派博傳思國際中心

標題: Titlebook: Advances on P2P, Parallel, Grid, Cloud and Internet Computing; Proceedings of the 1 Fatos Xhafa,Fang-Yie Leu,Chao-Tung Yang Conference proc [打印本頁]

作者: 技巧    時間: 2025-3-21 19:56
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing影響因子(影響力)




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing影響因子(影響力)學(xué)科排名




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing網(wǎng)絡(luò)公開度




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing被引頻次




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing被引頻次學(xué)科排名




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing年度引用




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing年度引用學(xué)科排名




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing讀者反饋




書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing讀者反饋學(xué)科排名





作者: 男生戴手銬    時間: 2025-3-21 23:24
Fault-Tolerant Fog Computing Models in the IoTIoT is realized by the fog computing model. Here, data and processes to handle the data are distributed to not only servers but also fog nodes. In our previous studies, the tree-based fog computing (TBFC) model is proposed to reduce the total electric energy consumption. However, if a fog node is fa
作者: forebear    時間: 2025-3-22 00:52
Semi-synchronocity Enabling Protocol and Pulsed Injection Protocol For A Distributed Ledger Systemred due to transaction processing and verification. For efficient systems, high latency should be avoided for the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov?[.] in his seminal paper.
作者: collagenase    時間: 2025-3-22 07:06

作者: Arresting    時間: 2025-3-22 10:12
Texture Estimation System of Snacks Using Neural Network Considering Sound and Loadamine various foods. The system consists of an original equipment and a simple neural network model. The equipment examines the food by compressing it and observing load and sound simultaneously. The input of the neural network model is parameters expressing characteristics of the load change and th
作者: Simulate    時間: 2025-3-22 16:14

作者: 使厭惡    時間: 2025-3-22 20:47
Parameterized Pulsed Transaction Injection Computation Model And Performance Optimizer For IOTA-Tang goal, dynamically and efficiently injecting the unverified transactions to enable synchronicity based on the current system configuration and the traffic of the network is crucial. To meet this need, we design the pulsed transaction injection parameterization (PTIP) protocol to provide a preliminar
作者: Euthyroid    時間: 2025-3-22 23:07

作者: euphoria    時間: 2025-3-23 05:26
On Construction of a Caffe Deep Learning Framework based on Intel Xeon Phifinancial market analysis, medical technology and so on. The need for more intelligent data increases significantly. Deep Learning as a framework that able to understand the abstract information such as images, text, and sound has a challenging area in recent research works. This phenomenon makes th
作者: Hemiplegia    時間: 2025-3-23 07:13
A Brief History of Self-destructing Data: From 2005 to 2017leakage, such as the PRISM and Instagram fappening, big data still maintain its leading position among the internet buzzwords. This paper strives to review and summarize the research process of self-destructing data in the past decade. Comparisons between landmark methods and systems have also been
作者: 別名    時間: 2025-3-23 11:21

作者: Anguish    時間: 2025-3-23 14:24
A Model for Data Enrichment over IoT Streams at Edges of Internetis to cope with big data streams at various levels, from the lowest level of data capturing to the highest level of Cloud platforms and applications. The objective is thus to extract full knowledge contained in the data in real time but also to solve bottlenecks of processing observed in IoT Cloud s
作者: 缺陷    時間: 2025-3-23 18:07

作者: PALSY    時間: 2025-3-24 01:01

作者: 針葉    時間: 2025-3-24 06:12

作者: deforestation    時間: 2025-3-24 07:28
A Fuzzy-based Approach for MobilePeerDroid System Considering of Peer Communication Costing primitive operations and services that are integrated into the P2P middleware.We propose an abstract model for achieving these requirements and we discuss how this model can support awareness of collaboration in mobile teams. In this paper, we present a fuzzy-based system for improving peer coor
作者: MOTTO    時間: 2025-3-24 12:33
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Schemepaper we focus on the timed-realise conditional proxy broadcast re-encryption. In this primitive, if and only the condition and time satisfied the requirement, the proxy can re-encrypt the delegator(broadcast encryption set)’s ciphertext to be the delegatee(another broadcast encryption set)’s cipher
作者: 離開可分裂    時間: 2025-3-24 15:50

作者: Anticoagulants    時間: 2025-3-24 20:55
Blockchain-Based Trust Communities for Decentralized M2M Application Servicesation processes. Moreover, this publication presents a concept for using blockchain within the system for decentralized M2M application service provision. Finally, the combination of P2P overlay and blockchain network is introduced in order to verify the integrity of data.
作者: 現(xiàn)實    時間: 2025-3-25 01:10

作者: Adulate    時間: 2025-3-25 03:47
The Implementation of a Hadoop Ecosystem Portal with Virtualization Deployment reduce the difficulty of building a big data platform and save time but also provide an excellent performance of the system. And we also made the comparison of performance between the web user interface and the command line using the HiBench benchmark suit.
作者: 朝圣者    時間: 2025-3-25 08:25
Smart Intrusion Detection with Expert Systems configurations, by varying the number of hidden layers and the number of training epochs to obtain a low number of false results. We observed that it is required a large number of training epochs and that by using the entire data set consisting of 31 features the best classification is carried out
作者: RENAL    時間: 2025-3-25 13:27
A Fuzzy-based Approach for MobilePeerDroid System Considering of Peer Communication Costomputer simulations. From the simulations results, we conclude that when AA, SCT, GS values are increased, the peer coordination quality is increased, but when PCC is increased, the peer coordination quality is decreased.
作者: Absenteeism    時間: 2025-3-25 19:43
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Schemet the decryption oracle of normal ciphertext but also the decryption oracle of the re-encrypted ciphertext and the re-encrypted key generation oracle. In 2013, Liang et al. proposed a CCA-secure time-realised conditional proxy broadcast re-encryption scheme, in this paper, we show their proposal is
作者: 兒童    時間: 2025-3-25 20:52

作者: 亞麻制品    時間: 2025-3-26 03:58
2367-4512 o Employee). .Cloud computing. has been described as a “computing paradigm where the boundaries of computing are determined by economic rationale rather than technical limits”. Cloud computing has fast become t978-3-030-02606-6978-3-030-02607-3Series ISSN 2367-4512 Series E-ISSN 2367-4520
作者: 熱心    時間: 2025-3-26 07:15

作者: harrow    時間: 2025-3-26 09:23

作者: Ablation    時間: 2025-3-26 16:35
https://doi.org/10.1007/978-94-017-1160-9ve the execution time of this scenario. The algorithm will re-partition the web-graph and re-perform the web-pages ranking only when necessary. The experimental results show that the proposed algorithm outperform in terms of the ranking’s execution times and the ranking’s accuracy.
作者: MOCK    時間: 2025-3-26 17:58

作者: 無法解釋    時間: 2025-3-26 22:09
https://doi.org/10.1007/978-3-658-24620-4training time before and after optimization on Intel Xeon E5-2650 and Intel Xeon Phi 7210 . In this case, we use vectorization, OpenMP parallel processing, message transfer Interface (MPI) for optimization. In the third experiment, we compared multinode execution results on two nodes of Intel Xeon E
作者: Aggressive    時間: 2025-3-27 04:18
https://doi.org/10.1007/978-3-642-96552-4 reduce the difficulty of building a big data platform and save time but also provide an excellent performance of the system. And we also made the comparison of performance between the web user interface and the command line using the HiBench benchmark suit.
作者: 重畫只能放棄    時間: 2025-3-27 07:36
Review: Intermedia Trends in The Web, configurations, by varying the number of hidden layers and the number of training epochs to obtain a low number of false results. We observed that it is required a large number of training epochs and that by using the entire data set consisting of 31 features the best classification is carried out
作者: 光亮    時間: 2025-3-27 10:18
Parsing a Video into Semantic Segments,omputer simulations. From the simulations results, we conclude that when AA, SCT, GS values are increased, the peer coordination quality is increased, but when PCC is increased, the peer coordination quality is decreased.
作者: 名字    時間: 2025-3-27 14:58

作者: 尊敬    時間: 2025-3-27 18:53
Advances on P2P, Parallel, Grid, Cloud and Internet Computing978-3-030-02607-3Series ISSN 2367-4512 Series E-ISSN 2367-4520
作者: 前兆    時間: 2025-3-28 00:12
https://doi.org/10.1007/978-94-017-1160-9or in the system contains a partial local web-graph and it locally performs web ranking. Since a distributed web ranking is generally incur penalties on execution times and accuracy from data synchronization, a web-graph can preliminary partitioned with a desired structure before a link analysis alg
作者: CRASS    時間: 2025-3-28 05:02

作者: Heretical    時間: 2025-3-28 08:35
Virale Zielgruppen im Content Marketingred due to transaction processing and verification. For efficient systems, high latency should be avoided for the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov?[.] in his seminal paper.
作者: 受人支配    時間: 2025-3-28 12:17

作者: endarterectomy    時間: 2025-3-28 15:35

作者: biosphere    時間: 2025-3-28 21:14
Content Room versus Büroarbeitsplatzification of trustless nodes and increase the security level of the community. Several trust management systems using different trust evaluation techniques are presented in the application field of M2M. However, most of them do not provide a secure way to store the computed trust values in the commu
作者: 繁殖    時間: 2025-3-28 23:11

作者: 依法逮捕    時間: 2025-3-29 03:18

作者: 勤勉    時間: 2025-3-29 08:46
https://doi.org/10.1007/978-3-658-24620-4financial market analysis, medical technology and so on. The need for more intelligent data increases significantly. Deep Learning as a framework that able to understand the abstract information such as images, text, and sound has a challenging area in recent research works. This phenomenon makes th
作者: 吸引人的花招    時間: 2025-3-29 12:45
Content-Addressable Processors,leakage, such as the PRISM and Instagram fappening, big data still maintain its leading position among the internet buzzwords. This paper strives to review and summarize the research process of self-destructing data in the past decade. Comparisons between landmark methods and systems have also been
作者: 注視    時間: 2025-3-29 18:06

作者: antedate    時間: 2025-3-29 22:06
Content Addressing by Software,is to cope with big data streams at various levels, from the lowest level of data capturing to the highest level of Cloud platforms and applications. The objective is thus to extract full knowledge contained in the data in real time but also to solve bottlenecks of processing observed in IoT Cloud s
作者: Bph773    時間: 2025-3-30 03:03
Springer Series in Information Sciencesand classified in 2002. Even into the Cloud era, SQL Injection is still the biggest risk of internet according to statics. Virtualization technology used by Cloud such as SaaS, PaaS and IaaS failed to provide extra security against this kind of attack. In this paper we strive to explain how to perfo
作者: chandel    時間: 2025-3-30 04:13
Review: Intermedia Trends in The Web,In this context, optimising the performance of intrusion detection systems (IDS) is a key research issue to meet demanding requirements on security of complex and large scale networks. Within the IDS systems, attack classification plays an important role. In this work we propose and evaluate the use
作者: hypnogram    時間: 2025-3-30 08:44
Parsing a Video into Semantic Segments,loud computing which distributes load of cloud servers on different fog servers and enhance the overall performance of cloud. Smart Grid (SG) is the combination of traditional grid and information,communication and technology. The purpose of integration of cloud-fog based system and smart grid in th
作者: Solace    時間: 2025-3-30 14:27
Parsing a Video into Semantic Segments,ing primitive operations and services that are integrated into the P2P middleware.We propose an abstract model for achieving these requirements and we discuss how this model can support awareness of collaboration in mobile teams. In this paper, we present a fuzzy-based system for improving peer coor
作者: pulmonary-edema    時間: 2025-3-30 16:38

作者: Liberate    時間: 2025-3-30 23:36

作者: 禮節(jié)    時間: 2025-3-31 04:20

作者: 完整    時間: 2025-3-31 06:49

作者: anchor    時間: 2025-3-31 11:38

作者: entrance    時間: 2025-3-31 15:53
Semi-synchronocity Enabling Protocol and Pulsed Injection Protocol For A Distributed Ledger SystemWe introduce a semi-synchronous transaction entry protocol layer to avoid asynchronism in the system since an asynchronous system has a high latency. We further model periodic pulsed injections into the evaluation layer from the entry layer to regulate the performance of the system.
作者: 憂傷    時間: 2025-3-31 18:31

作者: upstart    時間: 2025-3-31 23:35
https://doi.org/10.1007/978-94-017-1160-9ication and replication FTBFC models to make fog nodes fault-tolerant. In the non-replication FTBFC model, another operational fog node takes over a faulty fog node. We evaluate the non-replication FTBFC models in terms of the electric energy consumption and execution time.
作者: sterilization    時間: 2025-4-1 02:35
https://doi.org/10.1007/978-3-658-24620-4 features and benefits of WebSocket, and combines the popular single-page application development model to allow developers to quickly develop efficient and reliable web applications based on our framework. Several experiments has been carried out and the results are presented to show the performance of the WebSocket framework.
作者: AMPLE    時間: 2025-4-1 09:43





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
崇义县| 阿瓦提县| 万山特区| 九台市| 石狮市| 武功县| 松原市| 全南县| 安达市| 永丰县| 宣化县| 观塘区| 南丹县| 蒙阴县| 陵川县| 华蓥市| 遂川县| 前郭尔| 柘城县| 呼图壁县| 霍林郭勒市| 张北县| 怀远县| 宕昌县| 五河县| 平和县| 洪雅县| 紫云| 阜南县| 青阳县| 仁寿县| 惠来县| 三亚市| 拜城县| 根河市| 新宾| 开原市| 丰宁| 深圳市| 仙桃市| 岱山县|