咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 44 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 49 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 23 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 6 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 水利工程
  • 30 篇 理学
    • 14 篇 数学
    • 14 篇 物理学
    • 4 篇 生物学
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 16 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学

主题

  • 27 篇 computer science
  • 24 篇 cities and towns
  • 13 篇 cryptography
  • 13 篇 telecommunicatio...
  • 12 篇 routing
  • 11 篇 bandwidth
  • 11 篇 quality of servi...
  • 10 篇 intelligent netw...
  • 10 篇 costs
  • 9 篇 traffic control
  • 8 篇 delay
  • 7 篇 computer archite...
  • 7 篇 algorithm design...
  • 6 篇 computational mo...
  • 6 篇 protocols
  • 5 篇 data security
  • 5 篇 hardware
  • 5 篇 local area netwo...
  • 5 篇 communication sy...
  • 4 篇 computer network...

机构

  • 11 篇 computer science...
  • 10 篇 telecommunicatio...
  • 8 篇 department of co...
  • 8 篇 computer science...
  • 5 篇 computer science...
  • 5 篇 department of co...
  • 5 篇 telecommunicatio...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 computer science...
  • 3 篇 department of co...
  • 3 篇 telecommunicatio...
  • 3 篇 computer science...
  • 3 篇 department of el...
  • 2 篇 donostia interna...
  • 2 篇 infn gruppo coll...
  • 2 篇 university of ge...
  • 2 篇 institute for th...
  • 2 篇 dept. of electri...
  • 2 篇 computer science...

作者

  • 8 篇 harn l
  • 8 篇 t.f. znati
  • 6 篇 d. medhi
  • 6 篇 znati taieb f.
  • 6 篇 nedjah nadia
  • 5 篇 jing chen
  • 4 篇 a. van de liefvo...
  • 4 篇 nery alexandre s...
  • 4 篇 hui yu
  • 4 篇 jianping wang
  • 4 篇 xiaojun shen
  • 4 篇 zhou mu
  • 4 篇 xu kunjie
  • 4 篇 tian zengshan
  • 4 篇 j.p. agrawal
  • 3 篇 frança felipe m....
  • 3 篇 l. harn
  • 3 篇 s. q. zheng
  • 3 篇 alexandre s. ner...
  • 3 篇 znati taieb

语言

  • 148 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Science and Telecommunications Program"
151 条 记 录,以下是121-130 订阅
排序:
An X.500 prototype to support integrated network management  93
An X.500 prototype to support integrated network management
收藏 引用
Proceedings of the 1993 ACM conference on computer science
作者: Wei Wei Adrian Tang OSI Laboratory Computer Science and Telecommunications Program University of Missouri at Kansas City Kansas City MO
Because of the heterogeneity and the distributed nature of integrated network management, a good approach to understand the managed objects by syntax/semantics on the remote managed systems can significantly improve t...
来源: 评论
INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
收藏 引用
IEE PROCEEDINGS-E computerS AND DIGITAL TECHNIQUES 1992年 第2期139卷 139-143页
作者: HARN, L LIN, HY Computer Science Telecommunications Program University of Missouri—Kansas City Kansas City USA
User authentication and access control are both necessary mechanisms for data protection in a computer system. Traditionally, they are implemented in different modules. In this paper, a new solution is presented to pr... 详细信息
来源: 评论
AN ITERATIVE ALGORITHM FOR THE REVE PUZZLE
收藏 引用
computer JOURNAL 1992年 第1期35卷 91-92页
作者: VANDELIEFVOORT, A Computer Science Telecommunications Program University of Missouri-Kansas City 5100 Rockhill Road Kansas City Missouri 64110-2499 U.S.
A divide-and-conquer approach for the presumed minimal solution to the Reve's puzzle, the Tower of Hanoi with four pegs, leadsto a simple structure of the solution. In particular, it allows an easy, iterative algo... 详细信息
来源: 评论
A software authentication system for information integrity
收藏 引用
computers and Security 1992年 第8期11卷 747-752页
作者: Harn, Lein Lin, Hung-Yu Yang, Shoubao Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City MO 64110 United States University of Science and Technology of China China
This paper describes a software authentication technique based on the public key cryptography for information integrity. The software provider can use a secret key to sign any released program and the user can verify ... 详细信息
来源: 评论
A unified framework for survivable telecommunications network design
A unified framework for survivable telecommunications networ...
收藏 引用
1992 IEEE International Conference on Communications: Discovering a New World of Communications, SUPERCOMM/ICC 1992
作者: Medhi, D. Center for Telecomputing Research Computer Science Telecommunications Program University of Missouri - Kansas City 5100 Rockhill Road Kansas CityMO64110 United States
We present a unified framework for telecommunications switched traffic and transmission facility network design for survivability. This design is considered for backbone nonhierarchical teletraffic networks with dynam...
来源: 评论
A software authentication system for the prevention of computer viruses  92
A software authentication system for the prevention of compu...
收藏 引用
Proceedings of the 1992 ACM annual conference on Communications
作者: Lein Harn Hung-Yu Lin Shoubao Yang Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City MO Department of Computer Science University of Science and Technology of China Hefei Anhui 230026 PRC
In the absence of systematic techniques to detect the existence of computer viruses, preventing suspicious software from entering the system at the initial point of entry appears to be the best method to protect compu...
来源: 评论
A performance evaluation model for a digital group with multislot traffic streams  92
A performance evaluation model for a digital group with mult...
收藏 引用
Proceedings of the 1992 ACM annual conference on Communications
作者: D. Medhi A. van de Liefvoort C. S. Reece Computer Science Telecommunications Program University of Missouri-Kansas City 5100 Rockhill Road Kansas City MO
We present a unified model to compute various performance measures when a mixture of multi-slot traffic streams is offered on a trunk group of an integrated digital network under various bandwidth control schemes. Whe...
来源: 评论
A performance study of a highly-parallel architecture to provide registration and translation services in an intelligent network  92
A performance study of a highly-parallel architecture to pro...
收藏 引用
Proceedings of the 1992 ACM annual conference on Communications
作者: Jerry Stach Jerry Place Computer Science Telecommunications program University of Mo. - Kansas City 5100 Rockhill Rd. Kansas City MO
This paper presents the initial investigation of a highly parallel architecture that can be used as an Intelligent Network Translation and Registration Platform (INTARP). The INTARP architecture is deterministic and u...
来源: 评论
A model of the contention resolution time for binary tree protocols  92
A model of the contention resolution time for binary tree pr...
收藏 引用
Proceedings of the 1992 ACM annual conference on Communications
作者: Jagan P. Agrawal Mary L. Gerken Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City MO Environment Protection Agency 726 Minnesota Ave. Kansas City KS
In a binary tree type local area network (LAN) protocol, the number of probe slots (K) needed for contention resolution, when M out of N terminals are contending for the bus access depends not only on the value of M b...
来源: 评论
A high-performance, modular design paradigm for teletraffic simulation with CSIM
A high-performance, modular design paradigm for teletraffic ...
收藏 引用
1991 Symposium on Applied Computing, SOAC 1991
作者: Scoggins, Sophia Computer Science and Telecommunications Program University of Missouri-Kansas City Kansas CityMO64110 United States
The simulator designed by the author provides a new design paradigm for simulating large-scale telecommunications systems. It is based on C and CSIM and has the features of dynamic memory allocation, modular design, i... 详细信息
来源: 评论