咨询与建议

限定检索结果

文献类型

  • 1,034 篇 会议
  • 6 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 290 篇 工学
    • 278 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 76 篇 电气工程
    • 73 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 3 篇 轻工技术与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 56 篇 医学
    • 56 篇 临床医学
  • 43 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 生物学
  • 38 篇 管理学
    • 30 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 217 篇 information tech...
  • 177 篇 computer science
  • 112 篇 information retr...
  • 94 篇 internet
  • 83 篇 application soft...
  • 67 篇 image coding
  • 63 篇 data mining
  • 63 篇 cryptography
  • 57 篇 computer archite...
  • 57 篇 information secu...
  • 55 篇 computer network...
  • 53 篇 costs
  • 51 篇 protection
  • 50 篇 information syst...
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 43 篇 mobile computing
  • 43 篇 watermarking
  • 41 篇 streaming media

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 school of comput...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,041 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding Computing, ITCC 2004"
1041 条 记 录,以下是281-290 订阅
排序:
Performance evaluation of secure concurrency control algorithm for multilevel secure distributed database system
Performance evaluation of secure concurrency control algorit...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: N. Kaur R. Singh A.K. Sarje M. Misra Department of Electronics and Computer Engineering Indian Institute of Technology Roorkee Roorkee Uttarakhand India
Majority of the research in multilevel secure database management systems (MLS/DBMS) focuses primarily on centralized database systems. However, with the demand for higher performance and higher availability, database... 详细信息
来源: 评论
Optimized scheduling for data aggregation in wireless sensor networks
Optimized scheduling for data aggregation in wireless sensor...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: F. Hu X. Cao C. May Computer Engineering Department Rochester Institute of Technology Rochester NY USA Information Technology Department Rochester Institute of Technology Rochester NY USA
The most important issue in wireless sensor networks is energy consumption. To this end, many networking schemes attempt to minimize the amount of data transmitted by using data aggregation. This trades off data fresh... 详细信息
来源: 评论
Managing a relational database with intelligent agents
Managing a relational database with intelligent agents
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: I. Rudowsky O. Kulyba M. Kunin D. Ogarodnikov T. Raphan Institute of Neural & Intelligent Systems Department of Computer & Information Science Brooklyn College of CUNY USA Department of Neurology Mount Sinai School of Medicine USA
A prototype relational database system was developed that has indexing capability, which threads into data acquisition and analysis programs used by a wide range of researchers. To streamline the user interface and ta... 详细信息
来源: 评论
Fuzzy-based parameterized Gaussian edge detector using global and local properties
Fuzzy-based parameterized Gaussian edge detector using globa...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J. See M. Hanmandlu S. Vasikarla Faculty of Information Technology Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia Department of Electrical Engineering Indian Institute of Technology Delhi New Delhi India IT Department American InterContinental University Los Angeles CA USA
Many edge detection schemes suffer from the lack of image quality at the global level. Global properties are more vital in grayscale images due to loss of hue and texture. This paper proposes a novel fuzzy-based Gauss... 详细信息
来源: 评论
A mobile commerce framework based on Web services architecture
A mobile commerce framework based on Web services architectu...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Yao-Chung Chang Jiann-Liang Chen Wen-Ming Tseng Department of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan
"Mobile Internet" arguably means more than just a new technique for communication; many analysts believe that it revolutionized the business world and innovate the way individuals live. This study concentrat... 详细信息
来源: 评论
Efficient array & pointer bound checking against buffer overflow attacks via hardware/software
Efficient array & pointer bound checking against buffer over...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zili Shao Chun Xue Qingfeng Zhuge E.H.M. Sha Bin Xiao Department of Computer Science University of Technology Dallas TX USA Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China
Buffer overflow attacks cause serious security problems. Array & pointer bound checking is one of the most effective approaches for defending against buffer overflow attacks when source code is available. However;... 详细信息
来源: 评论
Effective steganalysis based on statistical moments of wavelet characteristic function
Effective steganalysis based on statistical moments of wavel...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Y.Q. Shi Guorong Xuan Chengyun Yang Jianjiong Gao Zhenping Zhang Peiqi Chai Dekun Zou Chunhua Chen Wen Chen New Jersey Institute of Technology Newark NJ USA University of Tongji Shanghai China
In this paper, an effective steganalysis based on statistical moments of wavelet characteristic function is proposed. It decomposes the test image using two-level Haar wavelet transform into nine subbands (here the im... 详细信息
来源: 评论
Constructing different learning paths through e-learning
Constructing different learning paths through e-learning
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Kyoung Mi Yang R.J. Ross Seong Baeg Kim Department of Computer Education National University South Korea Computer Science Department Montana State University USA
It is a challenging problem to apply an efficient teaching-learning method to the situation where learners have diverse computing backgrounds and the learning content to be covered is also in the broad coverage. In th... 详细信息
来源: 评论
The N/R one time password system
The N/R one time password system
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: V. Goyal A. Abraham S. Sanyal Sang Yong Han OSP Global Mumbai India School of Computer Science and Engineering Chung Ang University South Korea School of Technology & Computer Science Tata Institute of Fundamental Research India
A new one time password system is described which is secure against eavesdropping and server database compromise at the same time. Traditionally, these properties have proven to be difficult to satisfy at the same tim... 详细信息
来源: 评论
The BPEL orchestrating framework for secured grid services
The BPEL orchestrating framework for secured grid services
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: P. Amnuaykanjanasin N. Nupairoj Department of Computer Engineering Chulalongkom University Bangkok Thailand
Workflow has been considered as a crucial component in several Grid projects. Among many workflow standards, BPEL, Business Process Execution Language, is emerging as a de-facto workflow standard in Grid and Web servi... 详细信息
来源: 评论