標題: Titlebook: Advanced Information Networking and Applications; Proceedings of the 3 Leonard Barolli,Flora Amato,Makoto Takizawa Conference proceedings 2 [打印本頁] 作者: Jejunum 時間: 2025-3-21 16:14
書目名稱Advanced Information Networking and Applications影響因子(影響力)
書目名稱Advanced Information Networking and Applications影響因子(影響力)學科排名
書目名稱Advanced Information Networking and Applications網(wǎng)絡公開度
書目名稱Advanced Information Networking and Applications網(wǎng)絡公開度學科排名
書目名稱Advanced Information Networking and Applications被引頻次
書目名稱Advanced Information Networking and Applications被引頻次學科排名
書目名稱Advanced Information Networking and Applications年度引用
書目名稱Advanced Information Networking and Applications年度引用學科排名
書目名稱Advanced Information Networking and Applications讀者反饋
書目名稱Advanced Information Networking and Applications讀者反饋學科排名
作者: 咆哮 時間: 2025-3-21 20:40
https://doi.org/10.1007/978-3-8351-9113-6 and uploading. We design a fine-grained access control mechanism using smart contract which provide a different level of access rights to the users in the network. We implement our system on Ethereum private blockchain and use proof of authority for consensus mechanism.作者: Gerontology 時間: 2025-3-22 01:20
https://doi.org/10.1007/978-3-8351-9113-6traffic and test the proposed method which shows that it can effectively detect the periodicity of different sequences in the industrial control system and provide an auxiliary method for anomaly detection.作者: 協(xié)迫 時間: 2025-3-22 07:47 作者: enlist 時間: 2025-3-22 09:25 作者: LAVA 時間: 2025-3-22 16:26 作者: Desert 時間: 2025-3-22 17:25 作者: intolerance 時間: 2025-3-22 22:42
https://doi.org/10.1007/978-3-8351-9113-6technical way. Mathematical models that help determining the models’ pricing are analyzed. What is more, several experiments are conducted using the Sensitivity Analysis (SA) technique determining if the advantages and profits outweigh the disadvantages.作者: THROB 時間: 2025-3-23 04:36 作者: CHART 時間: 2025-3-23 08:33 作者: 獨輪車 時間: 2025-3-23 09:47
https://doi.org/10.1007/978-3-8351-9113-6esults show that our approach performs better than that of two other approaches, namely CoordVNF and TS-SFCC in terms of time composition and acceptance ratio when the number of services being chained increases.作者: 吞沒 時間: 2025-3-23 13:57 作者: Annotate 時間: 2025-3-23 21:52 作者: 粗魯性質(zhì) 時間: 2025-3-23 23:36
https://doi.org/10.1007/978-3-8348-9610-0hat allows it to adapt to the unpredictable changes in the environment, and to provide better support for the heterogeneity of devices. The proposed algorithm has reduced the power consumption by 37% and failure rate by 57%, with a slightly shorter completion time compared to the existing solutions.作者: oracle 時間: 2025-3-24 06:07
Advanced Information Networking and Applications978-3-030-44041-1Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: HEPA-filter 時間: 2025-3-24 09:12
https://doi.org/10.1007/978-3-8351-9113-6t Learning (IRBRL), which mainly developed based on reinforcement learning techniques and SDN controller is responsible for creating and maintaining routing policies, including dynamic routing and link bandwidth allocation.作者: Melanocytes 時間: 2025-3-24 11:21
https://doi.org/10.1007/978-3-8351-9113-6echnologies, which are oriented for security areas, and user authentication tasks. In particular new visual codes will be defined, which allow to authenticate persons, based on theirs cognitive skills, and possibilities of performing fast recognition and semantic evaluation of observed patterns.作者: 令人發(fā)膩 時間: 2025-3-24 18:11
https://doi.org/10.1007/978-3-030-44041-1Information Networking; Intelligent Systems; Data Mining; IoT; Wireless Networking; Intelligent Mobile Sy作者: Trigger-Point 時間: 2025-3-24 22:31 作者: 警告 時間: 2025-3-25 00:44
Leonard Barolli,Flora Amato,Makoto TakizawaPresents recent research in information networking and applications.Gathers the proceedings of the 34th International Conference on Advanced Information Networking and Applications held in Caserta, It作者: 返老還童 時間: 2025-3-25 03:41 作者: 聽覺 時間: 2025-3-25 09:46 作者: JADED 時間: 2025-3-25 13:09
https://doi.org/10.1007/978-3-8351-9113-6However, it is challenging to track the provenance of data and maintain traceability throughout the network. The traditional supply chains are centralized and dependent on third party for trading. Centralized systems lack transparency, accountability and auditability. In our proposed solution, we ha作者: 腐蝕 時間: 2025-3-25 18:55
https://doi.org/10.1007/978-3-8351-9113-6rational efficiency and accuracy of power systems. There are many weather parameters which have influential affect on the supply and demand of electricity, but temperature, solar radiations, and wind speed are the most important parameters. Our proposed time series model is based on preprocessing, f作者: NICHE 時間: 2025-3-25 23:34
https://doi.org/10.1007/978-3-8351-9113-6n this context, health data occupies a privileged place. The reliable gathering of personal health information has become recently possible through wearable medical devices. These devices usually do not store the data locally and offer, in the most favourable case, limited basic data processing feat作者: 騎師 時間: 2025-3-26 01:47 作者: auxiliary 時間: 2025-3-26 04:58 作者: 摘要記錄 時間: 2025-3-26 11:09 作者: glans-penis 時間: 2025-3-26 15:05
https://doi.org/10.1007/978-3-8351-9113-6echnologies, which are oriented for security areas, and user authentication tasks. In particular new visual codes will be defined, which allow to authenticate persons, based on theirs cognitive skills, and possibilities of performing fast recognition and semantic evaluation of observed patterns.作者: vitreous-humor 時間: 2025-3-26 20:39 作者: Affectation 時間: 2025-3-26 23:19
https://doi.org/10.1007/978-3-8351-9113-6health record on cloud environment, making data exchange feasible between patient and healthcare provider. However, this new shift comes with the risk of security and privacy concerns of patient and data. The exchange of healthcare data among patients and healthcare provider with high level of secur作者: maroon 時間: 2025-3-27 04:46 作者: BILE 時間: 2025-3-27 05:27 作者: 西瓜 時間: 2025-3-27 09:48 作者: Kinetic 時間: 2025-3-27 14:57 作者: Proclaim 時間: 2025-3-27 20:27
https://doi.org/10.1007/978-3-8351-9113-6r large-scale transportation networks where numerous detectors are geographically deployed to collect traffic data is still an open issue. To address this issue, in this paper, we formulate the problem of customizing an LSTM model for a single detector into a finite Markov decision process and then 作者: gain631 時間: 2025-3-27 23:27 作者: languid 時間: 2025-3-28 05:50 作者: Uncultured 時間: 2025-3-28 06:41 作者: profligate 時間: 2025-3-28 14:22
Bewehren nach DIN 1045-1 (2008)problems. Some of the major challenges are related to the service deployment process (composition, embedding, and scheduling). In particular, current solutions for network service composition are limited, in the sense that they are not customizable, neither in terms of the evaluation setup nor the o作者: 分解 時間: 2025-3-28 15:09 作者: 鐵砧 時間: 2025-3-28 22:20
A Secure Distributed e-Health System for the Management of Personal Health Metrics Data,Business-to-Business-Marketing am Institut für Handel, Absatz und Marketing an der Johannes Kepler Universit?t Linz. .Prof. (FH) Dr. Kurt Gaubinger ist FH-Professor für Marketing im Fachhochschul-Studiengang Innovations- und Produktmanag978-3-8349-0346-4978-3-8349-9287-1作者: 解開 時間: 2025-3-29 01:18
Modeling the Chatbot Quality of Services (CQoS) Using Word Embedding to Intelligently Detect Inapprr ein moralisch fragwürdiges Verhalten des Veranstalters erkl?ren k?nnen. Als L?sungsansatz stellen die Autoren die Einführung eines Fachkenntnisnachweises für Veranstalter ?ffentlicher Events zur Diskussion.作者: Affable 時間: 2025-3-29 04:16 作者: HAIRY 時間: 2025-3-29 09:03
Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare System,etails zu verlieren..?.Univ.-Prof. Dr. Michael Lingenfelder, Philipps-Universit?t Marburg.Ein weiterer Beweis für die besondere Kompetenz von Ralf T. Kreutzer im Marketing, seine gro?e Leidenschaft für die best978-3-658-35306-3978-3-658-35307-0作者: Terminal 時間: 2025-3-29 14:43 作者: 游行 時間: 2025-3-29 18:09
CUSCO: A Customizable Solution for NFV Composition,cht der Ort um auf Details des Strategischen Managements einzugehen (siehe die vielen Lehrbücher dazu). Vielmehr soll im folgenden argumentiert werden, warum es sinnvoll ist, verschiedene Teile des strategischen Prozesses als Projekte zu betrachten.作者: 較早 時間: 2025-3-29 21:01
Improving Spectrum Usage on Full-Duplex Communications with an Innovative Channel Reservation,tative . der . (2005, S. 20–23) liefert hierzu interessante Ergebnisse. Danach ist eine ?gute Ausbildung“ mit 88 % das meistgenannte Lebensziel der Deutschen, noch vor ?Partnerschaft“ (mit 80 %), ?finanzieller Absicherung für Zukunft und Alter“ (78 %) sowie ?Selbstbestimmung und Individualit?t“ und ?Kinder“ mit je 75 %.作者: 責難 時間: 2025-3-30 00:42
ITMN: A New MAC Protocol for Improving Throughput of Multihop Wireless Networks Considering Number nsziel der Deutschen, noch vor ?Partnerschaft“ (mit 80 %), ?finanzieller Absicherung für Zukunft und Alter“ (78 %) sowie ?Selbstbestimmung und Individualit?t“ und ?Kinder“ mit je 75 %. Eine vertiefende Analyse zeigt jedoch, dass ?gute Ausbildung“ zu den Lebenszielen geh?rt, deren Erreichen eher als ?selbstverst?ndlich“ vorausgesetzt wird! M.E.作者: Homocystinuria 時間: 2025-3-30 06:45 作者: 蹣跚 時間: 2025-3-30 09:51
Machine Learning Based Data Reduction in WSN for Smart Agriculture,978-3-8349-3873-2作者: 北極熊 時間: 2025-3-30 12:43 作者: GROSS 時間: 2025-3-30 19:14
Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks,Unterricht vorbereitete Exkursion mit einem Gastvortrag und eigenst?ndiger studentischer Forschung. Die Studierenden haben hier die M?glichkeit, qualitativ empirische Forschungsmethoden mit einer hohen Relevanz für die Praxis der Sozialen Arbeit anzuwenden und einzuüben.作者: BILIO 時間: 2025-3-30 22:42 作者: 欲望 時間: 2025-3-31 02:34 作者: 肥料 時間: 2025-3-31 06:32
Eye Tracking Technology in Personal Authentication Protocols,he Entscheidungsfallen vermeiden?.Unternehmertum – ein vielschichtiges, zeitloses und nachhaltiges Konzept?.VUCA, Stress und Ressourcen: Analysen und Gestaltungsempfehlungen für Führungskr?fte aus wirtschaftspsychologischer Sicht?.Corporate Governance: Implikationen verantwortungsvoller Unternehmens作者: 縱欲 時間: 2025-3-31 11:16 作者: GEST 時間: 2025-3-31 17:11 作者: licence 時間: 2025-3-31 17:31 作者: 連累 時間: 2025-3-31 23:04 作者: 祖?zhèn)?nbsp; 時間: 2025-4-1 04:03 作者: 骯臟 時間: 2025-4-1 09:05 作者: ESPY 時間: 2025-4-1 13:32
https://doi.org/10.1007/978-3-8351-9113-6gh a client application module that is installed on the user’s smartphone or smartwatch, and securely transports it to the cloud backend. The homomorphic processing of the encrypted data is performed using the Apache Spark service. The event-based handlers are triggered by the IBM OpenWhisk programm