咨询与建议

限定检索结果

文献类型

  • 1,056 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 305 篇 工学
    • 292 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 77 篇 信息与通信工程
    • 75 篇 电气工程
    • 15 篇 控制科学与工程
    • 11 篇 光学工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 54 篇 理学
    • 41 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 生物学
    • 1 篇 化学
  • 42 篇 管理学
    • 31 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 220 篇 information tech...
  • 180 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 69 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 costs
  • 55 篇 information secu...
  • 55 篇 computer network...
  • 51 篇 information syst...
  • 49 篇 protection
  • 47 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 44 篇 mobile computing
  • 42 篇 watermarking
  • 41 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 gippsland school...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 8 篇 l.s. dooley
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,062 篇 英文
检索条件"任意字段=ITCC 2005 - International Conference on Information Technology: Coding and Computing"
1062 条 记 录,以下是611-620 订阅
排序:
Replicate relational and XML databases for Internet computing
Replicate relational and XML databases for Internet computin...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J. Fong H.K. Wong Computer Science Department City University of Hong Kong Hong Kong China
Most XML-enabled database management systems can only translate a few relations into an XML document. Moreover, the translation is without data semantics constraints consideration, which may not be sufficient for info... 详细信息
来源: 评论
ProtoMon: embedded monitors for cryptographic protocol intrusion detection and prevention
ProtoMon: embedded monitors for cryptographic protocol intru...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S.P. Joglekar S.R. Tate Department of Computer Science and Engineering University of North Texas Denton TX USA
Intrusion detection systems (IDS) are responsible for monitoring and analyzing host or network activity to detect intrusions in order to protect information from unauthorized access or manipulation. There are two main... 详细信息
来源: 评论
Modelling long duration transactions with time constraints in active database
Modelling long duration transactions with time constraints i...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: D.S. Yadav R. Agrawal D.S. Chauhan R.C. Saraswat A.K. Majumdar Institute of Engineering & Technology Uttar Pradesh Technical University Lucknow India Department of Computer Science Kettering University Flint MI USA Department of Computer Science and Engineering Indian Institute of Technology Kharagpur India
The applications like situation assessment, object tracking, trading & stock control, and workflow management require actions to be taken in stringent time frame for full benefit of the system. These applications ... 详细信息
来源: 评论
A new framework for uncertainty sampling: exploiting uncertain and positive-certain examples in similarity-based text classification
A new framework for uncertainty sampling: exploiting uncerta...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: K.H. Lee B.H. Kang School of Information Technologies University of Sydney NSW Australia School of Computing University of Tasmania Hobart TAS Australia
One of the major concerns with supervised learning approaches to text classification is that they require a large number of labeled examples to achieve a high level of effectiveness. Labeling such a large number of ex... 详细信息
来源: 评论
Building decision trees using functional dependencies
Building decision trees using functional dependencies
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Kwok-Wa Lam V.C.S. Lee Department of Computer Science City University of Hong Kong Hong Kong China
Decision tree (DT) induction is regarded as a representative of traditional approaches to classification rule mining which is an important technique for many data mining applications. Using a heuristic-based local sea... 详细信息
来源: 评论
A Web-service oriented framework for building SCORM compatible learning management systems
A Web-service oriented framework for building SCORM compatib...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Chih-Ping Chu Ching-Pao Chang Chung-Wei Yeh Yu-Fang Yeh Department of computer science & Info. Engineering National Cheng Kung University Tainan Taiwan Institute of Computer Science & Info. Education National Tainan Teachers College Taiwan
Managing the large amount of learning content involved in the development of an expandable learning management system (LMS) is a critical task for most educational organizations. In designing such a system, considerat... 详细信息
来源: 评论
Security protection and checking in embedded system integration against buffer overflow attacks
Security protection and checking in embedded system integrat...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zili Shao Chun Xue Qingfeng Zhuge E.H.-M. Sha Bin Xiao Department of Computer Science University of Texas Dallas Richardson TX USA Department of Computing Hong Kong Polytechnic University Hong Kong China
With more embedded systems networked, it becomes an important research problem to effectively defend embedded systems against buffer overflow attacks and efficiently check if systems have been protected. In this paper... 详细信息
来源: 评论
On-line generation of suggestions for Web users
On-line generation of suggestions for Web users
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: F. Silvestri R. Baraglia P. Palmerini M. Serrano National Research Council Information Science and Technologies Institute Pisa Italy
The knowledge extracted from the analysis of historical information of a Web server can be used to develop personalization or recommendation systems. Web usage mining (WUM) systems are specifically designed to carry o... 详细信息
来源: 评论
On the importance of protecting /spl Delta/ in SFLASH against side channel attacks
On the importance of protecting /spl Delta/ in SFLASH agains...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: K. Okeya T. Takagi C. Vuillaume Systems Development Laboratory Hitachi and Limited Yokohama Japan Fachbereich Informatik Technische Universität Darmstadt Darmstadt Germany
SFLASH was chosen as one of the final selection of the NESSIE project in 2003. It is one of the most efficient digital signature schemes and is suitable for implementation on memory-constrained devices such as smartca... 详细信息
来源: 评论
Arbitrary trajectories tracking using multiple model based particle filtering in infrared image sequence
Arbitrary trajectories tracking using multiple model based p...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M.A. Zaveri S.N. Merchant U.B. Desai SPANN Laboratory Electrical Engineering Department Indian Institute of Technology Bombay India
Particle filtering is being investigated extensively due to its important feature of target tracking based on nonlinear and non-Gaussian model. It tracks a trajectory with a known model at a given time. It means that ... 详细信息
来源: 评论