咨询与建议

限定检索结果

文献类型

  • 1,017 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 285 篇 工学
    • 274 篇 计算机科学与技术...
    • 176 篇 软件工程
    • 74 篇 电气工程
    • 69 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 57 篇 医学
    • 57 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 41 篇 理学
    • 31 篇 数学
    • 10 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 生物学
  • 38 篇 管理学
    • 31 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 216 篇 information tech...
  • 176 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 62 篇 cryptography
  • 61 篇 data mining
  • 58 篇 image coding
  • 56 篇 computer archite...
  • 55 篇 information secu...
  • 54 篇 computer network...
  • 52 篇 costs
  • 50 篇 information syst...
  • 50 篇 protection
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 41 篇 watermarking
  • 40 篇 mobile computing
  • 40 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 gippsland school...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 9 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,021 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding and Computing, ITCC 2002"
1021 条 记 录,以下是141-150 订阅
排序:
Intention scheduling for BDI agent systems
Intention scheduling for BDI agent systems
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zu-Nien Lin Hsun-Jen Hsu Feng-Jian Wang Department of Computer Science and Information Engineering National Chiao Tung University Hsinchu Taiwan
BDI is one of the models in agent systems. Currently, most of BDI agents' researches are focused on the ability for agents to dynamically select plans to achieve a goal. There are fewer discussions on intention sc... 详细信息
来源: 评论
Model-based verification in the development of dependable systems
Model-based verification in the development of dependable sy...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: D.B. Aredo O. Owe Norwegian Computing Centre Oslo Norway Department of Informatics University of Oslo Oslo Norway
In this paper, we present a framework that integrates the semi-formal modeling language, namely UML, with the formal method, namely PVS, to exploit their synergy in the development of dependable systems. System descri... 详细信息
来源: 评论
Orthogonal Hermite pulses used for UWB M-ary communication
Orthogonal Hermite pulses used for UWB M-ary communication
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Wen Hu Guoxin Zheng School of Communication and Information Engineering Shanghai University Shanghai China
Orthogonal Hermite pulse shapes used for ultra wideband communication are proposed. The paper suggests that M-ary biorthogonal modulation based on orthogonal Hermite pulse shapes can be used to construct M-ary communi... 详细信息
来源: 评论
A comparison of some clustering techniques via color segmentation
A comparison of some clustering techniques via color segment...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Agarwal S. Madasu M. Hanmandlu S. Vasikarla Department of Electrical Engineering Indian Institute of Technology Delhi New Delhi India Infosys Technologies Limited Chennai India IT Department American InterContinental University Los Angeles CA USA
This paper proposes a new improved modified mountain clustering technique. The proposed technique is being compared with some existing techniques such as FCM, Gath-Geva, probabilistic clustering and modified mountain ... 详细信息
来源: 评论
An analysis of reliable delivery specifications for Web services
An analysis of reliable delivery specifications for Web serv...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Pallickara G. Fox S.L. Pallickara Community Grids Laboratory Indiana University USA
Reliable delivery of messages is now a key component of the Web Services roadmap, with two promising, and competing, specifications in this area viz. WS-reliability (WSR) from OASIS and WS-reliable messaging (WSRM) fr... 详细信息
来源: 评论
SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments
SAFE-RD (secure, adaptive, fault tolerant, and efficient res...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Sharmin S. Ahmed S.I. Ahamed Department of Mathematics Statistic and Computer Science Marquette University Milwaukee WI USA
To facilitate thousands of hand held device users' lookup for services anywhere anytime, the importance of a resource discovery scheme in pervasive computing environments cannot be overlooked. The incorporation of... 详细信息
来源: 评论
No-capture hardware feature for securing sensitive information
No-capture hardware feature for securing sensitive informati...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: K. Hussain S. Rajan N. Addulla G. Moussa College of Engineering and Computer Science University of Central Florida USA
Protecting sensitive information (credit card information, social security number... etc.) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupul... 详细信息
来源: 评论
Modified radix-2 Montgomery modular multiplication to make it faster and simpler
Modified radix-2 Montgomery modular multiplication to make i...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: K. Manochehri S. Pourmozafari Department of Computer Engineering and IT Amirkabir University of Technology슠 Tehran Iran
Montgomery modular multiplication algorithm is commonly used in implementations of the RSA cryptosystem or other cryptosystems based on modular arithmetic. There are several improvements for making it suitable for har... 详细信息
来源: 评论
Text data mining: a case study
Text data mining: a case study
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: C.W. Ford Chia-Chu Chiang Hao Wu R.R. Chilka J.R. Talburt Department of Computer Science University of Arkansas Little Rock AR USA Acxiom Corporation AR USA
A vast amount of data is available on the World Wide Web. Many companies have started to mine this data to augment datasets used in production. This paper presents an industry study for one such text data mining. The ... 详细信息
来源: 评论
Evaluations of protein sequence alignments using structural information
Evaluations of protein sequence alignments using structural ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A. Auyeung U. Melcher Department of Computer Science Oklahoma State University Stillwater OK USA Department of Biochemistry and Molecular Genetics Oklahoma State University Stillwater OK USA
Correct alignment of protein sequences is critical for accurate understanding of the evolution of the protein. Therefore, it is important to know how likely an alignment is correct. Any approach that uses randomized s... 详细信息
来源: 评论