標(biāo)題: Titlebook: Advances in Ubiquitous Networking; Proceedings of the U Essa?d Sabir,Hicham Medromi,Mohamed Sadik Conference proceedings 2016 Springer Scie [打印本頁(yè)] 作者: GURU 時(shí)間: 2025-3-21 20:09
書目名稱Advances in Ubiquitous Networking影響因子(影響力)
書目名稱Advances in Ubiquitous Networking影響因子(影響力)學(xué)科排名
書目名稱Advances in Ubiquitous Networking網(wǎng)絡(luò)公開(kāi)度
書目名稱Advances in Ubiquitous Networking網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Advances in Ubiquitous Networking被引頻次
書目名稱Advances in Ubiquitous Networking被引頻次學(xué)科排名
書目名稱Advances in Ubiquitous Networking年度引用
書目名稱Advances in Ubiquitous Networking年度引用學(xué)科排名
書目名稱Advances in Ubiquitous Networking讀者反饋
書目名稱Advances in Ubiquitous Networking讀者反饋學(xué)科排名
作者: GRIEF 時(shí)間: 2025-3-22 00:00
Enhanced Hybrid Uplink Time Difference of Arrival and Assisted Global Positioning System for UMTS Us existing techniques in a way to find a robust method that meets the expectations of both areas. In this paper, we propose an enhanced hybrid approach between the up-link time difference of arrival and Assisted GPS positioning methods for UMTS users by improving the accuracy of UTDOA using the NLMS 作者: insolence 時(shí)間: 2025-3-22 00:38 作者: LIEN 時(shí)間: 2025-3-22 08:37
A Pricing-Based Spectrum Leasing Framework with Adaptive Distributed Learning for Cognitive Radio Net of her licensed spectrum to a secondary (SU). We propose a pricing-based spectrum leasing framework between the PU and the SU. The spectrum leasing problem can be depicted by a non-cooperative game where: on one hand, the PU plays the seller and attempts to maximize its own utility by setting the 作者: tympanometry 時(shí)間: 2025-3-22 10:30
Theoretical Analysis of BER Performance for Asynchronous FBMC Based Multi-cellular Networks with Nons in the presence of high power amplifiers (HPA) nonlinear distortion (NLD). A promising class of FBMC modulation called Cosine Modulated Multitone (CMT) is considered and the analytical BER is derived based on the signal to interference plus noise ratio (SINR) of a cellular network consisting of on作者: intangibility 時(shí)間: 2025-3-22 16:29 作者: ABHOR 時(shí)間: 2025-3-22 21:04 作者: 無(wú)政府主義者 時(shí)間: 2025-3-22 22:56
A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systemsioning services, users increasingly demand services that can adapt to their recent context. In this paper, we propose a multi-attributes and adaptive approach for Context Level Agreements (CLAs) negotiation between a context provider and a context consumer using a context broker. The approach employ作者: 我還要背著他 時(shí)間: 2025-3-23 04:34
A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computings of the cloud, but unfortunately this technology suffers from many security vulnerabilities. The main purpose of this paper is to present a new secure architecture of Virtual Network machines in order to increase security among virtual machines in a virtualized environment (Xen as a case study). Fi作者: 拔出 時(shí)間: 2025-3-23 06:50 作者: triptans 時(shí)間: 2025-3-23 12:20
Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learning people are taking online courses. It becomes the need of the hour, since it is being used as a big platform for enhancing and upgrading knowledge by increasing flexibility in various fields and providing ways to make learning easier. However E-learning has several challenges, one of these major cha作者: CHARM 時(shí)間: 2025-3-23 15:09
A New Shared and Comprehensive Tool of Cloud Computing Security Risk Assessmenteir users. Despite the fact that cloud computing offers many cost benefits for their cloud users, number of security risk are emerging in association with cloud usage that need to be assessed. Assessing risk in Cloud computing environment remains an open research issue. This paper presents a compreh作者: 假 時(shí)間: 2025-3-23 20:39
The Behavior of CPW-Fed Slotted Cantor Set Fractal Antenna an Ultra Wide Band (UWB) behavior and important gains. Also, the setup of slots allows having more lower resonant frequencies and therefore designing miniaturized antennas with good performances..All the simulations were performed with FEKO 6.3.作者: 玉米棒子 時(shí)間: 2025-3-23 22:14 作者: 捏造 時(shí)間: 2025-3-24 02:34
High Sensitive and Efficient Circular Polarized Rectenna Design for RF Energy Harvesting at 5.8 GHzloped structure is suitable to harvest RF energy at 5.8GHz ISM frequency band for powering devices involving low power consumption, located in unreachable area or needing expensive maintenance costs. The proposed design incorporate a 2?×?2 circular polarized antenna array with an enhanced directivit作者: 主動(dòng) 時(shí)間: 2025-3-24 07:31 作者: 美麗的寫 時(shí)間: 2025-3-24 13:36 作者: Lumbar-Spine 時(shí)間: 2025-3-24 17:44
Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learningtrol) model which is considered as one of the most developed access control security models, to improve the highest degree of security in a concrete e-learning scenario for educational purpose, and to prove how the expressive power and flexibility of this model work. The proposed approach is impleme作者: granite 時(shí)間: 2025-3-24 23:02 作者: 惰性女人 時(shí)間: 2025-3-24 23:22
Sociology of the Sciences - Monographswest power to transmit their packets among . available levels whereas the followers retransmit at the random power levels picked from . higher distinct. Furthermore, we investigate the impact of the implementation of our scheme on the equilibrium and discuss the optimal partition of leaders/follower作者: GUILT 時(shí)間: 2025-3-25 03:22 作者: Crayon 時(shí)間: 2025-3-25 08:16
https://doi.org/10.1007/0-387-32773-8trol) model which is considered as one of the most developed access control security models, to improve the highest degree of security in a concrete e-learning scenario for educational purpose, and to prove how the expressive power and flexibility of this model work. The proposed approach is impleme作者: 取回 時(shí)間: 2025-3-25 11:55 作者: Devastate 時(shí)間: 2025-3-25 19:48
Advances in Ubiquitous Networking978-981-287-990-5Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 比喻好 時(shí)間: 2025-3-25 21:08 作者: 暗語(yǔ) 時(shí)間: 2025-3-26 01:58 作者: 礦石 時(shí)間: 2025-3-26 08:08
https://doi.org/10.1007/978-981-287-990-5distributed ambient intelligence; context-awareness; cloud computing; wearable devices; future mobile ne作者: 胖人手藝好 時(shí)間: 2025-3-26 10:33 作者: glamor 時(shí)間: 2025-3-26 16:36
Gary Lock,Brian Leigh MolyneauxThis paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.作者: ARCH 時(shí)間: 2025-3-26 17:29
Applying Encryption Algorithm for Data Security in Cloud StorageThis paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.作者: 箴言 時(shí)間: 2025-3-27 00:11
Elinor Accampo,Christopher E. Forthmedium access protocol. We study the performance of this system under a new transmission scheduling scheme. In contrast to slotted aloha, each new arrival packet is first transmitted at a probability . and retransmitted later, if needed, with probability .. Under this proposal, we analyze the cooper作者: 怪物 時(shí)間: 2025-3-27 02:31
Elinor Accampo,Christopher E. Forth existing techniques in a way to find a robust method that meets the expectations of both areas. In this paper, we propose an enhanced hybrid approach between the up-link time difference of arrival and Assisted GPS positioning methods for UMTS users by improving the accuracy of UTDOA using the NLMS 作者: PALMY 時(shí)間: 2025-3-27 06:15 作者: 描繪 時(shí)間: 2025-3-27 09:57 作者: aplomb 時(shí)間: 2025-3-27 14:08
De-Orientalized Pedagogical Spaces,s in the presence of high power amplifiers (HPA) nonlinear distortion (NLD). A promising class of FBMC modulation called Cosine Modulated Multitone (CMT) is considered and the analytical BER is derived based on the signal to interference plus noise ratio (SINR) of a cellular network consisting of on作者: Badger 時(shí)間: 2025-3-27 21:14
https://doi.org/10.1007/978-94-6351-191-9of protocols are defined: controlled access protocols and competing protocols, in which our work is registered. In our paper, we define an access protocol where each station possesses a different and unique contention sequence CS, with which they enter in a battle with other stations. In the end of 作者: 宣稱 時(shí)間: 2025-3-28 02:01 作者: 船員 時(shí)間: 2025-3-28 03:07
Landon E. Hancock,Susan H. Allenioning services, users increasingly demand services that can adapt to their recent context. In this paper, we propose a multi-attributes and adaptive approach for Context Level Agreements (CLAs) negotiation between a context provider and a context consumer using a context broker. The approach employ作者: Interim 時(shí)間: 2025-3-28 07:21
René Claude Niyonkuru,Réginas Ndayiragijes of the cloud, but unfortunately this technology suffers from many security vulnerabilities. The main purpose of this paper is to present a new secure architecture of Virtual Network machines in order to increase security among virtual machines in a virtualized environment (Xen as a case study). Fi作者: gerontocracy 時(shí)間: 2025-3-28 10:30 作者: badinage 時(shí)間: 2025-3-28 14:49
https://doi.org/10.1007/0-387-32773-8 people are taking online courses. It becomes the need of the hour, since it is being used as a big platform for enhancing and upgrading knowledge by increasing flexibility in various fields and providing ways to make learning easier. However E-learning has several challenges, one of these major cha作者: 下垂 時(shí)間: 2025-3-28 20:47 作者: 小畫像 時(shí)間: 2025-3-29 01:42
https://doi.org/10.1007/0-387-32773-8 an Ultra Wide Band (UWB) behavior and important gains. Also, the setup of slots allows having more lower resonant frequencies and therefore designing miniaturized antennas with good performances..All the simulations were performed with FEKO 6.3.作者: 天真 時(shí)間: 2025-3-29 04:24 作者: 受辱 時(shí)間: 2025-3-29 10:09 作者: facilitate 時(shí)間: 2025-3-29 15:08 作者: 茁壯成長(zhǎng) 時(shí)間: 2025-3-29 18:16 作者: TOXIN 時(shí)間: 2025-3-29 20:41
1876-1100 ionalscientific event that took place on. .September 08-10, 2015, in thefascinating city of Casablanca, Morocco...?UNet’15 is technicallysponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.. .978-981-13-5740-4978-981-287-990-5Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 愛(ài)得痛了 時(shí)間: 2025-3-30 00:03 作者: 停止償付 時(shí)間: 2025-3-30 07:26
A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computingrst, we expose the different network modes based on Xen Hypervisor, and then we analyses vulnerabilities and security issues within these kind of environment. Finally, we present in details new secure architecture and demonstrate how it can face the main security network attacks.作者: Enrage 時(shí)間: 2025-3-30 09:51 作者: Priapism 時(shí)間: 2025-3-30 15:52
Landon E. Hancock,Susan H. Allen the rounds of negotiation. The ultimate goal is to improve context-based adaptation of context-aware applications and services. One of the advantages of this approach is that it permits to resolve conflicts of interests between the context provider and the context consumer when the global utility of each party reaches a Pareto optimum.作者: florid 時(shí)間: 2025-3-30 18:48 作者: 嘲笑 時(shí)間: 2025-3-30 22:25 作者: incarcerate 時(shí)間: 2025-3-31 01:06
A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systems the rounds of negotiation. The ultimate goal is to improve context-based adaptation of context-aware applications and services. One of the advantages of this approach is that it permits to resolve conflicts of interests between the context provider and the context consumer when the global utility of each party reaches a Pareto optimum.作者: miscreant 時(shí)間: 2025-3-31 05:49
A New Shared and Comprehensive Tool of Cloud Computing Security Risk Assessmentich is also in compliance with all the specific characteristics of the Cloud Computing. An experimental result will be showed at the end to demonstrate the effectiveness of this new risk assessment model.作者: 思考才皺眉 時(shí)間: 2025-3-31 10:59