標(biāo)題: Titlebook: Computing and Intelligent Systems; International Confer Yanwen Wu Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidelberg 2011 a [打印本頁(yè)] 作者: cerebral 時(shí)間: 2025-3-21 18:15
書(shū)目名稱Computing and Intelligent Systems影響因子(影響力)
書(shū)目名稱Computing and Intelligent Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱Computing and Intelligent Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Computing and Intelligent Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Computing and Intelligent Systems被引頻次
書(shū)目名稱Computing and Intelligent Systems被引頻次學(xué)科排名
書(shū)目名稱Computing and Intelligent Systems年度引用
書(shū)目名稱Computing and Intelligent Systems年度引用學(xué)科排名
書(shū)目名稱Computing and Intelligent Systems讀者反饋
書(shū)目名稱Computing and Intelligent Systems讀者反饋學(xué)科排名
作者: Acquired 時(shí)間: 2025-3-21 22:46
The Edisonian Method: Trial and Errorof oral defense experts agreeing reaches the number requested, i.e., the threshold value ., related students pass the oral defense procedure. The research opens a new windows for the application of proxy signature technology in remote education and it is very important for us to popularize online or作者: Invigorate 時(shí)間: 2025-3-22 01:47
: Hardy and the Philosophy of Money,contracts for agents. It helps to prevent agents from speculating. Introduction of supervision mechanism into incentive mechanism not only results in theoretical innovation, but also has great application value in practice.作者: A精確的 時(shí)間: 2025-3-22 05:55
Research on Repair Algorithms for Hole and Cracks Errors of STL Models,algorithm based on the principle of minimum angle, cracks can be repaired by alter the coordinate of point. Using VC++ and OpenGL develop the error check system , and the check and repair algorithms are verified valid.作者: GLOOM 時(shí)間: 2025-3-22 10:00
Online Oral Defense System Based on Threshold Proxy Signature,of oral defense experts agreeing reaches the number requested, i.e., the threshold value ., related students pass the oral defense procedure. The research opens a new windows for the application of proxy signature technology in remote education and it is very important for us to popularize online or作者: Proponent 時(shí)間: 2025-3-22 16:58
An Analysis on Incentive Mechanism for Agents under Asymmetric Information Condition,contracts for agents. It helps to prevent agents from speculating. Introduction of supervision mechanism into incentive mechanism not only results in theoretical innovation, but also has great application value in practice.作者: Proponent 時(shí)間: 2025-3-22 20:42 作者: Prologue 時(shí)間: 2025-3-22 22:10
Communications in Computer and Information Sciencehttp://image.papertrans.cn/c/image/234793.jpg作者: FLACK 時(shí)間: 2025-3-23 03:34
Computing and Intelligent Systems978-3-642-24091-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 指數(shù) 時(shí)間: 2025-3-23 07:49 作者: Adherent 時(shí)間: 2025-3-23 12:30 作者: 支架 時(shí)間: 2025-3-23 15:42 作者: chalice 時(shí)間: 2025-3-23 21:04 作者: 能量守恒 時(shí)間: 2025-3-24 01:28
Andy Adamson,John Davies,Ian Robsonrted by synergistic learning toolkits, this study explores the community structure, social relation and participation character in classroom knowledge building by Social network analysis. This results show that there come into being a social relation network with knowledge convergence under the lear作者: 富饒 時(shí)間: 2025-3-24 05:06 作者: 揉雜 時(shí)間: 2025-3-24 09:15
David Kreps,Charles Ess,Kai Kimppa is proposed in the paper. With the strategy, tags are selected on the basis of users’ behavior pattern analysis. According to the strategy, an algorithm was implemented to rank users with representativeness of the tagging behaviors. Results of the statistical experiments show that the proposed stra作者: ostensible 時(shí)間: 2025-3-24 10:46 作者: faddish 時(shí)間: 2025-3-24 17:54
Inventive Success: The Phonograph by day. Game software is adjoin typical by science and art, is a complex subject by interactive multi-subjects. Harbin Normal University confirms the guide thought "All-embraced on Polytechnic & literature" & trains the goal of comprehensive applicable talent, establishes multi-steps implementation作者: AMITY 時(shí)間: 2025-3-24 19:20 作者: Blood-Clot 時(shí)間: 2025-3-25 01:44
https://doi.org/10.1007/978-3-030-29940-8siness behaviors. By applying signaling game theory and multi-agent modeling and simulation method, the paper focuses on the customer behaviors and the transaction process with consideration of the learning from customer’s social network and the impact of the business behavior. First, the process of作者: 一起 時(shí)間: 2025-3-25 04:43
Studies in History and Philosophy of Sciences, which considers the complex situation, including normal, rupture and peak cluster situation, has been researched. The total volume of nanoparticles can be gained by traveling throughout the matrix to get the base and height of every nanoparticle. Then we give a method to inspect the accuracy of t作者: 失誤 時(shí)間: 2025-3-25 09:50 作者: mortgage 時(shí)間: 2025-3-25 14:02 作者: 狗舍 時(shí)間: 2025-3-25 17:08
The Edisonian Method: Trial and Errorrket entities participating in the circulation processes, the novel pattern of agreement based circulation of agricultural products of fruits and vegetables has been discussed. Getting the guidance from the agreement based circulation pattern, an E-business service platform constructed on applicatio作者: 可轉(zhuǎn)變 時(shí)間: 2025-3-25 23:12
https://doi.org/10.1007/978-3-030-29940-8e scheme, . original signers cooperate to delegate their signing power to one proxy signer. In 2003, Chen, Chung and Huang proposed one proxy-protected proxy multi-signature scheme (CCH1 scheme) based on the elliptic curve cryptosystem. Park et al. pointed out that CCH1 scheme is insecure, however, 作者: 尊嚴(yán) 時(shí)間: 2025-3-26 01:27 作者: exercise 時(shí)間: 2025-3-26 04:26
https://doi.org/10.1007/978-3-030-29940-8ch is widely welcomed in China recently. Game API in the Mobile Information Device Profile (MIDP) 2.0 is used to build the game engine; And components designs and implementation steps of the game are introduced in detail. Various techniques, such as object pool, multi-threaded, socket connection, Ma作者: 鞠躬 時(shí)間: 2025-3-26 10:49
https://doi.org/10.1007/978-1-349-07810-3der to reduce staff stress and improve employee’s work performance, this paper includes society, organization and individual factors influencing on job insecurity. And then, the article provides five countermeasures to relieve employee’s job insecurity.作者: CLAM 時(shí)間: 2025-3-26 12:59
: Hardy and the Philosophy of Money,centive contracts between principals and agents under asymmetric information condition in order to solve the problems in establishing incentive mechanism for agents. The relationship between incentive and risk is discussed and the best equilibrium between them is given. Supervision mechanism is intr作者: 牽連 時(shí)間: 2025-3-26 20:12
Scientific Failure: Etheric ForceBy reviewing and analyzing the researches on mathematics problem solving, this paper designs SET, a conceptual framework for designing scaffolds effectively in one-to-one learning environment. It aims at supporting pupils on solving mathematics problems successfully in the guidance of SET.作者: 不適當(dāng) 時(shí)間: 2025-3-27 00:25 作者: endure 時(shí)間: 2025-3-27 05:08
https://doi.org/10.1007/978-3-642-24091-1analytic network process; human resource management; knowledge management; virtual enterprise; web-based作者: Deject 時(shí)間: 2025-3-27 05:39 作者: Conduit 時(shí)間: 2025-3-27 10:36
Design of Mobile Learning Scenario Based on Ad Hoc,ty. Mobile Learning can not do without the guidance of instructional design, This paper build mobile learning network architecture based on Ad Hoc, analysis and design according to the characteristics of the feature, scenario, activity of mobile learning.作者: Ischemic-Stroke 時(shí)間: 2025-3-27 16:31
,Analysis and Intervention on the Influencing Factors of Employee’s Job Insecurity,der to reduce staff stress and improve employee’s work performance, this paper includes society, organization and individual factors influencing on job insecurity. And then, the article provides five countermeasures to relieve employee’s job insecurity.作者: Extricate 時(shí)間: 2025-3-27 19:43
Conference proceedings 2011 and Control, ICCIC 2011, held in Wuhan, China, in September 2011.
The papers are organized in two volumes on Innovative Computing and Information (CCIS 231 and 232), two volumes on Computing and Intelligent Systems (CCIS 233 and 234), and in two volumes on Information and Management Engineering (CCIS 235 and 236).作者: Maximizer 時(shí)間: 2025-3-28 01:01 作者: Neutral-Spine 時(shí)間: 2025-3-28 04:27 作者: acclimate 時(shí)間: 2025-3-28 08:10 作者: 信徒 時(shí)間: 2025-3-28 12:09 作者: MELD 時(shí)間: 2025-3-28 15:20
Study on Multi-agent Based Simulation Process of Signaling Game in e-Commerce,on process of signaling game between business and customer based on multi-agent is designed and a prototype of simulation is build, in order to offer a decision support for the transaction under asymmetric information.作者: indoctrinate 時(shí)間: 2025-3-28 21:20 作者: 陰謀 時(shí)間: 2025-3-28 23:46
An E-Business Service Platform for Agreement Based Circulation of Agricultural Products of Fruits a management information system of business processes of circulation on the E-business service platform. The architecture and function composing of the E-business service platform has been presented. The E-business service platform for agreement based circulation of agricultural products of fruits and vegetables has been designed and implemented.作者: ciliary-body 時(shí)間: 2025-3-29 05:21
Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem,iptic curve cryptosystem. By observation, Park et al. showed that CCH2 scheme can’t resist the conspiracy attack from all original signers. As to CCH2 scheme, Park et al. neither provided an improved version or new version. Based on CCH2 scheme, a modified scheme is brought forward.作者: AMPLE 時(shí)間: 2025-3-29 07:55
The Impact of Computer Based Education on Computer Education,better results in teaching computer knowledge, the teaching method and curriculum program should be reformed as the computer technology developing. Some detail reference countermeasures will be discussed.作者: 征稅 時(shí)間: 2025-3-29 15:16
Factors Affecting the Quality of Graduation Project and Countermeasures, to avoid the graduation project and defense become a formality. In this paper, we researched based on a case study to analysis the main cause of graduation project quality going down and then proposed several corresponding countermeasures.作者: 橫條 時(shí)間: 2025-3-29 16:55 作者: 逃避責(zé)任 時(shí)間: 2025-3-29 19:57
Main Factors Affecting the Adoption and Diffusion of Web Service Technology Standards, the Web Service technology standard system, based on the innovation diffusion analysis framework of Technology - Organization - Environment (TOE) analyses the main factors affecting the adoption and diffusion of Web Service technology standards.作者: debouch 時(shí)間: 2025-3-30 02:56
1865-0929 011.
The papers are organized in two volumes on Innovative Computing and Information (CCIS 231 and 232), two volumes on Computing and Intelligent Systems (CCIS 233 and 234), and in two volumes on Information and Management Engineering (CCIS 235 and 236).978-3-642-24090-4978-3-642-24091-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 譏笑 時(shí)間: 2025-3-30 04:02 作者: 初次登臺(tái) 時(shí)間: 2025-3-30 08:42 作者: 根除 時(shí)間: 2025-3-30 12:41 作者: 群島 時(shí)間: 2025-3-30 17:44 作者: 忍受 時(shí)間: 2025-3-31 00:10 作者: 彎腰 時(shí)間: 2025-3-31 00:56
1865-0929 tutes the refereed proceedings of the International Conference on Computing, Information and Control, ICCIC 2011, held in Wuhan, China, in September 2011.
The papers are organized in two volumes on Innovative Computing and Information (CCIS 231 and 232), two volumes on Computing and Intelligent Syst作者: 撫育 時(shí)間: 2025-3-31 05:52
The 16th Congress — Munich 1988better results in teaching computer knowledge, the teaching method and curriculum program should be reformed as the computer technology developing. Some detail reference countermeasures will be discussed.作者: AVANT 時(shí)間: 2025-3-31 09:40 作者: Presbycusis 時(shí)間: 2025-3-31 15:10 作者: B-cell 時(shí)間: 2025-3-31 20:38
The Edisonian Method: Trial and Error the Web Service technology standard system, based on the innovation diffusion analysis framework of Technology - Organization - Environment (TOE) analyses the main factors affecting the adoption and diffusion of Web Service technology standards.作者: generic 時(shí)間: 2025-4-1 00:00 作者: flourish 時(shí)間: 2025-4-1 03:17
Social Network Analysis of Knowledge Building in Synergistic Learning Environment,ner knowledge building led by teachers, which make views and ideas of learners assembling to support knowledge building, at the same time this paper also describes the participant character in learning community. This study can provide a new way to learning technology innovation in different culture context.作者: resuscitation 時(shí)間: 2025-4-1 06:35