咨询与建议

限定检索结果

文献类型

  • 1,012 篇 会议
  • 4 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,017 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 286 篇 工学
    • 274 篇 计算机科学与技术...
    • 176 篇 软件工程
    • 74 篇 电气工程
    • 68 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 56 篇 医学
    • 56 篇 临床医学
  • 45 篇 理学
    • 32 篇 数学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 2 篇 生物学
  • 36 篇 管理学
    • 30 篇 图书情报与档案管...
    • 10 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 215 篇 information tech...
  • 176 篇 computer science
  • 111 篇 information retr...
  • 93 篇 internet
  • 83 篇 application soft...
  • 62 篇 image coding
  • 62 篇 cryptography
  • 61 篇 data mining
  • 56 篇 computer archite...
  • 55 篇 information secu...
  • 53 篇 computer network...
  • 52 篇 costs
  • 50 篇 information syst...
  • 49 篇 protection
  • 46 篇 grid computing
  • 45 篇 bandwidth
  • 45 篇 humans
  • 42 篇 watermarking
  • 41 篇 robustness
  • 40 篇 mobile computing

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...
  • 3 篇 department of el...

作者

  • 10 篇 d. grossman
  • 7 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,017 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding and Computing, ITCC 2001"
1017 条 记 录,以下是11-20 订阅
Research on grid resource reliability model based on promise
Research on grid resource reliability model based on promise
收藏 引用
international conference on information technology - coding and computing
作者: Li, MS Yang, SB Fu, QF Yang, J Univ Sci & Technol China Dept Comp Sci Hefei 230026 Peoples R China
To distinguish the reliabilities of different resources is difficult in the grid environment. For the first time the signaling game theory is applied to the research on grid resource reliability, and a grid resource r... 详细信息
来源: 评论
The GSI plug-in for gSOAP: Enhanced security, performance, and reliability
The GSI plug-in for gSOAP: Enhanced security, performance, a...
收藏 引用
international conference on information technology - coding and computing
作者: Aloisio, G Cafaro, M Epicoco, I Lezzi, D van Engelen, R Univ Lecce Ctr Adv Computat Technol I-73100 Lecce Italy
In this paper we report on the current status of the GSI plug-in for gSOAP an open source solution to the problem of securing web services in grid environments.
来源: 评论
Protection of privacy in pervasive computing environments
Protection of privacy in pervasive computing environments
收藏 引用
international conference on information technology - coding and computing
作者: Cheng, HS Zhang, DQ Tan, JG Inst Infocomm Res Context Aware Syst Dept Singapore 119613 Singapore
In this paper, we present two techniques. The first technique called Privacy Sensitive information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and f... 详细信息
来源: 评论
A new phylogenetic tree model for fuzzy characters
A new phylogenetic tree model for fuzzy characters
收藏 引用
international conference on information technology - coding and computing
作者: Auyeung, A Oklahoma State Univ Dept Comp Sci Stillwater OK 74078 USA
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be... 详细信息
来源: 评论
Bluetooth as an enabling technology in mobile transactions
Bluetooth as an enabling technology in mobile transactions
收藏 引用
international conference on information technology - coding and computing
作者: Pradhan, S Lawrence, E Zmijewska, A UTS Australia
Mobile Commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial ... 详细信息
来源: 评论
A new authentication and key exchange protocol in WLAN
A new authentication and key exchange protocol in WLAN
收藏 引用
itcc 2005 - international conference on information technology: coding and computing
作者: Chen, Zhuo Hong, Fan Hong, Liang Laboratory of Information Security School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
The security of identity authentication and key negotiate is an important foundation of WLAN (Wireless Local Area Network) security. We present a new authentication and key exchange protocol Wireless Key Exchange (WKE... 详细信息
来源: 评论
An ontology-enabled service oriented architecture for pervasive computing
An ontology-enabled service oriented architecture for pervas...
收藏 引用
international conference on information technology - coding and computing
作者: Ni, Q Sloman, M Univ London Imperial Coll Sci & Technol Dept Comp London SW7 2AZ England
In this paper, we propose a new Ontology-enabled Service Oriented Architecture (OSOA) for Pervasive computing that is built on Web Services architecture, and incorporates Universal Plug and Play (UPnP). OSOA aims to c... 详细信息
来源: 评论
A mathematical investigation on retrieval performance evaluation measures of information retrieval algorithm
A mathematical investigation on retrieval performance evalua...
收藏 引用
itcc 2005 - international conference on information technology: coding and computing
作者: Song, Jun-Feng Zhang, Wei-Ming Xiao, Wei-Dong School of Information System and Management National University of Defense Technology ChangSha 410073 China
Retrieval performance evaluation measures of information retrieval algorithm are the foundation of evaluating and improving information retrieval algorithm. In this paper precision and recall are analyzed mathematical... 详细信息
来源: 评论
information navigation profiles for mediation and adaptation
Information navigation profiles for mediation and adaptation
收藏 引用
international conference on information technology - coding and computing
作者: Gargi, U Hewlett Packard Labs Palo Alto CA 94304 USA
information retrieval (IR) systems offer a variety of interfaces and interaction modes. A given IR system's interface and interaction mode may not be optimal for a given accessing device/network pair or desired by... 详细信息
来源: 评论
Mitigating denial of service attacks with password puzzles
Mitigating denial of service attacks with password puzzles
收藏 引用
international conference on information technology - coding and computing
作者: Ma, M Inst Infocomm Res I2R Singapore 119613 Singapore
The client puzzles have been proposed as an important mechanism in defendiug against distributed denial-of-service (DDoS) attacks. In this paper we propose a new IP layer client puzzles scheme, password puzzles (PP). ... 详细信息
来源: 评论