限定检索结果

检索条件"机构=Department of Computer and Information Science"
40 条 记 录,以下是1-10 订阅
视图:
排序:
Asurvey on design and application of open-channel solid-state drives
收藏 引用
《Frontiers of information Technology & Electronic Engineering》2023年 第5期24卷 637-658页
作者:Junchao CHEN Guangyan ZHANG Junyu WEIDepartment of Computer Science and TechnologyTsinghua UniversityBeijing 100084China Xi’an Satellite Control CenterXi’an 710043China Beijing National Research Center for Information Science and TechnologyTsinghua UniversityBeijing 100084China 
Compared with traditional solid-state drives(SSDs),open-channel SSDs(OCSSDs)expose their internal physical layout and provide a host-based flash translation layer(FTL)that allows host-side software to control the inte...
来源:详细信息评论
Arabic Bank Check Processing: State of the Art
收藏 引用
《Journal of computer science & Technology》2013年 第2期28卷 285-299页
作者:Irfan Ahmad Sabri A.MahmoudInformation and Computer Science Department King Fahd University of Petroleum & Minerals 
In this paper, we present a general model for Arabic bank check processing indicating the major phases of a check processing system. We then survey the available databases for Arabic bank check processing research. Th...
来源:详细信息评论
A framework for an integrated unified modeling language
收藏 引用
《Frontiers of information Technology & Electronic Engineering》2016年 第2期17卷 143-159页
作者:Mohammad ALSHAYEB Nasser KHASHAN Sajjad MAHMOODInformation and Computer Science DepartmentKing Fahd University of Petroleum and Minerals 
The unified modeling language(UML) is one of the most commonly used modeling languages in the software *** simplifies the complex process of design by providing a set of graphical notations,which helps express the obj...
来源:详细信息评论
Role based access control design using Triadic concept analysis
收藏 引用
《Journal of Central South University》2016年 第12期23卷 3183-3191页
作者:Ch.Aswani Kumar S.Chandra Mouliswaran LI Jin-hai C.ChandrasekarSchool of Information Technology & EngineeringVIT University Faculty of ScienceKunming University of Science and Technology Department of Computer SciencePeriyar University 
Role based access control is one of the widely used access control *** are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Onto...
来源:详细信息评论
Energy efficient mechanism using flexible medium access control protocol for hybrid wireless sensor networks
收藏 引用
《Journal of Central South University》2013年 第8期20卷 2165-2174页
作者:SUN Ning JEONG Yoon-su LEE Sang-hoDepartment of Computer Science Chungbuk National University Department of Information Communication Engineering Mokwon University 
Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is rega...
来源:详细信息评论
RePizer:a framework for prioritization of software requirements
收藏 引用
《Frontiers of information Technology & Electronic Engineering》2016年 第8期17卷 750-765页
作者:Saif Ur Rehman KHAN Sai Peck LEE Mohammad DABBAGH Muhammad TAHIR Muzafar KHAN Muhammad ARIFDepartment of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur 50603 Malaysia Faculty of Computing and Information Technology University of Jeddah Jeddah 21589 Saudi Arabia College of Computer and Information Sciences (Muzahmiyah Branch) King Saud University Riyadh 11362 Saudi Arabia Department of Computer Science University of Gujrat Gujrat 50700 Pakistan 
标准的软件开发周期很大程度上取决于利益相关方的需求。软件开发全程围绕需求设计和管理。考虑到时间和资源的限制,必须分清哪些是必须首先考虑的高优先级需求。已有的需求排序架构缺少对历史数据的记录,而这些历史数据有助于从类似项...
来源:详细信息评论
Uncertainty Model Validation for Unstable System
收藏 引用
《Journal of Donghua University(English Edition)》2007年 第3期24卷 323-325页
作者:李征 顾国祥College of Information Science and TechnologyDonghua University Department of Electrical and ComputerLouisiana State University 
无常模型确认被几个作者为稳定的系统学习了。这份报纸为不稳定的 systans 考虑无常模型确认。在到为稳定的系统的学习的一个类似的假设下面,一必要并且 suffident 状况为不要使无效的不稳定的无常模型被获得,它概括为可信的系统的无...
来源:详细信息评论
Parallel Key-insulated Signature: Framework and Construction
收藏 引用
《Journal of Shanghai Jiaotong university(science)》2008年 第1期13卷 6-11页
作者:翁健 陈克非 李祥学 刘胜利 邱卫东Department of Computer Science and Engineering Shanghai Jiaotong University School of Information Security Engineering Shanghai Jiaotong University 
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulate...
来源:详细信息评论
Design and Evaluation of CRDMAC: Circular RTR Directional MAC Protocol for WANETs
收藏 引用
《China Communications》2012年 第6期9卷 1-13页
作者:Lu Huang Li Jie Dong Zhongping Ji YushengDepartment of Computer Science University of Tsukuba Tsukuba Science City3058573 Ibaraki Japan Fujitsu Limited Yokosuka 2390847 Kanagawa Japan Information Systems Architecture Science Research Division National Institute of Informatics Tokyo 1018460 Japan 
Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new prob...
来源:详细信息评论
Performance-driven assignment and mapping for reliable networks-on-chips
收藏 引用
《Journal of Zhejiang University-science C(computers and Electronics)》2014年 第11期15卷 1009-1020页
作者:Qian-qi LE Guo-wu YANG William N.N.HUNG Xiao-yu SONG Fu-you FANSchool of Computer Science and Engineering University of Electronic Science and Technology of China Department of Information and Computing Science Chengdu University of Technology Synopsys Inc. Mountain View CA 94040 USA Department of Electronic and Computer Engineering Portland State University Portland OR 97207-0751 USA 
Network-on-chip(NoC) communication architectures present promising solutions for scalable communication requests in large system-on-chip(SoC) designs. Intellectual property(IP) core assignment and mapping are two key ...
来源:详细信息评论
聚类工具 回到顶部