咨询与建议

限定检索结果

文献类型

  • 1,017 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 285 篇 工学
    • 274 篇 计算机科学与技术...
    • 176 篇 软件工程
    • 74 篇 电气工程
    • 69 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 57 篇 医学
    • 57 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 41 篇 理学
    • 31 篇 数学
    • 10 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 生物学
  • 38 篇 管理学
    • 31 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 4 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 216 篇 information tech...
  • 176 篇 computer science
  • 111 篇 information retr...
  • 94 篇 internet
  • 85 篇 application soft...
  • 62 篇 cryptography
  • 61 篇 data mining
  • 58 篇 image coding
  • 56 篇 computer archite...
  • 55 篇 information secu...
  • 54 篇 computer network...
  • 52 篇 costs
  • 50 篇 information syst...
  • 50 篇 protection
  • 46 篇 bandwidth
  • 46 篇 grid computing
  • 46 篇 humans
  • 41 篇 watermarking
  • 40 篇 mobile computing
  • 40 篇 robustness

机构

  • 9 篇 university of te...
  • 7 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 school of inform...
  • 5 篇 univ sci & techn...
  • 4 篇 department of co...
  • 4 篇 information syst...
  • 4 篇 community grids ...
  • 4 篇 deis university ...
  • 4 篇 center for advan...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 information scie...
  • 3 篇 univ lecce ctr a...
  • 3 篇 department of co...
  • 3 篇 gippsland school...
  • 3 篇 department of co...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of co...
  • 3 篇 illinois institu...

作者

  • 10 篇 d. grossman
  • 9 篇 m. murshed
  • 7 篇 k. taghva
  • 7 篇 aloisio g
  • 7 篇 m. cafaro
  • 7 篇 cafaro m
  • 7 篇 a. abraham
  • 7 篇 g. aloisio
  • 7 篇 m. hanmandlu
  • 6 篇 n. ansari
  • 6 篇 l.s. dooley
  • 6 篇 g. fox
  • 6 篇 a. spink
  • 6 篇 r. steele
  • 6 篇 s. vasikarla
  • 6 篇 e. lawrence
  • 6 篇 o. frieder
  • 6 篇 j. domingo-ferre...
  • 5 篇 s.i. ahamed
  • 5 篇 m. cannataro

语言

  • 1,021 篇 英文
检索条件"任意字段=International Conference on Information Technology: Coding and Computing, ITCC 2002"
1021 条 记 录,以下是331-340 订阅
排序:
Robust partner selection scheme for information quality assurance despite uncertainty in open multi-agent systems
Robust partner selection scheme for information quality assu...
收藏 引用
international conference on information technology - coding and computing
作者: Barber, KS Park, J Univ Texas Lab Intelligen Proc & Syst Austin TX 78712 USA
information quality assurance despite uncertainty can be investigated in the context of soft security where an agent maintains trustworthiness evaluations of its information sources to assist in the evaluation of inco... 详细信息
来源: 评论
On permutation operations in cipher design
On permutation operations in cipher design
收藏 引用
international conference on information technology - coding and computing
作者: Lee, RB Shi, ZJ Yin, YL Rivest, RL Robshaw, MJB Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are u... 详细信息
来源: 评论
The GRelC library: A basic pillar in the Grid Relational Catalog architecture
The GRelC library: A basic pillar in the Grid Relational Cat...
收藏 引用
international conference on information technology - coding and computing
作者: Aloisio, G Cafaro, M Fiore, S Mirto, M Univ Lecce ISUFI Ctr Adv Computat Technol I-73100 Lecce Italy
Today many Data Grid applications need to manage and process a very large amount of data distributed across multiple grid nodes and stored in relational databases. The Grid Relational Catalog Project (GRelC) developed... 详细信息
来源: 评论
Bluetooth potential in the M-enterprise: A feasibility study
Bluetooth potential in the M-enterprise: A feasibility study
收藏 引用
international conference on information technology - coding and computing
作者: Pradhan, S Newton, S Lawrence, E Das, J Univ Technol Sydney Sydney NSW 2007 Australia
Today's workforce is becoming increasingly mobile. Handheld devices have evolved into indispensable enterprise tools, which enhance the mobile knowledge workers' ability to remain connected and productive. A W... 详细信息
来源: 评论
Secure information sharing using role-based delegation
Secure information sharing using role-based delegation
收藏 引用
international conference on information technology - coding and computing
作者: Ahn, GJ Mohan, B Univ N Carolina Charlotte NC 28223 USA
As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources.... 详细信息
来源: 评论
A modified optical image reconstruction model with information feedback
A modified optical image reconstruction model with informati...
收藏 引用
international conference on information technology - coding and computing
作者: Zhang, CY Zhang, YK Univ So Mississippi Dept Comp Sci & Stat Hattiesburg MS 39406 USA
The significant computational overhead associated with the iterative reconstruction process of biomedical optical imaging is one of the major factors that hinder its application in clinical diagnosis, especially for l... 详细信息
来源: 评论
Modified LZW algorithm for efficient compressed text retrieval
Modified LZW algorithm for efficient compressed text retriev...
收藏 引用
international conference on information technology - coding and computing
作者: Zhang, N Tao, T Satya, RV Mukherjee, A Univ Cent Florida Sch Comp Sci Orlando FL 32816 USA
With increasing amount of text data being stored in the compressed format, efficient information retrieval in the compressed domain has become a major concern. Being able to randomly access the compressed data is high... 详细信息
来源: 评论
Adaptive neuro-fuzzy intrusion detection systems
Adaptive neuro-fuzzy intrusion detection systems
收藏 引用
international conference on information technology - coding and computing
作者: Chavan, S Shah, K Dave, N Mukherjee, S Abraham, A Sanyal, S Institute of Technology for Women SNDT University India Department of Computer Science Oklahoma State University United States Sch. of Tech. and Computer Science Tata Inst. of Fundamental Research India
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning p... 详细信息
来源: 评论
international conference on information technology: itcc 2004: Volume I
International conference on information technology: ITCC 200...
收藏 引用
international conference on information technology: coding computing, itcc 2004
The proceedings contains 145 papers from the conference on the international conference on information technology: itcc 2004: Volume I. The topics discussed include: Jigsaw-based secure data transfer over computer net... 详细信息
来源: 评论
international conference on information technology: itcc 2004 - Volume II
International conference on information technology: ITCC 200...
收藏 引用
international conference on information technology: coding computing, itcc 2004
The proceedings contains 160 papers from the international conference on information technology. The topics discussed include: performance evaluation of block-based motion estimation algorithms and distortion measures... 详细信息
来源: 评论