咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 44 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 49 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 23 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 6 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 水利工程
  • 30 篇 理学
    • 14 篇 数学
    • 14 篇 物理学
    • 4 篇 生物学
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 16 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学

主题

  • 27 篇 computer science
  • 24 篇 cities and towns
  • 13 篇 cryptography
  • 13 篇 telecommunicatio...
  • 12 篇 routing
  • 11 篇 bandwidth
  • 11 篇 quality of servi...
  • 10 篇 intelligent netw...
  • 10 篇 costs
  • 9 篇 traffic control
  • 8 篇 delay
  • 7 篇 computer archite...
  • 7 篇 algorithm design...
  • 6 篇 computational mo...
  • 6 篇 protocols
  • 5 篇 data security
  • 5 篇 hardware
  • 5 篇 local area netwo...
  • 5 篇 communication sy...
  • 4 篇 computer network...

机构

  • 11 篇 computer science...
  • 10 篇 telecommunicatio...
  • 8 篇 department of co...
  • 8 篇 computer science...
  • 5 篇 computer science...
  • 5 篇 department of co...
  • 5 篇 telecommunicatio...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 computer science...
  • 3 篇 department of co...
  • 3 篇 telecommunicatio...
  • 3 篇 computer science...
  • 3 篇 department of el...
  • 2 篇 donostia interna...
  • 2 篇 infn gruppo coll...
  • 2 篇 university of ge...
  • 2 篇 institute for th...
  • 2 篇 dept. of electri...
  • 2 篇 computer science...

作者

  • 8 篇 harn l
  • 8 篇 t.f. znati
  • 6 篇 d. medhi
  • 6 篇 znati taieb f.
  • 6 篇 nedjah nadia
  • 5 篇 jing chen
  • 4 篇 a. van de liefvo...
  • 4 篇 nery alexandre s...
  • 4 篇 hui yu
  • 4 篇 jianping wang
  • 4 篇 xiaojun shen
  • 4 篇 zhou mu
  • 4 篇 xu kunjie
  • 4 篇 tian zengshan
  • 4 篇 j.p. agrawal
  • 3 篇 frança felipe m....
  • 3 篇 l. harn
  • 3 篇 s. q. zheng
  • 3 篇 alexandre s. ner...
  • 3 篇 znati taieb

语言

  • 148 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Science Telecommunications Program"
151 条 记 录,以下是41-50 订阅
排序:
Classification of medical software
Classification of medical software
收藏 引用
Symposium on Applied Computing
作者: P. Schneider M.L.A. Hines Computer Science Telecommunications Program University of Missouri Kansas City USA
The current state of software engineering practices in medical software development is discussed. The authors focus on patient safety (freedom from harm by a medical device) and patient vulnerability (possible indirec... 详细信息
来源: 评论
Performance analysis of the general renewal multi-server finite waiting room model
Performance analysis of the general renewal multi-server fin...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of computer and Telecommunication Systems (MASCOTS)
作者: Wen-Jung Hsin A. van de Liefvoort Computer Science Telecommunications Program University of Missouri Kansas City USA
In this paper, we analyze the performance of GI/GI/s/s+r systems. In particular we examine steady-state call blocking and time blocking. We vary several parameters such as the number of servers, the number of waiting ... 详细信息
来源: 评论
Entropy as a measure of database information  6
Entropy as a measure of database information
收藏 引用
6th Annual computer Security Applications Conference, ACSAC 1990
作者: Unger, E.A. Harn, L. Kumar, V. Comput. and Inf. Sci. Kansas State Univ. ManhattanKS United States Computer Science Telecommunications Program University of Missouri at Kansas City United States
An estimate of the information a database contains and the quantification of the vulnerability of that database to compromise by inferential methods is discussed. Such a measure could be used to evaluate the deterrent... 详细信息
来源: 评论
Increasing DHT Data Security by Scattering Data (Invited Paper)
Increasing DHT Data Security by Scattering Data (Invited Pap...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Bryan Mills Taieb Znati Department of Computer Science Telecommunications Program University of Pittsburgh Pittsburgh PA USA Telecommunications Program University of Pittsburgh Pittsburgh PA USA
This paper describes methods for increasing the security of data being stored in a distributed hash table (DHT) which leverages the inherent properties of the DHT to provide a secure storage substrate. The methods pre... 详细信息
来源: 评论
Selective encryption for consumer applications
Selective encryption for consumer applications
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: T. Lookabaugh D.C. Sicker Department of Computer Science and Interdisciplinary Telecommunications Program University of Colorado Boulder USA
Selective encryption is a technique to save computational complexity or enable new system functionality by encrypting only a portion of a compressed bitstream while achieving adequate security. Although suggested in a... 详细信息
来源: 评论
Multi-hour, multi-traffic class network design for VP-based wide-area dynamically reconfigurable ATM networks
Multi-hour, multi-traffic class network design for VP-based ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: D. Medhi Computer Science Telecommunications Program University of Missouri Kansas City MO USA
The virtual path (VP) concept has been gaining attention in terms of effective deployment of ATM (asynchronous transfer mode) networks in recent years. In this paper, we discuss a multi-hour, multi-traffic class netwo... 详细信息
来源: 评论
Supporting connection-oriented service in MLAN protocol
Supporting connection-oriented service in MLAN protocol
收藏 引用
IEEE Conference and Exhibition on Global telecommunications (GLOBECOM)
作者: U. Varshney J.P. Agrawal Computer Science Telecommunications Program University of Missouri Kansas City MO USA
With the emerging ATM broadband networks, there will be a need for connectivity between LANs and broadband networks. The possibility of seamless internetworking between these networks has generated a significant resea... 详细信息
来源: 评论
A NOTE ON MINIMAL VISIBILITY GRAPHS
收藏 引用
INFORMATION PROCESSING LETTERS 1993年 第2期46卷 101-101页
作者: SHEN, XJ HU, Q Computer Science Telecommunications Program University of Missouri &mdash Kansas City Kansas City MO 64110 USA
In a comment, fatal mistakes in the proof in Campbell and Higgins' (1991) main theorem concerning minimal visibility graphs are discussed. These mistakes stem from the incorrectness of Lemma 4 and Lemma 5, which ... 详细信息
来源: 评论
A teletraffic simulator for circuit switched and signaling intelligent network with SS7  91
A teletraffic simulator for circuit switched and signaling i...
收藏 引用
Proceedings of the 23rd conference on Winter simulation
作者: Sophia Scoggins Mark Scoggins Jerrold Stach Computer Science Program University of Texas at Dallas Richardson TX Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City MO
来源: 评论
Parallel algorithms for verification and sensitivity analysis of minimum spanning trees
Parallel algorithms for verification and sensitivity analysi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Weifa Liang Xiaojun Shen Qing Hu Department of Computer Science Australian National University Canberra Australia Computer Science Telecommunications Program University of Missouri KS USA
To verify whether a spanning tree T(V,E) of graph G(V,E') is a minimum spanning tree, two parallel algorithms are presented. The first algorithm requires O(log n) time and O(max{m/log n, n/sup 3/2//log n}) process... 详细信息
来源: 评论