咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 46 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 50 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 24 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 6 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
  • 31 篇 理学
    • 14 篇 数学
    • 14 篇 物理学
    • 5 篇 生物学
    • 3 篇 化学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 3 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学

主题

  • 27 篇 computer science
  • 24 篇 cities and towns
  • 13 篇 cryptography
  • 13 篇 telecommunicatio...
  • 12 篇 routing
  • 11 篇 bandwidth
  • 11 篇 quality of servi...
  • 10 篇 intelligent netw...
  • 10 篇 costs
  • 9 篇 traffic control
  • 8 篇 delay
  • 7 篇 computer archite...
  • 7 篇 algorithm design...
  • 6 篇 computational mo...
  • 6 篇 protocols
  • 5 篇 data security
  • 5 篇 hardware
  • 5 篇 local area netwo...
  • 5 篇 communication sy...
  • 4 篇 computer network...

机构

  • 11 篇 computer science...
  • 10 篇 telecommunicatio...
  • 8 篇 department of co...
  • 8 篇 computer science...
  • 5 篇 computer science...
  • 5 篇 department of co...
  • 5 篇 telecommunicatio...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 computer science...
  • 3 篇 department of co...
  • 3 篇 telecommunicatio...
  • 3 篇 computer science...
  • 3 篇 department of el...
  • 2 篇 donostia interna...
  • 2 篇 infn gruppo coll...
  • 2 篇 university of ge...
  • 2 篇 institute for th...
  • 2 篇 dept. of electri...
  • 2 篇 computer science...

作者

  • 8 篇 harn l
  • 8 篇 t.f. znati
  • 6 篇 d. medhi
  • 6 篇 znati taieb f.
  • 6 篇 nedjah nadia
  • 5 篇 jing chen
  • 4 篇 a. van de liefvo...
  • 4 篇 nery alexandre s...
  • 4 篇 hui yu
  • 4 篇 jianping wang
  • 4 篇 xiaojun shen
  • 4 篇 zhou mu
  • 4 篇 xu kunjie
  • 4 篇 tian zengshan
  • 4 篇 j.p. agrawal
  • 3 篇 frança felipe m....
  • 3 篇 l. harn
  • 3 篇 s. q. zheng
  • 3 篇 alexandre s. ner...
  • 3 篇 znati taieb

语言

  • 150 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Science Telecommunications Program"
153 条 记 录,以下是21-30 订阅
排序:
A public-key based dynamic password scheme
A public-key based dynamic password scheme
收藏 引用
1991 Symposium on Applied Computing, SOAC 1991
作者: Ham, Lein Computer Science Telecommunications Program University of Missouri-Kansas City Kansas CityMO64110 United States
A dynamic password authentication scheme based on public-key concept is proposed in this paper. The login password is changed dynamically and users can use this scheme within a remote login environment. Since we emplo... 详细信息
来源: 评论
Parallel bundle-based decomposition for large-scale structured mathematical programming problems
收藏 引用
Annals of Operations Research 1990年 第1期22卷 101-127页
作者: Medhi, Deepankar Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City 64110 MO 5100 Rockhill Road United States
In this paper, we present parallel bundle-based decomposition algorithms to solve a class of structured large-scale convex optimization problems. An example in this class of problems is the block-angular linear progra...
来源: 评论
Performance of redundancy methods in P2P networks under churn
Performance of redundancy methods in P2P networks under chur...
收藏 引用
2012 International Conference on Computing, Networking and Communications, ICNC'12
作者: Herrera-Ruiz, Octavio Znati, Taieb Graduate Telecommunications Program School of Information Science United States Computer Science Department School of Arts and Sciences University of Pittsburgh United States
Peer-to-Peer (P2P) networks organize large amounts of resources distributed across the Internet for user access. However, the availability of these resources is hindered by the participants' transient connectivity... 详细信息
来源: 评论
Proactive repair redundancy algorithms for distributed storage in P2P networks
Proactive repair redundancy algorithms for distributed stora...
收藏 引用
2012 26th Queen's Biennial Symposium on Communications, QBSC 2012
作者: Herrera, Octavio Znati, Taieb Graduate Telecommunications Program School of Information Science United States Computer Science Department School of Arts and Sciences University of Pittsburgh United States
Distributed storage systems frequently use erasure coding based redundancy or replication to improve availability. Traditional erasure coding based approaches to redundancy are optimal in terms of their storage overhe... 详细信息
来源: 评论
CRYPTANALYSIS OF THE BLIND SIGNATURES BASED ON THE DISCRETE LOGARITHM PROBLEM
收藏 引用
ELECTRONICS LETTERS 1995年 第14期31卷 1136-1136页
作者: HARN, L Computer Science Telecommunications Program University of Missouri Kansas City USA
Carmenisch et al. proposed a blind signature scheme based on the discrete logarithm during at the rump session of Eurocrypt'94. Horster er al. generalised this approach to design the Meta blind signature schemes. ... 详细信息
来源: 评论
Integrated 6G TN and NTN Localization: Challenges, Opportunities, and Advancements
IEEE Communications Standards Magazine
收藏 引用
IEEE Communications Standards Magazine 2025年
作者: Saleh, Sharief Zheng, Pinjun Liu, Xing Chen, Hui Keskin, Musa Furkan Priyanto, Basuki Beale, Martin Ettefagh, Yasaman Seco-Granados, Gonzalo Al-Naffouri, Tareq Y. Wymeersch, Henk Chalmers University of Technology Department of Electrical Engineering Sweden King Abdullah University of Science and Technology (KAUST) Electrical and Computer Engineering Program Division of Computer Electrical and Mathematical Sciences and Engineering (CEMSE) Saudi Arabia Sony Europe BV United Kingdom Universitat Autònoma de Barcelona Department of Telecommunications and Systems Engineering Spain
The rapid evolution of cellular networks has introduced groundbreaking technologies, including large and distributed antenna arrays and reconfigurable intelligent surfaces in terrestrial networks (TNs), as well as aer... 详细信息
来源: 评论
Authentication protocols for personal communication systems  95
Authentication protocols for personal communication systems
收藏 引用
1995 Conference on Applications, Technologies, Architectures, and Protocols for computer Communication, SIGCOMM 1995
作者: Lin, Hung-Yu Ham, Lein Computer Science Telecommunications Program University of Missouri-Kansas City 4747 Troost Kansas CityMO64110 United States
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of the communication should be enciphered ... 详细信息
来源: 评论
Permutation routing in all-optical product networks  13th
收藏 引用
13th International Parallel Processing Symposium, IPPS 1999 Held in Conjunction with the 10th Symposium on Parallel and Distributed Processing, SPDP 1999
作者: Liang, Weifa Shen, Xiaojun Department of Computer Science Australian National University CanberraACT0200 Australia Computer Science Telecommunications Program University of Missouri-Kansas City Kansas CityMO64110 United States
In this paper we study permutation routing techniques for all-optical networks. Firstly, we show some lower bounds on the number of wavelengths needed for implementing any permutation on an alloptical network in terms... 详细信息
来源: 评论
Open systems interconnection abstract syntax notation: ***  7th
收藏 引用
7th Annual Workshop on Conceptual Graphs, 1992
作者: Hines, Timothy R. Computer Science Telecommunications Program University of Missouri-Kansas City 4747 Troost Kansas CityMO64110-2499 United States
Open Systems Interconnection (OSI) enables communication between computers using a common set of protocols (rules) and structured data [5,9]. ASN.1 (Abstract Syntax Notation One) is a formal notation allowing communic... 详细信息
来源: 评论
A bandwidth adaptation scheme to support QoS requirements of mobile users in wireless environments  9
A bandwidth adaptation scheme to support QoS requirements of...
收藏 引用
9th International Conference on computer Communications and Networks, ICCCN 2000
作者: Aljadhai, AbdulRahman Znati, Taieb F. Computer Technology Department Riyadh College of Technology Riyadh Saudi Arabia Department of Computer Science Telecommunications Program University of Pittsburgh PittsburghPA15260 United States
- This paper presents an adaptive QoS management scheme to accommodate dynamic variations in network resources, due to the mobility of the users and location-dependent errors. The scheme ensures that satisfactory leve... 详细信息
来源: 评论