派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computer Science and Convergence; CSA 2011 & WCC 2011 James J. (Jong Hyuk) Park,Han-Chieh Chao,Jongsung Conference proceedings 2012 Sprin [打印本頁]

作者: eternal    時(shí)間: 2025-3-21 17:45
書目名稱Computer Science and Convergence影響因子(影響力)




書目名稱Computer Science and Convergence影響因子(影響力)學(xué)科排名




書目名稱Computer Science and Convergence網(wǎng)絡(luò)公開度




書目名稱Computer Science and Convergence網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Science and Convergence被引頻次




書目名稱Computer Science and Convergence被引頻次學(xué)科排名




書目名稱Computer Science and Convergence年度引用




書目名稱Computer Science and Convergence年度引用學(xué)科排名




書目名稱Computer Science and Convergence讀者反饋




書目名稱Computer Science and Convergence讀者反饋學(xué)科排名





作者: 虛弱    時(shí)間: 2025-3-21 23:53
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/c/image/233784.jpg
作者: inclusive    時(shí)間: 2025-3-22 03:00
https://doi.org/10.1007/978-94-007-2792-2Artificial intelligence; Data mining; Dependable computing; Embedded systems; Grid computing; Mobile and
作者: 五行打油詩    時(shí)間: 2025-3-22 05:28
978-94-017-7922-7Springer Science+Business Media B.V. 2012
作者: CHOIR    時(shí)間: 2025-3-22 09:31

作者: Optometrist    時(shí)間: 2025-3-22 14:56
High Attack Cost: Hash Based RFID Tag Mutual Authentication Protocolity problems are obstructing their diffusion. This paper proposes hash-based RFID tag mutual authentication protocol to solve these security problems of RFID systems. The proposed protocol is designed to demand high cost of acquiring the tag information from attackers.
作者: Optometrist    時(shí)間: 2025-3-22 18:30

作者: 愛國(guó)者    時(shí)間: 2025-3-22 23:24
The Cellular Basis of Morphogenesisting requires, and processes the error metric and triangulation by GPU, to improve the rending efficiency of image hardware, and save the running time of CPU. For large terrain data, terrain data are compressed and stored in special method, and dynamically transmitted to graphic hardware according t
作者: archenemy    時(shí)間: 2025-3-23 04:31

作者: urethritis    時(shí)間: 2025-3-23 07:28
The Celtic Revival in Shakespeare‘s Wake and summarize the most important concepts of the documents and help the user to go through the main points of the text faster and make the processing of information much easier. An important class of such systems is the ones that produce extractive summaries. This summary is produced by selecting m
作者: buoyant    時(shí)間: 2025-3-23 11:40

作者: DRILL    時(shí)間: 2025-3-23 17:11

作者: FAZE    時(shí)間: 2025-3-23 21:39
The Celtic Revival in Shakespeare‘s Wakeoverhead occurs at that node, and this may possibly affect the entire network. Also, this causes frequent data loss as there is excessive traffic or as the topology constantly changes. In this paper, VSDR (Visualization Sensing Data Routing) is designed and implemented, which visually shows on a GML
作者: 削減    時(shí)間: 2025-3-23 23:45

作者: Mets552    時(shí)間: 2025-3-24 04:02
The Celtic Revival in Shakespeare‘s Wakeo a different set subject to specific utility and privacy requirements. It is obvious that the distribution of sensitive attributes in original database is domain specific and dependent on the application. Another factor that influences the choice of transformation method is the processing and publi
作者: 縱欲    時(shí)間: 2025-3-24 10:04
https://doi.org/10.1057/9781137027665nd for exploiting the open and vast marked. This pushes the limits for security mechanisms which in general are too rigorous to fully adapt to such a dynamic and heterogeneous environment. Trust mechanisms can supplement the security mechanisms in this situation to reduce the risk by means of truste
作者: 發(fā)炎    時(shí)間: 2025-3-24 13:10
The Celtic Revival in Shakespeare‘s Wake such as NIST primes have a property yields modular reduction algorithms that are significantly fast. However the number of NIST primes are not large enough. In this paper, we further extend the idea of NIST primes. Then we find more primes can provide fast modular reduction computation that NIST pr
作者: 緯度    時(shí)間: 2025-3-24 15:47

作者: Fibroid    時(shí)間: 2025-3-24 22:46
International Political Economy Seriesic policy and to guarantee that all the I-frames of each video stream meet their deadlines. The proposed scheduling algorithms are called .-.-. (lpWDA-MG/lpLDA-MG) and it is an attempt to reduce energy consumption by incorporating the DVS technique while simultaneously supporting multimedia such as
作者: 閑聊    時(shí)間: 2025-3-25 01:58

作者: 結(jié)束    時(shí)間: 2025-3-25 06:02

作者: patella    時(shí)間: 2025-3-25 10:12
https://doi.org/10.1057/9780230595736 be able to recognize the problem and solve it in an optimized time, is in the very near future, and will allow the network to be more flexible, and prevent network operators from making a mistake. The approach described in this paper shows that, by enabling data exchange between different substatio
作者: stroke    時(shí)間: 2025-3-25 14:45

作者: SLING    時(shí)間: 2025-3-25 15:53

作者: Rebate    時(shí)間: 2025-3-25 23:08
The Celtic and Roman Traditions clusters on the ring network model. The routing algorithm mainly considers the remaining energy of nodes and the coverage of the cluster to balance energy consumption in network. Simulation analysis shows that: the routing policy will balance the energy consumption of the network at a large extent
作者: 古文字學(xué)    時(shí)間: 2025-3-26 00:18

作者: OFF    時(shí)間: 2025-3-26 05:27
The Celtic Revival in Shakespeare‘s Wakep record user’s data about location information such as timestamp, GPS information for searched locations. In this paper, we will analyze data generated by famous map applications–Google map, Daum map, Naver map and extract necessary information to assist digital forensic investigations.
作者: RUPT    時(shí)間: 2025-3-26 10:42
https://doi.org/10.1057/9780230595736ity problems are obstructing their diffusion. This paper proposes hash-based RFID tag mutual authentication protocol to solve these security problems of RFID systems. The proposed protocol is designed to demand high cost of acquiring the tag information from attackers.
作者: goodwill    時(shí)間: 2025-3-26 14:38
The Celtic and Roman Traditions clusters on the ring network model. The routing algorithm mainly considers the remaining energy of nodes and the coverage of the cluster to balance energy consumption in network. Simulation analysis shows that: the routing policy will balance the energy consumption of the network at a large extent and greatly extend the network lifetime.
作者: antiandrogen    時(shí)間: 2025-3-26 20:14
Conference proceedings 2012011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs. .CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications?and will
作者: 強(qiáng)有力    時(shí)間: 2025-3-26 23:13

作者: 扔掉掐死你    時(shí)間: 2025-3-27 01:39
Energy-Efficient Multi-Granularity Resource Reservations for Multimedia ServicesMPEG video stream services. We present results to show several features of the proposed algorithms and show the experimental results by comparing with the existing methods that support MPEG4 streams. The experimental results show that the proposed algorithms tremendously reduce energy consumption by 2–50%.
作者: BANAL    時(shí)間: 2025-3-27 05:16
Utilizing Converged Networks for Green Network Operationsthe results show that the converged networks consume less network operation resources compared with non-converged networks and converged networks also perform better when the network operation scale is increased. Some open research issues and the future work are further discussed in the conclusion part of this paper.
作者: creatine-kinase    時(shí)間: 2025-3-27 09:36

作者: 個(gè)阿姨勾引你    時(shí)間: 2025-3-27 16:13
International Political Economy SeriesMPEG video stream services. We present results to show several features of the proposed algorithms and show the experimental results by comparing with the existing methods that support MPEG4 streams. The experimental results show that the proposed algorithms tremendously reduce energy consumption by 2–50%.
作者: WAIL    時(shí)間: 2025-3-27 17:55
The Celtic and Roman Traditionsthe results show that the converged networks consume less network operation resources compared with non-converged networks and converged networks also perform better when the network operation scale is increased. Some open research issues and the future work are further discussed in the conclusion part of this paper.
作者: FECK    時(shí)間: 2025-3-27 23:31
1876-1100 n opportunity for academic and industry professionals to dis.Computer Science and Convergence.?is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the
作者: acrimony    時(shí)間: 2025-3-28 04:49

作者: Aspirin    時(shí)間: 2025-3-28 09:58

作者: anus928    時(shí)間: 2025-3-28 10:33

作者: arrogant    時(shí)間: 2025-3-28 14:36

作者: COLIC    時(shí)間: 2025-3-28 22:05
Extended NIST Prime Family for Efficient Modular Reductionenough. In this paper, we further extend the idea of NIST primes. Then we find more primes can provide fast modular reduction computation that NIST prime family does not support. Our method provides more efficient modular arithmetic than Montgomery algorithm in prime fields that NIST primes does not support.
作者: debouch    時(shí)間: 2025-3-29 02:08
Self-Healing in Smart Distribution Networks Using Data Exchange Model and Reliable Multicast Protocorevent network operators from making a mistake. The approach described in this paper shows that, by enabling data exchange between different substations, and by exploiting substations unused resources, it is possible to obtain a self-healing distribution network in which risks of manual interventions are reduced to minimum.
作者: 陶醉    時(shí)間: 2025-3-29 06:16
https://doi.org/10.1057/9781137027665ation within acceptable risk. Adherence to a DeSPoT policy should ensure that the target fulfills the organizational level requirements to the trust behavior, and that the target is not exposed to unacceptable risk. The paper gives an example-driven presentation of the method.
作者: 惡意    時(shí)間: 2025-3-29 08:30
International Political Economy Serieshing the vehicles. In this paper, the combination of edges (initial candidate) and bag-of-features (final verification) has improved detection rate significantly as compared to other well known methods. Our method has 96% detection rate on roads inside a city and 98% detection on highways.
作者: Formidable    時(shí)間: 2025-3-29 11:51
DeSPoT: A Method for the Development and Specification of Policies for Trust Negotiationation within acceptable risk. Adherence to a DeSPoT policy should ensure that the target fulfills the organizational level requirements to the trust behavior, and that the target is not exposed to unacceptable risk. The paper gives an example-driven presentation of the method.
作者: 踉蹌    時(shí)間: 2025-3-29 17:56
Single Camera Vehicle Detection Using Edges and Bag-of-Featureshing the vehicles. In this paper, the combination of edges (initial candidate) and bag-of-features (final verification) has improved detection rate significantly as compared to other well known methods. Our method has 96% detection rate on roads inside a city and 98% detection on highways.
作者: 假裝是我    時(shí)間: 2025-3-29 20:07

作者: 誘惑    時(shí)間: 2025-3-30 03:48
https://doi.org/10.1057/9780230595736 from real life images, while generating well localized edges. We have compared our method using images form Berkely’s segmentation data set. Experimental results show the robustness of our method to noise in real life images.
作者: Alienated    時(shí)間: 2025-3-30 06:10

作者: inclusive    時(shí)間: 2025-3-30 08:58

作者: 動(dòng)物    時(shí)間: 2025-3-30 15:34
A New BiGaussian Edge Filter from real life images, while generating well localized edges. We have compared our method using images form Berkely’s segmentation data set. Experimental results show the robustness of our method to noise in real life images.
作者: diskitis    時(shí)間: 2025-3-30 17:29

作者: oblique    時(shí)間: 2025-3-30 21:29
A Large-Scale Terrain Rendering Method With GPU-Based Geometry Compressionting requires, and processes the error metric and triangulation by GPU, to improve the rending efficiency of image hardware, and save the running time of CPU. For large terrain data, terrain data are compressed and stored in special method, and dynamically transmitted to graphic hardware according t
作者: 聲音刺耳    時(shí)間: 2025-3-31 04:47
Cots Sparse Matrix Utilization in Distribution Power Flow Applicationsthe field of distribution networks, which analyzed the sparse matrix calculations as integral part of its calculation engine, this paper presents the considerations and analysis for the utilization of commercial of-the-shelf sparse matrix solvers (COTS SMS). Analysis is given for the parallel direct
作者: 婚姻生活    時(shí)間: 2025-3-31 07:59

作者: evince    時(shí)間: 2025-3-31 10:33
The Factors Affect User Behaviour in a Picture-Based User Authentication System: PixelPinive user authentication schemes which try to take place of the textual password. PixelPin is one of the picture-based authentication systems, which are base on Blonder’s patent (Graphical Passwords. United States Patent 5559961.). This paper is the report on our evaluation of the PixelPin by conduct
作者: hallow    時(shí)間: 2025-3-31 16:02

作者: 柏樹    時(shí)間: 2025-3-31 21:34
Dynamic Visualization for Sensing Information Based on Mobile Sensor Networkoverhead occurs at that node, and this may possibly affect the entire network. Also, this causes frequent data loss as there is excessive traffic or as the topology constantly changes. In this paper, VSDR (Visualization Sensing Data Routing) is designed and implemented, which visually shows on a GML
作者: 平    時(shí)間: 2025-4-1 00:55

作者: 青石板    時(shí)間: 2025-4-1 05:05

作者: 手工藝品    時(shí)間: 2025-4-1 09:18
DeSPoT: A Method for the Development and Specification of Policies for Trust Negotiationnd for exploiting the open and vast marked. This pushes the limits for security mechanisms which in general are too rigorous to fully adapt to such a dynamic and heterogeneous environment. Trust mechanisms can supplement the security mechanisms in this situation to reduce the risk by means of truste
作者: 隱士    時(shí)間: 2025-4-1 11:07
Extended NIST Prime Family for Efficient Modular Reduction such as NIST primes have a property yields modular reduction algorithms that are significantly fast. However the number of NIST primes are not large enough. In this paper, we further extend the idea of NIST primes. Then we find more primes can provide fast modular reduction computation that NIST pr




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
沾益县| 三河市| 临邑县| 萨迦县| 波密县| 宁夏| 航空| 庄河市| 崇州市| 开封县| 信丰县| 绥芬河市| 佳木斯市| 东台市| 吉隆县| 芜湖市| 房产| 商洛市| 崇左市| 漠河县| 府谷县| 郑州市| 紫阳县| 霍州市| 沾益县| 乌审旗| 资源县| 巨鹿县| 霞浦县| 林周县| 阜阳市| 开平市| 古蔺县| 广元市| 汤阴县| 鲁山县| 九江县| 海城市| 和硕县| 大宁县| 安塞县|