派博傳思國際中心

標題: Titlebook: Digital Enterprise and Information Systems; International Confer Ezendu Ariwa,Eyas El-Qawasmeh Conference proceedings 2011 Springer-Verlag [打印本頁]

作者: 征募    時間: 2025-3-21 16:28
書目名稱Digital Enterprise and Information Systems影響因子(影響力)




書目名稱Digital Enterprise and Information Systems影響因子(影響力)學科排名




書目名稱Digital Enterprise and Information Systems網(wǎng)絡(luò)公開度




書目名稱Digital Enterprise and Information Systems網(wǎng)絡(luò)公開度學科排名




書目名稱Digital Enterprise and Information Systems被引頻次




書目名稱Digital Enterprise and Information Systems被引頻次學科排名




書目名稱Digital Enterprise and Information Systems年度引用




書目名稱Digital Enterprise and Information Systems年度引用學科排名




書目名稱Digital Enterprise and Information Systems讀者反饋




書目名稱Digital Enterprise and Information Systems讀者反饋學科排名





作者: Formidable    時間: 2025-3-21 22:06
Measuring Quality in Metadata Repositorieslity problem of secure e-mail systems. The public key is taken from general information (such as e-mail address) of the recipient and thus does not require access to any certificate to validate the key. To increase the system strength, the identity-based cryptography is combined with mediated crypto
作者: 肌肉    時間: 2025-3-22 04:26
https://doi.org/10.1007/978-3-319-24592-8r, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however
作者: 等待    時間: 2025-3-22 05:27
Xiaoqiang Tang,Zhufeng Shao,Rui Yaosequence, we perform the scrambling in DCT domain with variable control parameters. To further enforce the security, the gray values of image pixels are diffused using keystream extracted from the extended key sequence of the chaotic map and the plainimage. As a result, the algorithm resists the cho
作者: 施魔法    時間: 2025-3-22 11:52
Technology Management: Case of Facebookmands and needs for an extreme secure connection. An ideal security protocol should always be protecting the security of connections in many aspects, and leaves no trapdoor for the attackers. Nowadays, one of the popular cryptography protocols is hybrid cryptosystem that uses symmetric and public ke
作者: 內(nèi)部    時間: 2025-3-22 15:29
Technology Assessment in the Energy Sectorof view. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied. The algorithm which has been proposed here is based on binary coding and the complementary pair rules. Therefore, DNA reference sequence is chosen and also a secret message M is hidden i
作者: 內(nèi)部    時間: 2025-3-22 17:25

作者: adhesive    時間: 2025-3-22 21:17
Strategic Induction of Decision Trees widely used because of simplicity and usability. In order to discover the most suitable services among various web services and compose them, the integrated service annotation of SOAP and REST web services is necessary. In this paper, we present semantic service framework which is designed for user
作者: 沒有貧窮    時間: 2025-3-23 02:41
Tingshao Zhu,Wen Gao,Charles X. Lingveloping countries within the last two decades. Findings from such researches focused more on the barriers to e-commerce with very little on the extent of adoption. This paper utilized the findings from past studies and the explanatory case study methodology to describe the extent of e-commerce adop
作者: exostosis    時間: 2025-3-23 07:36
https://doi.org/10.1007/978-1-4471-0835-1t predictions. Given the significant negative consequences of low enrollments on both academia and industry, the IS community has focused its efforts on mechanisms to increase enrollments. This study investigates how such a mechanism – social support – influences students’ aspirations to pursue an I
作者: Cardiac-Output    時間: 2025-3-23 12:53

作者: Arbitrary    時間: 2025-3-23 16:02
A Generic Ontology for Spatial Reasoningn software packages. This approach can be also used to analyze the dependence between various economic indicators, especially for the situation in which the direction of the causality between the model variables is unknown. The model is employed for studying the relation between wheat market prices
作者: Synthesize    時間: 2025-3-23 21:34
Strategic Induction of Decision Treespresents a mathematical model to optimize the fuzzy Option value for multi-stage portfolio of IT projects. A fuzzy Option model is used to maximize the Option value of each IT project. The IT portfolio selection problem is formulated as a fuzzy zero-one integer programming model that can handle both
作者: 接合    時間: 2025-3-24 01:14

作者: Prostaglandins    時間: 2025-3-24 04:44
Bo Hu,Inés Arana,Ernesto Compatangelo(P2P) system is how to locate Peers relevant to a given query. Different methods proposed routing strategies of queries taking into account the P2P network at hand. In this paper, we propose an architecture, based on (Super-) Peers, and we focus on query routing. Our approach considers that (Super-)
作者: 抗體    時間: 2025-3-24 10:34

作者: EVICT    時間: 2025-3-24 12:07

作者: ENNUI    時間: 2025-3-24 17:23

作者: noxious    時間: 2025-3-24 22:00

作者: 拒絕    時間: 2025-3-25 02:48
Max Bramer,Ann Macintosh,Frans Coeneny. An objective of developing BuSCLI is to simplify the management of submission data of building plan approval through online system for the Local Authority (LA) or State Town and Country Planning in Malaysia. We presents the data management of the system through the data dictionary include login,
作者: 有罪    時間: 2025-3-25 04:15
Ezendu Ariwa,Eyas El-QawasmehFast-track conference proceedings.State-of-the-art research.Up-to-date result
作者: 血統(tǒng)    時間: 2025-3-25 10:29

作者: Boycott    時間: 2025-3-25 14:24

作者: 錯誤    時間: 2025-3-25 16:54

作者: interlude    時間: 2025-3-25 22:32

作者: 上下倒置    時間: 2025-3-26 03:44
Privacy-Enhanced Deniable Authentication E-Mail Servicer, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however
作者: Esophagus    時間: 2025-3-26 06:46

作者: 范例    時間: 2025-3-26 11:13
Improving Hybrid Cryptosystems with DNA Steganographymands and needs for an extreme secure connection. An ideal security protocol should always be protecting the security of connections in many aspects, and leaves no trapdoor for the attackers. Nowadays, one of the popular cryptography protocols is hybrid cryptosystem that uses symmetric and public ke
作者: MILL    時間: 2025-3-26 15:50
Data Hiding Method Based on DNA Basic Characteristicsof view. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied. The algorithm which has been proposed here is based on binary coding and the complementary pair rules. Therefore, DNA reference sequence is chosen and also a secret message M is hidden i
作者: 鐵砧    時間: 2025-3-26 19:51

作者: bifurcate    時間: 2025-3-26 23:40
Semi-automatic Semantic Service Annotation for SOAP and REST Web Services widely used because of simplicity and usability. In order to discover the most suitable services among various web services and compose them, the integrated service annotation of SOAP and REST web services is necessary. In this paper, we present semantic service framework which is designed for user
作者: Forehead-Lift    時間: 2025-3-27 02:56
E-Commerce Adoption in Nigeriaveloping countries within the last two decades. Findings from such researches focused more on the barriers to e-commerce with very little on the extent of adoption. This paper utilized the findings from past studies and the explanatory case study methodology to describe the extent of e-commerce adop
作者: harangue    時間: 2025-3-27 08:53

作者: 放逐某人    時間: 2025-3-27 09:38

作者: 絕食    時間: 2025-3-27 15:25

作者: 終點    時間: 2025-3-27 19:50

作者: 高原    時間: 2025-3-28 00:47

作者: Ganglion    時間: 2025-3-28 03:08
P2P Queries Routing Using Distributed Knowledge(P2P) system is how to locate Peers relevant to a given query. Different methods proposed routing strategies of queries taking into account the P2P network at hand. In this paper, we propose an architecture, based on (Super-) Peers, and we focus on query routing. Our approach considers that (Super-)
作者: 雀斑    時間: 2025-3-28 07:23
Electronic Payment Use and Legal Protectionefits, legal protection, risk avoidance, and satisfaction with prior experiences. The analytical results presented in this study indicate that beliefs (benefits, legal protection and risk allocation) differentially affect e-payment use behavior. Notably, consumer beliefs and confirmation affect sati
作者: Granular    時間: 2025-3-28 13:38
Bridging between SAML-Based Payment and Other Identity Federation Payment Systemshe last few years, a third aspect has become important within these federations: i.e., payment. Thus, several payment approaches have been designed and used in Identity Federations. However, when more than one federation is being combined into an inter-federation association, federation bridges have
作者: 食物    時間: 2025-3-28 16:00

作者: Habituate    時間: 2025-3-28 22:21

作者: plasma-cells    時間: 2025-3-29 01:35

作者: 愉快嗎    時間: 2025-3-29 05:51

作者: BIAS    時間: 2025-3-29 10:07
E-Commerce Adoption in Nigeriat of adoption. This paper utilized the findings from past studies and the explanatory case study methodology to describe the extent of e-commerce adoption in Nigeria. Recent attempts to transcend known e-commerce barriers and the role of banks and available ICT technologies are also discussed.
作者: Arteriography    時間: 2025-3-29 12:32
The Role of Contextual Support in Increasing Information Systems Enrollmentson mechanisms to increase enrollments. This study investigates how such a mechanism – social support – influences students’ aspirations to pursue an IS degree. More specifically, the study suggests that social support, self-efficacy, outcome expectations, and interests are expected to independently and cumulatively affect students’ choice of IS.
作者: 隱藏    時間: 2025-3-29 16:49

作者: infelicitous    時間: 2025-3-29 20:20
Conference proceedings 2011nd data protection, embedded systems and software, information technology management, e-business applications and software, critical computing and storage, distributed and parallel applications, digital management products, image processing, digital enterprises, XML-based languages, digital libraries, and data mining.
作者: travail    時間: 2025-3-30 02:25

作者: conscribe    時間: 2025-3-30 06:15
Research and Development Managementsystems can be modified to generate NAND-friendly access pattern. The performance evaluation results through trace-driven simulations shows that the request size is the most critical factor that impacts on the performance.
作者: Apogee    時間: 2025-3-30 09:10

作者: narcissism    時間: 2025-3-30 14:03

作者: Nonconformist    時間: 2025-3-30 20:22
Ireneusz Czarnowski,Piotr Jedrzejowicz of ERP implementation factors that will provide structural knowledge for all stakeholders involved in the process of ERP implementation in public sector. Also it could be approached as a ground base for professionals to foster its implementation practices and focus on critical factors.
作者: Crohns-disease    時間: 2025-3-30 20:47
Carem C. Fabris,Alex A. Freitasbusiness organisations, followed with personnel and technology factors. The research has also indicated that the user engagement is very important to the success of ERP implementation, and it can have an effect on the success and failure of ERP projects.
作者: milligram    時間: 2025-3-31 03:50

作者: 水獺    時間: 2025-3-31 05:55
Measuring Quality in Metadata Repositoriesolled (without the ability to fraud or detect secret) by the authorized person to prevent hackers and non-authorized parties from using or manipulating of the system. This proposal includes the deployment of the combined method for Mediated Identity-Based Cryptography.
作者: 否認    時間: 2025-3-31 09:44
https://doi.org/10.1007/978-3-319-24592-8ture scheme to support strong privacy, and construct a privacy-enhanced deniable authentication E-mail scheme using the designated verifier signature scheme. Compared with the Harn and Ren’s scheme, the proposed scheme has a simple cryptographic structure and can be easily realized with the existing secure E-mail systems.
作者: Disk199    時間: 2025-3-31 13:45
Strategic Induction of Decision Treesotation approach deals with functional semantics, non-functional semantics, and data semantics from web service description and web service portal. Based on this service annotation, it is useful to discover and compose services that satisfy the user’s goal.
作者: Cerebrovascular    時間: 2025-3-31 18:08

作者: 吞沒    時間: 2025-4-1 01:29
https://doi.org/10.1007/978-1-4471-0651-7s has already been considered in many research activities, the problem of how to bridge payment data still remains unsolved. Therefore, this paper presents a solution to bridge between a SAML-based payment enabled Identity Federation and four other kinds of payment solutions used by Identity Federations.
作者: amorphous    時間: 2025-4-1 03:51

作者: 終端    時間: 2025-4-1 07:32

作者: 貧困    時間: 2025-4-1 11:54
Semi-automatic Semantic Service Annotation for SOAP and REST Web Servicesotation approach deals with functional semantics, non-functional semantics, and data semantics from web service description and web service portal. Based on this service annotation, it is useful to discover and compose services that satisfy the user’s goal.
作者: Retrieval    時間: 2025-4-1 17:45

作者: Camouflage    時間: 2025-4-1 20:55
Bridging between SAML-Based Payment and Other Identity Federation Payment Systemss has already been considered in many research activities, the problem of how to bridge payment data still remains unsolved. Therefore, this paper presents a solution to bridge between a SAML-based payment enabled Identity Federation and four other kinds of payment solutions used by Identity Federations.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
绥宁县| 合水县| 花莲县| 天祝| 仪陇县| 伊川县| 望都县| 鲁山县| 金溪县| 勐海县| 彭阳县| 岳池县| 凤冈县| 安龙县| 开平市| 东安县| 通化县| 阜康市| 都兰县| 马鞍山市| 平度市| 保德县| 宣汉县| 徐水县| 南华县| 五寨县| 湄潭县| 滦平县| 景洪市| 张北县| 南陵县| 马关县| 岳普湖县| 灌南县| 瓮安县| 库车县| 永宁县| 九龙城区| 伊宁市| 东乡族自治县| 平凉市|