標(biāo)題: Titlebook: Advances in Parallel and Distributed Computing and Ubiquitous Services; UCAWSN & PDCAT 2015 James J. (Jong Hyuk) Park,Gangman Yi,Hong Shen [打印本頁] 作者: 櫥柜 時間: 2025-3-21 17:19
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services影響因子(影響力)
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services影響因子(影響力)學(xué)科排名
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services網(wǎng)絡(luò)公開度
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services被引頻次
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services被引頻次學(xué)科排名
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services年度引用
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services年度引用學(xué)科排名
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services讀者反饋
書目名稱Advances in Parallel and Distributed Computing and Ubiquitous Services讀者反饋學(xué)科排名
作者: 討厭 時間: 2025-3-21 22:25 作者: GULLY 時間: 2025-3-22 01:49
Valve Emboli Due to Non-Captured Pacingcol oblivious data plane, and it provides a simple programming model similar to POX. Based on POFOX, we construct a network testbed, and experimentally illustrate that POFOX can effectively manage the POF network, and provide the controlling functionality with high performances.作者: Daily-Value 時間: 2025-3-22 06:22
Coexisting Psychological Problems be treated transparently like private memory so that the cache hierarchy can be fully utilised without sacrificing memory consistency. Second, we propose a distance-aware page allocation scheme that samples access frequencies and selects the most frequently-recently used pages to be stored on the on-chip scratchpad memory.作者: 含鐵 時間: 2025-3-22 12:42 作者: 遣返回國 時間: 2025-3-22 15:31
https://doi.org/10.1007/3-540-53499-7installed on the mobile device using an escrow server. Thereby it enhances data protection, minimizes damage resulting from the exposure of data attributable to the loss of a mobile device, and prevents the installation of illegitimate software.作者: Mercurial 時間: 2025-3-22 19:50
Linguistic Diversity In The Classroom,the beacon is attached to the bottom of a UAV. In the indoor experiment, while transferring a beacon, the distances between the beacon and an AP were measured and tuned. Therefore, the accumulated difference between the real beacon location and the calculated beacon location was reduced by 31.1?%.作者: 紀(jì)念 時間: 2025-3-23 00:34
Tim Lau MD, FRCP(C), MSc,Sarah Russell MDontrol the brightness and color of the light in the proper space. Such a system could be utilized in a variety of fields. For example, an intelligent apartment could provide a comfortable indoor environment, as well as save energy, and light therapy could be used to treat depression and insomniac.作者: Relinquish 時間: 2025-3-23 02:38
Aidan Murphy,Anthony Ventresque,Conor Ryanhe number of fingers and detecting the hand area. Because Kinect provides a color image and depth image at the same time, it is easy to understand a gesture. The finger number is identified by calculating the length of the outline and central point of the hand.作者: LAIR 時間: 2025-3-23 06:08
Complex Cases in Total Knee Arthroplastyent algorithms for matrix-matrix addition/subtraction and multiplication using our scheme. The experimental results show that the proposed scheme outperforms the Traditional Multidimensional Array (TMA) based algorithms.作者: 不舒服 時間: 2025-3-23 11:05
J. Emsley,R. D. Ernst,K. D. Warrencritical parts of power system operations, both responsible for retrieving information from field equipment for sending control commands. We studied the wind energy SCADA system for IEC 61850 communication protocol. We focus on security for reliable SCADA system now. We want to introduce security concept required in SCADA systems.作者: 制度 時間: 2025-3-23 15:11
https://doi.org/10.1007/3-540-53499-7 a text corpus which is used for training of the target application, and it means that the method is independent to the ASR engine. The method is general and can be applied to any speech based application such as spoken dialog systems.作者: jovial 時間: 2025-3-23 18:46
https://doi.org/10.1007/978-94-6209-083-5t locations. The FMR has a prediction logic that should estimate an abnormal situation to analyze the possibility of crime by using the Regression and Apriori algorithm. The FMR model can be usefully used to prevent the crime because of an immediate response and rapid situation assessment.作者: maroon 時間: 2025-3-23 22:24 作者: 做作 時間: 2025-3-24 06:06 作者: 謙卑 時間: 2025-3-24 10:24 作者: 感情 時間: 2025-3-24 11:15 作者: 剝削 時間: 2025-3-24 18:35 作者: ARC 時間: 2025-3-24 22:32 作者: 土坯 時間: 2025-3-24 23:36 作者: cataract 時間: 2025-3-25 06:50
https://doi.org/10.1007/978-94-6209-083-5vices and expressing intention. This paper proposes a novel user interface to utilize the locations of users as control signals in indoor ubiquitous computing environments. The locations of users are estimated by analyzing the distance between a beacon and APs.作者: tooth-decay 時間: 2025-3-25 10:40 作者: Neonatal 時間: 2025-3-25 14:52
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/a/image/149333.jpg作者: STEER 時間: 2025-3-25 17:14 作者: Hallmark 時間: 2025-3-25 21:35 作者: Semblance 時間: 2025-3-26 01:20
Valve Emboli Due to Non-Captured Pacingined Networking (SDN). In this paper, we present POFOX, a SDN controller for POF. POFOX employs the full potentials of POF devices by allowing a protocol oblivious data plane, and it provides a simple programming model similar to POX. Based on POFOX, we construct a network testbed, and experimentall作者: Traumatic-Grief 時間: 2025-3-26 05:01 作者: Generalize 時間: 2025-3-26 11:22
Complex Cases in Total Knee Arthroplasty the array dimension is large and hence efficient design of multidimensional array operation is an important research issue. In this paper, we propose a two dimensional representation of multidimensional array. The scheme converts an . dimensional array into a two dimensional array. We design effici作者: GRAVE 時間: 2025-3-26 15:21
Management of Periprosthetic Femur Fracturecalled Omentum, aiming at bringing virtual microscopy to an Internet-scale community. Omentum has to manage more than 10,000 large proprietary microscopic images that are converted to easily dividable JPEG-trees, each consisting of millions of very small-scaled image parts. In this paper we propose 作者: 斜坡 時間: 2025-3-26 18:19 作者: POLYP 時間: 2025-3-27 00:22
Complex Cases of Personality Disorderstotype of CCN using Protocol-Oblivious Forwarding (POF), called Software-Defined Content Network (SDCN). And SDCN does not rely on the IP. CCN supports the unique in-network caching, so that caching strategies become a challenge. CCN lacks of global recognition for the whole network that leads to un作者: 召集 時間: 2025-3-27 03:24
https://doi.org/10.1007/978-3-030-70455-1 a series of sensors, controllers, and actuators. It is wirelessly connected by the internet of events between sensors and actuators. The perceptible objects are considered as not only a time-based, controlled system at the micro level, but also as an event-driven, controlled system at the macro lev作者: 歡樂東方 時間: 2025-3-27 08:28
https://doi.org/10.1007/BFb0111452 heterogeneous. However, the average ability of the group needed to solve a given task to a fair evaluation in cooperative learning should be similar to each other between the groups. In this paper, we propose greedy approach to find partitions with high homogeneity in a group and high heterogeneity作者: 刪除 時間: 2025-3-27 11:14 作者: 無法取消 時間: 2025-3-27 14:20
https://doi.org/10.1007/3-540-53499-7g applications. ASR errors are detected and corrected by syllable prediction. For accurate prediction of a next syllable, we used a current syllable, previous syllable context, and phonetic information of next syllable which is given by ASR error. The proposed method can correct ASR errors only with作者: 案發(fā)地點 時間: 2025-3-27 20:50
https://doi.org/10.1007/3-540-53499-7 secret data through mobile devices is increased. As a result, the illegitimate leakage and collection of user data related to mobile devices has greatly increased. In this paper, we propose a method of managing the sensitive data of a mobile device using an escrow server. The proposed scheme is adv作者: ineluctable 時間: 2025-3-28 00:22
https://doi.org/10.1007/3-540-53499-7ation of these color volume datasets, which are typically generated manually or semi-automatically, produces poor-quality rendering results. We propose an interactive high-quality visualization method using GPU-based refinements to support the study of anatomical structures. To smoothly represent th作者: headlong 時間: 2025-3-28 04:29
Linguistic Diversity In The Classroom,manned Aerial Vehicles (UAVs) is the core technique to control multiple UAVs. To calculate the locations of UAVs, the distance between Access Points (APs) and UAVs should be measured accurately given that the location of UAVs is obtained on the basis of the distance between APs and UAVs. In this pap作者: 遭遇 時間: 2025-3-28 10:02 作者: freight 時間: 2025-3-28 12:38
https://doi.org/10.1007/978-94-6209-083-5 shows a weak effect about preventing crime. To solve the weak effort, we propose a Flexible Multi-level Regression (FMR) model that should estimate a dangerous situation for the pedestrian. The FMR model is tracking the behavior of between pedestrians from multiple CCTV that are located in differen作者: cataract 時間: 2025-3-28 16:49
Tim Lau MD, FRCP(C), MSc,Sarah Russell MDteristics of humans. In particular, numerous intelligent systems have been developed to prove humans with the services required for a living space. In this study, a middleware system was developed to analyze a user’s emotions using brain waves to control the brightness and color of light accordingly作者: 縮影 時間: 2025-3-28 19:12 作者: Ptsd429 時間: 2025-3-29 02:54
https://doi.org/10.1007/978-981-10-0068-3Artificial intelligence; Big data and data mining; Embedded system; Intelligent sensor network; PDCAT 20作者: 溫和女孩 時間: 2025-3-29 05:13
978-981-10-9077-6Springer Science+Business Media Singapore 2016作者: 彩色 時間: 2025-3-29 10:14 作者: EWE 時間: 2025-3-29 13:19
OCLS: A Simplified High-Level Abstraction Based Framework for Heterogeneous Systems,Overview: 作者: 危險 時間: 2025-3-29 17:24
ASR Error Management Using RNN Based Syllable Prediction for Spoken Dialog Applications,Overview: 作者: Ingrained 時間: 2025-3-29 20:09 作者: 排他 時間: 2025-3-30 01:21
Indoor Location-Based Natural User Interface for Ubiquitous Computing Environment,Overview: 作者: 混亂生活 時間: 2025-3-30 04:57
,Automatic Lighting Control Middleware System Controlled by User’s Emotion Based on EEG,Overview: 作者: 寄生蟲 時間: 2025-3-30 11:10
Advances in Parallel and Distributed Computing and Ubiquitous ServicesUCAWSN & PDCAT 2015作者: myalgia 時間: 2025-3-30 12:46
Ofir Koren,Ran Eliaz,Hasan Jilaihawimprove users’ interest in similarity, but they do not give a mathematical definition. In this paper, we use these two factors to design two new similarity functions. To use them in the MF-based RS, we come up with two kinds of social regularization for each similarity function. Compared with previou作者: investigate 時間: 2025-3-30 17:08 作者: mitten 時間: 2025-3-30 23:24
1876-1100 ing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation..978-981-10-9077-6978-981-10-0068-3Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: travail 時間: 2025-3-31 03:01 作者: bleach 時間: 2025-3-31 07:29 作者: patriarch 時間: 2025-3-31 11:38 作者: Dignant 時間: 2025-3-31 15:20 作者: pester 時間: 2025-3-31 19:25
An Experimental Study on Social Regularization with User Interest Similarity, ist meist verkürzt. Die proximale Urethra ist auch in Ruhe trichterformig zur Blase hin ge?ffnet. Im Gegensatz zur ersten Gruppe kann bei der seltenen ?reinen“ Form einer . der Blasenhals funktionell anatomisch stabil sein. Mischformen sind je-doch h?ufig.作者: 新鮮 時間: 2025-3-31 23:15 作者: defray 時間: 2025-4-1 05:27
Hierarchical Caching Management for Software Defined Content Network Based on Node Value,ntiert sich, ob bei der beschriebenen Ausgangssituation eine Harnableitung in Betracht kommt oder wegen ungenügender Funktion und potentieller Infektionsgef?hrdung eine unilaterale Nephrektomie auf der betroffenen Seite in Zusammenhang mit der Exenteration vorgenommen werden sollte (s. Kapitel F. IV作者: 最低點 時間: 2025-4-1 08:40
Interoperation of Distributed MCU Emulator/Simulator for Operating Power Simulation of Large-Scale anach ihre Prophylaxe einrichten, weniger Thrombosen bei ihren Kranken, als diejenigen, die nichts dergleichen tun? Gegen die Thrombose ist kein Kraut gewachsen, so wenig wie gegen die Embolie. Das ist gewi? betrüblich und ganz besonders betrüblich ist es, da? wir nichts haben, um Embolien zu verhüt