieval system, the SQLGenerator, stores XML of any schema in a fixed schema relational database and supports a f... 详细信息
来源: 评论
Fuzzy edge detector using entropy optimization
Fuzzy edge detector using entropy optimization
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Hanmandlu J. See S. Vasikarla Department of Electrical Engineering Indian Institute of Technology Delhi New Delhi India
This paper proposes a fuzzy-based approach to edge detection in gray-level images. The proposed fuzzy edge detector involves two phases - global contrast intensification and local fuzzy edge detection. In the first ph... 详细信息
来源: 评论
Performance study of a MLS/DBMS implemented as a kernelized architecture
Performance study of a MLS/DBMS implemented as a kernelized ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Garuba E. Appiah L. Burge Department of Systems and Computer Science Howard University College of Medicine Washington D.C. DC USA
Although users of multi-level secure database management system (MLS/DBMS) continue to rely on existing systems to satisfy their multi-level security needs, these systems no longer enjoy direct commercial-off-the-shel... 详细信息
来源: 评论
Summarizing inter-query learning in content-based image retrieval via incremental semantic clustering
Summarizing inter-query learning in content-based image retr...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: I. Gondra D.R. Heisterkamp Department of Computer Science Oklahoma State University Stillwater OH USA
In previous work, we developed a novel relevance feedback (RF) framework that learns one-class support vector machines (ISVM) from retrieval experience to represent the set memberships of users' high level semanti... 详细信息
来源: 评论
Assessing distance learning student's performance: a natural language processing approach to analyzing class discussion messages
Assessing distance learning student's performance: a natural...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Yi-fang Brook Wu Xin Chen Information Systems Department New Jersey Institute of Technology USA
In classes supported by electronic messaging systems, students are required or encouraged to discuss the class topics and share their knowledge by posting text messages and replying to others. When the amount of messa... 详细信息
来源: 评论
Data redundancy and compression methods for a disk-based network backup system
Data redundancy and compression methods for a disk-based net...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Yan Ghen Zhiwei Qu Zhenhua Zhang Boon-Lock Yeo Software Sch. Shanghai JiaoTong Univ. China Software School Shanghai JiaoTong University China Software School ZheJiang University China Intel China Software Center China Intel China Software Center
Traditionally backup has been performed on tapes. With the price of disk becoming cheaper and CPUs becoming faster, the use of disk-based network backup system to replace or augment tape-based backup becomes realistic... 详细信息
来源: 评论
Arcanum: a secure and efficient key exchange protocol for the Internet
Arcanum: a secure and efficient key exchange protocol for th...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.S. Mian A. Masood Computer Science & Software Engineering University of Western Australia Crawley WA Australia Signals R&D Establishment MCS National University of Science and Technology Rawalpindi Pakistan
A VPN establishes a cryptographically secure network using the existing insecure infrastructure of the Internet. A number of protocols, including IPSec have been designed to establish VPNs. However, keys must be share... 详细信息
来源: 评论
Web server attack categorization based on root causes and their locations
Web server attack categorization based on root causes and th...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Jeongseok Seo Han-Sung Kim Sanghyun Cho Sungdeok Cha Division of Computer Science Department of EECS KAIST and AITRC/IIRTRC/SPIC Daejeon South Korea
Frequency of attacks on Web services and resulting damage continue to grow as Web services become popular. Unfortunately, existing signature-based intrusion detection techniques are inadequate in providing reasonable ... 详细信息
来源: 评论
An object and XML database schemas design tool
An object and XML database schemas design tool
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: N. Chankuang S. Chittayasothorn Department of Computer Engineering Faculty of Engineering King Mongkut''s Institute of Technology Bangkok Thailand
Nowadays relational database schemas are designed by using well-known database design techniques such as the entity relationship model and the normalization process. The result schemas can be guaranteed to have minimu... 详细信息
来源: 评论