咨询与建议

限定检索结果

文献类型

  • 1,012 篇 会议
  • 4 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,017 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 286 篇 工学
    • 274 篇 计算机科学与技术...
    • 176 篇 软件工程
    • 74 篇 电气工程
    • 68 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 56 篇 医学
    • 56 篇 临床医学
  • 45 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 2 篇 生物学
  • 36 篇 管理学
    • 30 篇 图书情报与档案管...
    • 10 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 215 篇 information tech...
  • 176 篇 computer science
  • 111 篇 information retr...
  • 93 篇 internet
  • 83 篇 application soft...
  • 62 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 information secu...
  • 53 篇 computer network...
  • 52 篇 costs
  • 50 篇 information syst...
  • 49 篇 protection
  • 46 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 42 篇 watermarking
  • 41 篇 robustness
  • 40 篇 mobile computing

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...
  • 3 篇 department of el...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,017 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding and Computing, ITCC 2001"
1017 条 记 录,以下是91-100 订阅
排序:
No-capture hardware feature for securing sensitive information
No-capture hardware feature for securing sensitive informati...
收藏 引用
international conference on information technology - coding and computing
作者: Hussain, K Rajan, S Addulla, N Moussa, G Univ Cent Florida Coll Engn & Comp Sci Orlando FL 32816 USA
Protecting sensitive information (credit card information, social security number... etc) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulo... 详细信息
来源: 评论
Using principles of pervasive computing to design M-commerce applications
Using principles of pervasive computing to design M-commerce...
收藏 引用
international conference on information technology - coding and computing
作者: Kurkovsky, S Columbus State Univ Columbus GA USA
Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one... 详细信息
来源: 评论
Management of explicit and implicit knowledge in consulting companies
Management of explicit and implicit knowledge in consulting ...
收藏 引用
3rd international conference on information technology: coding and computing (itcc 2002)
作者: Bodendorf, F Uelpenich, S Univ Erlangen Nurnberg Dept Informat Syst D-90403 Nurnberg Germany
Knowledge management is very important in the consulting business. On the one hand knowledge is the crucial factor of production that differentiates consulting companies from their competitors. On the other hand knowl... 详细信息
来源: 评论
Computation and performance trade-offs in motion estimation algorithms
Computation and performance trade-offs in motion estimation ...
收藏 引用
2nd international conference on information technology - coding and computing (itcc 2001)
作者: Namuduri, KR Ji, AY Clark Atlanta Univ Ctr Theoret Studies Phys Syst Dept Comp Sci Atlanta GA 30314 USA
Real-time video/visual communication applications require trade-offs in terms of processing speed, visual image quality and power consumption. Motion estimation is one of the tusks in video coding that requires signif... 详细信息
来源: 评论
Towards an indoor location system using RF signal strength in IEEE 802.11 networks
Towards an indoor location system using RF signal strength i...
收藏 引用
international conference on information technology - coding and computing
作者: Harder, A Song, LL Wang, Y Auburn Univ Dept Software Engn & Comp Sci Auburn AL 36849 USA
Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information;they mainly work in outdoor environment. Applications call for... 详细信息
来源: 评论
Misbehavior detection in clustered ad-hoc networks with central control
Misbehavior detection in clustered ad-hoc networks with cent...
收藏 引用
international conference on information technology - coding and computing
作者: Vassilaras, S Vogiatzis, D Yovanof, GS Athens Information Technology Greece
Although individual node cooperation is necessary for the correct execution of network protocols in Mobile Ad-hoc Networks, it is not always guaranteed Therefore, misbehavior defection and reputation mechanisms need t... 详细信息
来源: 评论
Transaction mechanism design in decentralized computational market
Transaction mechanism design in decentralized computational ...
收藏 引用
international conference on information technology - coding and computing
作者: Fu, QF Yang, SB Li, MS Zhu, JM Univ Sci & Technol China Dept Comp Sci Hefei 230026 Peoples R China
Based on Utility and Mechanism Design theory, this paper describes grid resources trade and allocation mechanism in Decentralized Computational Market, focusing on the design of double auction and aggregate market mec... 详细信息
来源: 评论
Accessing temporal data objects in mobile computing environments
Accessing temporal data objects in mobile computing environm...
收藏 引用
international conference on information technology - coding and computing
作者: Wong, ACS Lee, VCS Lam, KW City Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China
In mobile computing environments, many real life applications involve transaction processing with temporal data objects which are updated periodically by external environment. Transaction in temporal database not only... 详细信息
来源: 评论
T-error correcting/d-error detecting (d>t) and all unidirectional error detecting codes with neural network. II
T-error correcting/d-error detecting (d>t) and all unidirect...
收藏 引用
international conference on information technology: coding and computing, itcc 2002
作者: Htay, Maung Maung Iyengar, S. Sitharama Zheng, Si Qing Department of Information Technology Radford University RadfordVA24142 United States Department of Computer Science Louisiana State University Baton RougeLA70803 United States Department of Computer Science University of Texas DallasTX75083 United States
For pt.I. see itcc, IEEE proceeding, p. 529-36 (April 2001). In this paper, we develop an algorithm for t-error correcting/d-error detecting and all unidirectional error detecting (t-EC/d-ED/AUED) codes in the framewo... 详细信息
来源: 评论
An extensible framework for practical secure component composition in a ubiquitous computing environment
An extensible framework for practical secure component compo...
收藏 引用
international conference on information technology - coding and computing
作者: Llewellyn-Jones, D Merabti, M Shi, Q Askwith, B Liverpool John Moores Univ Sch Comp & Math Sci Liverpool L3 5UX Merseyside England
Establishing the security properties of executable code provides an important challenge for advocates of ubiquitous computing. We provide a framework that utilises component composition techniques in order to establis... 详细信息
来源: 评论