標題: Titlebook: Computational Science and Its Applications - ICCSA 2006; International Confer Marina Gavrilova,Osvaldo Gervasi,Hyunseung Choo Conference pr [打印本頁] 作者: encroach 時間: 2025-3-21 16:11
書目名稱Computational Science and Its Applications - ICCSA 2006影響因子(影響力)
書目名稱Computational Science and Its Applications - ICCSA 2006影響因子(影響力)學科排名
書目名稱Computational Science and Its Applications - ICCSA 2006網(wǎng)絡(luò)公開度
書目名稱Computational Science and Its Applications - ICCSA 2006網(wǎng)絡(luò)公開度學科排名
書目名稱Computational Science and Its Applications - ICCSA 2006被引頻次
書目名稱Computational Science and Its Applications - ICCSA 2006被引頻次學科排名
書目名稱Computational Science and Its Applications - ICCSA 2006年度引用
書目名稱Computational Science and Its Applications - ICCSA 2006年度引用學科排名
書目名稱Computational Science and Its Applications - ICCSA 2006讀者反饋
書目名稱Computational Science and Its Applications - ICCSA 2006讀者反饋學科排名
作者: Champion 時間: 2025-3-22 00:09
Computational Science and Its Applications - ICCSA 2006978-3-540-34076-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: freight 時間: 2025-3-22 02:01 作者: STAT 時間: 2025-3-22 08:08
https://doi.org/10.1007/11751595Performance; algorithms; bioinformatics; computational geometry; computer; computer science; data security作者: 骨 時間: 2025-3-22 09:20
978-3-540-34075-1Springer-Verlag Berlin Heidelberg 2006作者: Offensive 時間: 2025-3-22 13:31
Modification and coating of polymer surfacesdesirable to apply database technologies to information security engineering in order to manage the security requirements in design and development of the systems. This paper proposes a security requirement management database based on the international standard ISO/IEC 15408 that defines security f作者: Offensive 時間: 2025-3-22 19:11
O. Gershevitz,P. Silickas,C. N. Sukenik needed to be developed and implemented. In the present study, a neural network based system is proposed for computer access security for the issues of preventive security and detection of violation. Two types of data, time intervals between successive keystrokes during password entry through keyboa作者: 思鄉(xiāng)病 時間: 2025-3-23 00:09 作者: 金絲雀 時間: 2025-3-23 02:24
Thomas Jenner Moore M.D., Ph.D.tect the intruder using infrared sensor and monitor the room or office in real time by web camera. The password was needed to enter the house or office and the operation of home appliances could be remotely controlled by network, too. This fabricated system was small and had an advantage to suppleme作者: 并置 時間: 2025-3-23 07:51 作者: 倫理學 時間: 2025-3-23 12:16
Aqueous Solutions, Slurries And Pulp,ithm runs on smartcards. Power analysis attacks are a very strong cryptanalysis by monitoring and analyzing power consumption traces. In this paper, we experiment Exclusive OR operation. We also analyze the tendency of state-of-the-art regarding hardware countermeasures and experiments of Hamming-We作者: Hectic 時間: 2025-3-23 15:33 作者: 口訣法 時間: 2025-3-23 20:16
Surface Chemistry of Froth Flotation Vector) Routing, all the nodes have to receive route request messages, and rebroadcast the route request messages for others. It causes a lot of network traffic overheads. In this study, we propose a belt-zone selection method for decreasing the number of RREQ messages. All nodes that receive the R作者: 熔巖 時間: 2025-3-24 00:31 作者: bisphosphonate 時間: 2025-3-24 04:58 作者: 放肆的我 時間: 2025-3-24 07:32 作者: jet-lag 時間: 2025-3-24 12:51 作者: opprobrious 時間: 2025-3-24 14:59
Surface Chemistry of Froth Flotation purpose of our research is to construct the system on the real-time environment with the technology of environment monitoring systems and ubiquitous computing systems. Also, we present the monitoring system to provide a faster solution to prevent disasters through automatic machine controls in urge作者: 皮薩 時間: 2025-3-24 22:33 作者: Ganglion-Cyst 時間: 2025-3-25 00:16 作者: heirloom 時間: 2025-3-25 03:41
Surface Chemistry of Froth Flotation needs of the users. Since there is no sufficient cooperation among the agents and they are independent to each other, it is difficult to make an efficient search of information in the distributed environment. Therefore, a typical search agent is difficult to use and can contain irrelevant informati作者: Intentional 時間: 2025-3-25 11:03 作者: Anthology 時間: 2025-3-25 12:07
https://doi.org/10.1007/978-1-4615-7975-5g uncertainty on cost and sc11edule estimates. Product lines raise reuse to the level of design frameworks, not simply code or component reuse. They capture commonality and adaptability, through domain and variability analyzes, to be able to create new products easily by instantiating prefabricated 作者: 開頭 時間: 2025-3-25 16:31 作者: 口味 時間: 2025-3-25 22:13
Design and Fabrication of Security and Home Automation Systemtect the intruder using infrared sensor and monitor the room or office in real time by web camera. The password was needed to enter the house or office and the operation of home appliances could be remotely controlled by network, too. This fabricated system was small and had an advantage to supplement additional function easily.作者: Meditate 時間: 2025-3-26 03:12
A Security Requirement Management Database Based on ISO/IEC 15408desirable to apply database technologies to information security engineering in order to manage the security requirements in design and development of the systems. This paper proposes a security requirement management database based on the international standard ISO/IEC 15408 that defines security f作者: Decibel 時間: 2025-3-26 05:29
Development of Committee Neural Network for Computer Access Security System needed to be developed and implemented. In the present study, a neural network based system is proposed for computer access security for the issues of preventive security and detection of violation. Two types of data, time intervals between successive keystrokes during password entry through keyboa作者: MOAN 時間: 2025-3-26 09:35
C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Modelassification to this problem. We acquire multiple levels of linguistic knowledge from natural language processing to make well-integrated features for ME framework. Five kinds of features were used to represent various linguistic constraints including phonetic features, POS tag features, phrase brea作者: expire 時間: 2025-3-26 14:30 作者: ferment 時間: 2025-3-26 16:57 作者: 野蠻 時間: 2025-3-26 22:52 作者: LURE 時間: 2025-3-27 03:54
Information System Modeling for Analysis of Propagation Effects and Levels of Damager the systems over the Internet have increased, too. To reduce the possibilities of such threats, studies on security risk analysis in the field of information security technology have been actively conducted. However, it is very difficult to analyze actual causes of damage or to establish safeguard作者: conduct 時間: 2025-3-27 05:56
A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks Vector) Routing, all the nodes have to receive route request messages, and rebroadcast the route request messages for others. It causes a lot of network traffic overheads. In this study, we propose a belt-zone selection method for decreasing the number of RREQ messages. All nodes that receive the R作者: 震驚 時間: 2025-3-27 10:17
A VLSM Address Management Method for Variable IP Subnettingor converting to IPv6. One of the serious problems of the IPv4 addressing structure is the fact that is a shortage of IP addresses. The address shortage is derived by lots of unused addresses during IP distribution and IP subnetting design. We propose an effective subnet IP address calculation metho作者: Merited 時間: 2025-3-27 17:29 作者: 心胸開闊 時間: 2025-3-27 18:15 作者: 委屈 時間: 2025-3-27 22:14 作者: GLOOM 時間: 2025-3-28 03:07
The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor N purpose of our research is to construct the system on the real-time environment with the technology of environment monitoring systems and ubiquitous computing systems. Also, we present the monitoring system to provide a faster solution to prevent disasters through automatic machine controls in urge作者: 遠地點 時間: 2025-3-28 09:46
Ontology-Based Information Search in the Real World Using Web Servicesarch based on the ontology can provide the inferred and associated information between data. To develop an ontology application in the real world, we design the architecture of search systems based on the ontology using Web services. Our system consists of ontology modules, search procedure modules 作者: 思想 時間: 2025-3-28 12:34 作者: cataract 時間: 2025-3-28 18:12 作者: Entirety 時間: 2025-3-28 21:11 作者: Dysplasia 時間: 2025-3-29 02:12 作者: Texture 時間: 2025-3-29 06:03 作者: 形容詞詞尾 時間: 2025-3-29 10:10
0302-9743 esearchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.978-3-540-34075-1978-3-540-34076-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 剝削 時間: 2025-3-29 14:15 作者: Cantankerous 時間: 2025-3-29 15:33 作者: 溫和女孩 時間: 2025-3-29 20:58
A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks process fails, the route breaks down. In this paper, a robust routing protocol is proposed to increase the success rate of the local route reestablishment and enhance the communication delay performance. The results of computer simulation show that the proposed routing protocol increases system per作者: 冷淡一切 時間: 2025-3-30 03:13
Applying Product Line to the Embedded Systemsen sub-domains and their most important properties is an investment that must be looked after. However, the sub-domains need flexibility to use, change and manage their own technologies, and evolve separately, but in a controlled way.作者: Expertise 時間: 2025-3-30 05:43
Conference proceedings 2006Together, these far-reaching scienti?c areas contributed to shaping this conference in the realms of state-- the-art computational science researchand applications, encompassing the fac- itating theoretical foundations and the innovative applications of such results in other areas.作者: harmony 時間: 2025-3-30 09:17
Adsorption of Flotation Collectors,tal that the propagation effects and levels of damage are analyzed using real-time comprehensive methods in order to predict damage in advance and minimize the extent of the damage. For this reason we propose a modeling technique for information systems by making use of SPICE and Petri-Net, and meth作者: Fortuitous 時間: 2025-3-30 15:55 作者: Entirety 時間: 2025-3-30 17:51 作者: Gobble 時間: 2025-3-30 22:52 作者: habile 時間: 2025-3-31 01:11
Computational Science and Its Applications - ICCSA 2006International Confer作者: anesthesia 時間: 2025-3-31 05:15
https://doi.org/10.1007/978-1-4757-4302-9event type, Therefore, it takes less time to collect packets and analyze them than the existing IDS, and reacts about abnormal intrusion? real time. In addition, it is possible for this to detect the devious intrusion detection by generating pattern graph.作者: 大氣層 時間: 2025-3-31 10:35
Surface Chemistry of Froth Flotatione embedding controller S/W as its brain and in which large-scale development organization has multi-site development environments..We evaluated SDSEM as a very practical but limited model against our goal by introducing and applying to business units.作者: Occupation 時間: 2025-3-31 16:56 作者: Stress 時間: 2025-3-31 20:48 作者: follicle 時間: 2025-3-31 23:14
0302-9743 in Glasgow, UK, during May 8–11, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA 2006. Computational science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitione作者: 有法律效應(yīng) 時間: 2025-4-1 03:44
Acid-Base Properties of Surface Oxide Films, ME framework. Five kinds of features were used to represent various linguistic constraints including phonetic features, POS tag features, phrase break features, position features, and length features.作者: Musket 時間: 2025-4-1 07:44 作者: 聯(lián)想 時間: 2025-4-1 11:21
Surface Chemistry of Froth Flotationcomputing systems. Also, we present the monitoring system to provide a faster solution to prevent disasters through automatic machine controls in urgent situations. As the purpose of this study, we constructed simulation nodes with wireless sensor network devices and implemented a real-time monitoring system.作者: prostatitis 時間: 2025-4-1 15:09
Oil and Colour Chemists’ Associationge in a?practical image processing application.?As a result of experiment, though the method does not always guarantee the convergence, it shows the improved learning time and the high convergence rate.作者: 最初 時間: 2025-4-1 21:37
C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model ME framework. Five kinds of features were used to represent various linguistic constraints including phonetic features, POS tag features, phrase break features, position features, and length features.作者: 藥物 時間: 2025-4-2 01:07
Experiments and Hardware Countermeasures on Power Analysis Attackse experiment Exclusive OR operation. We also analyze the tendency of state-of-the-art regarding hardware countermeasures and experiments of Hamming-Weights on power attacks. It can be useful to evaluate a cryptosystem related with hardware security technology.