標(biāo)題: Titlebook: Computational Science and Its Applications – ICCSA 2021; 21st International C Osvaldo Gervasi,Beniamino Murgante,Carmelo Maria T Conference [打印本頁] 作者: MAXIM 時(shí)間: 2025-3-21 17:03
書目名稱Computational Science and Its Applications – ICCSA 2021影響因子(影響力)
書目名稱Computational Science and Its Applications – ICCSA 2021影響因子(影響力)學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2021網(wǎng)絡(luò)公開度
書目名稱Computational Science and Its Applications – ICCSA 2021網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2021被引頻次
書目名稱Computational Science and Its Applications – ICCSA 2021被引頻次學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2021年度引用
書目名稱Computational Science and Its Applications – ICCSA 2021年度引用學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2021讀者反饋
書目名稱Computational Science and Its Applications – ICCSA 2021讀者反饋學(xué)科排名
作者: 不規(guī)則 時(shí)間: 2025-3-21 22:29
0302-9743 ications, ICCSA 2021, which was held in Cagliari, Italy, during September 13 – 16, 2021. The event was organized in a hybrid mode due to the Covid-19 pandemic.The 466 full and 18 short papers presented in these proceedings were carefully reviewed and selected from 1588 submissions. Part VIII of the 作者: conformity 時(shí)間: 2025-3-22 02:24 作者: FLOAT 時(shí)間: 2025-3-22 07:10 作者: legitimate 時(shí)間: 2025-3-22 10:38
Schreibblockaden waren gestern!res to protect personal data. GDPR addresses a clear need of our social network-based society, but has the side effect of outlining the incapability of many actual enterprises, especially small and medium ones, to address such new requirements. In this paper the new Regulation is described with a conceptual map approach.作者: NOVA 時(shí)間: 2025-3-22 12:57 作者: NOVA 時(shí)間: 2025-3-22 19:43
Privacy-Preserving Access for?Multi-Access Edge Computing (MEC) Applicationsate a system model based on this scenario, then define the adversary model and privacy requirements for this system model. Second, we introduce a privacy-preserving access solution for the system model and analyze the solution against the privacy requirements.作者: 大方不好 時(shí)間: 2025-3-22 23:47 作者: 沙發(fā) 時(shí)間: 2025-3-23 04:54 作者: Tractable 時(shí)間: 2025-3-23 06:18
Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymizs that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but there are situations in which stored information must be deleted or made inaccessible on request or p作者: 無能性 時(shí)間: 2025-3-23 11:04
Vehicle-to-Everything (V2X) Communication Scenarios for Vehicular Ad-hoc Networking (VANET): An?Overve you fast, comprehensive, and easy access to all of the existing approaches in the field. With this inspiration, and the effect of traffic congestion as a challenging issue that affects the regular daily lives of millions of people around the world, in this work, we concentrate on communications p作者: 瘙癢 時(shí)間: 2025-3-23 17:35 作者: Fulsome 時(shí)間: 2025-3-23 19:59
Privacy-Preserving Access for?Multi-Access Edge Computing (MEC) Applicationscy for applications and reduced load in the transport network. This paper is about user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the Mobile Network Operator (MNO). First, we cre作者: convulsion 時(shí)間: 2025-3-23 22:29
A Conceptual Model for the General Data Protection Regulationting personal data. Accordingly, in recent years, governments are going to define and apply new rules, that aims at protecting the personal space of each individual. From 2018, General Data protection Regulation (GDPR) applies in Europe, giving specific rights to each individual and imposing procedu作者: infinite 時(shí)間: 2025-3-24 05:23
Toward a Design of Blood Donation Management by Blockchain Technologiesreasing a lot. In most countries, blood quality and origin are managed by blood management information systems, such as national institutions. However, the existing system lacks limitations in that it lacked detailed blood information, which causes difficulties in managing blood quality, supply, and作者: Water-Brash 時(shí)間: 2025-3-24 09:07 作者: Hearten 時(shí)間: 2025-3-24 13:34 作者: 忘川河 時(shí)間: 2025-3-24 17:20 作者: 比賽用背帶 時(shí)間: 2025-3-24 20:40
Multi-instrumental Analysis of the Extreme Meteorological Event Occurred in Matera (Italy) on Novembuently, part of the existing cultural heritage on the national territory is located in areas subject to flood risk, which compromises the accessibility, preservation and integrity of cultural heritage. As an example, we consider a single flood event that occurred in southern Italy on November 11th a作者: Eeg332 時(shí)間: 2025-3-25 01:28
Resilient Improvement of Historic Districts via Digital Tools. The Virtualization of Energy Retrofitch environmental processes are part of the main challenges in scientific, technical and administrative fields. On the other hand, the increasing endorsement of IT expertise and tools in traditional processes offers the opportunity to manage specific knowledge and relations using Digital Models. As u作者: Misgiving 時(shí)間: 2025-3-25 04:57 作者: opinionated 時(shí)間: 2025-3-25 07:45
Discounting for Economic Analysis of Long-Lived and Short-Lived Water Resource Investmentsevaluation results. These are projects that commonly involve the use of unique and irreplaceable natural sites, often with potentially irreversible consequences and considerable effects on the community. Therefore, in the analyses it is of absolute importance to give the right “weight” to costs and 作者: 碎片 時(shí)間: 2025-3-25 12:31
Energy Efficiency in the Management of the Integrated Water Service. A Case Study on the White Certi end-use through energy efficiency improvement measures and projects. Electricity and natural gas distributors (obliged parties) can achieve their energy efficiency improvement targets either by implementing energy efficiency projects (and earning TEEs) or by purchasing TEEs from other parties. Volu作者: 豪華 時(shí)間: 2025-3-25 17:18
Water and Land Value in Italyact on its value..Irrigation water is not just a factor of production but its availability has generated new territorial systems, significantly different from those that would have developed in its absence; subsequently, these systems have evolved from traditional agricultural to industrial and tert作者: 運(yùn)氣 時(shí)間: 2025-3-25 22:24 作者: Capitulate 時(shí)間: 2025-3-26 03:38 作者: Harrowing 時(shí)間: 2025-3-26 05:58 作者: 思想靈活 時(shí)間: 2025-3-26 08:44
Pers?nlichkeit und Schreibprobleme encryption, transport-level encryption, intrusion detection systems) to prevent or detect attacks. Yet these hardening measures do little to face even worse threats posed on .. Solutions such as Homomorphic Encryption (HE) and hardware-assisted Trusted Execution Environment (TEE) are nowadays among作者: Freeze 時(shí)間: 2025-3-26 13:55 作者: absolve 時(shí)間: 2025-3-26 20:33 作者: expdient 時(shí)間: 2025-3-27 00:18
https://doi.org/10.1007/978-3-662-63895-8reasing a lot. In most countries, blood quality and origin are managed by blood management information systems, such as national institutions. However, the existing system lacks limitations in that it lacked detailed blood information, which causes difficulties in managing blood quality, supply, and作者: LASH 時(shí)間: 2025-3-27 03:04 作者: 攀登 時(shí)間: 2025-3-27 07:44 作者: 攤位 時(shí)間: 2025-3-27 09:38 作者: 強(qiáng)壯 時(shí)間: 2025-3-27 16:01 作者: 騎師 時(shí)間: 2025-3-27 19:26
Leaving Earth: From Dreams to Reality?,ch environmental processes are part of the main challenges in scientific, technical and administrative fields. On the other hand, the increasing endorsement of IT expertise and tools in traditional processes offers the opportunity to manage specific knowledge and relations using Digital Models. As u作者: 擁護(hù) 時(shí)間: 2025-3-27 22:50 作者: grudging 時(shí)間: 2025-3-28 04:55
https://doi.org/10.1007/978-0-387-74635-7evaluation results. These are projects that commonly involve the use of unique and irreplaceable natural sites, often with potentially irreversible consequences and considerable effects on the community. Therefore, in the analyses it is of absolute importance to give the right “weight” to costs and 作者: 宿醉 時(shí)間: 2025-3-28 06:27 作者: babble 時(shí)間: 2025-3-28 11:40 作者: hieroglyphic 時(shí)間: 2025-3-28 15:22
Roger-Maurice Bonnet,Lodewijk Woltjer the aqueduct network has several advantages for water service operators, such as reducing the production and distribution costs of the resource, limiting the volumes of water purchased wholesale, and improving the users’ perception of the service. The aim of the paper is to define an econometric mo作者: fender 時(shí)間: 2025-3-28 20:25 作者: antedate 時(shí)間: 2025-3-28 23:47
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233027.jpg作者: 懶惰民族 時(shí)間: 2025-3-29 06:10 作者: GROSS 時(shí)間: 2025-3-29 09:51 作者: ASTER 時(shí)間: 2025-3-29 14:00
Computational Science and Its Applications – ICCSA 202121st International C作者: 眨眼 時(shí)間: 2025-3-29 18:26
Osvaldo Gervasi,Beniamino Murgante,Carmelo Maria T作者: PHIL 時(shí)間: 2025-3-29 19:57
Vehicle-to-Everything (V2X) Communication Scenarios for Vehicular Ad-hoc Networking (VANET): An?Overto-Infrastructure (V2I) and Vehicle-to-Network (V2N) and Vehicle-to-Pedestrian (V2P). In general, these four scenarios are included in the category of vehicle-to-everything (V2X). Therefore, in this paper, we provide an overview of the most important scenarios of V2X communications based on their ch作者: mighty 時(shí)間: 2025-3-30 01:21
Privacy-Preserving Credit Scoring via?Functional Encryptionm. Despite such a solution offers strong security guarantees, it is constrained by having to trust Intel and by the SGX hardware extension availability. In this paper, we evaluate a new frontier for ., i.e., performing privacy-preserving credit risk scoring via an emerging cryptographic scheme: ., w作者: 無禮回復(fù) 時(shí)間: 2025-3-30 04:15 作者: 瑣事 時(shí)間: 2025-3-30 11:22 作者: giggle 時(shí)間: 2025-3-30 13:38
Knowledge and Big Data: New Approaches to the Anamnesis and Diagnosis of the Architectural Heritage’ion work on historic buildings..Digital systematization therefore represents an urgent priority not only for the dissemination of cultural contents but, especially, for the executive guarantee of correct interventions on the Heritage in accordance with the provisions dictated by the national protect作者: GULLY 時(shí)間: 2025-3-30 18:18
Built Environments Prone to Sudden and Slow Onset Disasters: From Taxonomy Towards Approaches for Peand Virtual Tour based, supports analytical and parametric simulations and pervasive training, respectively. This last objective can be perceived through smart and inclusive Digital solutions, mostly shared via web applications, to reach a wider audience.作者: 采納 時(shí)間: 2025-3-30 22:21 作者: 他一致 時(shí)間: 2025-3-31 02:07 作者: gangrene 時(shí)間: 2025-3-31 06:47 作者: 腐爛 時(shí)間: 2025-3-31 11:14
Discounting for Economic Analysis of Long-Lived and Short-Lived Water Resource Investmentstions with a useful life of 30?years or more; (ii) a declining dual discounting approach for investment decisions with very long lifespan. The main novelty is the introduction in the logical-mathematical structure of the SDR of the environmental quality, expressed as a function of the Water Resource作者: Afflict 時(shí)間: 2025-3-31 16:14