咨询与建议

限定检索结果

文献类型

  • 1,034 篇 会议
  • 6 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 290 篇 工学
    • 278 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 76 篇 电气工程
    • 73 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 3 篇 轻工技术与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 56 篇 医学
    • 56 篇 临床医学
  • 43 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 生物学
  • 38 篇 管理学
    • 30 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 217 篇 information tech...
  • 177 篇 computer science
  • 112 篇 information retr...
  • 94 篇 internet
  • 83 篇 application soft...
  • 67 篇 image coding
  • 63 篇 data mining
  • 63 篇 cryptography
  • 57 篇 computer archite...
  • 57 篇 information secu...
  • 55 篇 computer network...
  • 53 篇 costs
  • 51 篇 protection
  • 50 篇 information syst...
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 43 篇 mobile computing
  • 43 篇 watermarking
  • 41 篇 streaming media

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 school of comput...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,041 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding Computing, ITCC 2004"
1041 条 记 录,以下是231-240 订阅
排序:
Watermark detection schemes with high security
Watermark detection schemes with high security
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Liu Yongliang Xiaolin Yang Hongxun Yao Tiejun Huang Wen Gao Harbin Institute of Technology China Institute for Computing Technology China
In traditional watermark detection, a prover exposes the secret information that can be used to remove the watermark to the possible dishonest verifier in order to prove a watermark presents in a digital data. This is... 详细信息
来源: 评论
Concept-based information access
Concept-based information access
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R. Ozcan Y.A. Aslandogan Department of Computer Science and Engineering University of Technology USA
Concept-based access to information promises important benefits over keyword-based access. One of these benefits is the ability to take advantage of semantic relationships among concepts in finding relevant documents.... 详细信息
来源: 评论
Digital chips for an on-line casino
Digital chips for an on-line casino
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J. Castella-Roca G. Navarro J.A. Ortega-Ruiz J. Garcia ETSE-URV Catalonia Spain Universidad Autonoma de Barcelona Catalonia Spain
Unlike in traditional environments, e-gambling players must make a beforehand payment to start a game. Most on-line casinos currently solve this problem using prepayment systems where the on-line casino has absolute c... 详细信息
来源: 评论
AES power attack based on induced cache miss and countermeasure
AES power attack based on induced cache miss and countermeas...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: G. Bertoni V. Zaccaria L. Breveglieri M. Monchiero G. Palermo Advanced System Technology STMicroelectronics Agrate Milan Italy Dipartimento di Elettronica e Informazione Politecnico di Milano Milan Italy
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus inducing a cache miss during the encryption... 详细信息
来源: 评论
Stateful Inspection firewall session table processing
Stateful Inspection firewall session table processing
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Xin Li Zheng-Zhou Ji Ming-Zeng Hu School of Computer Science and Technology Harbin Institute of Technology Harbin China
Stateful Inspection is a key technology to network devices such as routers and firewalls. Existed session table architectures of Stateful Inspection devices store all session information in a single entry, which cause... 详细信息
来源: 评论
Fast parallel table lookups to accelerate symmetric-key cryptography
Fast parallel table lookups to accelerate symmetric-key cryp...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Murat Fiskiran R.B. Lee Department of Electrical Engineering Princeton University USA
Table lookups are one of the most frequently-used operations in symmetric key ciphers. Particularly in the newer algorithms such as the advanced encryption standard (AES), we frequently find that the greatest fraction... 详细信息
来源: 评论
A classifier-based text mining approach for evaluating semantic relatedness using support vector machines
A classifier-based text mining approach for evaluating seman...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Chung-Hong Lee Hsin-Chang Yang Department of Electrical Engineering National Kaohsiung University of Applied Sciences Kaohsiung Taiwan Department of Information Management Chang Jung University Tainan County Taiwan
The quantification of evaluating semantic relatedness among texts has been a challenging issue that pervades much of machine learning and natural language processing. This paper presents a hybrid approach of a text-mi... 详细信息
来源: 评论
ID-based one round authenticated group key agreement protocol with bilinear pairings
ID-based one round authenticated group key agreement protoco...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Yijuan Shi Gongliang Chen Jianhua Li Department of Electronic Engineering Shanghai Jiaotong University Shanghai China
Authenticated group key agreement is important in many modern collaborative and distributed applications. Recently, identity-based authenticated group key agreement has been increasingly researched because of the simp... 详细信息
来源: 评论
Enhancing focused crawling with genetic algorithms
Enhancing focused crawling with genetic algorithms
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Shokouhi P. Chubak Z. Raeesy School of Computer Science and IT RMIT University Melbourne Australia Department of Computer Engineering Sharif University of Technology Tehran Iran Department of Computer Engineering Bu-Ali Sina University Tehran Iran
Web crawlers are one of the most crucial components in search engines and their optimization would have a great effect on improving the searching efficiency. In this paper, we introduce an intelligent crawler called G... 详细信息
来源: 评论
Layered MPEG video transmission over IP DiffServ
Layered MPEG video transmission over IP DiffServ
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Hong Zhao N. Ansari Y.Q. Shi College of Engineering Embrey-Riddle Aeronautical University Prescott AZ USA Advanced Networking Laboratory New Jersey Institute of Technology Newark NJ USA
Multimedia applications have become one of the major traffic to be transported through networks. These applications require high bandwidth and stringent quality of service (QoS). The end video quality is determined no... 详细信息
来源: 评论