咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 44 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 49 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 23 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 6 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 水利工程
  • 30 篇 理学
    • 14 篇 数学
    • 14 篇 物理学
    • 4 篇 生物学
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 16 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学

主题

  • 27 篇 computer science
  • 24 篇 cities and towns
  • 13 篇 cryptography
  • 13 篇 telecommunicatio...
  • 12 篇 routing
  • 11 篇 bandwidth
  • 11 篇 quality of servi...
  • 10 篇 intelligent netw...
  • 10 篇 costs
  • 9 篇 traffic control
  • 8 篇 delay
  • 7 篇 computer archite...
  • 7 篇 algorithm design...
  • 6 篇 computational mo...
  • 6 篇 protocols
  • 5 篇 data security
  • 5 篇 hardware
  • 5 篇 local area netwo...
  • 5 篇 communication sy...
  • 4 篇 computer network...

机构

  • 11 篇 computer science...
  • 10 篇 telecommunicatio...
  • 8 篇 department of co...
  • 8 篇 computer science...
  • 5 篇 computer science...
  • 5 篇 department of co...
  • 5 篇 telecommunicatio...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 computer science...
  • 3 篇 department of co...
  • 3 篇 telecommunicatio...
  • 3 篇 computer science...
  • 3 篇 department of el...
  • 2 篇 donostia interna...
  • 2 篇 infn gruppo coll...
  • 2 篇 university of ge...
  • 2 篇 institute for th...
  • 2 篇 dept. of electri...
  • 2 篇 computer science...

作者

  • 8 篇 harn l
  • 8 篇 t.f. znati
  • 6 篇 d. medhi
  • 6 篇 znati taieb f.
  • 6 篇 nedjah nadia
  • 4 篇 a. van de liefvo...
  • 4 篇 nery alexandre s...
  • 4 篇 hui yu
  • 4 篇 jing chen
  • 4 篇 jianping wang
  • 4 篇 xiaojun shen
  • 4 篇 zhou mu
  • 4 篇 xu kunjie
  • 4 篇 tian zengshan
  • 4 篇 j.p. agrawal
  • 3 篇 frança felipe m....
  • 3 篇 l. harn
  • 3 篇 s. q. zheng
  • 3 篇 alexandre s. ner...
  • 3 篇 znati taieb

语言

  • 147 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Science and Telecommunications Program"
150 条 记 录,以下是141-150 订阅
排序:
A knowledge-based assistant for pesticide identification
A knowledge-based assistant for pesticide identification
收藏 引用
Symposium on Applied Computing
作者: P. Schneider S.K. Graham Computer Science and Telecommunications Program University of Missouri Kansas City USA
The Pesticide Identification Assistant (PIA) is a knowledge-based system designed to assist an analytical chemist with the identification of pesticide residues in food products using gas-liquid chromatography. The dat... 详细信息
来源: 评论
The conditional and residual waiting time distributions of the M/G/1 queue
The conditional and residual waiting time distributions of t...
收藏 引用
Symposium on Applied Computing
作者: A. van de Liefvoort Computer Science Telecommunications Program University of Missouri Kansas City USA
A single-server queuing system with arrivals according to a Poisson process and general service times is considered. The system is assumed to be in steady state. Using linear algebraic techniques only, alternate deriv... 详细信息
来源: 评论
Classification of medical software
Classification of medical software
收藏 引用
Symposium on Applied Computing
作者: P. Schneider M.L.A. Hines Computer Science Telecommunications Program University of Missouri Kansas City USA
The current state of software engineering practices in medical software development is discussed. The authors focus on patient safety (freedom from harm by a medical device) and patient vulnerability (possible indirec... 详细信息
来源: 评论
Entropy as a measure of database information  6
Entropy as a measure of database information
收藏 引用
6th Annual computer Security Applications Conference, ACSAC 1990
作者: Unger, E.A. Harn, L. Kumar, V. Comput. and Inf. Sci. Kansas State Univ. ManhattanKS United States Computer Science Telecommunications Program University of Missouri at Kansas City United States
An estimate of the information a database contains and the quantification of the vulnerability of that database to compromise by inferential methods is discussed. Such a measure could be used to evaluate the deterrent... 详细信息
来源: 评论
An iterative solution to the four-peg Tower of Hanoi problem  90
收藏 引用
Proceedings of the 1990 ACM annual conference on Cooperation
作者: Appie van de Liefvoort Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City Missouri
One of the variations of the Towers of Hanoi puzzle allows for p pegs, and for four pegs the solution to this variation is shown to have a simple structure which can be used to derive an iterative solution to the prob...
来源: 评论
Entropy as a measure of database information
Entropy as a measure of database information
收藏 引用
Annual computer Security Applications Conference
作者: E.A. Unger L. Harn V. Kumar Computer and Information Sciences Kansas State University USA Computer Science Telecommunications Program University of Missouri Kansas City USA
An estimate of the information a database contains and the quantification of the vulnerability of that database to compromise by inferential methods is discussed. Such a measure could be used to evaluate the deterrent... 详细信息
来源: 评论
ON THE DESIGN OF A SINGLE-KEY-LOCK MECHANISM BASED ON NEWTONS INTERPOLATING POLYNOMIAL
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1989年 第9期15卷 1135-1137页
作者: LAIH, CS HARN, L LEE, JY Department of Electrical Engineering National Cheng Kung University Tainan Taiwan Republic of China Computer Science and Telecommunications Program University of Missouri Kansas City MO 64110
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the N... 详细信息
来源: 评论
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem
Two new efficient cryptosystems based on Rabin's scheme: alt...
收藏 引用
Annual computer Security Applications Conference
作者: L. Harn T. Kiesler Computer Science Telecommunications Program University of Missouri Kansas City Kansas City MO USA
Proposes two distinct cryptosystems based on Rabin's scheme. The first incorporates coding theory and provides encryption only. The second provides simultaneously both private encryption and digital signature for ... 详细信息
来源: 评论
An extended cryptographic key generation scheme for multilevel data security
An extended cryptographic key generation scheme for multilev...
收藏 引用
Annual computer Security Applications Conference
作者: Lein Harn Yaw-Ruey Chien T. Kiesler Computer Science Telecommunications Program University of Missouri Kansas City Kansas City MO USA
S. Akl and P. Taylor (Proc. Crypto-82, p.237-250, 1982) proposed an elegant solution to the multilevel key distribution problem, using a cryptographic approach. In the present work, two problems associated with the Ak... 详细信息
来源: 评论
Electronic Meeting System Experience at IBM
收藏 引用
Journal of Management Information Systems 1989年 第3期6卷 25-43页
作者: Vogel, Douglas R. Nunamaker Jr., Jay F. Martz Jr., William Benjamin Grohowski, Ronald McGoff, Christopher Assistant Professor of MIS College of Business and Public Administration University of Arizona Tucson Head Department of MIS University of Arizona Professor of MIS and Computer Science University of Arizona Chairman Association for Computing Machinery Curriculum Committee on Information Systems University of Arizona Director of MIS and Telecommunications IBM Systems Integration Division Bethesda Maryland IBM Program Manager IBM Systems Integration Division Bethesda Maryland
Electronic meeting systems (EMS) have been introduced inside IBM in a cooperative effort between IBM and the University of Arizona to address the demands of an increasingly competitive and turbulent business environme... 详细信息
来源: 评论