標(biāo)題: Titlebook: Cloud Computing; 10th EAI Internation Lianyong Qi,Mohammad R. Khosravi,Varun G. Menon Conference proceedings 2021 ICST Institute for Comput [打印本頁] 作者: T-Lymphocyte 時(shí)間: 2025-3-21 18:18
書目名稱Cloud Computing影響因子(影響力)
書目名稱Cloud Computing影響因子(影響力)學(xué)科排名
書目名稱Cloud Computing網(wǎng)絡(luò)公開度
書目名稱Cloud Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cloud Computing被引頻次
書目名稱Cloud Computing被引頻次學(xué)科排名
書目名稱Cloud Computing年度引用
書目名稱Cloud Computing年度引用學(xué)科排名
書目名稱Cloud Computing讀者反饋
書目名稱Cloud Computing讀者反饋學(xué)科排名
作者: 非實(shí)體 時(shí)間: 2025-3-21 22:30 作者: 多產(chǎn)子 時(shí)間: 2025-3-22 00:23
https://doi.org/10.1007/978-3-322-95390-2 lattice constructed by MCmR reduces redundant concepts while maintaining its structure and improve the efficiency of data analysis. We verify the valid of MCmR on multiple disease gene datasets, and its ACC in Prostate_Tumor, Lung_cancer, Breast_cancer and Leukemia datasets reached 95.4, 94.9, 96.0作者: 歡呼 時(shí)間: 2025-3-22 07:38
https://doi.org/10.1007/978-3-322-89819-7f LSTM, and the self-attention mechanism to better exact features. We conduct extensive experiments on the KDDcup99 dataset to evaluate the performance of our CNN-A-LSTM model. Compared with other machine learning and deep learning models, our CNN-A-LSTM has superior performance.作者: 煞費(fèi)苦心 時(shí)間: 2025-3-22 09:58
Schlüsseltechnologie Mathematik support for fast and highly concurrent upload data and access data. Finally, the existing sensitive and private data storage methods of industrial block chain are analyzed, and the experimental comparison with the method in this paper proves the effectiveness of this method.作者: inhibit 時(shí)間: 2025-3-22 13:44 作者: inhibit 時(shí)間: 2025-3-22 18:55
Schlüsseltechnologie-Industrienutational costs. We performed extensive experiments to valid the approach and compared it with a Spark Streaming approach. The results of the experiment show that the proposed approach has better cost optimization than the baseline approach.作者: opportune 時(shí)間: 2025-3-23 00:44 作者: 巡回 時(shí)間: 2025-3-23 03:17
https://doi.org/10.1007/978-3-531-90227-2anized semantic structures. Experimental results show that DSE improves the performance of text classification and outperforms the state-of-the-art feature generation baselines on micro-. and macro-. scores over the real-world text classification datasets.作者: 學(xué)術(shù)討論會(huì) 時(shí)間: 2025-3-23 06:32 作者: 一美元 時(shí)間: 2025-3-23 13:43 作者: cumber 時(shí)間: 2025-3-23 16:47 作者: 他很靈活 時(shí)間: 2025-3-23 21:53 作者: CHURL 時(shí)間: 2025-3-24 00:41
A Concept Lattice Method for Eliminating Redundant Features lattice constructed by MCmR reduces redundant concepts while maintaining its structure and improve the efficiency of data analysis. We verify the valid of MCmR on multiple disease gene datasets, and its ACC in Prostate_Tumor, Lung_cancer, Breast_cancer and Leukemia datasets reached 95.4, 94.9, 96.0作者: 古代 時(shí)間: 2025-3-24 04:49
Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detectionf LSTM, and the self-attention mechanism to better exact features. We conduct extensive experiments on the KDDcup99 dataset to evaluate the performance of our CNN-A-LSTM model. Compared with other machine learning and deep learning models, our CNN-A-LSTM has superior performance.作者: 結(jié)構(gòu) 時(shí)間: 2025-3-24 07:43
Data Privacy Protection of Industrial Blockchain support for fast and highly concurrent upload data and access data. Finally, the existing sensitive and private data storage methods of industrial block chain are analyzed, and the experimental comparison with the method in this paper proves the effectiveness of this method.作者: 舉止粗野的人 時(shí)間: 2025-3-24 12:01
Lightweight Anonymous Communication Model Based on Anonymous IBEtacks, and finally achieve communication security and anonymity. Compared with other anonymous communication systems, our scheme has significant advantages in efficiency and relatively low cost. In the future, it has good application prospects.作者: 聽覺 時(shí)間: 2025-3-24 15:24
Cost-Aware Big Data Stream Processing in Cloud Environmentutational costs. We performed extensive experiments to valid the approach and compared it with a Spark Streaming approach. The results of the experiment show that the proposed approach has better cost optimization than the baseline approach.作者: 否決 時(shí)間: 2025-3-24 22:48
Research on the Development of Natural Human-Computer Interaction for Mobile Terminalsgy, this paper discusses the hot issues in mobile human-computer interaction and concludes that the future human-computer interaction of mobile terminals has four development directions: 1) natural human computer interaction, 2) augmented reality interaction, 3) multi-modal fusion, 4) affective comp作者: 臭名昭著 時(shí)間: 2025-3-25 00:27
Encoding Dual Semantic Knowledge for Text-Enhanced Cloud Servicesanized semantic structures. Experimental results show that DSE improves the performance of text classification and outperforms the state-of-the-art feature generation baselines on micro-. and macro-. scores over the real-world text classification datasets.作者: 悲觀 時(shí)間: 2025-3-25 04:41 作者: Grandstand 時(shí)間: 2025-3-25 10:42
ECG Arrhythmia Heartbeat Classification Using Deep Learning NetworksCG. Long short-term memory networks (LSTM) is suitable for processing time-series signals. The combination of the two has a better classification performance than the sole network. Besides, the Attention mechanism can help the model do better on focusing on abnormal heartbeats also improve the inter作者: Corroborate 時(shí)間: 2025-3-25 13:40 作者: 表主動(dòng) 時(shí)間: 2025-3-25 16:04
1867-8211 m 49 submissions. The book is organized in four general areas of cyber-physical intelligent computing, secure cloud systems and cloud-based privacy, cloud-based IoT architecture, and cloud cCmputing applications..978-3-030-69991-8978-3-030-69992-5Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 浮雕 時(shí)間: 2025-3-25 22:26
Conference proceedings 2021mber 2020. Due to COVID-19 pandemic the conference conference was held virtually.The 14 full papers were carefully reviewed and selected from 49 submissions. The book is organized in four general areas of cyber-physical intelligent computing, secure cloud systems and cloud-based privacy, cloud-based作者: 債務(wù) 時(shí)間: 2025-3-26 00:37 作者: FEAT 時(shí)間: 2025-3-26 05:00
https://doi.org/10.1007/978-3-531-92019-1eries: backward, order-aware and predicate-containing queries. Experiment results show that our implementation outperforms a start-of-the-art XML database BaseX in both absolute loading time and execution time for the target queries. The absolute execution time over 358 GB of XML data averagely is only seconds by using 32 EC2 instances.作者: 為現(xiàn)場(chǎng) 時(shí)間: 2025-3-26 09:35
https://doi.org/10.1007/978-3-322-89819-7. We first introduce the data preprocessing measures for handling imbalanced fraud detection dataset. Then we compare related models to implement fraudster recognition. We also propose a feature selection approach based on combined feature weights. Some future research interests are also envisioned.作者: 其他 時(shí)間: 2025-3-26 15:05
https://doi.org/10.1007/978-3-642-76781-4posed trust mechanism, trustrank is quantified by normative trust and risk measures. Performance analysis shows that the proposed trust mechanism has a higher probability of high trust device being selected and higher success rate of cooperation.作者: 不妥協(xié) 時(shí)間: 2025-3-26 20:19
A Dual-Index Based Representation for Processing XPath Queries on Very Large XML Documentseries: backward, order-aware and predicate-containing queries. Experiment results show that our implementation outperforms a start-of-the-art XML database BaseX in both absolute loading time and execution time for the target queries. The absolute execution time over 358 GB of XML data averagely is only seconds by using 32 EC2 instances.作者: inflate 時(shí)間: 2025-3-26 22:32
A Fraud Detection Approach Based on Combined Feature Weighting. We first introduce the data preprocessing measures for handling imbalanced fraud detection dataset. Then we compare related models to implement fraudster recognition. We also propose a feature selection approach based on combined feature weights. Some future research interests are also envisioned.作者: 和藹 時(shí)間: 2025-3-27 02:40
Research on Distributed Trust Management in IoTposed trust mechanism, trustrank is quantified by normative trust and risk measures. Performance analysis shows that the proposed trust mechanism has a higher probability of high trust device being selected and higher success rate of cooperation.作者: Ferritin 時(shí)間: 2025-3-27 09:01 作者: Inflammation 時(shí)間: 2025-3-27 09:29
A Dual-Index Based Representation for Processing XPath Queries on Very Large XML Documentss remains a challenge in case XML documents are very large. In this study, we implemented a tree-shaped data structure called partial tree that is intrinsically suitable for large XML document processing with multiple computers. Our implementation uses two index sets to accelerate the evaluation of 作者: sleep-spindles 時(shí)間: 2025-3-27 14:16
IAS-BERT: An Information Gain Association Vector Semi-supervised BERT Model for Sentiment Analysisal Encoder Representations from Transformers (BERT), as one of those models, has achieved excellent results in various tasks of NLP since its emergence. But it still has shortcomings, such as poor capability of extracting local features and exploding of training gradients. After analyzing the shortc作者: 宏偉 時(shí)間: 2025-3-27 20:17
A Concept Lattice Method for Eliminating Redundant Featuresormation from omics genes quickly. Feature selection is an important step of data preprocessing, and it is one of the key factors affecting the capability of algorithm information extraction. Since single feature selection method causes the deviation of feature subsets, we introduce ensemble learnin作者: 變形 時(shí)間: 2025-3-28 01:43
Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detectionome the targets of malicious attacks or hackers due to the centralization of data storage and computing facilities. Most intrusion attacks to cloud servers are often originated from inner or external networks. Intrusion detection is a prerequisite to designing anti-intrusion countermeasures of cloud作者: Antioxidant 時(shí)間: 2025-3-28 03:28 作者: Orgasm 時(shí)間: 2025-3-28 09:34 作者: 變白 時(shí)間: 2025-3-28 13:33
Lightweight Anonymous Communication Model Based on Anonymous IBE have a greater demand for privacy. In addition, the development of mobile Internet and cloud computing requires the communication model to be as efficient and low-bandwidth as possible on the basis of security. In order to achieve the goal of protecting users’ data privacy, this paper firstly prese作者: GRACE 時(shí)間: 2025-3-28 17:39 作者: 蛛絲 時(shí)間: 2025-3-28 19:43 作者: 冷淡一切 時(shí)間: 2025-3-28 23:31
Research on the Development of Natural Human-Computer Interaction for Mobile Terminals transition from humans adapting to computers, to computers constantly adapting to humans. With the development of human-computer interaction, users are more and more inclined to use natural communication methods such as natural language, gestures, and vision instead of traditional keyboard and mous作者: Uncultured 時(shí)間: 2025-3-29 03:52
Encoding Dual Semantic Knowledge for Text-Enhanced Cloud Serviceselationships of implicit topics and explicit words to generate a more comprehensive representation for each text. To fully exploit the semantic knowledge for text classification in cloud computing systems, we attempt to encode topic and word features based on their latent relationships. The extracte作者: 推遲 時(shí)間: 2025-3-29 07:45 作者: TERRA 時(shí)間: 2025-3-29 12:51
ECG Arrhythmia Heartbeat Classification Using Deep Learning Networksondition of the human heart. In this paper, we designed four deep learning network structures and three electrocardiogram signal preprocessing methods, under the same dataset, explored the impact and performance of different preprocessing methods and models on the ECG arrhythmia classification work.作者: 厚臉皮 時(shí)間: 2025-3-29 17:09 作者: vector 時(shí)間: 2025-3-29 20:33 作者: Progesterone 時(shí)間: 2025-3-30 03:19 作者: Prostaglandins 時(shí)間: 2025-3-30 05:03
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/c/image/228407.jpg作者: 糾纏 時(shí)間: 2025-3-30 11:42 作者: commonsense 時(shí)間: 2025-3-30 12:54
https://doi.org/10.1007/978-3-531-92019-1s remains a challenge in case XML documents are very large. In this study, we implemented a tree-shaped data structure called partial tree that is intrinsically suitable for large XML document processing with multiple computers. Our implementation uses two index sets to accelerate the evaluation of 作者: compassion 時(shí)間: 2025-3-30 17:23
https://doi.org/10.1007/978-3-531-92019-1al Encoder Representations from Transformers (BERT), as one of those models, has achieved excellent results in various tasks of NLP since its emergence. But it still has shortcomings, such as poor capability of extracting local features and exploding of training gradients. After analyzing the shortc作者: 無政府主義者 時(shí)間: 2025-3-31 00:22 作者: 蠟燭 時(shí)間: 2025-3-31 04:16