標(biāo)題: Titlebook: Computational Science and Its Applications – ICCSA 2009; International Confer Osvaldo Gervasi,David Taniar,Marina L. Gavrilova Conference p [打印本頁(yè)] 作者: monster 時(shí)間: 2025-3-21 16:10
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009影響因子(影響力)
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009被引頻次
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009被引頻次學(xué)科排名
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009年度引用
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009年度引用學(xué)科排名
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009讀者反饋
書(shū)目名稱(chēng)Computational Science and Its Applications – ICCSA 2009讀者反饋學(xué)科排名
作者: perimenopause 時(shí)間: 2025-3-21 23:28
Results of Gastric Reduction Surgery,r modification makes EKE-M resistant to the attack. However, the claim turned out to be untrue. In the current paper, we demonstrate this by showing that Byun et al.’s modified EKE-M is still vulnerable to an undetectable on-line dictionary attack. Besides reporting our attack, we also figure out wh作者: faultfinder 時(shí)間: 2025-3-22 02:23
Charles B. Mikell III,Joseph S. Neimat the STBC-UWB system can be substantially improved by increasing the number of iterations in the decoding process for a fixed code rate. Also, it is confirmed that the double binary turbo coding and STBC schemes are very effective in increasing the number of simultaneous users for a given bit error 作者: concert 時(shí)間: 2025-3-22 05:49
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NATlanguage for firewall ACLs, AFPL2, covering most features other languages do not cover, is proposed. The language is then used as the platform independent meta-model, the first part of the MDA-based framework.作者: exceptional 時(shí)間: 2025-3-22 08:42
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwordsr modification makes EKE-M resistant to the attack. However, the claim turned out to be untrue. In the current paper, we demonstrate this by showing that Byun et al.’s modified EKE-M is still vulnerable to an undetectable on-line dictionary attack. Besides reporting our attack, we also figure out wh作者: Amnesty 時(shí)間: 2025-3-22 16:36 作者: Amnesty 時(shí)間: 2025-3-22 18:47
Computational Science and Its Applications – ICCSA 2009International Confer作者: dragon 時(shí)間: 2025-3-22 21:34
Ontology-Based Requirements Conflicts Analysis in Activity Diagrams for modeling process behaviors of systems. This paper utilizes ontological approach to analyze conflicts in the requirement specifications of activity diagrams. The proposed conflicts analysis method includes a modeling process and a set of conflicts detection rules. Several scenarios of electronic作者: 作繭自縛 時(shí)間: 2025-3-23 01:49 作者: gerrymander 時(shí)間: 2025-3-23 07:33 作者: Explicate 時(shí)間: 2025-3-23 13:15
Towards Guidelines for a Development Process for Component-Based Embedded Systemsdevelopment processes need to be changed to best utilize the component-based paradigm, and how processes and technologies must be designed to support each other. To facilitate this change towards component-based embedded software, this paper presents a set of process guidelines, named the Progress P作者: exostosis 時(shí)間: 2025-3-23 15:51 作者: 車(chē)床 時(shí)間: 2025-3-23 18:43
Weyuker’s Properties, Language Independency and Object Oriented Metricsarchers have used these properties to evaluate object oriented metrics although the object-oriented (OO) features are entirely different in nature. In this paper, we evaluate each of Weyuker’s properties for its effective evaluation and relevance for OO metrics. In addition, we evaluate eleven OO me作者: 勾引 時(shí)間: 2025-3-24 00:07 作者: 不持續(xù)就爆 時(shí)間: 2025-3-24 03:11 作者: Campaign 時(shí)間: 2025-3-24 09:57 作者: 細(xì)胞 時(shí)間: 2025-3-24 13:55
Testing Topologies for the Evaluation of IPSEC Implementationsn gaining ground and, at present, is the solution more used for this purpose. That is the reason why a large number of implementations of IPSEC have been created and put into operation. This work proposes three testing topologies to carry out IPSEC implementation assessment, each of these scenarios 作者: 獸皮 時(shí)間: 2025-3-24 18:00
Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recoveryating through short distance connections (Wi-Fi or Bluetooth). To protect the exchange of messages, our work describes a payment protocol centered in the client which applies digital signature with recovery using self-certified public keys. Additionally, security aspects have been analyzed and proto作者: UNT 時(shí)間: 2025-3-24 19:35
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multiwork reviews Liu et al,’s scheme and provides a security analysis on the scheme. Our analysis shows that Liu et al.’s scheme does not achieve its fundamental goal not only of mutual authentication bur also of password security. We demonstrate these by mounting a user impersonation attack and an off-作者: 極肥胖 時(shí)間: 2025-3-25 01:29 作者: myalgia 時(shí)間: 2025-3-25 06:21 作者: BARGE 時(shí)間: 2025-3-25 09:51
A Practical Approach to a Reliable Electronic Electiononic voting scheme involving issuing a receipt based on the cut-and-choose mechanism. Compared with Chaum ..’s scheme[3], this scheme does not require large amounts of physical ballots and trust assumptions on tellers. Furthermore, it is as efficient and user-friendly as any of the existing electron作者: 改正 時(shí)間: 2025-3-25 15:03 作者: impale 時(shí)間: 2025-3-25 18:48 作者: 提名的名單 時(shí)間: 2025-3-25 20:37
Gastrectomy with D3 Lymph Node Dissection this paper, we evaluate each of Weyuker’s properties for its effective evaluation and relevance for OO metrics. In addition, we evaluate eleven OO metrics against language independency and additive property. A set of additional properties for object oriented metrics are also summarized in this paper.作者: llibretto 時(shí)間: 2025-3-26 03:45 作者: Assignment 時(shí)間: 2025-3-26 06:28 作者: 巡回 時(shí)間: 2025-3-26 10:21
Psychosocial Aspects of Low Back Painamental goal not only of mutual authentication bur also of password security. We demonstrate these by mounting a user impersonation attack and an off-line password guessing attack, respectively, on Liu et al.’s scheme.作者: molest 時(shí)間: 2025-3-26 14:09
Gastric Operations: General Principles,sing biometric information which provides mutual authentication but only requires symmetric cryptographic operations. This paper proposes a new protocol which is best suitable in pervasive computing environments thus providing efficiency in number of rounds, forward secrecy and security against known-key attack.作者: 敲竹杠 時(shí)間: 2025-3-26 19:39 作者: 切割 時(shí)間: 2025-3-26 22:44 作者: 死亡率 時(shí)間: 2025-3-27 04:47 作者: 清洗 時(shí)間: 2025-3-27 06:40
Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recoverythe client which applies digital signature with recovery using self-certified public keys. Additionally, security aspects have been analyzed and protocol implementation specifications have been presented.作者: gout109 時(shí)間: 2025-3-27 11:53
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multiamental goal not only of mutual authentication bur also of password security. We demonstrate these by mounting a user impersonation attack and an off-line password guessing attack, respectively, on Liu et al.’s scheme.作者: GIDDY 時(shí)間: 2025-3-27 13:38 作者: 曲解 時(shí)間: 2025-3-27 18:29
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Keyrovable security, the protocol is in fact insecure in the presence of an active adversary. In this paper, we present the imperfection of Shi et al.’s protocol and suggest modifications to the protocol which would resolve the problem.作者: 骯臟 時(shí)間: 2025-3-28 01:12
Radiologic Diagnosis (CT, MRI, & PET-CT)rocess Guidelines (PPG), which is based on the structure of CMMI. This paper presents the structure of the PPG, and presents and analyzes the PPG parts which most closely relate to system verification, which is typically an important and difficult activity for embedded software.作者: Pamphlet 時(shí)間: 2025-3-28 03:24 作者: 晚來(lái)的提名 時(shí)間: 2025-3-28 08:24 作者: extrovert 時(shí)間: 2025-3-28 11:54
Gastrectomy with D3 Lymph Node Dissectiones in remote teams with considerations of the dependencies and constraints. In this paper, we propose an approach that can be used to reduce the overall time of GSD project development by allocating the tasks to the best possible resources based on an integrated analysis of the constraints and their impact on the overall product development.作者: Nonporous 時(shí)間: 2025-3-28 16:48
Geriatric Elbow Fractures and Dislocations,g voter’s voting process. This scheme is provably secure under the fact that the ElGamal encryption cryptosystem is semantically secure. We implemented the proposed scheme in according to the defined implementation requirement and provide the security analysis of the scheme.作者: 巨大沒(méi)有 時(shí)間: 2025-3-28 20:38
Ontology-Based Requirements Conflicts Analysis in Activity Diagramsovides systematic steps for modeling requirements and ontologies. (2) This method also offers a set of questions for facilitating requirements elicitation about activity diagrams. (3) The proposed rules can systematically assist in requirements conflicts detection.作者: 咆哮 時(shí)間: 2025-3-29 02:33 作者: 清晰 時(shí)間: 2025-3-29 03:27
A Practical Approach to a Reliable Electronic Electiong voter’s voting process. This scheme is provably secure under the fact that the ElGamal encryption cryptosystem is semantically secure. We implemented the proposed scheme in according to the defined implementation requirement and provide the security analysis of the scheme.作者: annexation 時(shí)間: 2025-3-29 10:46 作者: 圍裙 時(shí)間: 2025-3-29 13:08
Nieun Seo,Joon Seok Lim,Arthur Cho projects in the most effective way. Here, we present a set of qualities for a good project leader in software engineering. In addition to that, we also demonstrate how cognitive and ethical issues affect leadership qualities.作者: Mitigate 時(shí)間: 2025-3-29 19:03
Verification of Use Case with Petri Nets in Requirement Analysiss. After specifying the scenarios, each of them can be transformed into its correspondent Petri-net model. Through analyzing these Petri-net models, some flaws or errors of requirements can be detected. The proposed approach is demonstrated by an E-mail client system.作者: URN 時(shí)間: 2025-3-29 23:01 作者: 責(zé)怪 時(shí)間: 2025-3-30 03:55
Towards Guidelines for a Development Process for Component-Based Embedded Systemsrocess Guidelines (PPG), which is based on the structure of CMMI. This paper presents the structure of the PPG, and presents and analyzes the PPG parts which most closely relate to system verification, which is typically an important and difficult activity for embedded software.作者: 免費(fèi) 時(shí)間: 2025-3-30 06:48 作者: 精致 時(shí)間: 2025-3-30 11:40 作者: 徹底檢查 時(shí)間: 2025-3-30 13:29 作者: BUOY 時(shí)間: 2025-3-30 16:32
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/232977.jpg作者: 遺棄 時(shí)間: 2025-3-31 00:47 作者: 十字架 時(shí)間: 2025-3-31 03:22 作者: CANDY 時(shí)間: 2025-3-31 08:51 作者: crutch 時(shí)間: 2025-3-31 11:49 作者: Glucose 時(shí)間: 2025-3-31 14:00
Nieun Seo,Joon Seok Lim,Arthur Choer team to success. There is a common notion among software specialists that the more complex a project manager thinks, the better his leadership is. In this paper, we discuss the significance of simple thinking in project leadership. If the leader thinks in a simple way, then the risk of being suff作者: OREX 時(shí)間: 2025-3-31 18:25 作者: 外露 時(shí)間: 2025-4-1 00:14 作者: 治愈 時(shí)間: 2025-4-1 03:34 作者: 現(xiàn)暈光 時(shí)間: 2025-4-1 09:32
Christine Cedraschi,Valérie Piguetm has its own low-level language with a different functionality, syntax, and development environment. Although several high-level languages have been proposed to model firewall access control policies, none of them has been widely adopted by the industry due to a combination of factors: high complex作者: perimenopause 時(shí)間: 2025-4-1 14:14 作者: 航海太平洋 時(shí)間: 2025-4-1 18:22 作者: puzzle 時(shí)間: 2025-4-1 19:23 作者: 不適 時(shí)間: 2025-4-1 23:52 作者: 接觸 時(shí)間: 2025-4-2 04:36 作者: LEER 時(shí)間: 2025-4-2 08:26 作者: 場(chǎng)所 時(shí)間: 2025-4-2 13:52 作者: 同步左右 時(shí)間: 2025-4-2 16:52
Charles B. Mikell III,Joseph S. Neimat coding is analyzed and simulated in multi-user environments. The channel model is considered as a modified Saleh and Valenzuela (SV) model which was suggested as a UWB indoor channel model by the IEEE 802.15.SG3a in July 2003. In order to apply the STBC scheme to the UWB system considered in this p作者: 最高峰 時(shí)間: 2025-4-2 21:15
A Grid Implementation of Chimere: Ozone Production in Central Italyed by specific interfaces built by the authors, adaptating meteo, emissions and boundary conditions data provided by different agencies to the needs of the Model. A prototype grid implementation on a segment of the EGEE Grid has been performed. Preliminary results of an application to the Umbria Region ozone production are also presented.