咨询与建议

限定检索结果

文献类型

  • 1,034 篇 会议
  • 6 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 290 篇 工学
    • 278 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 76 篇 电气工程
    • 73 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 3 篇 轻工技术与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 56 篇 医学
    • 56 篇 临床医学
  • 43 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 生物学
  • 38 篇 管理学
    • 30 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 217 篇 information tech...
  • 177 篇 computer science
  • 112 篇 information retr...
  • 94 篇 internet
  • 83 篇 application soft...
  • 67 篇 image coding
  • 63 篇 data mining
  • 63 篇 cryptography
  • 57 篇 computer archite...
  • 57 篇 information secu...
  • 55 篇 computer network...
  • 53 篇 costs
  • 51 篇 protection
  • 50 篇 information syst...
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 43 篇 mobile computing
  • 43 篇 watermarking
  • 41 篇 streaming media

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 school of comput...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,041 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding Computing, ITCC 2004"
1041 条 记 录,以下是141-150 订阅
排序:
Adaptation and configuration - support-possibilities of different learner types within virtual learning environments - an experience report
Adaptation and configuration - support-possibilities of diff...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: I. Sassen B. Schwartz-Reinken Institute of Information Systems University of Hamburg Germany
There is a variety of virtual learning environments leading from simple text-based HTML courses to more complex hyper-media structures including e.g. interactive learning modules realized as Java applets. In this pape... 详细信息
来源: 评论
An efficient secure key issuing protocol in ID-based cryptosystems
An efficient secure key issuing protocol in ID-based cryptos...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R. Gangishetti M.C. Gorantla M.L. Das A. Saxena V.P. Gulati Castle Hills Institute for Development and Research in Banking Technology Hyderabad Andhra Pradesh India
This paper presents an efficient and secure protocol for key issuing in ID-based cryptosystems using bilinear pairings. We use a simple blinding technique to eliminate the need of secure channel and multiple authoriti... 详细信息
来源: 评论
Intention scheduling for BDI agent systems
Intention scheduling for BDI agent systems
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zu-Nien Lin Hsun-Jen Hsu Feng-Jian Wang Department of Computer Science and Information Engineering National Chiao Tung University Hsinchu Taiwan
BDI is one of the models in agent systems. Currently, most of BDI agents' researches are focused on the ability for agents to dynamically select plans to achieve a goal. There are fewer discussions on intention sc... 详细信息
来源: 评论
Analyze grid from the perspective of a computing system
Analyze grid from the perspective of a computing system
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Guoshun Hao Shilong Ma Haoming Guo X. Wu M. Yang Y. Jiang National Laboratory of Software Development Environment Beijing Aeronautics and Astronautics University Beijing China Department of Electrical & Computer Engineering University of Nevada Las Vegas Las Vegas NV USA
This paper presents a service-based grid computing model which emphasizes that a grid is a special computing system. By comparing this model with the traditional computing system model, we analyze their similarities a... 详细信息
来源: 评论
Model-based verification in the development of dependable systems
Model-based verification in the development of dependable sy...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: D.B. Aredo O. Owe Norwegian Computing Centre Oslo Norway Department of Informatics University of Oslo Oslo Norway
In this paper, we present a framework that integrates the semi-formal modeling language, namely UML, with the formal method, namely PVS, to exploit their synergy in the development of dependable systems. System descri... 详细信息
来源: 评论
Orthogonal Hermite pulses used for UWB M-ary communication
Orthogonal Hermite pulses used for UWB M-ary communication
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Wen Hu Guoxin Zheng School of Communication and Information Engineering Shanghai University Shanghai China
Orthogonal Hermite pulse shapes used for ultra wideband communication are proposed. The paper suggests that M-ary biorthogonal modulation based on orthogonal Hermite pulse shapes can be used to construct M-ary communi... 详细信息
来源: 评论
A comparison of some clustering techniques via color segmentation
A comparison of some clustering techniques via color segment...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Agarwal S. Madasu M. Hanmandlu S. Vasikarla Department of Electrical Engineering Indian Institute of Technology Delhi New Delhi India Infosys Technologies Limited Chennai India IT Department American InterContinental University Los Angeles CA USA
This paper proposes a new improved modified mountain clustering technique. The proposed technique is being compared with some existing techniques such as FCM, Gath-Geva, probabilistic clustering and modified mountain ... 详细信息
来源: 评论
An analysis of reliable delivery specifications for Web services
An analysis of reliable delivery specifications for Web serv...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Pallickara G. Fox S.L. Pallickara Community Grids Laboratory Indiana University USA
Reliable delivery of messages is now a key component of the Web Services roadmap, with two promising, and competing, specifications in this area viz. WS-reliability (WSR) from OASIS and WS-reliable messaging (WSRM) fr... 详细信息
来源: 评论
SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments
SAFE-RD (secure, adaptive, fault tolerant, and efficient res...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Sharmin S. Ahmed S.I. Ahamed Department of Mathematics Statistic and Computer Science Marquette University Milwaukee WI USA
To facilitate thousands of hand held device users' lookup for services anywhere anytime, the importance of a resource discovery scheme in pervasive computing environments cannot be overlooked. The incorporation of... 详细信息
来源: 评论
No-capture hardware feature for securing sensitive information
No-capture hardware feature for securing sensitive informati...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: K. Hussain S. Rajan N. Addulla G. Moussa College of Engineering and Computer Science University of Central Florida USA
Protecting sensitive information (credit card information, social security number... etc.) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupul... 详细信息
来源: 评论