咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 1 篇 机械工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 计算机科学与技术...
    • 1 篇 建筑学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
    • 1 篇 美术学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 data security
  • 1 篇 video streaming
  • 1 篇 3gpp
  • 1 篇 data privacy
  • 1 篇 simulation
  • 1 篇 3gpp lte
  • 1 篇 packet schedulin...
  • 1 篇 pervasive comput...
  • 1 篇 information tech...
  • 1 篇 educational inst...
  • 1 篇 mechanical facto...
  • 1 篇 queuing analysis...
  • 1 篇 quality of servi...
  • 1 篇 local thermodyna...
  • 1 篇 downlink
  • 1 篇 ofdma
  • 1 篇 long term evolut...
  • 1 篇 memory hierarchy
  • 1 篇 third generation...
  • 1 篇 feature extracti...

机构

  • 1 篇 faculty of engin...
  • 1 篇 department of mu...
  • 1 篇 information secu...
  • 1 篇 department of co...
  • 1 篇 faculty ofengine...
  • 1 篇 department of in...
  • 1 篇 center ofor cryp...
  • 1 篇 department of co...
  • 1 篇 center ofor cryp...

作者

  • 1 篇 rachod patachaia...
  • 1 篇 huda adibah mohd...
  • 1 篇 raphael c.-w. ph...
  • 1 篇 kumbesan sandras...
  • 1 篇 faria nassiri mo...
  • 1 篇 md. baharul isla...
  • 1 篇 muhammad ali ism...
  • 1 篇 simin naghavi
  • 1 篇 riyaj basukala
  • 1 篇 mir md. jahangir...
  • 1 篇 yasaman sarlati
  • 1 篇 huo-chong ling
  • 1 篇 swee-huay heng

语言

  • 5 篇 英文
检索条件"机构=Faculty ofEngineering and Information Technology"
5 条 记 录,以下是1-10 订阅
排序:
A comparison study of multi-attribute continuous double auction mechanisms
A comparison study of multi-attribute continuous double auct...
收藏 引用
International Conference on e-Commerce in Developing Countries: with focus on e-Trust (ECDC)
作者: Yasaman Sarlati Simin Naghavi Faria Nassiri Mofakham Department of Information Technology Engineering Faculty ofEngineering University of Isfahan Iran
Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Doubl... 详细信息
来源: 评论
A New Feature-Based Image Registration Algorithm
收藏 引用
Computer technology and Application 2013年 第2期4卷 79-84页
作者: Md. Baharul Islam Mir Md. Jahangir Kabir Department of Multimedia Technology and Creative Arts Faculty of Science and Information Technology Daffodil InternationalUniversity Dhaka 1207 Bangladesh Department of Computer Science and Engineering Faculty of Electrical and Computer Engineering Rajshahi University ofEngineering & Technology Rajshahi 6204 Bangladesh
IR (Image Registration) is one of the important operation of image processing system which is the process of aligning two or more images into one coordinate system that are taken at different times, from different s... 详细信息
来源: 评论
Performance Behaviour Analysis of the Present 3-Level Cache System for Multi-Core Processors
收藏 引用
Computer technology and Application 2012年 第11期3卷 729-733页
作者: Muhammad Ali Ismail Department of Computer and Information Systems Engineering Faculty of Electrical and Computer Engineering NED University ofEngineering and Technology Karachi 752 70 Pakistan
In this paper, a study related to the expected performance behaviour of present 3-level cache system for multi-core systems is presented. For this a queuing model for present 3-level cache system for multi-core proces... 详细信息
来源: 评论
Performance of Well Known Packet Scheduling Algorithms in the Downlink 3GPP LTE System
Performance of Well Known Packet Scheduling Algorithms in th...
收藏 引用
IEEE Malaysia International Conference on Communications
作者: Huda Adibah Mohd Ramli Riyaj Basukala Kumbesan Sandrasegaran Rachod Patachaianand Faculty of Engineering and Information Technology University of Technology Faculty ofEngineering and Information Technology University of Technology
This paper investigates the performance of well known packet scheduling algorithms developed for single carrier wireless systems from a real time video streaming perspective. The performance evaluation is conducted us... 详细信息
来源: 评论
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
Attacks on a Blind Signature-Based Steganographic Protocol o...
收藏 引用
International Conference on Advanced Communication technology (ICACT)
作者: Huo-Chong Ling Swee-Huay Heng Raphael C.-W. Phan Center ofor Cryptography & Information Security Faculty ofEngineering Multimedia University Cyberjaya Malaysia Center ofor Cryptography & Information Security Faculty ofEngineering and Technology Multimedia University Malacca Malaysia Information Security Research (iSECURES) Laboratory Swinburne University of Technology Kuching Malaysia
We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signatu... 详细信息
来源: 评论