標(biāo)題: Titlebook: Cloud Computing, Big Data & Emerging Topics; 9th Conference, JCC- Marcelo Naiouf,Enzo Rucci,Laura De Giusti Conference proceedings 2021 Spr [打印本頁] 作者: EFFCT 時間: 2025-3-21 18:28
書目名稱Cloud Computing, Big Data & Emerging Topics影響因子(影響力)
書目名稱Cloud Computing, Big Data & Emerging Topics影響因子(影響力)學(xué)科排名
書目名稱Cloud Computing, Big Data & Emerging Topics網(wǎng)絡(luò)公開度
書目名稱Cloud Computing, Big Data & Emerging Topics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cloud Computing, Big Data & Emerging Topics被引頻次
書目名稱Cloud Computing, Big Data & Emerging Topics被引頻次學(xué)科排名
書目名稱Cloud Computing, Big Data & Emerging Topics年度引用
書目名稱Cloud Computing, Big Data & Emerging Topics年度引用學(xué)科排名
書目名稱Cloud Computing, Big Data & Emerging Topics讀者反饋
書目名稱Cloud Computing, Big Data & Emerging Topics讀者反饋學(xué)科排名
作者: HERE 時間: 2025-3-21 21:50 作者: Diaphragm 時間: 2025-3-22 00:37
Detection of Crop Lines and Weeds in Corn Fields Based on Images Obtained from a Droneductions. Weeds are one of the main factors affecting the yield and quality of farming products. The PA is one of the technological solutions to detect weeds in corn crops through the analysis of digital images to carry out different actions that allow reducing the risk of production in a traditiona作者: 母豬 時間: 2025-3-22 05:00
Routing Security Using Blockchain Technology, these attacks are as old as the protocol itself, and today these failures continue to occur and research continues on what is the best strategy to provide security for routing on the Internet. New solutions, such as RPKI, are generating risks due to the centralization of the routing authority, the作者: Affluence 時間: 2025-3-22 10:25
Comparison of Hardware and Software Implementations of AES on?Shared-Memory Architecturesever-increasing amount of sensitive data that need to be protected, it is natural to turn to parallel AES solutions that exploit the full computational power provided by emerging architectures in order to reduce encryption time. In this paper, we compare the performance of a hardware-based AES solut作者: 易于交談 時間: 2025-3-22 16:18 作者: 易于交談 時間: 2025-3-22 17:26 作者: 鐵塔等 時間: 2025-3-22 21:50
A Comparison of Neural Networks for?Sign Language Recognition with?LSA64 Neural Network models have taken precedence over specialized models designed specifically for Sign Language. Despite this, the completeness and complexity of datasets has not scaled accordingly. This deficiency presents a significant challenge for deploying Sign Language Recognition models, special作者: BIBLE 時間: 2025-3-23 04:37
Optimizing Sparse Matrix Storage for the Big Data Erarge graphs, as these are often represented as sparse matrices. In this context, it is necessary to provide matrix storage formats that save memory, avoid pointless computations, and enable convenient memory accesses. Reordering techniques, which permute the rows and columns of the matrix to achieve 作者: 小說 時間: 2025-3-23 08:06 作者: Irascible 時間: 2025-3-23 12:11
LOBD: Linked Data Dashboard for?Marine Biodiversityfrom Global Biodiversity Information Facility (GBIF) with different linked open datasets such as ., . and ., to visually present the information as a scientific dashboard. The application allows to complement information about marine Biodiversity with information not initially available. To demonstr作者: Engaging 時間: 2025-3-23 15:56
3D-Domotic: A 3D Mobile Application for Domotic Control entertainment possibilities for the user. In turn, Domotics is closely related to the most recent concept of the Internet of Things, which proposes the interconnection of everyday objects in a home or office through the Internet. In this work, a 3D mobile application called . is presented. This app作者: anchor 時間: 2025-3-23 22:05
Visualization Technique for Comparison of Time-Based Large Data Setsjective of information visualization is to help gain insight into the data, and in this context, it should assist the user in the task of comparison. However, few visualization techniques have been specifically developed to support the comparison process, even less for large data sets. In this paper作者: Insulin 時間: 2025-3-23 23:58 作者: Cryptic 時間: 2025-3-24 03:31 作者: 概觀 時間: 2025-3-24 08:34
https://doi.org/10.1007/978-3-531-19129-4nology, where security is provided to the BGP protocol through the deployment of a specific application for the allocation of Internet resources in the Ethereum Ropsten network, and the subsequent use of this stored information.作者: Infelicity 時間: 2025-3-24 13:05
,Was geh?rt in die Pflegedokumentation?,vely. The former is implemented using Intel AES New Instructions and the latter using the OpenSSL library. The results reveal that PAES-HW-CPU achieves higher performance. However, PAES-SW-GPU on 2 GPUs is competitive compared to CPUs with hardware support for AES and few cores and CPUs that do not support AES.作者: 冒煙 時間: 2025-3-24 16:47
,Was geh?rt in die Pflegedokumentation?,elopment phases and classification success rates are shown for each algorithm used in the different experiments. This system may be an alternative for the early analysis of public tenders for software with fuzzy requirements.作者: Missile 時間: 2025-3-24 21:36
https://doi.org/10.1007/978-3-662-00669-6LCG). This work focuses on the study of a recently published dataset?[.] to reconstruct the lifetime of transfers and reveals important information that can be used to predict the Time To Complete (TTC) of transfers across the WLCG.作者: MAUVE 時間: 2025-3-25 01:21 作者: 明智的人 時間: 2025-3-25 06:38 作者: 可卡 時間: 2025-3-25 09:45 作者: 收養(yǎng) 時間: 2025-3-25 13:24 作者: probate 時間: 2025-3-25 18:55
Proposal for a Classifier for Public Tenders for Software Based on Standard IEEE830elopment phases and classification success rates are shown for each algorithm used in the different experiments. This system may be an alternative for the early analysis of public tenders for software with fuzzy requirements.作者: 知識 時間: 2025-3-25 20:00 作者: 礦石 時間: 2025-3-26 03:49
3D-Domotic: A 3D Mobile Application for Domotic Controlin their actual physical location, and are controlled directly on the model of the house, in a simple and completely visual way. Device status is monitored in real time, simplifying the control of the house.作者: 不能平靜 時間: 2025-3-26 08:04 作者: 帶子 時間: 2025-3-26 10:41 作者: CRUDE 時間: 2025-3-26 13:22
Schrift und Sprache der Chinesenormats. Concretely, we develop an evolutionary algorithm (EA) to provide the matrix reordering, following different optimization goals. The results show that the nonzero patterns obtained after applying the EA’s reorderings are superior to those obtained through standard reorderings, regarding the use of hybrid sparse matrix formats.作者: 輕快走過 時間: 2025-3-26 20:31 作者: BRIEF 時間: 2025-3-27 00:44 作者: plasma-cells 時間: 2025-3-27 02:35 作者: 古文字學(xué) 時間: 2025-3-27 08:16 作者: 利用 時間: 2025-3-27 12:02 作者: 粗野 時間: 2025-3-27 16:50
1865-0929 l of 37 submissions. The papers are organized in topical sections on parallel and distributed computing; machine and deep learning; big data; web and mobile computing; visualization...*The conference was held virtually due to the COVID-19 pandemic..978-3-030-84824-8978-3-030-84825-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 討好美人 時間: 2025-3-27 19:25
1865-0929 &ET 2021, held in La Plata, Argentina*, in June 2021..The 12 full papers and 2 short papers presented were carefully reviewed and selected from a total of 37 submissions. The papers are organized in topical sections on parallel and distributed computing; machine and deep learning; big data; web and 作者: cruise 時間: 2025-3-27 23:26 作者: grieve 時間: 2025-3-28 04:07
Detection of Crop Lines and Weeds in Corn Fields Based on Images Obtained from a Dronecrop exclusion, weed detection, this allows separating the weed from the crop lines detected in the images captured at 5, 10, and 15 m in height. The results obtained show that the crop lines (85%) and weeds (34.61%) of the total vegetation can be better identified in the fourth week 15 m high. With作者: GREG 時間: 2025-3-28 06:48
A Comparison of Neural Networks for?Sign Language Recognition with?LSA64ll previous models, many specifically designed for this task. Furthermore, we perform ablation studies that indicate that temporal data augmentation can provide a significant boost to accuracy, unlike traditional spatial data augmentation techniques. Finally, we analyze the activation values of the 作者: mediocrity 時間: 2025-3-28 11:18
Library for Multidimensional Data Visualizationy. In this paper, we present the . Library, a data visualization library supporting Non-Paired General Line Coordinates (.) with associated traditional interactions like brushing, zooming, and panning. . is a collection of visualization methods, designed for experimenting with . techniques in the de作者: Cupping 時間: 2025-3-28 17:10 作者: AMBI 時間: 2025-3-28 21:15
https://doi.org/10.1007/978-3-531-19129-4crop exclusion, weed detection, this allows separating the weed from the crop lines detected in the images captured at 5, 10, and 15 m in height. The results obtained show that the crop lines (85%) and weeds (34.61%) of the total vegetation can be better identified in the fourth week 15 m high. With作者: bypass 時間: 2025-3-29 00:15 作者: 含糊其辭 時間: 2025-3-29 05:38 作者: 有特色 時間: 2025-3-29 08:52 作者: 惡臭 時間: 2025-3-29 13:47 作者: Ceramic 時間: 2025-3-29 16:53
LOBD: Linked Data Dashboard for?Marine Biodiversityfrom Global Biodiversity Information Facility (GBIF) with different linked open datasets such as ., . and ., to visually present the information as a scientific dashboard. The application allows to complement information about marine Biodiversity with information not initially available. To demonstrate this, a use case is presented.作者: jettison 時間: 2025-3-29 22:18 作者: 預(yù)兆好 時間: 2025-3-30 02:00
https://doi.org/10.1007/978-3-531-19129-4be of natural or man-made origin, the latter in turn can be intentional or unintentional. Forest fires cause great losses and harms every year, some of which are often irreparable. Among the different strategies and technologies available to mitigate the effects of fire, the forest fire behavior pre作者: 偽善 時間: 2025-3-30 07:39 作者: ostrish 時間: 2025-3-30 08:30
https://doi.org/10.1007/978-3-531-19129-4, these attacks are as old as the protocol itself, and today these failures continue to occur and research continues on what is the best strategy to provide security for routing on the Internet. New solutions, such as RPKI, are generating risks due to the centralization of the routing authority, the作者: META 時間: 2025-3-30 13:08
,Was geh?rt in die Pflegedokumentation?,ever-increasing amount of sensitive data that need to be protected, it is natural to turn to parallel AES solutions that exploit the full computational power provided by emerging architectures in order to reduce encryption time. In this paper, we compare the performance of a hardware-based AES solut作者: 油膏 時間: 2025-3-30 19:48 作者: 微生物 時間: 2025-3-31 00:45 作者: 使痛苦 時間: 2025-3-31 02:07 作者: deadlock 時間: 2025-3-31 08:21
Schrift und Sprache der Chinesenrge graphs, as these are often represented as sparse matrices. In this context, it is necessary to provide matrix storage formats that save memory, avoid pointless computations, and enable convenient memory accesses. Reordering techniques, which permute the rows and columns of the matrix to achieve 作者: Accommodation 時間: 2025-3-31 09:48