標(biāo)題: Titlebook: Computers, Networks, Systems, and Industrial Engineering 2011; Roger Lee Conference proceedings 2011 Springer Berlin Heidelberg 2011 Compu [打印本頁(yè)] 作者: False-Negative 時(shí)間: 2025-3-21 16:18
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011影響因子(影響力)
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011被引頻次
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011被引頻次學(xué)科排名
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011年度引用
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011年度引用學(xué)科排名
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011讀者反饋
書(shū)目名稱(chēng)Computers, Networks, Systems, and Industrial Engineering 2011讀者反饋學(xué)科排名
作者: 細(xì)微差別 時(shí)間: 2025-3-21 22:10 作者: TOXIN 時(shí)間: 2025-3-22 02:26
A Non-functional Requirements Traceability Management Method Based on Architectural Patterns,uality, apply to the overall qualities of the system. In most cases, non-functional requirements provide solutions in pattern and are applied to the system in the design phase. If the traceability between the analysis model elements, design model elements and the elements involved in the architectur作者: GRILL 時(shí)間: 2025-3-22 04:59 作者: Allege 時(shí)間: 2025-3-22 09:57 作者: 津貼 時(shí)間: 2025-3-22 15:08 作者: 津貼 時(shí)間: 2025-3-22 18:35
Non-coherent Logarithmic Detector Performance in Log-Normal and Weibull Clutter Environment (UWB Aunal reflected from a target often contains unwanted echoes called as clutter, so the detection of target is difficult with clutter echoes. Therefore, it is important to investigate the radar detector performance for the better detection of the reflected signals. This paper analyzes the detection per作者: Colonoscopy 時(shí)間: 2025-3-23 00:28 作者: Gum-Disease 時(shí)間: 2025-3-23 03:58
An Intelligent Multi-Agent Model for Resource Virtualization: Supporting Social Media Service in Cls information services based on SNS. As the availability of social media contents generated from users increases dramatically, the task of providing high-quality media contents in social media sites that need user contributions is emerging as unimportant issue in IT field. In this paper, we propose 作者: FLIT 時(shí)間: 2025-3-23 07:26
Compiler-Assisted Maximum Stack Usage Measurement Technique for Efficient Multi-threading in Memoryr this problem have been proposed in prior research, but the proposed solutions were not totally effective. This paper proposes the compiler-assisted maximum stack usage measurement technique as a new solution for this problem. This technique measures the maximum stack usage of each thread with spec作者: amygdala 時(shí)間: 2025-3-23 11:29 作者: arousal 時(shí)間: 2025-3-23 14:45 作者: 虛情假意 時(shí)間: 2025-3-23 19:58 作者: animated 時(shí)間: 2025-3-23 23:54 作者: chronicle 時(shí)間: 2025-3-24 03:56 作者: 愛(ài)管閑事 時(shí)間: 2025-3-24 06:52 作者: cacophony 時(shí)間: 2025-3-24 12:22
Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits,n of their confidential information. Usually, DLP systems identify, monitor, and protect data in use, data in motion, and data at rest through deep content inspection, contextual security analysis of transaction and with a centralized management framework. Electronic documents, e-mails or network lo作者: 不適當(dāng) 時(shí)間: 2025-3-24 18:39
Optimal Sizing of Hybrid Wind-PV-Tide System, than utilization of single renewable energy resource. This study presents a methodology to perform the optimal sizing of a new and renewable hybrid generation system. The methodology aims at finding the configuration, among sets of system components, that meets the desired system requirements, with作者: 并排上下 時(shí)間: 2025-3-24 19:00
A Smart Web-Sensor Based on IEEE 1451 and Web-Service Using a Gas Sensor,information must be reliable and secure, and the diagnosis for sensors should be easy to handle. To ensure these outcomes, the IEEE 1451 has been used in the past for smart sensor. This paper proposes a new smart web sensor model. Since the proposed smart web sensor is based on IEEE 1451.0, most of 作者: falsehood 時(shí)間: 2025-3-25 00:06 作者: municipality 時(shí)間: 2025-3-25 06:17 作者: 飾帶 時(shí)間: 2025-3-25 11:20 作者: CANON 時(shí)間: 2025-3-25 14:38 作者: expound 時(shí)間: 2025-3-25 18:41
Computers, Networks, Systems, and Industrial Engineering 2011978-3-642-21375-5Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 熒光 時(shí)間: 2025-3-25 22:58
https://doi.org/10.1007/978-3-540-71379-1ents were done to Ad-Hoc on-demand distance vector routing by using dominating sets to decrease the network load and flooding. But further with the increase of nodes at higher terrain dimensions the performance of Ad-Hoc on-demand distance vector routing decreases. To overcome this problem, we apply作者: 蟄伏 時(shí)間: 2025-3-26 00:49
Geometrische Aspekte der Mechanik,s paper, we study the effect of changing the retransmission mechanism on QoS parameters and propose a mechanism which would dynamically adjust the retry limits (which controls the retransmission policy) based upon network state (feedback force effect) and applications (driving force effect). We star作者: colloquial 時(shí)間: 2025-3-26 06:40 作者: invert 時(shí)間: 2025-3-26 11:29
Die Prinzipien der kanonischen Mechanik,alyze the detection performance of non-coherent detectors such as square law detector, linear detector and logarithmic detector in a background of white Gaussian noise (WGN) for Ultra Wide Band Short Range Radar in Automotive applications. It is assumed that the target is stationary and energy refle作者: 痛恨 時(shí)間: 2025-3-26 13:29
,Dynamik I: Axiome und Erhaltungss?tze,odel used in the existing qualitative simulation has a strong limitation where the complex condition and nonautonomous model can not be expressed. To solve the problems, we propose the following new modeling. First, we define a modeling method regarding relationship and transmission of effect betwee作者: 呼吸 時(shí)間: 2025-3-26 20:23
Reiner M. Dreizler,Cora S. Lüddeld fully support business operations. Enterprise Architecture (EA) can be used to support business and IT alignment. To help design such systems using EA, Enterprise Architecture Frameworks (EAF) may be used. There are frameworks to support EA, such as Zachman Framework, the Department of Defense Ar作者: Custodian 時(shí)間: 2025-3-26 21:12 作者: 發(fā)生 時(shí)間: 2025-3-27 01:33 作者: 指數(shù) 時(shí)間: 2025-3-27 05:59 作者: 一窩小鳥(niǎo) 時(shí)間: 2025-3-27 11:54 作者: 朝圣者 時(shí)間: 2025-3-27 15:37 作者: Distribution 時(shí)間: 2025-3-27 20:44 作者: 門(mén)閂 時(shí)間: 2025-3-27 23:55
https://doi.org/10.1007/b137829es worldwide. Despite this increasingly popular trend, the initial expectations of the cost reductions of offshore outsourcing have not been realized. Many software development companies are facing difficulties caused by many hidden costs, including translation efforts in language gap, transition ri作者: 可商量 時(shí)間: 2025-3-28 05:34 作者: chiropractor 時(shí)間: 2025-3-28 09:11
Reiner M. Dreizler,Cora S. Lüddebut at the expense of the frame response delay. These two performance metrics, power consumption and delay, are reciprocally affected by sleep mode parameters such as initial sleep window Tmin, and final sleep window Tmax. This paper focuses on minimizing energy consumption under a guaranteed delay 作者: 責(zé)難 時(shí)間: 2025-3-28 11:35 作者: Inkling 時(shí)間: 2025-3-28 14:51
Reiner M. Dreizler,Cora S. Lüdden of their confidential information. Usually, DLP systems identify, monitor, and protect data in use, data in motion, and data at rest through deep content inspection, contextual security analysis of transaction and with a centralized management framework. Electronic documents, e-mails or network lo作者: assent 時(shí)間: 2025-3-28 21:59
,Relativit?tstheorie und Elektromagnetismus, than utilization of single renewable energy resource. This study presents a methodology to perform the optimal sizing of a new and renewable hybrid generation system. The methodology aims at finding the configuration, among sets of system components, that meets the desired system requirements, with作者: BUST 時(shí)間: 2025-3-29 02:55 作者: 針葉類(lèi)的樹(shù) 時(shí)間: 2025-3-29 05:55
Dynamically Controlling Retransmission Mechanism for Analysing QoS Parameters of IEEE 802.11 Networry limits (which controls the retransmission policy) based upon network state (feedback force effect) and applications (driving force effect). We start by explaining the brief theory behind retransmission mechanism followed by some basic analysis which provides the motivation for the need to dynamically control the retransmission mechanism.作者: Subjugate 時(shí)間: 2025-3-29 08:31 作者: AVOW 時(shí)間: 2025-3-29 14:21 作者: 民間傳說(shuō) 時(shí)間: 2025-3-29 17:48
Die Prinzipien der kanonischen Mechanik,cted from the target is distributed. The non-coherent detectors have almost similar detection probability in a background of white Gaussian noise. The performance of the detector is analyzed and simulation has been done in order to verify.作者: LIMN 時(shí)間: 2025-3-29 22:03 作者: barium-study 時(shí)間: 2025-3-30 01:15
Reiner M. Dreizler,Cora S. Lüddethe work redistribution which arise from the reason that the techniques do not consider the characteristics of works and dynamic resources. To cope with such problems this paper suggests a regional matchmaking technique which can redistribute works in consideration of the characteristics of the works and the participant resources.作者: 進(jìn)入 時(shí)間: 2025-3-30 07:48 作者: mighty 時(shí)間: 2025-3-30 10:06 作者: misshapen 時(shí)間: 2025-3-30 12:47
Conference proceedings 2011 quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture作者: 使困惑 時(shí)間: 2025-3-30 16:34 作者: Collected 時(shí)間: 2025-3-30 22:59 作者: Obstacle 時(shí)間: 2025-3-31 01:06 作者: 書(shū)法 時(shí)間: 2025-3-31 05:09
Reiner M. Dreizler,Cora S. Lüddevalidate that our proposed PEDC mechanism indeed minimizes consumed power for a specified frame response delay. In addition, in some cases, it can save up to 60% of consumed power compared to the original power saving mechanism in Mobile WiMAX.作者: Respond 時(shí)間: 2025-3-31 10:30 作者: ABIDE 時(shí)間: 2025-3-31 14:02
Using Dominating Sets with 2-Hop Neighborhood Information to Improve the Ad-Hoc On-Demand Distance to the destination can be identified using the two-hop information at the dominating nodes where the packet to destination is present. Our results show the performance of dominating sets with two-hop neighborhood information which have improved the broadcast latency, packet delivery, and load on network.作者: 推測(cè) 時(shí)間: 2025-3-31 19:43 作者: circuit 時(shí)間: 2025-3-31 22:35 作者: 來(lái)自于 時(shí)間: 2025-4-1 03:34 作者: 難管 時(shí)間: 2025-4-1 08:41
A Smart Web-Sensor Based on IEEE 1451 and Web-Service Using a Gas Sensor,ice is user friendly and a remote user can easily handle all kinds of information related to the sensor. This research presents a reference model for a smart web sensor and, to prove how valuable it is, a web-service using a gas sensor is utilized.作者: 丑惡 時(shí)間: 2025-4-1 12:29 作者: STELL 時(shí)間: 2025-4-1 15:18
Geometrische Aspekte der Mechanik,ry limits (which controls the retransmission policy) based upon network state (feedback force effect) and applications (driving force effect). We start by explaining the brief theory behind retransmission mechanism followed by some basic analysis which provides the motivation for the need to dynamically control the retransmission mechanism.