派博傳思國際中心

標(biāo)題: Titlebook: Cloud Computing, Big Data & Emerging Topics; 9th Conference, JCC- Marcelo Naiouf,Enzo Rucci,Laura De Giusti Conference proceedings 2021 Spr [打印本頁]

作者: EFFCT    時間: 2025-3-21 18:28
書目名稱Cloud Computing, Big Data & Emerging Topics影響因子(影響力)




書目名稱Cloud Computing, Big Data & Emerging Topics影響因子(影響力)學(xué)科排名




書目名稱Cloud Computing, Big Data & Emerging Topics網(wǎng)絡(luò)公開度




書目名稱Cloud Computing, Big Data & Emerging Topics網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cloud Computing, Big Data & Emerging Topics被引頻次




書目名稱Cloud Computing, Big Data & Emerging Topics被引頻次學(xué)科排名




書目名稱Cloud Computing, Big Data & Emerging Topics年度引用




書目名稱Cloud Computing, Big Data & Emerging Topics年度引用學(xué)科排名




書目名稱Cloud Computing, Big Data & Emerging Topics讀者反饋




書目名稱Cloud Computing, Big Data & Emerging Topics讀者反饋學(xué)科排名





作者: HERE    時間: 2025-3-21 21:50

作者: Diaphragm    時間: 2025-3-22 00:37
Detection of Crop Lines and Weeds in Corn Fields Based on Images Obtained from a Droneductions. Weeds are one of the main factors affecting the yield and quality of farming products. The PA is one of the technological solutions to detect weeds in corn crops through the analysis of digital images to carry out different actions that allow reducing the risk of production in a traditiona
作者: 母豬    時間: 2025-3-22 05:00
Routing Security Using Blockchain Technology, these attacks are as old as the protocol itself, and today these failures continue to occur and research continues on what is the best strategy to provide security for routing on the Internet. New solutions, such as RPKI, are generating risks due to the centralization of the routing authority, the
作者: Affluence    時間: 2025-3-22 10:25
Comparison of Hardware and Software Implementations of AES on?Shared-Memory Architecturesever-increasing amount of sensitive data that need to be protected, it is natural to turn to parallel AES solutions that exploit the full computational power provided by emerging architectures in order to reduce encryption time. In this paper, we compare the performance of a hardware-based AES solut
作者: 易于交談    時間: 2025-3-22 16:18

作者: 易于交談    時間: 2025-3-22 17:26

作者: 鐵塔等    時間: 2025-3-22 21:50
A Comparison of Neural Networks for?Sign Language Recognition with?LSA64 Neural Network models have taken precedence over specialized models designed specifically for Sign Language. Despite this, the completeness and complexity of datasets has not scaled accordingly. This deficiency presents a significant challenge for deploying Sign Language Recognition models, special
作者: BIBLE    時間: 2025-3-23 04:37
Optimizing Sparse Matrix Storage for the Big Data Erarge graphs, as these are often represented as sparse matrices. In this context, it is necessary to provide matrix storage formats that save memory, avoid pointless computations, and enable convenient memory accesses. Reordering techniques, which permute the rows and columns of the matrix to achieve
作者: 小說    時間: 2025-3-23 08:06

作者: Irascible    時間: 2025-3-23 12:11
LOBD: Linked Data Dashboard for?Marine Biodiversityfrom Global Biodiversity Information Facility (GBIF) with different linked open datasets such as ., . and ., to visually present the information as a scientific dashboard. The application allows to complement information about marine Biodiversity with information not initially available. To demonstr
作者: Engaging    時間: 2025-3-23 15:56
3D-Domotic: A 3D Mobile Application for Domotic Control entertainment possibilities for the user. In turn, Domotics is closely related to the most recent concept of the Internet of Things, which proposes the interconnection of everyday objects in a home or office through the Internet. In this work, a 3D mobile application called . is presented. This app
作者: anchor    時間: 2025-3-23 22:05
Visualization Technique for Comparison of Time-Based Large Data Setsjective of information visualization is to help gain insight into the data, and in this context, it should assist the user in the task of comparison. However, few visualization techniques have been specifically developed to support the comparison process, even less for large data sets. In this paper
作者: Insulin    時間: 2025-3-23 23:58

作者: Cryptic    時間: 2025-3-24 03:31

作者: 概觀    時間: 2025-3-24 08:34
https://doi.org/10.1007/978-3-531-19129-4nology, where security is provided to the BGP protocol through the deployment of a specific application for the allocation of Internet resources in the Ethereum Ropsten network, and the subsequent use of this stored information.
作者: Infelicity    時間: 2025-3-24 13:05
,Was geh?rt in die Pflegedokumentation?,vely. The former is implemented using Intel AES New Instructions and the latter using the OpenSSL library. The results reveal that PAES-HW-CPU achieves higher performance. However, PAES-SW-GPU on 2 GPUs is competitive compared to CPUs with hardware support for AES and few cores and CPUs that do not support AES.
作者: 冒煙    時間: 2025-3-24 16:47
,Was geh?rt in die Pflegedokumentation?,elopment phases and classification success rates are shown for each algorithm used in the different experiments. This system may be an alternative for the early analysis of public tenders for software with fuzzy requirements.
作者: Missile    時間: 2025-3-24 21:36
https://doi.org/10.1007/978-3-662-00669-6LCG). This work focuses on the study of a recently published dataset?[.] to reconstruct the lifetime of transfers and reveals important information that can be used to predict the Time To Complete (TTC) of transfers across the WLCG.
作者: MAUVE    時間: 2025-3-25 01:21

作者: 明智的人    時間: 2025-3-25 06:38

作者: 可卡    時間: 2025-3-25 09:45

作者: 收養(yǎng)    時間: 2025-3-25 13:24

作者: probate    時間: 2025-3-25 18:55
Proposal for a Classifier for Public Tenders for Software Based on Standard IEEE830elopment phases and classification success rates are shown for each algorithm used in the different experiments. This system may be an alternative for the early analysis of public tenders for software with fuzzy requirements.
作者: 知識    時間: 2025-3-25 20:00

作者: 礦石    時間: 2025-3-26 03:49
3D-Domotic: A 3D Mobile Application for Domotic Controlin their actual physical location, and are controlled directly on the model of the house, in a simple and completely visual way. Device status is monitored in real time, simplifying the control of the house.
作者: 不能平靜    時間: 2025-3-26 08:04

作者: 帶子    時間: 2025-3-26 10:41

作者: CRUDE    時間: 2025-3-26 13:22
Schrift und Sprache der Chinesenormats. Concretely, we develop an evolutionary algorithm (EA) to provide the matrix reordering, following different optimization goals. The results show that the nonzero patterns obtained after applying the EA’s reorderings are superior to those obtained through standard reorderings, regarding the use of hybrid sparse matrix formats.
作者: 輕快走過    時間: 2025-3-26 20:31

作者: BRIEF    時間: 2025-3-27 00:44

作者: plasma-cells    時間: 2025-3-27 02:35

作者: 古文字學(xué)    時間: 2025-3-27 08:16

作者: 利用    時間: 2025-3-27 12:02

作者: 粗野    時間: 2025-3-27 16:50
1865-0929 l of 37 submissions. The papers are organized in topical sections on parallel and distributed computing; machine and deep learning; big data; web and mobile computing; visualization...*The conference was held virtually due to the COVID-19 pandemic..978-3-030-84824-8978-3-030-84825-5Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 討好美人    時間: 2025-3-27 19:25
1865-0929 &ET 2021, held in La Plata, Argentina*, in June 2021..The 12 full papers and 2 short papers presented were carefully reviewed and selected from a total of 37 submissions. The papers are organized in topical sections on parallel and distributed computing; machine and deep learning; big data; web and
作者: cruise    時間: 2025-3-27 23:26

作者: grieve    時間: 2025-3-28 04:07
Detection of Crop Lines and Weeds in Corn Fields Based on Images Obtained from a Dronecrop exclusion, weed detection, this allows separating the weed from the crop lines detected in the images captured at 5, 10, and 15 m in height. The results obtained show that the crop lines (85%) and weeds (34.61%) of the total vegetation can be better identified in the fourth week 15 m high. With
作者: GREG    時間: 2025-3-28 06:48
A Comparison of Neural Networks for?Sign Language Recognition with?LSA64ll previous models, many specifically designed for this task. Furthermore, we perform ablation studies that indicate that temporal data augmentation can provide a significant boost to accuracy, unlike traditional spatial data augmentation techniques. Finally, we analyze the activation values of the
作者: mediocrity    時間: 2025-3-28 11:18
Library for Multidimensional Data Visualizationy. In this paper, we present the . Library, a data visualization library supporting Non-Paired General Line Coordinates (.) with associated traditional interactions like brushing, zooming, and panning. . is a collection of visualization methods, designed for experimenting with . techniques in the de
作者: Cupping    時間: 2025-3-28 17:10

作者: AMBI    時間: 2025-3-28 21:15
https://doi.org/10.1007/978-3-531-19129-4crop exclusion, weed detection, this allows separating the weed from the crop lines detected in the images captured at 5, 10, and 15 m in height. The results obtained show that the crop lines (85%) and weeds (34.61%) of the total vegetation can be better identified in the fourth week 15 m high. With
作者: bypass    時間: 2025-3-29 00:15

作者: 含糊其辭    時間: 2025-3-29 05:38

作者: 有特色    時間: 2025-3-29 08:52

作者: 惡臭    時間: 2025-3-29 13:47

作者: Ceramic    時間: 2025-3-29 16:53
LOBD: Linked Data Dashboard for?Marine Biodiversityfrom Global Biodiversity Information Facility (GBIF) with different linked open datasets such as ., . and ., to visually present the information as a scientific dashboard. The application allows to complement information about marine Biodiversity with information not initially available. To demonstrate this, a use case is presented.
作者: jettison    時間: 2025-3-29 22:18

作者: 預(yù)兆好    時間: 2025-3-30 02:00
https://doi.org/10.1007/978-3-531-19129-4be of natural or man-made origin, the latter in turn can be intentional or unintentional. Forest fires cause great losses and harms every year, some of which are often irreparable. Among the different strategies and technologies available to mitigate the effects of fire, the forest fire behavior pre
作者: 偽善    時間: 2025-3-30 07:39

作者: ostrish    時間: 2025-3-30 08:30
https://doi.org/10.1007/978-3-531-19129-4, these attacks are as old as the protocol itself, and today these failures continue to occur and research continues on what is the best strategy to provide security for routing on the Internet. New solutions, such as RPKI, are generating risks due to the centralization of the routing authority, the
作者: META    時間: 2025-3-30 13:08
,Was geh?rt in die Pflegedokumentation?,ever-increasing amount of sensitive data that need to be protected, it is natural to turn to parallel AES solutions that exploit the full computational power provided by emerging architectures in order to reduce encryption time. In this paper, we compare the performance of a hardware-based AES solut
作者: 油膏    時間: 2025-3-30 19:48

作者: 微生物    時間: 2025-3-31 00:45

作者: 使痛苦    時間: 2025-3-31 02:07

作者: deadlock    時間: 2025-3-31 08:21
Schrift und Sprache der Chinesenrge graphs, as these are often represented as sparse matrices. In this context, it is necessary to provide matrix storage formats that save memory, avoid pointless computations, and enable convenient memory accesses. Reordering techniques, which permute the rows and columns of the matrix to achieve
作者: Accommodation    時間: 2025-3-31 09:48





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
稻城县| 门源| 洛隆县| 花垣县| 卫辉市| 安吉县| 满城县| 平塘县| 宜丰县| 舞钢市| 昂仁县| 临漳县| 长寿区| 韩城市| 惠东县| 垫江县| 建瓯市| 江永县| 当阳市| 中阳县| 赞皇县| 共和县| 邛崃市| 正镶白旗| 开化县| 新营市| 尚义县| 建瓯市| 孟连| 葫芦岛市| 林州市| 城口县| 延川县| 彭阳县| 忻州市| 舒兰市| 牡丹江市| 威海市| 邹城市| 白城市| 密山市|