咨询与建议

限定检索结果

文献类型

  • 1,017 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 285 篇 工学
    • 274 篇 计算机科学与技术...
    • 176 篇 软件工程
    • 74 篇 电气工程
    • 69 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 57 篇 医学
    • 57 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 41 篇 理学
    • 31 篇 数学
    • 10 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 生物学
  • 38 篇 管理学
    • 31 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 216 篇 information tech...
  • 176 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 62 篇 cryptography
  • 61 篇 data mining
  • 58 篇 image coding
  • 56 篇 computer archite...
  • 55 篇 information secu...
  • 54 篇 computer network...
  • 52 篇 costs
  • 50 篇 information syst...
  • 50 篇 protection
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 41 篇 watermarking
  • 40 篇 mobile computing
  • 40 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 gippsland school...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 9 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,021 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding and Computing, ITCC 2002"
1021 条 记 录,以下是221-230 订阅
排序:
Towards an intrusion detection system for pervasive computing environments
Towards an intrusion detection system for pervasive computin...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: P. Kannadiga M. Zulkernine S.I. Ahamed School of Computing Queen's University Kingston ONT Canada Department of Math Stat. and Com. Science Marquette University Milwaukee WI USA
A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activi... 详细信息
来源: 评论
Autonomous and dynamic Web service composition in wireless grids
Autonomous and dynamic Web service composition in wireless g...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Haoming Guo M. Yang X. Wu Y. Jiang Shilong Ma Guoshun Hao National Laboratory of Software Development Environment Beijing Aeronautics and Astronautics University Beijing China Department of Electrical & Computer Engineering University of Nevada Las Vegas Las Vegas NV USA
In combination of Web service and wireless technology, grid computing is evolved into a de facto standard for shared-resource computations. Although numerous efforts have been made on the construction of grid systems,... 详细信息
来源: 评论
Development and evaluation of a slicing-based C++ debugger
Development and evaluation of a slicing-based C++ debugger
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: W. Wichaipanitch M.H. Samadzadeh S. Tangsripairoj Rajamangala University of Technology Klong Luang Pathum Thani Thailand Computer Science Department Oklahoma State University Stillwater OK USA Department of Computer Science Mahidol University Bangkok Thailand
The main objective of this work was to develop a debugging tool for C++ programs called C++Debug that uses program slicing and dicing techniques. The incremental development started by including simple statements firs... 详细信息
来源: 评论
Using RoleOf relationship in design pattern instantiation
Using RoleOf relationship in design pattern instantiation
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Chengwan He Keqing He F. He Feng Yao Jin Liu State key laboratory of Software Engineering Wuhan University of China China MDA Technology Department Fujitsu Laboratories Limited Shin-yokohama Japan Department of Computer Science and Technology Wuhan Institute of Chemical Technology China
The scattering of pattern logic (the attributes and methods of pattern role) is the most typical problem on design pattern instantiation, that is, pattern logic scatters across multiple business classes, which causes ... 详细信息
来源: 评论
XML schema re-engineering using a conceptual schema approach
XML schema re-engineering using a conceptual schema approach
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: O.Y. Yuliana S. Chittayasothorn Assumption University Thailand and Petro Christian University Indonesia Faculty of Engineering King Mongkut's Institute of Technology Bangkok Thailand
At present, the Extensible Markup Language (XML) is popular for both data presentation and data transfer activities. XML Documents follow XML Schemas. It is possible to use them as database schemas and databases. An X... 详细信息
来源: 评论
Conversion and proxy functions for symmetric key ciphers
Conversion and proxy functions for symmetric key ciphers
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: D.L. Cool A.D. Keromytis Dept. of Comput. Sci. Columbia Univ. New York NY USA Department of Computer Science Columbia University USA
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is des... 详细信息
来源: 评论
Watermark detection schemes with high security
Watermark detection schemes with high security
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Liu Yongliang Xiaolin Yang Hongxun Yao Tiejun Huang Wen Gao Harbin Institute of Technology China Institute for Computing Technology China
In traditional watermark detection, a prover exposes the secret information that can be used to remove the watermark to the possible dishonest verifier in order to prove a watermark presents in a digital data. This is... 详细信息
来源: 评论
Digital chips for an on-line casino
Digital chips for an on-line casino
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: J. Castella-Roca G. Navarro J.A. Ortega-Ruiz J. Garcia ETSE-URV Catalonia Spain Universidad Autonoma de Barcelona Catalonia Spain
Unlike in traditional environments, e-gambling players must make a beforehand payment to start a game. Most on-line casinos currently solve this problem using prepayment systems where the on-line casino has absolute c... 详细信息
来源: 评论
Concept-based information access
Concept-based information access
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: R. Ozcan Y.A. Aslandogan Department of Computer Science and Engineering University of Technology USA
Concept-based access to information promises important benefits over keyword-based access. One of these benefits is the ability to take advantage of semantic relationships among concepts in finding relevant documents.... 详细信息
来源: 评论
AES power attack based on induced cache miss and countermeasure
AES power attack based on induced cache miss and countermeas...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: G. Bertoni V. Zaccaria L. Breveglieri M. Monchiero G. Palermo Advanced System Technology STMicroelectronics Agrate Milan Italy Dipartimento di Elettronica e Informazione Politecnico di Milano Milan Italy
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus inducing a cache miss during the encryption... 详细信息
来源: 评论