咨询与建议

限定检索结果

文献类型

  • 1,034 篇 会议
  • 6 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 290 篇 工学
    • 278 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 76 篇 电气工程
    • 73 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 3 篇 轻工技术与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 56 篇 医学
    • 56 篇 临床医学
  • 43 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 生物学
  • 38 篇 管理学
    • 30 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 217 篇 information tech...
  • 177 篇 computer science
  • 112 篇 information retr...
  • 94 篇 internet
  • 83 篇 application soft...
  • 67 篇 image coding
  • 63 篇 data mining
  • 63 篇 cryptography
  • 57 篇 computer archite...
  • 57 篇 information secu...
  • 55 篇 computer network...
  • 53 篇 costs
  • 51 篇 protection
  • 50 篇 information syst...
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 43 篇 mobile computing
  • 43 篇 watermarking
  • 41 篇 streaming media

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 school of comput...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,041 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding Computing, ITCC 2004"
1041 条 记 录,以下是261-270 订阅
排序:
Performance evaluation of ad-hoc WLAN by M/G/1 queueing model
Performance evaluation of ad-hoc WLAN by M/G/1 queueing mode...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Sheng-Tzong Cheng Mingzoo Wu Department of Computer Science and Information Engineering National Cheng Kung University Tainan County Taiwan
The distributed coordination function (DCF) is specified for both ad-hoc and infrastructure network configurations in the IEEE 802.11 standard. In this paper, we present an analytic model for evaluating the performanc... 详细信息
来源: 评论
Tracking of unusual events in wireless sensor networks based on artificial neural-networks algorithms
Tracking of unusual events in wireless sensor networks based...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Kulakov D. Davcev Computer Science Department Faculty of Electrical Engineering Skopje Macedonia
Some of the algorithms developed within the artificial neural-networks tradition can be easily adopted to wireless sensor network platforms and will meet the requirements for sensor networks like: simple parallel dist... 详细信息
来源: 评论
Disciplined methods of software specification: a case study
Disciplined methods of software specification: a case study
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R.L. Baber D.L. Parnas S.A. Vilkomir P. Harrison T. O'Connor Software Quality Research Laboratory (SQRL) Department of Computer Science and Information Systems University of Limerick Ireland Dell Products Limerick Ireland
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and to help practitioners who want to app... 详细信息
来源: 评论
Replica placement in data grid: considering utility and risk
Replica placement in data grid: considering utility and risk
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R.M. Rahman K. Barker R. Alhajj Department of Computer Science University of Calgary Calgary AB Canada
Grid computing emerges from the need to integrate a collection of distributed computing resources to offer performance unattainable by any single machine. Grid technology facilitates data sharing across many organizat... 详细信息
来源: 评论
Applications of the Montgomery exponent
Applications of the Montgomery exponent
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Gueron O. Zuk Department of Mathematics University of Haifa Israel Department of Physics of Complex Systems Weizmann Institute of Science Israel
We define here the Montgomery exponent of order s, modulo the odd integer N, by MEXP = MEXP(A,X,N,s) = A/sup X/2/sup -s(X-1)/ (mod N), and illustrate some properties and usage of this operator. We show how A/sup X/ (m... 详细信息
来源: 评论
An adaptive scalable multiuser-OFDM system for multimedia transmission over fading channels
An adaptive scalable multiuser-OFDM system for multimedia tr...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.M.M. Nadhim Jianhua He Jiangtao Xi Zongkai Yang Electronics and Information Engineering Department Huazhong University of Science and Technology Wuhan China School of Electrical Computer and Telecommunications Engineering University of Wollongong Wollongong Australia
In this paper, an adaptive scalable multiuser-OFDM system was proposed for multimedia transmission over fading channels. The proposed adaptive algorithm can adapt according to the channel status information of each us... 详细信息
来源: 评论
Practical evaluation of a radial soft hash algorithm
Practical evaluation of a radial soft hash algorithm
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: F.-X. Standaert E. Lefebvre G. Rouvroy B. Macq J.-J. Quisquater J.-D. Legat Crypto Group Univ. Catholique de Louvain Belgium Laboratoire de Télécommunications et Télédétection Université Catholique de Louvain Belgium Laboratoire de Microélectronique Université Catholique de Louvain Belgium
This paper presents a practical evaluation of a radial soft hash algorithm, an image hashing technique used for image and visual content authentication. First we evaluate its collision resistance and susceptibility to... 详细信息
来源: 评论
Design theoretic approach to replicated declustering
Design theoretic approach to replicated declustering
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.S. Tosun Department of Computer Science University of Technology San Antonio TX USA
Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Most of the research on declustering is targeted at spatial range queries and investigates schemes ... 详细信息
来源: 评论
Media access mechanisms for integrated services in wireless networks
Media access mechanisms for integrated services in wireless ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Sheng-Tzong Cheng Ming-Hung Tao Mingzoo Wu Department of Computer Science and Information Engineering National Cheng Kung University Tainan County Taiwan
In the paper, we propose a media access framework for supporting integrated service including the real-time service, the controlled load service, and the best effort service in wireless networks. Three medium access m... 详细信息
来源: 评论
Dynamic learning of automata from the call stack log for anomaly detection
Dynamic learning of automata from the call stack log for ano...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zhen Liu S.M. Bridges Department of Computer Science and Engineering Mississippi State University USA
Anomaly detection based on monitoring of sequences of system calls has proved to be an effective approach for detection of previously unknown attacks on programs. This paper describes a new model for profiling normal ... 详细信息
来源: 评论