咨询与建议

限定检索结果

文献类型

  • 1,017 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 285 篇 工学
    • 274 篇 计算机科学与技术...
    • 176 篇 软件工程
    • 74 篇 电气工程
    • 69 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 57 篇 医学
    • 57 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 41 篇 理学
    • 31 篇 数学
    • 10 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 生物学
  • 38 篇 管理学
    • 31 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 216 篇 information tech...
  • 176 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 62 篇 cryptography
  • 61 篇 data mining
  • 58 篇 image coding
  • 56 篇 computer archite...
  • 55 篇 information secu...
  • 54 篇 computer network...
  • 52 篇 costs
  • 50 篇 information syst...
  • 50 篇 protection
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 41 篇 watermarking
  • 40 篇 mobile computing
  • 40 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 gippsland school...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 9 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,021 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding and Computing, ITCC 2002"
1021 条 记 录,以下是261-270 订阅
排序:
Applications of the Montgomery exponent
Applications of the Montgomery exponent
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: S. Gueron O. Zuk Department of Mathematics University of Haifa Israel Department of Physics of Complex Systems Weizmann Institute of Science Israel
We define here the Montgomery exponent of order s, modulo the odd integer N, by MEXP = MEXP(A,X,N,s) = A/sup X/2/sup -s(X-1)/ (mod N), and illustrate some properties and usage of this operator. We show how A/sup X/ (m... 详细信息
来源: 评论
An adaptive scalable multiuser-OFDM system for multimedia transmission over fading channels
An adaptive scalable multiuser-OFDM system for multimedia tr...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.M.M. Nadhim Jianhua He Jiangtao Xi Zongkai Yang Electronics and Information Engineering Department Huazhong University of Science and Technology Wuhan China School of Electrical Computer and Telecommunications Engineering University of Wollongong Wollongong Australia
In this paper, an adaptive scalable multiuser-OFDM system was proposed for multimedia transmission over fading channels. The proposed adaptive algorithm can adapt according to the channel status information of each us... 详细信息
来源: 评论
Practical evaluation of a radial soft hash algorithm
Practical evaluation of a radial soft hash algorithm
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: F.-X. Standaert E. Lefebvre G. Rouvroy B. Macq J.-J. Quisquater J.-D. Legat Crypto Group Univ. Catholique de Louvain Belgium Laboratoire de Télécommunications et Télédétection Université Catholique de Louvain Belgium Laboratoire de Microélectronique Université Catholique de Louvain Belgium
This paper presents a practical evaluation of a radial soft hash algorithm, an image hashing technique used for image and visual content authentication. First we evaluate its collision resistance and susceptibility to... 详细信息
来源: 评论
Media access mechanisms for integrated services in wireless networks
Media access mechanisms for integrated services in wireless ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Sheng-Tzong Cheng Ming-Hung Tao Mingzoo Wu Department of Computer Science and Information Engineering National Cheng Kung University Tainan County Taiwan
In the paper, we propose a media access framework for supporting integrated service including the real-time service, the controlled load service, and the best effort service in wireless networks. Three medium access m... 详细信息
来源: 评论
Design theoretic approach to replicated declustering
Design theoretic approach to replicated declustering
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: A.S. Tosun Department of Computer Science University of Technology San Antonio TX USA
Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Most of the research on declustering is targeted at spatial range queries and investigates schemes ... 详细信息
来源: 评论
Dynamic learning of automata from the call stack log for anomaly detection
Dynamic learning of automata from the call stack log for ano...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Zhen Liu S.M. Bridges Department of Computer Science and Engineering Mississippi State University USA
Anomaly detection based on monitoring of sequences of system calls has proved to be an effective approach for detection of previously unknown attacks on programs. This paper describes a new model for profiling normal ... 详细信息
来源: 评论
Simulation of mobility and routing in ad hoc networks using ant colony algorithms
Simulation of mobility and routing in ad hoc networks using ...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: T.H. Ahmed Institute for Computer Science and Business Information Systems University of Duisburg-Essen Germany
Mobile ad-hoc networks (MANET's) have recently attracted a lot of attention in the research community as well as the industry. This technology has become increasingly important in communication and networking. Rou... 详细信息
来源: 评论
High throughput Web services for life sciences
High throughput Web services for life sciences
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: M. Altunay D. Colonnese C. Warade North Carolina State University Raleigh NC USA IBM Portals Hartford CT USA IBM Health Care and Life Science Cambridge MA USA
This paper describes a collaborative project between IBM and the North Carolina BioGrid: building, deploying, and using high-throughput Web services for bioinformatics applications. Bioinformatics applications can hig... 详细信息
来源: 评论
A time-series biclustering algorithm for revealing co-regulated genes
A time-series biclustering algorithm for revealing co-regula...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: Ya Zhang Hongyuan Zha Chao-Hisen Chu School of Information Sciences and Technology Pennsylvania State University USA Department of Computer Science and Engineering Pennsylvania State University USA
Although existing bicluster algorithms claimed to be able to discover co-regulated genes under a subset of given experiment conditions, they ignore the inherent sequential relationship between crucial time points and ... 详细信息
来源: 评论
On the masking countermeasure and higher-order power analysis attacks
On the masking countermeasure and higher-order power analysi...
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: F.-X. Standaert E. Peeters J.-J. Quisquater Crypto Group University College London Louvain-la-Neuve Belgium
Masking is a general method used to thwart differential power analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values. As a consequence, the power consumption of the ... 详细信息
来源: 评论