派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computational Science and Its Applications - ICCSA 2007; International Confer Osvaldo Gervasi,Marina L. Gavrilova Conference proceedings 20 [打印本頁(yè)]

作者: peak-flow-meter    時(shí)間: 2025-3-21 19:40
書目名稱Computational Science and Its Applications - ICCSA 2007影響因子(影響力)




書目名稱Computational Science and Its Applications - ICCSA 2007影響因子(影響力)學(xué)科排名




書目名稱Computational Science and Its Applications - ICCSA 2007網(wǎng)絡(luò)公開度




書目名稱Computational Science and Its Applications - ICCSA 2007網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Science and Its Applications - ICCSA 2007被引頻次




書目名稱Computational Science and Its Applications - ICCSA 2007被引頻次學(xué)科排名




書目名稱Computational Science and Its Applications - ICCSA 2007年度引用




書目名稱Computational Science and Its Applications - ICCSA 2007年度引用學(xué)科排名




書目名稱Computational Science and Its Applications - ICCSA 2007讀者反饋




書目名稱Computational Science and Its Applications - ICCSA 2007讀者反饋學(xué)科排名





作者: jet-lag    時(shí)間: 2025-3-21 20:58
https://doi.org/10.1007/978-1-4615-7981-6rallel implementation of image-understanding algorithms. Aerial image understanding is investigated as an application. The system is designed to exploit temporal and spatial parallelism. A good speed-up was obtained for low- and intermediate-level operations. However, the speed-up for high-level ope
作者: 除草劑    時(shí)間: 2025-3-22 01:35

作者: 卵石    時(shí)間: 2025-3-22 08:17
https://doi.org/10.1007/978-1-4615-7981-6p visibility computations parallel or distributed-computing techniques can be used. Recent research demonstrates that scanline algorithms are suitable for balancing the workload and reducing the communication overhead of multiprocessor architectures. This paper summarizes known scanline algorithms a
作者: 使?jié)M足    時(shí)間: 2025-3-22 12:40
J. A. Zasadzinski,L. E. Scriven,H. T. Davisis based on stochastic optimization using a modified least squares method for the identification of communication and performance parameters. The model of computation involves a server distributing tasks to clients. The goal of the optimization is to reduce execution time by the clients. The costs o
作者: 鴿子    時(shí)間: 2025-3-22 16:26
Viscosity of Microemulsion Versus Salinityassic problems in computer graphics. In order to solve the problem quickly, many authors proposed binary space partitioning (BSP) as a preprocessing, possibly breaking up the input line segments so that visibility is determined in time linear in the number of resulting segments. Tóth [Discrete & Com
作者: 鴿子    時(shí)間: 2025-3-22 20:54
Phase Separation in Microemulsionsre ., but his own cannot authenticate this signature . was indeed produced by himself. To address it, in this work, we extend ring signature notion to present a novel scheme: ring signature scheme with self-authenticating which can authenticate that a member possesses a signature’s ownership. To imp
作者: concubine    時(shí)間: 2025-3-22 21:33

作者: 重力    時(shí)間: 2025-3-23 03:26

作者: 任命    時(shí)間: 2025-3-23 08:04
H. H. Mantsch,P. W. Yang,P. T. T. Wonglt to be detected. In order to cope with these problems, there have been many researches on the defense mechanisms including various DDoS detection mechanisms..SVM is suitable for attack detection since it is a binary classification method. However, it is not appropriate to classify attack categorie
作者: doxazosin    時(shí)間: 2025-3-23 13:20
H. Gutman,G. Arvidson,K. Fontell,G. Lindblomvironment. However, as the number of iteration and the interleaver size are increased, it is required much delay and computation for iterative decoding. Therefore, it is important to devise an efficient criterion to stop the iteration process and prevent unnecessary computations and decoding delay.
作者: 頭盔    時(shí)間: 2025-3-23 17:40
P. Stenius,H. Palonen,G. Str?m,L. ?dbergt Card life time. And, it approaches a file and against at the time when it controls a data the dependence degree is high very. Rankle and Effing suggested atomic operations which are based on the idea that when data is stored in an EEPROM, data must never be written only partially. Efficient design
作者: helper-T-cells    時(shí)間: 2025-3-23 20:57
H. Gutman,G. Arvidson,K. Fontell,G. Lindblomin this system agents are distributed, it can reduce network delay and network load, and each agent can operate independently. Agents can also be easily added or deleted. In this paper we propose an enhanced design of mobile agent based intrusion detection system using Hidden Markov Model algorithm
作者: 溫室    時(shí)間: 2025-3-24 02:03

作者: 毛細(xì)血管    時(shí)間: 2025-3-24 03:36
Molecular Modelling of Micellar Solutionssed as a sub-protocol compare to the case that when it is used as a standalone protocol. To fix such problems, in this paper, we propose a verifiable Non-interactive OT protocol that reduces the network traffic and computational complexity by preprocessing the necessary computations when the network
作者: NEEDY    時(shí)間: 2025-3-24 08:45
Stig E. Friberg,Zhuning Ma,Linda Rheintacks through the Internet are possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Key Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for re
作者: Canyon    時(shí)間: 2025-3-24 12:27
Recovery of Oil Using Surfactant-Based Foamsion Protocol), it is necessary to develop test scenario, test environment and adaptation test technology for security test of the system. In this paper, we design and implement security test environment and test program for SIP. This system also can be used as a fundamental system when someone devel
作者: 壕溝    時(shí)間: 2025-3-24 16:04

作者: AGATE    時(shí)間: 2025-3-24 22:57
Pooya Khodaparast,Kristian Jessenby incident. The main idea is that the first investigator who collects a volatile data by applying scripts built in USB media should be in crime scene at the time. In according to volatile data, he generates hash value, and gets witness signature. After that, he analyses the volatile data with authe
作者: CHANT    時(shí)間: 2025-3-25 03:13
Abhijit Kakati,Jitendra S. Sangwaiin Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail, and acquires personal information which is sensitive and financial information. This study propo
作者: 追蹤    時(shí)間: 2025-3-25 04:16

作者: Heterodoxy    時(shí)間: 2025-3-25 07:42

作者: antidote    時(shí)間: 2025-3-25 12:21

作者: 打折    時(shí)間: 2025-3-25 17:11

作者: 圣人    時(shí)間: 2025-3-25 20:32

作者: Enervate    時(shí)間: 2025-3-26 01:15

作者: 感情    時(shí)間: 2025-3-26 04:51
Security and Test Environment for SIPion Protocol), it is necessary to develop test scenario, test environment and adaptation test technology for security test of the system. In this paper, we design and implement security test environment and test program for SIP. This system also can be used as a fundamental system when someone develops a communication system based on SIP.
作者: 阻撓    時(shí)間: 2025-3-26 10:52

作者: legitimate    時(shí)間: 2025-3-26 14:06

作者: Embolic-Stroke    時(shí)間: 2025-3-26 19:37
Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave Propagations are computationally expensive in terms of processing time. Recently, we develop a method, High Speed Low Order FDTD (HSLO-FDTD) that is proven to solve one dimensional electromagnetic problem with a reduction of 67% of processing time from the FDTD method. In this paper, we extend the method to so
作者: 感激小女    時(shí)間: 2025-3-26 22:07
Visibility Computations – Scanline Algorithms and Techniquesp visibility computations parallel or distributed-computing techniques can be used. Recent research demonstrates that scanline algorithms are suitable for balancing the workload and reducing the communication overhead of multiprocessor architectures. This paper summarizes known scanline algorithms a
作者: ensemble    時(shí)間: 2025-3-27 02:43

作者: CESS    時(shí)間: 2025-3-27 07:04
Determining the Visibility of a Planar Set of Line Segments in , Timeassic problems in computer graphics. In order to solve the problem quickly, many authors proposed binary space partitioning (BSP) as a preprocessing, possibly breaking up the input line segments so that visibility is determined in time linear in the number of resulting segments. Tóth [Discrete & Com
作者: 使高興    時(shí)間: 2025-3-27 10:10

作者: DEMN    時(shí)間: 2025-3-27 14:59

作者: Leaven    時(shí)間: 2025-3-27 18:39
Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines kinds. Confidence in its ability to provide adequate authentication is, however, waning. This is largely due to the wrongful use of passwords by many users. In this paper, the design and development of keystroke pressure-based typing biometrics for individual user’s verification which based on the
作者: Friction    時(shí)間: 2025-3-27 22:39
An Attack Classification Mechanism Based on Multiple Support Vector Machineslt to be detected. In order to cope with these problems, there have been many researches on the defense mechanisms including various DDoS detection mechanisms..SVM is suitable for attack detection since it is a binary classification method. However, it is not appropriate to classify attack categorie
作者: indices    時(shí)間: 2025-3-28 03:32
An Efficient Iteration Decoding Stopping Criterion for Turbo Codesvironment. However, as the number of iteration and the interleaver size are increased, it is required much delay and computation for iterative decoding. Therefore, it is important to devise an efficient criterion to stop the iteration process and prevent unnecessary computations and decoding delay.
作者: Juvenile    時(shí)間: 2025-3-28 09:26

作者: peak-flow    時(shí)間: 2025-3-28 12:13

作者: 領(lǐng)先    時(shí)間: 2025-3-28 14:53

作者: left-ventricle    時(shí)間: 2025-3-28 20:57

作者: 植物群    時(shí)間: 2025-3-28 23:51
An Access Control Using SPKI Certificate in Peer-to-Peer Environmenttacks through the Internet are possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Key Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for re
作者: 細(xì)胞學(xué)    時(shí)間: 2025-3-29 06:08

作者: 知識(shí)    時(shí)間: 2025-3-29 10:40
Simulation Based Nodal Analysis for Effects Based Operationswever, there is no targeting system to support EBO based on scientific nodal analysis, which is the central factor for EBO execution, in Korea Military. In this situation, this paper, the study on targeting methodology, suggests ’SBNA(Simulation Based Nodal Analysis) plan’ to Korea Military for the
作者: Infuriate    時(shí)間: 2025-3-29 12:59
A Stable Evidence Collection Procedure of a Volatile Data in Researchby incident. The main idea is that the first investigator who collects a volatile data by applying scripts built in USB media should be in crime scene at the time. In according to volatile data, he generates hash value, and gets witness signature. After that, he analyses the volatile data with authe
作者: STIT    時(shí)間: 2025-3-29 19:13

作者: Gustatory    時(shí)間: 2025-3-29 19:47
Computational Science and Its Applications - ICCSA 2007International Confer
作者: Salivary-Gland    時(shí)間: 2025-3-30 02:25

作者: municipality    時(shí)間: 2025-3-30 07:44

作者: nonchalance    時(shí)間: 2025-3-30 10:24

作者: 清晰    時(shí)間: 2025-3-30 15:54

作者: 起波瀾    時(shí)間: 2025-3-30 20:11

作者: Indurate    時(shí)間: 2025-3-30 23:01
Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networksng cache to identify the misbehaving nodes. The suggested scheme decreases the number of hops to make up routing path in comparison with the existing one, and exclude malicious nodes from route establishment process.
作者: 芳香一點(diǎn)    時(shí)間: 2025-3-31 01:19
A Design of Fair Blind Signatures Protocol Using PVNIOT traffic is low. The proposed protocol uses third root mechanism instead of square root mechanism that is used for the Fiat-Shamir signature mechanism and also uses 1-out-of-2 oblivious transfer based on signature mechanism. We also analyze the proposed protocol by comparing to the Lein Harn, VNIOT protocols.
作者: 背信    時(shí)間: 2025-3-31 07:10
https://doi.org/10.1007/978-1-4615-7981-6rations was poor because of processor idle times, as the number of objects to be processed at higher level tends to be small. DSPs performed well as processing elements for number-crunching operations, but the performance was not so good for implementing symbolic operations.
作者: 定點(diǎn)    時(shí)間: 2025-3-31 13:09
E. Geladé,A. Verbeeck,F. C. De Schryverlve two dimensional wave propagation problem. Since the problem is large, we develop the parallel version of HSLO-FDTD method on distributed memory multiprocessor machine using message-passing interface. We examine the parallelism efficiency of the algorithm by analyzing the execution time and speed-up.
作者: 蚊帳    時(shí)間: 2025-3-31 16:28

作者: Infinitesimal    時(shí)間: 2025-3-31 18:57
H. Gutman,G. Arvidson,K. Fontell,G. LindblomIn this paper, we propose a new stop criterion for decoding turbo codes. It is verifying that the proposal iterative decoding stop criterion can be reduced the average iterative decoding number compared to conventional schemes with a negligible degradation of the error performance.
作者: frozen-shoulder    時(shí)間: 2025-4-1 00:45

作者: Neuralgia    時(shí)間: 2025-4-1 02:01
On Polymer/Surfactant Interactionng cache to identify the misbehaving nodes. The suggested scheme decreases the number of hops to make up routing path in comparison with the existing one, and exclude malicious nodes from route establishment process.
作者: AGONY    時(shí)間: 2025-4-1 07:41
Molecular Modelling of Micellar Solutions traffic is low. The proposed protocol uses third root mechanism instead of square root mechanism that is used for the Fiat-Shamir signature mechanism and also uses 1-out-of-2 oblivious transfer based on signature mechanism. We also analyze the proposed protocol by comparing to the Lein Harn, VNIOT protocols.
作者: infinite    時(shí)間: 2025-4-1 10:43
J. A. Zasadzinski,L. E. Scriven,H. T. Davisl of computation involves a server distributing tasks to clients. The goal of the optimization is to reduce execution time by the clients. The costs of getting the task from the server, execution of the task and sending the results back are estimated; and the scheduling is based on adaptive division of work (input for the clients) into blocks.
作者: generic    時(shí)間: 2025-4-1 15:25
Stig E. Friberg,Zhuning Ma,Linda RheinSPKI (Simple Public Key Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own right.
作者: 深淵    時(shí)間: 2025-4-1 21:15





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
保山市| 楚雄市| 江北区| 高雄市| 舒城县| 溧阳市| 宁陕县| 杭锦后旗| 武邑县| 伊川县| 萨迦县| 南宫市| 正镶白旗| 大荔县| 赤水市| 曲水县| 道真| 宣武区| 娱乐| 大理市| 北辰区| 中超| 和林格尔县| 宿松县| 焦作市| 北安市| 甘泉县| 日照市| 彭阳县| 柳州市| 东乡县| 育儿| 遂平县| 卓尼县| 望城县| 黄平县| 安多县| 辛集市| 安泽县| 温州市| 广元市|