派博傳思國(guó)際中心

標(biāo)題: Titlebook: Advances on Broad-Band Wireless Computing, Communication and Applications; Proceedings of the 1 Leonard Barolli Conference proceedings 2022 [打印本頁(yè)]

作者: 相持不下    時(shí)間: 2025-3-21 17:17
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications影響因子(影響力)




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications影響因子(影響力)學(xué)科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications網(wǎng)絡(luò)公開度




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications被引頻次




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications被引頻次學(xué)科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications年度引用




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications年度引用學(xué)科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications讀者反饋




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications讀者反饋學(xué)科排名





作者: lethal    時(shí)間: 2025-3-21 22:26
In-vehicle Network IDS Using Message Time Interval Infrastructure,ker on a CAN network can affect a genuine veritable failure as well as mechanical issues. Therefore, in this paper, we test detection performance by exploiting CAN characteristics by performing attacks on a framework that can propose and test message time interval-based IDS suitable for limited automotive environments.
作者: 膽小懦夫    時(shí)間: 2025-3-22 04:07
Hand Gesture Input Interface of , Using Leap Motion Controller and Its Application Example,his/her hands although Leap Motion controller does not so. Therefore, the authors added new functionality to support Leap Motion Controller for the hand gesture input interface of .. In this paper, the authors show an animation system using Leap Motion Controller as one of the applications developed using ..
作者: ACTIN    時(shí)間: 2025-3-22 06:57
Effects of Buffer Management Considering Time Continuity on Disaster Information on DTN Based Infor infrastructure. In particular, by performance evaluations, we clarify that the buffer management considering lapsed time of after generation of disaster information by area, improves freshness and size of delivery area of disaster information than typical buffer management by FIFO (First In First Out).
作者: 使出神    時(shí)間: 2025-3-22 10:15

作者: 群居動(dòng)物    時(shí)間: 2025-3-22 13:18
A Simulation System for Mesh Router Placement in WMNs Considering Coverage Construction Method and and uniform distributions of mesh clients. In this paper, we propose a CCM-based Simulated Annealing (SA) approach for mesh router placement problem. From the simulation results, we found that the proposed method covers more mesh clients for all instances compared with the CCM.
作者: evaculate    時(shí)間: 2025-3-22 17:53
,On the Latency of Nomadic Lévy Walk Based Message Ferry Routing in Delay Tolerant Networks,me (sink) position. In this paper, we show the simulation result on the latency of message delivery by message ferries with Nomadic Lévy Walk in DTNs. Then we compare with other variant of Lévy walk regarding the latency. We also discuss the difference of the latency between the sink relocation strategies of Nomadic Lévy Walk.
作者: patriarch    時(shí)間: 2025-3-22 23:23
Single Sign-On Using Contactless Smart Cards and Fingerprint Authentication, which involves contactless smartcards, to store the passwords and fingerprint authorization to authenticate a user for safety and security. This system provides security and convenience at one place.
作者: perpetual    時(shí)間: 2025-3-23 04:12

作者: Arrhythmia    時(shí)間: 2025-3-23 08:38
The Concept of the Modern Schoolker on a CAN network can affect a genuine veritable failure as well as mechanical issues. Therefore, in this paper, we test detection performance by exploiting CAN characteristics by performing attacks on a framework that can propose and test message time interval-based IDS suitable for limited automotive environments.
作者: 絕種    時(shí)間: 2025-3-23 11:14

作者: HERTZ    時(shí)間: 2025-3-23 16:01
Contemporary Sensorimotor Theory infrastructure. In particular, by performance evaluations, we clarify that the buffer management considering lapsed time of after generation of disaster information by area, improves freshness and size of delivery area of disaster information than typical buffer management by FIFO (First In First Out).
作者: hankering    時(shí)間: 2025-3-23 21:10

作者: 繁重    時(shí)間: 2025-3-23 22:14
https://doi.org/10.1007/978-3-211-76847-1d a hybrid simulation system based on PSO and HC called WMN-PSOHC. In this paper, we evaluate the performance of WMNs by using WMN-PSOHC considering different number of mesh routers and Chi-square distribution of mesh clients. Simulation results show that 32 mesh routers are enough for covering all mesh clients in the considered scenario.
作者: 總    時(shí)間: 2025-3-24 03:35
The Concept of the Modern Schoole networks are actually attached to automobile to perform V2X communication for wide area road state information platform. A prototype system is built and evaluate its network performance by comparing the proposed network with the previous network model.
作者: FIN    時(shí)間: 2025-3-24 07:42

作者: Projection    時(shí)間: 2025-3-24 12:49
,Performance Evaluation of WMNs by?WMN-PSOHC Hybrid Simulation System Considering Different Number od a hybrid simulation system based on PSO and HC called WMN-PSOHC. In this paper, we evaluate the performance of WMNs by using WMN-PSOHC considering different number of mesh routers and Chi-square distribution of mesh clients. Simulation results show that 32 mesh routers are enough for covering all mesh clients in the considered scenario.
作者: chemoprevention    時(shí)間: 2025-3-24 17:24

作者: 商店街    時(shí)間: 2025-3-24 21:14
Fusion Techniques for Strong Data Protection,f changing or deleting them. The use of fusion technology in data protection protocols significantly strengthens the existing solutions in the field of cryptographic solutions and at the same time allows the implementation of analytical and decision-making tasks.
作者: ordain    時(shí)間: 2025-3-24 23:17
Covolo di Pederobba Nursery, Treviso, Italy simulation results show that for chi-square distribution, the mesh routers can cover all mesh clients, but this distribution has not good load balancing for both router replacement methods. For the uniform distribution, the mesh routers do not cover all mesh clients but RIWM shows good performance in terms of load balancing.
作者: 是突襲    時(shí)間: 2025-3-25 06:37

作者: objection    時(shí)間: 2025-3-25 08:33
https://doi.org/10.1007/978-3-211-76847-1generated through the graph neural network. The experimental results on the Microsoft Malware Classification Challenge dataset show that retaining the feature data of the graph structure can effectively improve the effect of family classification. And the effect can also be improved through the instruction features based on TF-IDF.
作者: 澄清    時(shí)間: 2025-3-25 12:39
A Comparison Study of Chi-square and Uniform Distributions of Mesh Clients by WMN-PSODGA Simulation simulation results show that for chi-square distribution, the mesh routers can cover all mesh clients, but this distribution has not good load balancing for both router replacement methods. For the uniform distribution, the mesh routers do not cover all mesh clients but RIWM shows good performance in terms of load balancing.
作者: GOAD    時(shí)間: 2025-3-25 17:06
An Energy-Efficient Algorithm to Make Virtual Machines Migrate in a Server Cluster,ver to reduce the total energy consumption of the servers. In the evaluation, we show the execution time and energy consumption of servers in a cluster can be reduced in the MIM algorithm compared with other algorithms.
作者: 雕鏤    時(shí)間: 2025-3-25 19:57
Malware Classification Based on Graph Neural Network Using Control Flow Graph,generated through the graph neural network. The experimental results on the Microsoft Malware Classification Challenge dataset show that retaining the feature data of the graph structure can effectively improve the effect of family classification. And the effect can also be improved through the instruction features based on TF-IDF.
作者: 漸變    時(shí)間: 2025-3-26 01:11
Conference proceedings 2022e emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels of the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage an increasing
作者: 后退    時(shí)間: 2025-3-26 04:33
The Concept of the Modern Schoolc energy consumption of a server cluster by differentiating starting time of process replicas. The evaluation results show the total electric energy consumption of a server cluster and the average response time of each process can be reduced in the RATB-DSTPR algorithm.
作者: 單片眼鏡    時(shí)間: 2025-3-26 09:12

作者: Dictation    時(shí)間: 2025-3-26 13:49
https://doi.org/10.1007/978-3-211-76847-1me (sink) position. In this paper, we show the simulation result on the latency of message delivery by message ferries with Nomadic Lévy Walk in DTNs. Then we compare with other variant of Lévy walk regarding the latency. We also discuss the difference of the latency between the sink relocation strategies of Nomadic Lévy Walk.
作者: 高原    時(shí)間: 2025-3-26 20:16

作者: Conflagration    時(shí)間: 2025-3-27 00:40

作者: profligate    時(shí)間: 2025-3-27 04:01
Advances on Broad-Band Wireless Computing, Communication and ApplicationsProceedings of the 1
作者: endarterectomy    時(shí)間: 2025-3-27 05:24

作者: ingrate    時(shí)間: 2025-3-27 11:28

作者: congenial    時(shí)間: 2025-3-27 14:09
https://doi.org/10.1007/978-3-211-76847-1 tokens used is proposed. However, the more number of capability tokens are sent from subjects, the more complex the capability token selections are. Since the devices support just low processing power and smaller size of memory, it is important to avoid concentrating loads in devices. In this paper
作者: entreat    時(shí)間: 2025-3-27 17:55
Covolo di Pederobba Nursery, Treviso, Italyr location. The output of FSAQoS decides the QoS of a certain data link. We evaluate FSAQoS by computer simulations. QoS is decided as high when data exchange is reliable and it is provided in low latency, while beacon messages are transmitted in moderate frequency throughout the network.
作者: 訓(xùn)誡    時(shí)間: 2025-3-28 01:00
https://doi.org/10.1057/9781137457202opose an automated audit method of client-side vulnerability against XSS. Our method is based on Browser Exploitation Framework (BeEF), which is designed to provide effective client-side attack vectors and to exploit any potential vulnerabilities in the web browser. Our method automates the penetrat
作者: Compatriot    時(shí)間: 2025-3-28 03:54

作者: GROSS    時(shí)間: 2025-3-28 06:57

作者: LURE    時(shí)間: 2025-3-28 13:20

作者: 影響    時(shí)間: 2025-3-28 15:17
A Fuzzy-Based System for Assessment of Quality of Service Communication Links in SDN-VANETs,r location. The output of FSAQoS decides the QoS of a certain data link. We evaluate FSAQoS by computer simulations. QoS is decided as high when data exchange is reliable and it is provided in low latency, while beacon messages are transmitted in moderate frequency throughout the network.
作者: catagen    時(shí)間: 2025-3-28 20:24

作者: 職業(yè)    時(shí)間: 2025-3-29 00:04
Blockchain-Based Identity Management for Personal Data: A Survey,rmore, concerning identity management, it was found that the technology provides considerable improvement over database-based systems of identity and user authentication, however, it still contains systemic avenues of centralisation, through which a denial-of-service attack could increase.
作者: Pericarditis    時(shí)間: 2025-3-29 05:01
https://doi.org/10.1007/978-3-030-90072-4Broadband Networks Application; Heterogeneous Networking; High-speed Network Protocols; Routing Algorit
作者: 雇傭兵    時(shí)間: 2025-3-29 10:40

作者: grieve    時(shí)間: 2025-3-29 11:50

作者: plasma-cells    時(shí)間: 2025-3-29 19:34

作者: endarterectomy    時(shí)間: 2025-3-29 20:45

作者: Morose    時(shí)間: 2025-3-30 00:31

作者: 名字    時(shí)間: 2025-3-30 05:34

作者: Herd-Immunity    時(shí)間: 2025-3-30 11:54
The Concept of the Modern Schooler, a server cluster system consumes a large amount of electric energy compared with process non-replication approaches. In this paper, an RATB-DSTPR (Redundant Active Time-Based algorithm with Differentiating Starting Time of Process Replicas) algorithm is newly proposed to reduce the total electri
作者: nonradioactive    時(shí)間: 2025-3-30 13:24
https://doi.org/10.1007/978-3-211-76847-1ts on objects in devices, by device owners. Objects are data resource in a device which are used to store sensor data and action data. Through manipulating objects of devices, data are exchanged among subjects and objects. Here, the illegal information flow and the late information flow occur and su
作者: 陰謀    時(shí)間: 2025-3-30 17:09
https://doi.org/10.1007/978-3-211-76847-1low cost and it has attracted much attention in recent years. There are different methods for optimizing the placement of mesh routers. In our previous work, we proposed a Coverage Construction Method (CCM) and CCM-based Hill Climbing (HC) system for mesh router placement problem considering normal
作者: 蔑視    時(shí)間: 2025-3-31 00:44

作者: SIT    時(shí)間: 2025-3-31 01:29
https://doi.org/10.1007/978-3-211-76847-1h this, cyberattacks which interfere with these services occur frequently and the damage is increasing. Therefore, there is a need to strengthen countermeasures against cyberattacks and to minimize damage by responding quickly and with high accuracy. Therefore, in order to enhance security measures
作者: 蒙太奇    時(shí)間: 2025-3-31 05:03

作者: anchor    時(shí)間: 2025-3-31 09:12

作者: blackout    時(shí)間: 2025-3-31 15:23

作者: arthrodesis    時(shí)間: 2025-3-31 17:56

作者: burnish    時(shí)間: 2025-3-31 23:32
https://doi.org/10.1057/9781137457202e most underrated attack vectors. The typical use of XSS attacks is to steal cookies and expose sensitive information. An XSS attack occurs when the attacker tricks a legitimate web application to accept a malicious request. In this context, XSS is a server-side vulnerability. Hence, many previous s
作者: 悠然    時(shí)間: 2025-4-1 02:29

作者: 先行    時(shí)間: 2025-4-1 06:40

作者: 愉快嗎    時(shí)間: 2025-4-1 13:02
Contemporary Sensorimotor Theorylarge scale disasters, the situation of damage changes according to the time progress. Considering the phenomenon that disaster information to be delivered will change according to time passing, then, it is preferred to deliver it in short delay. In this paper, we discuss the effects of buffer manag
作者: 反饋    時(shí)間: 2025-4-1 17:42
Yvonne Gailey,Lesley Martin,Rachel Webbrotection protocols. Personalization is dedicated to precisely defined participants of the entire data protection protocols, without the possibility of changing or deleting them. The use of fusion technology in data protection protocols significantly strengthens the existing solutions in the field o




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
通江县| 康平县| 兰溪市| 巨鹿县| 藁城市| 株洲市| 浑源县| 大姚县| 蓬莱市| 太康县| 台前县| 上虞市| 社会| 台湾省| 镇沅| 城口县| 武穴市| 鄂尔多斯市| 河间市| 丰镇市| 夏邑县| 乌恰县| 荥阳市| 华亭县| 三门县| 玛沁县| 尼勒克县| 宝鸡市| 呈贡县| 五峰| 同仁县| 山丹县| 墨竹工卡县| 丘北县| 河北区| 黄大仙区| 翁牛特旗| 南阳市| 北宁市| 兴和县| 陆川县|