標題: Titlebook: Computer Supported Cooperative Work and Social Computing; 16th CCF Conference, Yuqing Sun,Tun Lu,Liping Gao Conference proceedings 2022 Spr [打印本頁] 作者: Stimulant 時間: 2025-3-21 19:53
書目名稱Computer Supported Cooperative Work and Social Computing影響因子(影響力)
書目名稱Computer Supported Cooperative Work and Social Computing影響因子(影響力)學科排名
書目名稱Computer Supported Cooperative Work and Social Computing網絡公開度
書目名稱Computer Supported Cooperative Work and Social Computing網絡公開度學科排名
書目名稱Computer Supported Cooperative Work and Social Computing被引頻次
書目名稱Computer Supported Cooperative Work and Social Computing被引頻次學科排名
書目名稱Computer Supported Cooperative Work and Social Computing年度引用
書目名稱Computer Supported Cooperative Work and Social Computing年度引用學科排名
書目名稱Computer Supported Cooperative Work and Social Computing讀者反饋
書目名稱Computer Supported Cooperative Work and Social Computing讀者反饋學科排名
作者: 谷物 時間: 2025-3-21 22:32
Decentralized Predictive Enterprise Resource Planning Framework on?Private Blockchain Networks Using models, we introduce neural networks combine with a private Blockchain network. In addition, we design an algorithm to train the neural networks that combine the loss function from each local model to achieve the smallest global level validation loss. Finally, we implement the experiments to prove 作者: 一瞥 時間: 2025-3-22 01:17
Fine-Grained Diagnosis Method for Microservice Faults Based on Hierarchical Correlation Analysisis designed to infer the root cause of the fault and provide effective diagnosis information for administrators. Experimental results show that the mechanism can quickly locate the fault location and infer the root cause of microservice failure in a more fine-grained way.作者: 懶鬼才會衰弱 時間: 2025-3-22 04:34 作者: esculent 時間: 2025-3-22 08:50
Modeling Method for Function Trees Guided by the Symmetric Quintuple Implicational Controller modeling, a new fuzzy and/or/not function tree establishing method has been put forward by using the symmetric quintuple implicational controller as the core. Finally, the whole process of functional tree modeling is demonstrated through an application example, and the validity of the scheme is ver作者: 草率女 時間: 2025-3-22 15:39
Fog Computing Federated Learning System Framework for Smart Healthcare the system, an improved election algorithm and detection mechanism are proposed to improve the security of data interaction. Ensure the normal operation of the system. In this way, the problem of “data islands” and resource imbalance in the medical field can be solved. Using real cardiovascular dat作者: 草率女 時間: 2025-3-22 17:14 作者: amyloid 時間: 2025-3-22 22:05
A Novel Traversal Search-Based D2D Collaborative Offloading Approach for Workflow Application in Dyncode the feasible offloading strategy in a rough order of cost, and then perform Fibonacci traversal to fast approximate the optimal offloading strategy. In the remaining iterations, a uniform traversal is performed in the neighborhood of the optimal offloading strategy. Finally, the best offloading作者: minion 時間: 2025-3-23 03:08
https://doi.org/10.1057/9780230514058 models, we introduce neural networks combine with a private Blockchain network. In addition, we design an algorithm to train the neural networks that combine the loss function from each local model to achieve the smallest global level validation loss. Finally, we implement the experiments to prove 作者: Feedback 時間: 2025-3-23 05:36
The Royal Humane Society: The Methodis designed to infer the root cause of the fault and provide effective diagnosis information for administrators. Experimental results show that the mechanism can quickly locate the fault location and infer the root cause of microservice failure in a more fine-grained way.作者: 宮殿般 時間: 2025-3-23 12:44 作者: hankering 時間: 2025-3-23 15:49 作者: 完成 時間: 2025-3-23 21:23
,A Decade of Decisions (1960–1970), the system, an improved election algorithm and detection mechanism are proposed to improve the security of data interaction. Ensure the normal operation of the system. In this way, the problem of “data islands” and resource imbalance in the medical field can be solved. Using real cardiovascular dat作者: MELON 時間: 2025-3-24 00:44
Managerial Skills and Competencies,re. We evaluate our strategy on YAWL by comparing with other three popular scheduling algorithms (Random Assignment, Fastest Complete Assignment and the Shortest Queue Assignment), which shows that our strategy performs more effective and stable.作者: Relinquish 時間: 2025-3-24 04:56
,Hello ,: Peter Tremayne’s Sister Fidelma,code the feasible offloading strategy in a rough order of cost, and then perform Fibonacci traversal to fast approximate the optimal offloading strategy. In the remaining iterations, a uniform traversal is performed in the neighborhood of the optimal offloading strategy. Finally, the best offloading作者: handle 時間: 2025-3-24 07:02 作者: Morose 時間: 2025-3-24 14:44
https://doi.org/10.1007/978-981-19-4546-5artificial intelligence; communication systems; computer hardware; computer networks; computer systems; c作者: 責問 時間: 2025-3-24 18:54
978-981-19-4545-8Springer Nature Singapore Pte Ltd. 2022作者: 邊緣 時間: 2025-3-24 19:04 作者: 歡呼 時間: 2025-3-24 23:23 作者: amorphous 時間: 2025-3-25 04:18 作者: 直覺沒有 時間: 2025-3-25 08:52 作者: SOW 時間: 2025-3-25 11:48
Operation: Managing amidst Complexity,ainers to these applications is crucial to minimize resource costs while fulfilling deadlines. Most of existing workflow scheduling algorithms are either not for randomly arrived workflows from users of Edge Computing or only consider workflows in pure Cloud Computing. In this article, an elastic re作者: Allure 時間: 2025-3-25 18:53
The Source of Contemporary Utilitarianism, in this field. Previous modeling was done manually by domain experts, which can be difficult for larger function trees. For this reason, the symmetric quintuple implicational method is introduced, and then the symmetric quintuple implicational controller is proposed, and the function tree modeling 作者: Infelicity 時間: 2025-3-25 20:40
Development of Contemporary Utilitarianism,ction algorithm is suitable to detect some attack types. Based on the two cases, we formally present the above-mentioned problems by applying Group Multi-Role Assignment (GMRA) model and propose an adaptive detection model that is composed of many parallel detection algorithms..The formalization of 作者: 槍支 時間: 2025-3-26 01:01
The Contemporary Family in Franceng strategy, we can determine the extinguishing points that can divide the fire field and break them one by one. Then, quantum particle swarm optimization is used to calculate the optimal path. If there are “flying fire” and other emergencies in the fire extinguishing process, the improved Ant Colon作者: 付出 時間: 2025-3-26 06:07
Carole Brugeilles,Pascal Sebillety is one of the current research hotspots in the cloud computing environment of multi-copy storage. In view of the problem of storage location adjustment caused by the dynamic change of data resources during the operation of cloud computing, this paper first presents a data request habit detection 作者: 館長 時間: 2025-3-26 10:32
Arnaud Régnier-Loilier,Zoé Perronlability. For data holders, the cloud service provider CSP is untrustworthy, and it may damage the data stored in the cloud or forge and deceive the integrity of the damaged data. Aiming at the data recoverability problem after detecting data integrity damage in cloud data storage, an audit method o作者: EVICT 時間: 2025-3-26 14:53
https://doi.org/10.1007/978-1-349-13436-6methods. However, in the group decision-making problem, it will bring challenges to the consistency of decision-making, if different experts utilize diverse models based on their own considerations. Therefore, we propose a three-way group decision-making model which combines these two kinds of model作者: 祖先 時間: 2025-3-26 18:12
,A Decade of Decisions (1960–1970), and it is susceptible to security and privacy issues. In response to the above problems, a fog computing federated learning system for smart healthcare is proposed. The system uses the iFogSim simulation platform to establish a smart fog computing layer between sensor nodes and remote cloud servers作者: 拋媚眼 時間: 2025-3-26 21:33
Managerial Skills and Competencies,le task assignment strategy based-on temporal workflow, aiming to improve the on-time completion rate in the multi-process and multi-case scenarios to enhance the flexibility of the workflow system. To achieve this purpose, we represent the needed temporal constraints used in the assignment, includi作者: 虛假 時間: 2025-3-27 02:29 作者: 方舟 時間: 2025-3-27 05:45 作者: accomplishment 時間: 2025-3-27 13:10 作者: 反抗者 時間: 2025-3-27 16:42 作者: 枕墊 時間: 2025-3-27 20:40
https://doi.org/10.1007/978-1-4039-3854-1al datasets are constructed with depth camera for indoor scene. However, it is challenging to construct outdoor dataset because the limitation of depth information devices. This paper presents a novel construction approach for outdoor dehazing dataset. In our approach, we propose to adopt realistic 作者: Ablation 時間: 2025-3-27 22:37
Conference proceedings 2022 Work and Social Computing, ChineseCSCW 2021, held in Xiangtan, China, November 26–28, 2021. The conference was held in a hybrid mode i.e. online and on-site in Xiangtan due to the COVID-19 crisis..The 65 revised full papers and 22 revised short papers were carefully reviewed and selected from 242 s作者: 遭受 時間: 2025-3-28 03:16 作者: Infirm 時間: 2025-3-28 06:39 作者: CLIFF 時間: 2025-3-28 13:00 作者: 替代品 時間: 2025-3-28 17:30
Arnaud Régnier-Loilier,Zoé Perronrify whether the data block is damaged and locate the exact location of the damaged data block, but also realizes the data integrity recovery function. In the process of data processing and auditing, the privacy and safety of data are guaranteed. Experiments have proved that the program has a certain degree of safety and effectiveness.作者: projectile 時間: 2025-3-28 19:30 作者: 路標 時間: 2025-3-29 02:17
Elastic Container Scheduling for?Stochastically Arrived Workflows in?Cloud and?Edge Computingkflows in Cloud and Edge to minimize long-term operating costs while meeting deadline constraints. Experimental results illustrate that our approach achieves a lower overall cost and a higher success ratio compared with the state-of-art algorithm.作者: 圓柱 時間: 2025-3-29 04:25 作者: 終點 時間: 2025-3-29 11:05 作者: CBC471 時間: 2025-3-29 11:50
Optimal Storage Cloud Data Recoverability Audit Method Based on Regenerative Coderify whether the data block is damaged and locate the exact location of the damaged data block, but also realizes the data integrity recovery function. In the process of data processing and auditing, the privacy and safety of data are guaranteed. Experiments have proved that the program has a certain degree of safety and effectiveness.作者: UTTER 時間: 2025-3-29 18:10
A Three-Way Group Decision-Making Approach Based on?Mixture Risksing PRS model. Then, the total risk cost is defined as the mixture of the probabilistic risk costs in PRS model and the Bayesian risk costs in DTRS model. The best option is selected according to the Bayesian minimum risk rule. Finally, the proposed model is verified by an illustration example.作者: 矛盾 時間: 2025-3-29 19:42 作者: asthma 時間: 2025-3-30 01:24 作者: crockery 時間: 2025-3-30 06:03 作者: 有限 時間: 2025-3-30 08:49 作者: 脆弱帶來 時間: 2025-3-30 12:34
1865-0929 nd Systems; Cooperative Evolutionary Computation and Human-like?Intelligent Collaboration; Domain-Specific Collaborative Applications;.Volume II:?.Crowd Intelligence and Crowd Cooperative Computing; Social Media and Online Communities..978-981-19-4545-8978-981-19-4546-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Collar 時間: 2025-3-30 18:13 作者: 新星 時間: 2025-3-30 21:57 作者: 舊石器 時間: 2025-3-31 04:46 作者: Vulnerary 時間: 2025-3-31 08:30
Mimicry, Authority and Subversion, the load balancing algorithm implemented in this paper reduces resource scheduling time and improves The utilization of server resources increases the concurrent access capability of distributed systems.作者: Heterodoxy 時間: 2025-3-31 11:41