咨询与建议

限定检索结果

文献类型

  • 1,054 册 图书
  • 18 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 1,077 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 24 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 5 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 电子科学与技术(可...
  • 12 篇 理学
    • 12 篇 数学
    • 2 篇 系统科学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 1,077 篇 coding and infor...
  • 384 篇 cryptology
  • 353 篇 computer communi...
  • 209 篇 systems and data...
  • 177 篇 artificial intel...
  • 171 篇 information syst...
  • 155 篇 algorithm analys...
  • 154 篇 computer systems...
  • 118 篇 data structures ...
  • 103 篇 discrete mathema...
  • 88 篇 communications e...
  • 86 篇 software enginee...
  • 85 篇 computer applica...
  • 82 篇 theory of comput...
  • 73 篇 management of co...
  • 65 篇 computer system ...
  • 65 篇 user interfaces ...
  • 64 篇 computers and so...
  • 64 篇 special purpose ...
  • 62 篇 e-commerce/e-bus...

机构

  • 16 篇 swansea universi...
  • 13 篇 university of ag...
  • 11 篇 university of wa...
  • 11 篇 delft university...
  • 11 篇 nanyang technolo...
  • 11 篇 boston universit...
  • 10 篇 tsinghua univers...
  • 9 篇 chinese academy ...
  • 8 篇 shanghai jiao to...
  • 8 篇 university of tu...
  • 8 篇 banaras hindu un...
  • 8 篇 abv-indian insti...
  • 8 篇 indian institute...
  • 7 篇 university of ma...
  • 7 篇 kingdee internat...
  • 7 篇 university of wa...
  • 7 篇 university of we...
  • 7 篇 new jersey insti...
  • 6 篇 cranfield univer...
  • 6 篇 coventry univers...

作者

  • 15 篇 yogesh k. dwived...
  • 14 篇 dongdai lin
  • 11 篇 moti yung
  • 10 篇 leonid reyzin
  • 10 篇 liang-jie zhang
  • 10 篇 douglas stebila
  • 9 篇 friedrich l. bau...
  • 9 篇 marijn janssen
  • 8 篇 anshul verma
  • 8 篇 matti mäntymäki
  • 8 篇 peter parycek
  • 8 篇 gregor von ciemi...
  • 8 篇 kiran kumar patt...
  • 8 篇 pradeepika verma
  • 7 篇 june wei
  • 7 篇 tsuyoshi takagi
  • 7 篇 abderrahmane nit...
  • 6 篇 david romero
  • 6 篇 daniel thalmann
  • 6 篇 nadia magnenat-t...

语言

  • 1,068 篇 英文
  • 9 篇 中文
检索条件"主题词=coding and information theory"
1077 条 记 录,以下是21-30 订阅
排序:
A Practical Approach to Compiler Construction (Undergraduate Topics in Computer Science)  1
收藏 引用
丛书名: Undergraduate topics in computer science
2017年
作者: Des Watson
This book provides a practically-oriented introduction to high-level programming language implementation. It demystifies what goes on within a compiler and stimulates the reader's interest in compiler design, an e... 详细信息
来源: 评论
A Selective Encryption Scheme with Multiple security Levels for the H. 264/AVC Video coding  16
A Selective Encryption Scheme with Multiple security Levels ...
收藏 引用
IEEE International Conference on Computer and information Technology (CIT)
作者: Sbiaa, F. Kotel, S. Zeghid, M. Tourki, R. Machhout, M. Baganne, A. Univ South Brittany Lab Informat Sci & Technol Commun & Knowledge Lab STICC Lorient France Univ Monastir Fac Sci Elect & Microelect Lab Monastir 5019 Tunisia
The H. 264 Advanced Video coding (H. 264/AVC) standard is considered to be the most commonly used format for video compression. Although it supports a very broad applications range covering all forms of digital compre... 详细信息
来源: 评论
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2015年 第4期12卷 485-490页
作者: Cafaro, Massimo Civino, Roberto Masucci, Barbara Univ Salento Dept Engn Innovat I-73100 Lecce Italy Univ Salento Dept Math & Phys I-73100 Lecce Italy Univ Salerno Dept Comp Sci I-84084 Fisciano Italy
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierar... 详细信息
来源: 评论
Why Cryptography Should Not Rely on Physical Attack Complexity  1
收藏 引用
丛书名: T-Labs Series in Telecommunication Services
2015年
作者: Juliane Krämer (auth.)
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on t... 详细信息
来源: 评论
Effects of Unequal Bit Costs on Classical Huffman Codes  17
Effects of Unequal Bit Costs on Classical Huffman Codes
收藏 引用
17th International Conference on Computer and information Technology (ICCIT)
作者: Kabir, Sohag Azad, Tanzima Alam, A. S. M. Ashraful Kaykobad, Mohammad Univ Hull Dept Comp Sci Kingston Upon Hull HU6 7RX N Humberside England Bangladesh Univ Engn & Technol Dept Comp Sci & Engn Dhaka Bangladesh Univ Otago Dept Comp Sci Dunedin New Zealand
Classical Huffman codes have a very good compression performance over traditional systems. Yet, more efficient encoding is possible by considering and applying techniques that treat the binary bits differently conside... 详细信息
来源: 评论
Transactions on Data Hiding and Multimedia Security VIII  1
收藏 引用
丛书名: Lecture Notes in Computer Science
2012年
作者: Yun Q. Shi Stefan Katzenbeisser
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, stegano... 详细信息
来源: 评论
Generational analysis of tension and entropy in data structures: impact on automatic data integration and on the semantic web
收藏 引用
KNOWLEDGE AND information SYSTEMS 2011年 第1期28卷 175-196页
作者: Rohn, Eli CogniMax LLC Highland Pk NJ 08904 USA
The move toward automatic data integration from autonomous and heterogeneous sources is viewed as a transition from a closed to an open system, which is in essence an adaptive information processing system. Data defin... 详细信息
来源: 评论
Identity-Based Encryption  1
收藏 引用
2011年
作者: Sanjit Chatterjee Palash Sarkar
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that woul... 详细信息
来源: 评论
Generational analysis of variety in data structures: impact on automatic data integration and on the semantic web
收藏 引用
KNOWLEDGE AND information SYSTEMS 2010年 第2期24卷 283-304页
作者: Rohn, Eli New Jersey Inst Technol Dept Informat Syst Newark NJ 07102 USA
We examine data definition languages (DDLs) from various computing era spanning almost 50 years to date. We prove that contemporary DDLs are indistinguishable from older ones using Zipf distribution of words, Zipf dis... 详细信息
来源: 评论
Implementing the LZ-index: theory versus Practice
收藏 引用
ACM Journal of Experimental Algorithmics 2009年 第PP1.2–1.49期13卷 1.2-1.49页
作者: Navarro, Gonzalo Department of Computer Science University of Chile Santiago Blanco Encalada 2120 Chile
The LZ-index is a theoretical proposal of a lightweight data structure for text indexing, based on the Ziv-Lempel trie. If a text of u characters over an alphabet of size σ is compressible to n symbols using the LZ78... 详细信息
来源: 评论