標題: Titlebook: Distributed Computing and Internet Technology; 10th International C Raja Natarajan Conference proceedings 2014 Springer International Publi [打印本頁] 作者: 大口水罐 時間: 2025-3-21 17:14
書目名稱Distributed Computing and Internet Technology影響因子(影響力)
書目名稱Distributed Computing and Internet Technology影響因子(影響力)學科排名
書目名稱Distributed Computing and Internet Technology網(wǎng)絡公開度
書目名稱Distributed Computing and Internet Technology網(wǎng)絡公開度學科排名
書目名稱Distributed Computing and Internet Technology被引頻次
書目名稱Distributed Computing and Internet Technology被引頻次學科排名
書目名稱Distributed Computing and Internet Technology年度引用
書目名稱Distributed Computing and Internet Technology年度引用學科排名
書目名稱Distributed Computing and Internet Technology讀者反饋
書目名稱Distributed Computing and Internet Technology讀者反饋學科排名
作者: 場所 時間: 2025-3-21 23:09
Reinforcement Learning for Matrix Computations: PageRank as an Examplee very reasons that make it effective in dynamic programming can also be leveraged for using it for distributed schemes for certain matrix computations involving non-negative matrices. In this spirit, we propose a reinforcement learning algorithm for PageRank computation that is fashioned after anal作者: 賞心悅目 時間: 2025-3-22 03:55 作者: lymphoma 時間: 2025-3-22 06:45
Cyber Security via Signaling Games: Toward a Science of Cyber Securityve, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The rec作者: 離開真充足 時間: 2025-3-22 09:44 作者: 潰爛 時間: 2025-3-22 14:13
Cells as Machines: Towards Deciphering Biochemical Programs in the Cellying theoretical computer science concepts and software engineering methods to the analysis of distributed biochemical reaction systems in the cell, designed by natural evolution, has led to interesting challenges in computer science, and new model-based insights in biology. In this paper, we review作者: 潰爛 時間: 2025-3-22 17:03
A Spatial Web Crawler for Discovering Geo-servers and Semantic Referencing with Spatial Features often dynamic in nature and available in heterogeneous format. The online spatial data sources are one of the key avenues for publishing and retrieving the geo-spatial data. Efficient discovery of these data sources through Internet, retrieval and analysis of useful information, is one of major cha作者: Chronic 時間: 2025-3-23 00:20
Software Transactional Memory Friendly Slot Schedulerso have high . across threads, and maximize . of the entire system simultaneously. Lock free algorithms are very fast, yet very ., and wait free algorithms follow the reverse trend. We thus propose a class of algorithms using software transactional memory (STM) that are in the middle of the spectrum.作者: Debark 時間: 2025-3-23 04:01 作者: 過時 時間: 2025-3-23 07:16
Value Added Services on Stationary Vehicular Cloud processing capability. A trivial solution to this resource poverty problem is compute offloading. Mobile clouds are not efficient with conventional internet cloud models and mobile computing approaches. The advancement in technology has made vehicles becoming more sophisticated through powerful on-作者: Aphorism 時間: 2025-3-23 10:22 作者: 最高峰 時間: 2025-3-23 14:00
SNAPWebD and SNAPSync: A Web Desktop and Transparent , of NFS and Standalone System Logical Volumesrk services has lead to the development of cloud computing where services such as applications or desktops can be accessed from remote servers through the Internet. In this paper, we present our work in developing a Web Desktop for the typical environments found in many corporates and educational in作者: MERIT 時間: 2025-3-23 18:53 作者: 寬敞 時間: 2025-3-23 22:35 作者: Dorsal-Kyphosis 時間: 2025-3-24 04:43 作者: 橢圓 時間: 2025-3-24 08:26
Effect of Choice of Discretization Methods on Context Extraction from Sensor Data – An Empirical Evage discovery like extraction of context, from these datasets, standard machine learning algorithms or their variations are used as classifier. Most classification schemes require the input data to be discretized. The focus of this paper is to study merits of some popular discretization methods when 作者: GULLY 時間: 2025-3-24 12:02
Discrete Krill Herd Algorithm – A Bio-Inspired Meta-Heuristics for Graph Based Network Route Optimizh can be utilized in optimization solution foundation of NP – Hard problems. In this paper we have adopted the various activities of the creature and described a discrete version of the Krill Herd Algorithm for the first time which is favorable for graph network based search and optimization problem作者: Pigeon 時間: 2025-3-24 16:51
A New Number System Using Alternate Fibonacci Numbers as the Positional Weights with Some Engineerinch can be exploited for various applications. We propose here a new number system, termed as the Tri-digit Fibonaccian Number System (TFNS), with alternate Fibonacci numbers as the positional weights for the various digits in the representation. We show that TFNS provides asymmetric distribution of 作者: 遺傳學 時間: 2025-3-24 22:16 作者: 蹣跚 時間: 2025-3-25 03:14 作者: Credence 時間: 2025-3-25 04:24 作者: Injunction 時間: 2025-3-25 07:57 作者: 支柱 時間: 2025-3-25 15:05
Hop and HipHop: Multitier Web Orchestrationt are known to be key components for the modular design of complex reactive behaviors. HipHop departs from Esterel by its ability to handle the dynamicity of Web applications, thanks to the reflexivity of Hop. Using a music player example, we show how to modularly build a non-trivial Hop application using HipHop orchestration code.作者: NICE 時間: 2025-3-25 17:32
The New Normal? related to Internet-related human subjects research, though it is not intended to align with regulatory guidance. Instead, the paper seeks to stimulate further discussion across disciplines about the ethics of contemporary Internet research.作者: HUSH 時間: 2025-3-25 22:06
Effect of Choice of Discretization Methods on Context Extraction from Sensor Data – An Empirical Evaapplied on noisy sensor logs. Representative methods from supervised and unsupervised discretization, like binning, clustering and entropy minimization are evaluated with context extraction. Interestingly, unlike common perception, for discretization of sensor data, supervised algorithms do not have a clear edge over unsupervised.作者: Clumsy 時間: 2025-3-26 02:33
A New Number System Using Alternate Fibonacci Numbers as the Positional Weights with Some Engineerinthe three digits (0, 1 and 2) in representing numbers with a pair of consecutive 2’s never appearing in a valid codeword. These properties can conveniently be utilized for typical engineering applications, e.g., message encoding for low-energy communication systems and variable length encoding with self-delimiting code.作者: Cpap155 時間: 2025-3-26 05:56 作者: Instrumental 時間: 2025-3-26 08:52 作者: Catheter 時間: 2025-3-26 12:40 作者: 改革運動 時間: 2025-3-26 18:44
https://doi.org/10.1007/978-3-030-99158-6buted version of the same is proposed to select a subset of nodes to cover a given area. Comparison with earlier works by simulation shows that the proposed distributed algorithm improves the estimated area coverage significantly.作者: 討人喜歡 時間: 2025-3-26 22:11
Reinforcement Learning for Matrix Computations: PageRank as an Exampleg model-free, i.e., not dependent on any specific assumptions about the transition probabilities in the random web-surfer model. We analyze its convergence and finite time behavior and present some supporting numerical experiments.作者: APNEA 時間: 2025-3-27 01:09 作者: 思考 時間: 2025-3-27 07:30
Value Added Services on Stationary Vehicular Cloud a communication mechanism for providing value added services on an opportunistically formed Stationary Vehicular Cloud by exploiting the idle vehicular resources that, now has become a thing of commonality in cities.作者: 切碎 時間: 2025-3-27 12:10 作者: Proclaim 時間: 2025-3-27 17:28
Software Transactional Memory Friendly Slot Schedulersthms follow the reverse trend. We thus propose a class of algorithms using software transactional memory (STM) that are in the middle of the spectrum. They equitably balance fairness and throughput, and are much simpler to design and verify.作者: hermitage 時間: 2025-3-27 20:51
0302-9743 l papers presented together with 6 invited talks in this volume were carefully reviewed and selected from 197 submissions. The papers cover topics such as distributed computing, sensor networks, Internet technologies and applications, security and multimedia..978-3-319-04482-8978-3-319-04483-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 遺產(chǎn) 時間: 2025-3-27 23:47
Jaume Barceló,Xavier Ros-Roca,Lidia Monterot are known to be key components for the modular design of complex reactive behaviors. HipHop departs from Esterel by its ability to handle the dynamicity of Web applications, thanks to the reflexivity of Hop. Using a music player example, we show how to modularly build a non-trivial Hop application using HipHop orchestration code.作者: 淘氣 時間: 2025-3-28 02:32 作者: 遭受 時間: 2025-3-28 06:57
Negotiating a European Defence Frameworkapplied on noisy sensor logs. Representative methods from supervised and unsupervised discretization, like binning, clustering and entropy minimization are evaluated with context extraction. Interestingly, unlike common perception, for discretization of sensor data, supervised algorithms do not have a clear edge over unsupervised.作者: FATAL 時間: 2025-3-28 11:51 作者: 詞匯 時間: 2025-3-28 14:41
Designing and Applying Chapter VIIecurity problems involving exchange of information (asymmetrically). This research aims to discover and understand complex structures of malicious use cases within the context of secure systems with the goal of developing an incentives-based measurement system that ensures a high level of resilience to attack.作者: Duodenitis 時間: 2025-3-28 18:53 作者: 提煉 時間: 2025-3-29 00:37 作者: Emmenagogue 時間: 2025-3-29 06:07
Energy-Aware Multi-level Routing Algorithm for Two-Tier Wireless Sensor NetworksHs rooted at the sink. We devise a simple and efficient technique through which each CH in the BN selects a few CHs as forwarding nodes keeping the load balancing among the CHs. Simulation results show that the proposed algorithm outperforms the existing ones in terms of network lifetime.作者: Obverse 時間: 2025-3-29 09:44 作者: intuition 時間: 2025-3-29 11:43 作者: SEEK 時間: 2025-3-29 16:14 作者: 合適 時間: 2025-3-29 21:16
https://doi.org/10.1007/978-3-319-67774-3nt Max-Min heuristic (FTMax-Min) (combinedly FTM.) are simulated using MATLAB. The experimental results are discussed and compared with the traditional heuristics. The results show that these approaches bypass the permanent machine failure and reduce the makespan.作者: 漂泊 時間: 2025-3-30 02:02 作者: FLAGR 時間: 2025-3-30 05:29
Agents of Change in an EU Contexty topology problem to MP2CS problem. This leads to an alternate NP-hard proof for MP2CS problem. We propose a heuristic for MP2CS, which is based on MST augmentation. Through simulation we show that the proposed heuristics performs better than the existing heuristic for MP2CS problem. We then consid作者: 贊成你 時間: 2025-3-30 10:15
Panagiotis E. Petrakis,Pantelis C. Kostisandom exploration schemes following some parameters which decides whether to include a node/edge or not. Due to the dynamicity of the road network with several dynamic parameters, the optimized path tends to change with intervals, the optimized path changes and will bring about a near fair distribut作者: notion 時間: 2025-3-30 15:09 作者: 憤怒事實 時間: 2025-3-30 18:13
Privacy through Accountability: A Computer Science Perspectiveol mechanisms are inadequate for enforcing such privacy policies, we develop principled . mechanisms that seek to encourage policy-compliant behavior by detecting policy violations, assigning blame, and punishing violators. We apply these techniques to several U.S. privacy laws and organizational pr作者: Fabric 時間: 2025-3-30 21:49 作者: 懶洋洋 時間: 2025-3-31 03:59
An Improved Approach of Decoupling in Mobile Cloud Computing networks. This results in better decoupling between mobile applications and mobile cloud services, which, in turn, improves adaptability and robustness of MCC. A new mobile cloud architecture that realizes the proposed approach has also been presented in this paper.作者: 噴出 時間: 2025-3-31 08:09 作者: regale 時間: 2025-3-31 12:30
SNAPWebD and SNAPSync: A Web Desktop and Transparent , of NFS and Standalone System Logical VolumesNFS volumes of a user and vice versa. Together, these two applications allow a user to access their home directory from the cloud using any available device and also sync the changes transparently to local home systems. This keeps the information consistent across multiple systems without user inter作者: 食品室 時間: 2025-3-31 15:42
Minimum Range Assignment Problem for Two Connectivity in Wireless Sensor Networksy topology problem to MP2CS problem. This leads to an alternate NP-hard proof for MP2CS problem. We propose a heuristic for MP2CS, which is based on MST augmentation. Through simulation we show that the proposed heuristics performs better than the existing heuristic for MP2CS problem. We then consid作者: 壯觀的游行 時間: 2025-3-31 18:31
Discrete Krill Herd Algorithm – A Bio-Inspired Meta-Heuristics for Graph Based Network Route Optimizandom exploration schemes following some parameters which decides whether to include a node/edge or not. Due to the dynamicity of the road network with several dynamic parameters, the optimized path tends to change with intervals, the optimized path changes and will bring about a near fair distribut作者: 空氣傳播 時間: 2025-4-1 01:35 作者: objection 時間: 2025-4-1 02:36 作者: MAG 時間: 2025-4-1 08:55
Jaume Barceló,Xavier Ros-Roca,Lidia Monterong found in embedded systems. To handle them, we extend the Hop web programming platform by HipHop, a domain-specific language dedicated to event-based process orchestration. Borrowing the synchronous reactive model of Esterel, HipHop is based on synchronous concurrency and preemption primitives tha作者: AVANT 時間: 2025-4-1 12:32
An American Interlude: Sanctions Reinventede very reasons that make it effective in dynamic programming can also be leveraged for using it for distributed schemes for certain matrix computations involving non-negative matrices. In this spirit, we propose a reinforcement learning algorithm for PageRank computation that is fashioned after anal作者: 虛假 時間: 2025-4-1 14:21 作者: 滔滔不絕的人 時間: 2025-4-1 19:20
Designing and Applying Chapter VIIve, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The rec