咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 44 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 49 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 23 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 6 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 水利工程
  • 30 篇 理学
    • 14 篇 数学
    • 14 篇 物理学
    • 4 篇 生物学
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 16 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学

主题

  • 27 篇 computer science
  • 24 篇 cities and towns
  • 13 篇 cryptography
  • 13 篇 telecommunicatio...
  • 12 篇 routing
  • 11 篇 bandwidth
  • 11 篇 quality of servi...
  • 10 篇 intelligent netw...
  • 10 篇 costs
  • 9 篇 traffic control
  • 8 篇 delay
  • 7 篇 computer archite...
  • 7 篇 algorithm design...
  • 6 篇 computational mo...
  • 6 篇 protocols
  • 5 篇 data security
  • 5 篇 hardware
  • 5 篇 local area netwo...
  • 5 篇 communication sy...
  • 4 篇 computer network...

机构

  • 11 篇 computer science...
  • 10 篇 telecommunicatio...
  • 8 篇 department of co...
  • 8 篇 computer science...
  • 5 篇 computer science...
  • 5 篇 department of co...
  • 5 篇 telecommunicatio...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 computer science...
  • 3 篇 department of co...
  • 3 篇 telecommunicatio...
  • 3 篇 computer science...
  • 3 篇 department of el...
  • 2 篇 donostia interna...
  • 2 篇 infn gruppo coll...
  • 2 篇 university of ge...
  • 2 篇 institute for th...
  • 2 篇 dept. of electri...
  • 2 篇 computer science...

作者

  • 8 篇 harn l
  • 8 篇 t.f. znati
  • 6 篇 d. medhi
  • 6 篇 znati taieb f.
  • 6 篇 nedjah nadia
  • 5 篇 jing chen
  • 4 篇 a. van de liefvo...
  • 4 篇 nery alexandre s...
  • 4 篇 hui yu
  • 4 篇 jianping wang
  • 4 篇 xiaojun shen
  • 4 篇 zhou mu
  • 4 篇 xu kunjie
  • 4 篇 tian zengshan
  • 4 篇 j.p. agrawal
  • 3 篇 frança felipe m....
  • 3 篇 l. harn
  • 3 篇 s. q. zheng
  • 3 篇 alexandre s. ner...
  • 3 篇 znati taieb

语言

  • 148 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Science and Telecommunications Program"
151 条 记 录,以下是91-100 订阅
排序:
DSA TYPE SECURE INTERACTIVE BATCH VERIFICATION PROTOCOLS
收藏 引用
ELECTRONICS LETTERS 1995年 第4期31卷 257-258页
作者: HARN, L Computer Science Telecommunications Program University of Missouri Kansas City USA
The author proposes some DSA type secure interactive batch verification protocols, where the signer generates n signatures through interactions with the verifier, and the verifier validates all these n signatures.
来源: 评论
FAIR RECONSTRUCTION OF A SECRET
收藏 引用
INFORMATION PROCESSING LETTERS 1995年 第1期55卷 45-47页
作者: LIN, HY HARN, L Computer Science Telecommunications Program University of Missouri — Kansas City 5100 Rockhill Road Kansas City MO 64110 USA
After gathering sufficient shadows from honest participants and deriving the secret exclusively, a participant, in the process of reconstruction a secret, can turn dishonest and withhold his own shadow (or present a f... 详细信息
来源: 评论
Object-oriented software engineering: A conceptual approach  7
Object-oriented software engineering: A conceptual approach
收藏 引用
7th Software Engineering Environments Conference, SEE 1995
作者: Hines, M.L. Computer Science Telecommunications Program University of Missouri-Kansas City Kansas CityMO United States
The design, development, and maintenance of large, complex software systems has long been plagued by the imposition of artificially frozen requirements. A design and development environment which allows a continuum of... 详细信息
来源: 评论
CRYPTANALYSIS OF THE BLIND SIGNATURES BASED ON THE DISCRETE LOGARITHM PROBLEM
收藏 引用
ELECTRONICS LETTERS 1995年 第14期31卷 1136-1136页
作者: HARN, L Computer Science Telecommunications Program University of Missouri Kansas City USA
Carmenisch et al. proposed a blind signature scheme based on the discrete logarithm during at the rump session of Eurocrypt'94. Horster er al. generalised this approach to design the Meta blind signature schemes. ... 详细信息
来源: 评论
Authentication protocols for personal communication systems  95
Authentication protocols for personal communication systems
收藏 引用
1995 Conference on Applications, Technologies, Architectures, and Protocols for computer Communication, SIGCOMM 1995
作者: Lin, Hung-Yu Ham, Lein Computer Science Telecommunications Program University of Missouri-Kansas City 4747 Troost Kansas CityMO64110 United States
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of the communication should be enciphered ... 详细信息
来源: 评论
Comparative evaluation of cooperative plan execution strategies in multiagent environments  28
Comparative evaluation of cooperative plan execution strateg...
收藏 引用
28th Annual Simulation Symposium, ANSS 1995
作者: Lauzac, Sylvain Znatit, Taieb F. University of Pittsburgh Department of Computer Science PittsburghPA15260 United States Telecommunications Program University of Pittsburgh PittsburghPA15260 United States
Coordinating the action of distributed agents an a dynamically changing environment is a difficult task. The dificulty stems from the fact the real-world environment changes independently fromthe actions of the agents... 详细信息
来源: 评论
Object-oriented software engineering: a conceptual approach
Object-oriented software engineering: a conceptual approach
收藏 引用
Software Engineering Environments Conference
作者: M.L. Hines Computer Science Telecommunications Program University of Missouri Kansas City USA
The design, development, and maintenance of large, complex software systems has long been plagued by the imposition of artificially frozen requirements. A design and development environment which allows a continuum of... 详细信息
来源: 评论
Performance analysis of the general renewal multi-server finite waiting room model
Performance analysis of the general renewal multi-server fin...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of computer and Telecommunication Systems (MASCOTS)
作者: Wen-Jung Hsin A. van de Liefvoort Computer Science Telecommunications Program University of Missouri Kansas City USA
In this paper, we analyze the performance of GI/GI/s/s+r systems. In particular we examine steady-state call blocking and time blocking. We vary several parameters such as the number of servers, the number of waiting ... 详细信息
来源: 评论
Multi-hour, multi-traffic class network design for VP-based wide-area dynamically reconfigurable ATM networks
Multi-hour, multi-traffic class network design for VP-based ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: D. Medhi Computer Science Telecommunications Program University of Missouri Kansas City MO USA
The virtual path (VP) concept has been gaining attention in terms of effective deployment of ATM (asynchronous transfer mode) networks in recent years. In this paper, we discuss a multi-hour, multi-traffic class netwo... 详细信息
来源: 评论
Enterprise network management: LAN status monitoring
Enterprise network management: LAN status monitoring
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Taesang Choi A. Tang OSE Laboratory Computer Science and Telecommunications Program University of Missouri Kansas City Kansas City MO USA
During the past few years, the study of network management has focused on a single node, e.g., a router or a hub. As network connectivity and heterogeneity grows, there is a need to extend the scope of management from... 详细信息
来源: 评论