咨询与建议

限定检索结果

文献类型

  • 35 篇 会议
  • 3 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 16 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 2 篇 理学
    • 1 篇 地球物理学
    • 1 篇 地质学
    • 1 篇 系统科学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 19 篇 security
  • 7 篇 protocols
  • 7 篇 cloud computing
  • 4 篇 authentication
  • 4 篇 servers
  • 4 篇 computational mo...
  • 3 篇 communication sy...
  • 3 篇 monitoring
  • 3 篇 network security
  • 3 篇 mobile communica...
  • 3 篇 business
  • 2 篇 registers
  • 2 篇 wireless sensor ...
  • 2 篇 algorithm design...
  • 2 篇 complexity theor...
  • 2 篇 mobile computing
  • 2 篇 ip networks
  • 2 篇 privacy
  • 1 篇 payment
  • 1 篇 internet of thin...

机构

  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 hannam universit...
  • 1 篇 indian institute...
  • 1 篇 computer science...
  • 1 篇 school of engine...
  • 1 篇 computer science...
  • 1 篇 university of pe...
  • 1 篇 guru gobind sing...
  • 1 篇 department of co...
  • 1 篇 the ohio state u...
  • 1 篇 department of co...
  • 1 篇 international in...
  • 1 篇 international bu...
  • 1 篇 washington unive...
  • 1 篇 univ calif irvin...
  • 1 篇 sri guru granth ...
  • 1 篇 department of co...
  • 1 篇 ifhe deemed univ...
  • 1 篇 ramco systems li...

作者

  • 2 篇 b.r. chandavarka...
  • 2 篇 kishore kothapal...
  • 1 篇 cristina băsescu
  • 1 篇 thilagam santhi
  • 1 篇 shoolapani biju
  • 1 篇 william hurst
  • 1 篇 sachin kumar yad...
  • 1 篇 p. palanisamy
  • 1 篇 safdari mustafa
  • 1 篇 t. v. geetha
  • 1 篇 n.v.s. karthik
  • 1 篇 li peng
  • 1 篇 singh manpreet
  • 1 篇 nirmala shenoy
  • 1 篇 sagar naik
  • 1 篇 kannan srinathan
  • 1 篇 glenford mapp
  • 1 篇 dharmeet singh h...
  • 1 篇 kumar syam p.
  • 1 篇 xiang yang

语言

  • 39 篇 英文
检索条件"任意字段=International Conference on Advanced Computing, Networking and Security, ADCONS 2011"
39 条 记 录,以下是1-10 订阅
排序:
advanced computing, networking and security - international conference, adcons 2011, Revised Selected Papers
Advanced Computing, Networking and Security - International ...
收藏 引用
international conference on advanced computing, networking and security, adcons 2011
The proceedings contain 70 papers. The topics discussed include: a new small world lattice;an intelligent cloud system adopting file pre-fetching;context awareness acquisition for safety sensor data processing on indu...
来源: 评论
Proceedings - 2nd international conference on advanced computing, networking and security, adcons 2013
Proceedings - 2nd International Conference on Advanced Compu...
收藏 引用
2nd international conference on advanced computing, networking and security, adcons 2013
The proceedings contain 47 papers. The topics discussed include: performance evaluation of multi-core processors with varied interconnect networks;a modified local least squares-based missing value estimation method i...
来源: 评论
Barriers and Strategy Analysis for the Usage of Social Media by small and medium-scale enterprises: A Systematic Review
Barriers and Strategy Analysis for the Usage of Social Media...
收藏 引用
advanced Research in computing (ICARC), international conference on
作者: D. D. K. Karawgoda C. A. Kavirathna Department of Industrial Management University of Kelaniya Kelaniya Sri Lanka
Small and medium-sized enterprises (SMEs) are vital contributors to economic growth, yet they often face challenges in utilizing social media effectively for customer engagement. This systematic review explores the ba... 详细信息
来源: 评论
Monitoring users in cloud computing: Evaluating the Centralized Approach
Monitoring users in cloud computing: Evaluating the Centrali...
收藏 引用
2nd international conference on advanced computing, networking and security (adcons)
作者: Prasad, Ajay Gupta, Divya Chakrabarti, Prasun Univ Petr & Energy Studies Dehra Dun Uttarakhand India Babulal Tarabai Inst Res & Technol Sagar India Sir Padampat Singhania Univ Udaipur Rajasthan India
So far, monitoring in cloud computing mostly tends to focus only on QoS and Service Level Agreements. However, if we tend to monitor user activities on clouds we have to look at a centralized approach. Having a centra... 详细信息
来源: 评论
Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES
Modified Vigenere Encryption Algorithm and its Hybrid Implem...
收藏 引用
2nd international conference on advanced computing, networking and security (adcons)
作者: Singh, Gurpreet Supriya Sri Guru Granth Sahib World Univ Comp Sci & Engn Dept Fatehgarh Sahib Punjab India
security is a mechanism by which information is protected from unintended or unauthorized access, change or destruction. To secure such information process of encryption is used. Encryption is the act of transforming ... 详细信息
来源: 评论
An Efficient Distributed Verification Protocol for Data Storage security in Cloud computing
An Efficient Distributed Verification Protocol for Data Stor...
收藏 引用
2nd international conference on advanced computing, networking and security (adcons)
作者: Kumar, Syam P. Subramanian, R. Selvam, Thamizh D. IFHE Deemed Univ Dept Comp Scince Hyderabad Andhra Pradesh India Pondicherry Univ Sch Engn & Technol Dept Comp Sci Pondicherry India
Data storage is an important application of cloud computing, where clients can remotely store their data into the cloud. By uploading their data into the cloud, clients can be relieved from the burden of local data st... 详细信息
来源: 评论
security Analysis of Session Initiation Protocol in IPv4 and IPv6 based VoIP network
Security Analysis of Session Initiation Protocol in IPv4 and...
收藏 引用
2nd international conference on advanced computing, networking and security (adcons)
作者: Sonwane, Ganesh Dadaji Chandavarkar, B. R. NITK Surathkal Comp Sci & Engn Dept Mangalore India
VoIP is new emerging technology for the delivery of voice communication and multimedia session over the Internet. In VoIP network voice and signaling are multiplexed and travel as normal data inside the IP network. Th... 详细信息
来源: 评论
Digital Image Authentication Model Based on Edge Adaptive Steganography
Digital Image Authentication Model Based on Edge Adaptive St...
收藏 引用
2nd international conference on advanced computing, networking and security (adcons)
作者: Grover, Nidhi Mohapatra, A. K. Guru Gobind Singh Indraprastha Univ Delhi India Indira Gandhi Delhi Tech Univ Women Dept Informat Technol Delhi India
With the rapid growth of internet in the present world, social networking websites like Twitter, Facebook and Instagram are being increasingly used by people to share their life moments and events via images. But this... 详细信息
来源: 评论
Trust Based Privacy Preserving Access Control In Web Services Paradigm
Trust Based Privacy Preserving Access Control In Web Service...
收藏 引用
2nd international conference on advanced computing, networking and security (adcons)
作者: Bhatia, Rekha Singh, Manpreet Punjabi Univ Reg Ctr Mohali India Punjabi Univ Patiala India
The digital world is changing at a fast pace. These days, web services are becoming the basis of many e-business systems & web users are increasingly sharing their personal information with web service providers. ... 详细信息
来源: 评论
advanced computing, networking and security  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: P. Santhi Thilagam Alwyn Roshan Pais K. Chandrasekaran N. Balakrishnan
This book constitutes revised selected papers from the international conference on advanced computing, networking and security, adcons 2011, held in Surathkal, India, in December 2011. The 73 papers included in this b... 详细信息
来源: 评论