標題: Titlebook: Advances on P2P, Parallel, Grid, Cloud and Internet Computing; Proceedings of the 1 Fatos Xhafa,Fang-Yie Leu,Chao-Tung Yang Conference proc [打印本頁] 作者: 技巧 時間: 2025-3-21 19:56
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing影響因子(影響力)
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing影響因子(影響力)學(xué)科排名
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing網(wǎng)絡(luò)公開度
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing被引頻次
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing被引頻次學(xué)科排名
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing年度引用
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing年度引用學(xué)科排名
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing讀者反饋
書目名稱Advances on P2P, Parallel, Grid, Cloud and Internet Computing讀者反饋學(xué)科排名
作者: 男生戴手銬 時間: 2025-3-21 23:24
Fault-Tolerant Fog Computing Models in the IoTIoT is realized by the fog computing model. Here, data and processes to handle the data are distributed to not only servers but also fog nodes. In our previous studies, the tree-based fog computing (TBFC) model is proposed to reduce the total electric energy consumption. However, if a fog node is fa作者: forebear 時間: 2025-3-22 00:52
Semi-synchronocity Enabling Protocol and Pulsed Injection Protocol For A Distributed Ledger Systemred due to transaction processing and verification. For efficient systems, high latency should be avoided for the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov?[.] in his seminal paper. 作者: collagenase 時間: 2025-3-22 07:06 作者: Arresting 時間: 2025-3-22 10:12
Texture Estimation System of Snacks Using Neural Network Considering Sound and Loadamine various foods. The system consists of an original equipment and a simple neural network model. The equipment examines the food by compressing it and observing load and sound simultaneously. The input of the neural network model is parameters expressing characteristics of the load change and th作者: Simulate 時間: 2025-3-22 16:14 作者: 使厭惡 時間: 2025-3-22 20:47
Parameterized Pulsed Transaction Injection Computation Model And Performance Optimizer For IOTA-Tang goal, dynamically and efficiently injecting the unverified transactions to enable synchronicity based on the current system configuration and the traffic of the network is crucial. To meet this need, we design the pulsed transaction injection parameterization (PTIP) protocol to provide a preliminar作者: Euthyroid 時間: 2025-3-22 23:07 作者: euphoria 時間: 2025-3-23 05:26
On Construction of a Caffe Deep Learning Framework based on Intel Xeon Phifinancial market analysis, medical technology and so on. The need for more intelligent data increases significantly. Deep Learning as a framework that able to understand the abstract information such as images, text, and sound has a challenging area in recent research works. This phenomenon makes th作者: Hemiplegia 時間: 2025-3-23 07:13
A Brief History of Self-destructing Data: From 2005 to 2017leakage, such as the PRISM and Instagram fappening, big data still maintain its leading position among the internet buzzwords. This paper strives to review and summarize the research process of self-destructing data in the past decade. Comparisons between landmark methods and systems have also been 作者: 別名 時間: 2025-3-23 11:21 作者: Anguish 時間: 2025-3-23 14:24
A Model for Data Enrichment over IoT Streams at Edges of Internetis to cope with big data streams at various levels, from the lowest level of data capturing to the highest level of Cloud platforms and applications. The objective is thus to extract full knowledge contained in the data in real time but also to solve bottlenecks of processing observed in IoT Cloud s作者: 缺陷 時間: 2025-3-23 18:07 作者: PALSY 時間: 2025-3-24 01:01 作者: 針葉 時間: 2025-3-24 06:12 作者: deforestation 時間: 2025-3-24 07:28
A Fuzzy-based Approach for MobilePeerDroid System Considering of Peer Communication Costing primitive operations and services that are integrated into the P2P middleware.We propose an abstract model for achieving these requirements and we discuss how this model can support awareness of collaboration in mobile teams. In this paper, we present a fuzzy-based system for improving peer coor作者: MOTTO 時間: 2025-3-24 12:33
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Schemepaper we focus on the timed-realise conditional proxy broadcast re-encryption. In this primitive, if and only the condition and time satisfied the requirement, the proxy can re-encrypt the delegator(broadcast encryption set)’s ciphertext to be the delegatee(another broadcast encryption set)’s cipher作者: 離開可分裂 時間: 2025-3-24 15:50 作者: Anticoagulants 時間: 2025-3-24 20:55
Blockchain-Based Trust Communities for Decentralized M2M Application Servicesation processes. Moreover, this publication presents a concept for using blockchain within the system for decentralized M2M application service provision. Finally, the combination of P2P overlay and blockchain network is introduced in order to verify the integrity of data.作者: 現(xiàn)實 時間: 2025-3-25 01:10 作者: Adulate 時間: 2025-3-25 03:47
The Implementation of a Hadoop Ecosystem Portal with Virtualization Deployment reduce the difficulty of building a big data platform and save time but also provide an excellent performance of the system. And we also made the comparison of performance between the web user interface and the command line using the HiBench benchmark suit.作者: 朝圣者 時間: 2025-3-25 08:25
Smart Intrusion Detection with Expert Systems configurations, by varying the number of hidden layers and the number of training epochs to obtain a low number of false results. We observed that it is required a large number of training epochs and that by using the entire data set consisting of 31 features the best classification is carried out 作者: RENAL 時間: 2025-3-25 13:27
A Fuzzy-based Approach for MobilePeerDroid System Considering of Peer Communication Costomputer simulations. From the simulations results, we conclude that when AA, SCT, GS values are increased, the peer coordination quality is increased, but when PCC is increased, the peer coordination quality is decreased.作者: Absenteeism 時間: 2025-3-25 19:43
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Schemet the decryption oracle of normal ciphertext but also the decryption oracle of the re-encrypted ciphertext and the re-encrypted key generation oracle. In 2013, Liang et al. proposed a CCA-secure time-realised conditional proxy broadcast re-encryption scheme, in this paper, we show their proposal is 作者: 兒童 時間: 2025-3-25 20:52 作者: 亞麻制品 時間: 2025-3-26 03:58
2367-4512 o Employee). .Cloud computing. has been described as a “computing paradigm where the boundaries of computing are determined by economic rationale rather than technical limits”. Cloud computing has fast become t978-3-030-02606-6978-3-030-02607-3Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: 熱心 時間: 2025-3-26 07:15 作者: harrow 時間: 2025-3-26 09:23 作者: Ablation 時間: 2025-3-26 16:35
https://doi.org/10.1007/978-94-017-1160-9ve the execution time of this scenario. The algorithm will re-partition the web-graph and re-perform the web-pages ranking only when necessary. The experimental results show that the proposed algorithm outperform in terms of the ranking’s execution times and the ranking’s accuracy.作者: MOCK 時間: 2025-3-26 17:58 作者: 無法解釋 時間: 2025-3-26 22:09
https://doi.org/10.1007/978-3-658-24620-4training time before and after optimization on Intel Xeon E5-2650 and Intel Xeon Phi 7210 . In this case, we use vectorization, OpenMP parallel processing, message transfer Interface (MPI) for optimization. In the third experiment, we compared multinode execution results on two nodes of Intel Xeon E作者: Aggressive 時間: 2025-3-27 04:18
https://doi.org/10.1007/978-3-642-96552-4 reduce the difficulty of building a big data platform and save time but also provide an excellent performance of the system. And we also made the comparison of performance between the web user interface and the command line using the HiBench benchmark suit.作者: 重畫只能放棄 時間: 2025-3-27 07:36
Review: Intermedia Trends in The Web, configurations, by varying the number of hidden layers and the number of training epochs to obtain a low number of false results. We observed that it is required a large number of training epochs and that by using the entire data set consisting of 31 features the best classification is carried out 作者: 光亮 時間: 2025-3-27 10:18
Parsing a Video into Semantic Segments,omputer simulations. From the simulations results, we conclude that when AA, SCT, GS values are increased, the peer coordination quality is increased, but when PCC is increased, the peer coordination quality is decreased.作者: 名字 時間: 2025-3-27 14:58 作者: 尊敬 時間: 2025-3-27 18:53
Advances on P2P, Parallel, Grid, Cloud and Internet Computing978-3-030-02607-3Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: 前兆 時間: 2025-3-28 00:12
https://doi.org/10.1007/978-94-017-1160-9or in the system contains a partial local web-graph and it locally performs web ranking. Since a distributed web ranking is generally incur penalties on execution times and accuracy from data synchronization, a web-graph can preliminary partitioned with a desired structure before a link analysis alg作者: CRASS 時間: 2025-3-28 05:02 作者: Heretical 時間: 2025-3-28 08:35
Virale Zielgruppen im Content Marketingred due to transaction processing and verification. For efficient systems, high latency should be avoided for the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov?[.] in his seminal paper. 作者: 受人支配 時間: 2025-3-28 12:17 作者: endarterectomy 時間: 2025-3-28 15:35 作者: biosphere 時間: 2025-3-28 21:14
Content Room versus Büroarbeitsplatzification of trustless nodes and increase the security level of the community. Several trust management systems using different trust evaluation techniques are presented in the application field of M2M. However, most of them do not provide a secure way to store the computed trust values in the commu作者: 繁殖 時間: 2025-3-28 23:11 作者: 依法逮捕 時間: 2025-3-29 03:18 作者: 勤勉 時間: 2025-3-29 08:46
https://doi.org/10.1007/978-3-658-24620-4financial market analysis, medical technology and so on. The need for more intelligent data increases significantly. Deep Learning as a framework that able to understand the abstract information such as images, text, and sound has a challenging area in recent research works. This phenomenon makes th作者: 吸引人的花招 時間: 2025-3-29 12:45
Content-Addressable Processors,leakage, such as the PRISM and Instagram fappening, big data still maintain its leading position among the internet buzzwords. This paper strives to review and summarize the research process of self-destructing data in the past decade. Comparisons between landmark methods and systems have also been 作者: 注視 時間: 2025-3-29 18:06 作者: antedate 時間: 2025-3-29 22:06
Content Addressing by Software,is to cope with big data streams at various levels, from the lowest level of data capturing to the highest level of Cloud platforms and applications. The objective is thus to extract full knowledge contained in the data in real time but also to solve bottlenecks of processing observed in IoT Cloud s作者: Bph773 時間: 2025-3-30 03:03
Springer Series in Information Sciencesand classified in 2002. Even into the Cloud era, SQL Injection is still the biggest risk of internet according to statics. Virtualization technology used by Cloud such as SaaS, PaaS and IaaS failed to provide extra security against this kind of attack. In this paper we strive to explain how to perfo作者: chandel 時間: 2025-3-30 04:13
Review: Intermedia Trends in The Web,In this context, optimising the performance of intrusion detection systems (IDS) is a key research issue to meet demanding requirements on security of complex and large scale networks. Within the IDS systems, attack classification plays an important role. In this work we propose and evaluate the use作者: hypnogram 時間: 2025-3-30 08:44
Parsing a Video into Semantic Segments,loud computing which distributes load of cloud servers on different fog servers and enhance the overall performance of cloud. Smart Grid (SG) is the combination of traditional grid and information,communication and technology. The purpose of integration of cloud-fog based system and smart grid in th作者: Solace 時間: 2025-3-30 14:27
Parsing a Video into Semantic Segments,ing primitive operations and services that are integrated into the P2P middleware.We propose an abstract model for achieving these requirements and we discuss how this model can support awareness of collaboration in mobile teams. In this paper, we present a fuzzy-based system for improving peer coor作者: pulmonary-edema 時間: 2025-3-30 16:38 作者: Liberate 時間: 2025-3-30 23:36 作者: 禮節(jié) 時間: 2025-3-31 04:20 作者: 完整 時間: 2025-3-31 06:49 作者: anchor 時間: 2025-3-31 11:38 作者: entrance 時間: 2025-3-31 15:53
Semi-synchronocity Enabling Protocol and Pulsed Injection Protocol For A Distributed Ledger SystemWe introduce a semi-synchronous transaction entry protocol layer to avoid asynchronism in the system since an asynchronous system has a high latency. We further model periodic pulsed injections into the evaluation layer from the entry layer to regulate the performance of the system.作者: 憂傷 時間: 2025-3-31 18:31 作者: upstart 時間: 2025-3-31 23:35
https://doi.org/10.1007/978-94-017-1160-9ication and replication FTBFC models to make fog nodes fault-tolerant. In the non-replication FTBFC model, another operational fog node takes over a faulty fog node. We evaluate the non-replication FTBFC models in terms of the electric energy consumption and execution time.作者: sterilization 時間: 2025-4-1 02:35
https://doi.org/10.1007/978-3-658-24620-4 features and benefits of WebSocket, and combines the popular single-page application development model to allow developers to quickly develop efficient and reliable web applications based on our framework. Several experiments has been carried out and the results are presented to show the performance of the WebSocket framework.作者: AMPLE 時間: 2025-4-1 09:43