咨询与建议

限定检索结果

文献类型

  • 191,537 篇 会议
  • 1,968 册 图书
  • 1,414 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 194,930 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,707 篇 工学
    • 86,406 篇 计算机科学与技术...
    • 63,699 篇 软件工程
    • 30,470 篇 信息与通信工程
    • 14,590 篇 控制科学与工程
    • 12,587 篇 电气工程
    • 10,397 篇 生物工程
    • 8,334 篇 电子科学与技术(可...
    • 7,678 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,715 篇 仪器科学与技术
    • 5,137 篇 光学工程
    • 4,747 篇 动力工程及工程热...
    • 4,543 篇 安全科学与工程
    • 4,305 篇 网络空间安全
    • 3,906 篇 化学工程与技术
    • 3,759 篇 交通运输工程
  • 43,361 篇 理学
    • 23,663 篇 数学
    • 11,207 篇 生物学
    • 9,424 篇 物理学
    • 7,276 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,549 篇 管理学
    • 19,834 篇 管理科学与工程(可...
    • 15,242 篇 图书情报与档案管...
    • 9,768 篇 工商管理
  • 6,810 篇 医学
    • 5,810 篇 临床医学
    • 5,437 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,397 篇 法学
    • 4,405 篇 社会学
  • 3,673 篇 经济学
    • 3,617 篇 应用经济学
  • 3,254 篇 教育学
  • 2,629 篇 农学
  • 1,509 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,493 篇 cloud computing
  • 6,172 篇 computational mo...
  • 4,692 篇 information tech...
  • 4,633 篇 feature extracti...
  • 3,993 篇 accuracy
  • 3,572 篇 training
  • 3,523 篇 data mining
  • 3,466 篇 computer archite...
  • 3,398 篇 image coding
  • 3,251 篇 internet of thin...
  • 3,147 篇 security
  • 2,991 篇 servers
  • 2,950 篇 mobile computing
  • 2,923 篇 computer science
  • 2,889 篇 protocols
  • 2,659 篇 machine learning
  • 2,632 篇 deep learning
  • 2,540 篇 educational inst...
  • 2,479 篇 wireless sensor ...
  • 2,451 篇 real-time system...

机构

  • 620 篇 university of ch...
  • 564 篇 institute of com...
  • 387 篇 school of comput...
  • 288 篇 chitkara univers...
  • 249 篇 maharishi school...
  • 223 篇 university of sc...
  • 187 篇 department of co...
  • 177 篇 faculty of infor...
  • 153 篇 department of co...
  • 148 篇 faculty of compu...
  • 147 篇 lovely professio...
  • 140 篇 department of co...
  • 139 篇 key laboratory o...
  • 137 篇 school of comput...
  • 127 篇 maharishi school...
  • 114 篇 state key labora...
  • 114 篇 institute of inf...
  • 112 篇 shenyang institu...
  • 112 篇 school of inform...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 96 篇 leonard barolli
  • 95 篇 wang lei
  • 83 篇 yang yang
  • 79 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 67 篇 liu yang
  • 65 篇 china
  • 60 篇 rui wang
  • 60 篇 wei wang
  • 53 篇 bin wang
  • 52 篇 li wei
  • 47 篇 feng liu
  • 46 篇 zhang lin
  • 46 篇 xiao liu
  • 46 篇 bastieri d.
  • 45 篇 li cheng
  • 44 篇 yang liu
  • 42 篇 yongdong zhang

语言

  • 190,343 篇 英文
  • 3,231 篇 其他
  • 1,959 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
194931 条 记 录,以下是4981-4990 订阅
排序:
Power: A metric for evaluating watermarking algorithms
Power: A metric for evaluating watermarking algorithms
收藏 引用
3rd international conference on information technology: coding and computing (ITCC 2002)
作者: Sion, R Atallah, M Prabhakar, S Purdue Univ Ctr Educ & Res Informat Assurance & Secur W Lafayette IN 47907 USA
An important parameter in evaluating data hiding methods is hiding capacity [3] [11] [12], [16] i.e. the amount of data that a certain algorithm can "hide" until reaching allowable distortion limits. One fun... 详细信息
来源: 评论
Vector Quantization Image coding Based on Biorthogonal Wavelet Transform and Improved SOFM
Vector Quantization Image Coding Based on Biorthogonal Wavel...
收藏 引用
international conference on information Science and technology (ICIST)
作者: Xie, Songzhao Wang, Chengyou Cui, Chao Shandong Univ Sch Mech Elect & Informat Engn Weihai 264209 Peoples R China
This paper studies the statistical properties and distributed properties of the coefficients after the image is decomposed at different scales by using the wavelet transform. The different quantization and coding sche... 详细信息
来源: 评论
The planning and design of the agile information system of the dynamic alliance
The planning and design of the agile information system of t...
收藏 引用
4th international conference on Wireless Communications, Networking and Mobile computing
作者: Zhou Zhimei Wuhan Univ Technol Fac Logist Engn Wuhan 430063 Peoples R China
The supply chain management strategy of the agile virtual enterprise is presented. The important role of the dynamic alliance in the agile information system running is discussed. The design and realization technology... 详细信息
来源: 评论
The hardware design of dual-mode wireless video surveillance system based on DM6437
The hardware design of dual-mode wireless video surveillance...
收藏 引用
2nd international conference on Networks Security, Wireless Communications and Trusted computing, NSWCTC 2010
作者: Kang, Liping Zhao, Zhefeng Xie, Gang College of Information Engineering Taiyuan University of Technology Taiyuan China
Based on WiFi and WiMAX, with TMS320DM6437 as the main processor and the use of highly efficient video coding standard - H.264 compression algorithm, wireless intelligent video monitoring system is realized. In the th... 详细信息
来源: 评论
Audio Watermarking Based on BCH coding using CT and DWT
Audio Watermarking Based on BCH Coding using CT and DWT
收藏 引用
11th international conference on information technology
作者: Bhat, Vivekananda K. Sengupta, Indranil Das, Abhijit Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India
A blind Cepstrum transform-Discrete wavelet trans. form (CT-DWT) composite audio watermarking based on BCH coding is proposed. It takes the advantages of error correcting, coding and cepstrum transform to lower the bi... 详细信息
来源: 评论
ICode-An Unified Competitive coding Profile Platform  6
ICode-An Unified Competitive Coding Profile Platform
收藏 引用
6th IEEE international conference on Emerging Smart computing and Informatics, ESCI 2024
作者: Muke, Saurav Ahire, Samruddhi Kale, Geetanjali Navghare, Pranali Pune Institute of Computer Technology Department of Computer Engineering Pune India
Although a software developer is capable of creating excellent software without the necessity for competitive coding. Having their hands in it may increase the project's efficiency and scalability. For every devel... 详细信息
来源: 评论
An error-resilient image coding and packetization scheme for packet-switched networks
An error-resilient image coding and packetization scheme for...
收藏 引用
6th IEEE international conference on Electro/information technology (EIT 2006)
作者: Wei, Jianming Salari, Ezzatollah Univ Toledo Dept Elect Engn & Comp Sci 2801 W Bancroft St Toledo OH 43606 USA
An error-resilient image coding and fixed-length packetization scheme is presented to prevent packet loss from packet-switched networks. A wavelet coder based on set partition in hierarchy trees (SPIHT) algorithm enco... 详细信息
来源: 评论
Improvement Of The DAA Protocol Based On TPM
Improvement Of The DAA Protocol Based On TPM
收藏 引用
3rd IEEE international conference on Computer Science and information technology (ICCSIT)
作者: Zhu Bian Chen Li Cui Huan-huan Tang Chao HuaZhong Nonnal Univ Dept Comp Sci Wuhan Peoples R China
Anonymous authentication is an important feature for trusted computing. Firstly, this paper describes two kinds of authentication model Trusted computing Group (TCG) proposed TTP model and DAA model, and then analyses... 详细信息
来源: 评论
A FAST IMAGE coding METHOD BASED ON DICTIONARY
A FAST IMAGE CODING METHOD BASED ON DICTIONARY
收藏 引用
10th IEEE international Computer conference on Wavelet Active Media technology and information Processing (ICCWAMTIP)
作者: Fan, Li-Qiang LangFang Teachers Coll Dept Informat & Comp Sci Langfang 065000 Peoples R China
A fast image coding method based on dictionary is introduced firstly. This method gets more image information by fewer characters and can increase the coding efficiency. It improves the matching progress by the domina... 详细信息
来源: 评论
DISTANCE computing IN THE MULTIVALUE NUMBER SPACE
DISTANCE COMPUTING IN THE MULTIVALUE NUMBER SPACE
收藏 引用
1994 IEEE international conference on Systems, Man, and Cybernetics - Humans, information and technology (SMC 94)
作者: HABERT, O HORN, O PRUSKI, A UNIV METZ LAEIF-57045 METZ 1FRANCE
Distance computing in robotics appears in the treatment of most of problems. In this article we propose a distance computing algorithm between any environment point and any shape obstacle boundary. The algorithm prese... 详细信息
来源: 评论