咨询与建议

限定检索结果

文献类型

  • 1,034 篇 会议
  • 6 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 290 篇 工学
    • 278 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 76 篇 电气工程
    • 73 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 3 篇 轻工技术与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 56 篇 医学
    • 56 篇 临床医学
  • 43 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 生物学
  • 38 篇 管理学
    • 30 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 217 篇 information tech...
  • 177 篇 computer science
  • 112 篇 information retr...
  • 94 篇 internet
  • 83 篇 application soft...
  • 67 篇 image coding
  • 63 篇 data mining
  • 63 篇 cryptography
  • 57 篇 computer archite...
  • 57 篇 information secu...
  • 55 篇 computer network...
  • 53 篇 costs
  • 51 篇 protection
  • 50 篇 information syst...
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 43 篇 mobile computing
  • 43 篇 watermarking
  • 41 篇 streaming media

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 school of comput...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,041 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding Computing, ITCC 2004"
1041 条 记 录,以下是411-420 订阅
排序:
Geoblock: a LVQ-based framework for geographic image retrieval
Geoblock: a LVQ-based framework for geographic image retriev...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: L. Zhu Department of Information Technology Armstrong Atlantic State University Savannah USA
Novel approaches are needed to support content-based retrieval on geographic image databases. Motivated by the success in the text-based information retrieval, where the indexing and retrieval is based on keywords, we... 详细信息
来源: 评论
A novel DCT-based approach for secure color image watermarking
A novel DCT-based approach for secure color image watermarki...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: N. Ahmidi R. Safabakhsh Amirkabir University of Technology슠 Iran
We focus on visually meaningful color image watermarks, we construct a new digital watermarking scheme based on the discrete cosine transformation. The proposed method uses the sensitivity of human eyes to adoptively ... 详细信息
来源: 评论
A system for ensuring data integrity in grid environments
A system for ensuring data integrity in grid environments
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Gilbert A. Abraham M. Paprzycki Department of Computer Science Oklahoma State University USA
Data integrity has to become one of the central concerns of large-scale distributed computing systems such as the grid, whose primary products are the results of computation. In order to maintain the integrity of this... 详细信息
来源: 评论
Architectural design features of a programmable high throughput AES coprocessor
Architectural design features of a programmable high through...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Hodjat P. Schaumont I. Verbauwhede Electrical Engineering Department University of California Los Angeles USA
Programmable, high throughput domain specific crypto processors are required for different networking applications. We present the architectural design features that lead to a multiple Gbits/s rate AES coprocessor, wh... 详细信息
来源: 评论
How to make e-cash with non-repudiation and anonymity
How to make e-cash with non-repudiation and anonymity
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R. Song L. Korba Institute for Information Technology National Research Council Canada Ottawa ONT Canada
Current e-cash systems enable anonymity services to protect users' privacy, but most of them do not provide the nonrepudiation service such that many problems exist in the systems like denying, losing, misusing, s... 详细信息
来源: 评论
A hybrid classifier approach for Web retrieved documents classification
A hybrid classifier approach for Web retrieved documents cla...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R.S. Bot Yi-fang Brook Wu Xin Chen Quanzhi Li Information Systems Department New Jersey Institute of Technology USA
The paper presents a hybrid technique for the classification of Web returned hits into concept hierarchies. The technique involves a combination of manual and automatic classifiers. At first, all Web returned document... 详细信息
来源: 评论
A parallel architecture for computing scalar multiplication on Hessian elliptic curves
A parallel architecture for computing scalar multiplication ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: N.A. Saqib F. Rodriguez-Henriquez A. Diaz-Perez Computer Science Section Electrical Engineering Department Centro de Investigación y de Estudios Avanazados del Instituto Politécnico Nacional Mexicali Mexico
A parallel architecture for the computation of Hessian elliptic curve scalar multiplication over binary fields is presented. The architecture was designed as general as possible trying to make no assumptions about the... 详细信息
来源: 评论
Identity-based threshold signature scheme from the bilinear pairings (extended abstract)
Identity-based threshold signature scheme from the bilinear ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Joonsang Baek Yuliang Zheng Monash University Australia UNC-Charlotte USA
The focus of this paper is to formalize the concept of identity-based threshold signature and give the first provably secure scheme based on the bilinear pairings. An important feature of our scheme is that a private ... 详细信息
来源: 评论
Applying continuous action reinforcement learning automata(CARLA) to global training of hidden Markov models
Applying continuous action reinforcement learning automata(C...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J. Kabudian M.R. Meybodi M.M. Homayounpour Department of Computer Engineering and Information Technology Amirkabir University of Technology슠 Tehran Iran
In this research, we have employed global search and global optimization techniques based on simulated annealing (SA) and continuous action reinforcement learning automata (CARLA) for global training of hidden Markov ... 详细信息
来源: 评论
Experiments on a secure compression algorithm
Experiments on a secure compression algorithm
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: E. Celikel M.E. Dalkilic Ege University International Computer Institute Turkey
A compression tool can provide security to some degree, if the algorithm itself is kept secret. Whenever the algorithm is known, as is the case for conventional compression, we cannot expect secrecy out of the tool. I... 详细信息
来源: 评论