咨询与建议

限定检索结果

文献类型

  • 1,034 篇 会议
  • 6 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 290 篇 工学
    • 278 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 76 篇 电气工程
    • 73 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 3 篇 轻工技术与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 56 篇 医学
    • 56 篇 临床医学
  • 43 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 生物学
  • 38 篇 管理学
    • 30 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 217 篇 information tech...
  • 177 篇 computer science
  • 112 篇 information retr...
  • 94 篇 internet
  • 83 篇 application soft...
  • 67 篇 image coding
  • 63 篇 data mining
  • 63 篇 cryptography
  • 57 篇 computer archite...
  • 57 篇 information secu...
  • 55 篇 computer network...
  • 53 篇 costs
  • 51 篇 protection
  • 50 篇 information syst...
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 43 篇 mobile computing
  • 43 篇 watermarking
  • 41 篇 streaming media

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 school of comput...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,041 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding Computing, ITCC 2004"
1041 条 记 录,以下是551-560 订阅
排序:
Security level evaluation: policy and fuzzy techniques
Security level evaluation: policy and fuzzy techniques
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: V. Casola M. Rak R. Preziosi L. Troiano Dipartimento di Ingegneria dellInformazione Second University of Naples Caserta Italy RCOST Department of Engineering University of Sannio Benevento Italy
In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The abilit... 详细信息
来源: 评论
Combining the product of Interactive Multimedia Creator with MPEG4 technology
Combining the product of Interactive Multimedia Creator with...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zheng Xiang Zhou Bing-Feng Fang Xi-Feng Sun Jin-Wen Si Duan-Feng Institute of Computer Science & Technology Peking University Beijing China
In order to enhance the functions of IMCPs (the Product of Interactive Multimedia Creator) over Internet through streaming multimedia technology., in the paper, some methods are proposed to combine IMCPs with MPEG4 te... 详细信息
来源: 评论
Detecting anomalies in high-performance parallel programs
Detecting anomalies in high-performance parallel programs
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: G. Florez Z. Liu S. Bridges R. Vaughn A. Skjellum The Center for Computer Security Research Mississippi State University USA Department of Computer and Information Sciences University of Alabama Birmingham USA
Message passing interface (MPI) is an effective programming technique for implementing parallel programs for distributed computation. As these applications run, a number of different types of irregularities can occur ... 详细信息
来源: 评论
Component-based embedded database for mobile embedded systems
Component-based embedded database for mobile embedded system...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S.I. Ahamed S. Vallecha Marquette University Milwaukee WI USA
Recent developments in portable devices and growing wireless communication networks have evolved mobile computing during the last few years. Mobile computing enlarges the usability of computers by allowing low powered... 详细信息
来源: 评论
Measuring the scalability of relationally mapped semistructured queries
Measuring the scalability of relationally mapped semistructu...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R.J. Cathey S.M. Beitzel E.C. Jensen A.J. Pilotto D. Grossman Information Retrieval Laboratory Department of Computer Science Illinois Institute of Technology Chicago IL USA
The explosive growth of XML has led to an increasing need for scalable XML retrieval systems. Our XML retrieval system, the SQLGenerator, stores XML of any schema in a fixed schema relational database and supports a f... 详细信息
来源: 评论
Fuzzy edge detector using entropy optimization
Fuzzy edge detector using entropy optimization
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Hanmandlu J. See S. Vasikarla Department of Electrical Engineering Indian Institute of Technology Delhi New Delhi India
This paper proposes a fuzzy-based approach to edge detection in gray-level images. The proposed fuzzy edge detector involves two phases - global contrast intensification and local fuzzy edge detection. In the first ph... 详细信息
来源: 评论
Performance study of a MLS/DBMS implemented as a kernelized architecture
Performance study of a MLS/DBMS implemented as a kernelized ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Garuba E. Appiah L. Burge Department of Systems and Computer Science Howard University College of Medicine Washington D.C. DC USA
Although users of multi-level secure database management system (MLS/DBMS) continue to rely on existing systems to satisfy their multi-level security needs, these systems no longer enjoy direct commercial-off-the-shel... 详细信息
来源: 评论
Summarizing inter-query learning in content-based image retrieval via incremental semantic clustering
Summarizing inter-query learning in content-based image retr...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: I. Gondra D.R. Heisterkamp Department of Computer Science Oklahoma State University Stillwater OH USA
In previous work, we developed a novel relevance feedback (RF) framework that learns one-class support vector machines (ISVM) from retrieval experience to represent the set memberships of users' high level semanti... 详细信息
来源: 评论
Arcanum: a secure and efficient key exchange protocol for the Internet
Arcanum: a secure and efficient key exchange protocol for th...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.S. Mian A. Masood Computer Science & Software Engineering University of Western Australia Crawley WA Australia Signals R&D Establishment MCS National University of Science and Technology Rawalpindi Pakistan
A VPN establishes a cryptographically secure network using the existing insecure infrastructure of the Internet. A number of protocols, including IPSec have been designed to establish VPNs. However, keys must be share... 详细信息
来源: 评论
Assessing distance learning student's performance: a natural language processing approach to analyzing class discussion messages
Assessing distance learning student's performance: a natural...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Yi-fang Brook Wu Xin Chen Information Systems Department New Jersey Institute of Technology USA
In classes supported by electronic messaging systems, students are required or encouraged to discuss the class topics and share their knowledge by posting text messages and replying to others. When the amount of messa... 详细信息
来源: 评论