派博傳思國際中心

標(biāo)題: Titlebook: Distributed Computing and Internet Technology; 14th International C Atul Negi,Raj Bhatnagar,Laxmi Parida Conference proceedings 2018 Spring [打印本頁]

作者: JAR    時間: 2025-3-21 18:35
書目名稱Distributed Computing and Internet Technology影響因子(影響力)




書目名稱Distributed Computing and Internet Technology影響因子(影響力)學(xué)科排名




書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度




書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Distributed Computing and Internet Technology被引頻次




書目名稱Distributed Computing and Internet Technology被引頻次學(xué)科排名




書目名稱Distributed Computing and Internet Technology年度引用




書目名稱Distributed Computing and Internet Technology年度引用學(xué)科排名




書目名稱Distributed Computing and Internet Technology讀者反饋




書目名稱Distributed Computing and Internet Technology讀者反饋學(xué)科排名





作者: 有害處    時間: 2025-3-21 22:56

作者: 單調(diào)性    時間: 2025-3-22 02:35

作者: Acumen    時間: 2025-3-22 07:49
https://doi.org/10.1057/9781137346568easy, security and privacy concern of App installed on mobile phone poses a potential threat to user of mobile phone. Users typically do not pay much attention at the time of App installation before accepting the privacy terms display on his/her mobile phone. In this paper, we present a security mon
作者: PURG    時間: 2025-3-22 09:32

作者: Calculus    時間: 2025-3-22 15:57

作者: Calculus    時間: 2025-3-22 21:06

作者: 事與愿違    時間: 2025-3-23 00:20

作者: Repetitions    時間: 2025-3-23 04:44

作者: Flounder    時間: 2025-3-23 09:07
https://doi.org/10.1007/978-3-030-59951-5lustering is the estimation of initial centroids which influence the performance of the algorithm. To overcome this issue, optimization algorithms like Bat and Firefly are executed as pre-processing step. These algorithms return optimal centroids which is given as input to the K-Means algorithm. Clu
作者: BROTH    時間: 2025-3-23 11:45
Scientific Communication and Codifications has emerged in recent years as an important paradigm for feature selection i.e. finding Reduct of conditional attributes in given data set. Two control strategies for Reduct Computation are Sequential Forward Selection (SFS), Sequential Backward Elimination(SBE). With the objective of scalable fea
作者: Femine    時間: 2025-3-23 15:38

作者: Enteropathic    時間: 2025-3-23 21:27
CETA: Gold Standard or Greenwashing?mart city, the number of handovers also increases proportionately. Minimization of the handoff latency is crucial to provide a better quality of service for vehicles to have access different ITS services and applications. Increased handover latency can cause an interruption in vehicle-to-infrastruct
作者: ANTIC    時間: 2025-3-24 02:01
The Evolution of the Primate FootThe problem under consideration is called the minimum cost dominating tree problem [.]. It arises in the context of wireless mobile communication, when building a . is required.
作者: originality    時間: 2025-3-24 03:36

作者: CRP743    時間: 2025-3-24 09:48

作者: gentle    時間: 2025-3-24 11:42
Formal Verification of Optimizing CompilersFormally verifying that a compiler, especially an optimizing one, maintains the semantics of its input has been a challenging problem. This paper surveys several of the main efforts in the area and describes recent efforts that target the LLVM compiler infrastructure while taking a novel viewpoint on the problem.
作者: 法律的瑕疵    時間: 2025-3-24 16:27

作者: 值得尊敬    時間: 2025-3-24 21:06

作者: 沉思的魚    時間: 2025-3-25 00:45

作者: STIT    時間: 2025-3-25 04:38

作者: 格子架    時間: 2025-3-25 08:14

作者: 有限    時間: 2025-3-25 12:36

作者: META    時間: 2025-3-25 17:12

作者: 含水層    時間: 2025-3-25 21:19

作者: thrombus    時間: 2025-3-26 03:18

作者: CLAIM    時間: 2025-3-26 05:24
Secure Synthesis of IoT via Readers-Writers Flow Modelquirements of the IoT. We demonstrate how the methodology concretely enables us to derive the constraints to be satisfied by the underlying components and enabled communications. A case study of a healthcare IoT implementation is discussed to illustrate the advantages of the methodology.
作者: 只有    時間: 2025-3-26 10:33
Auditing Access to Private Data on Android Platformde level. The experimental results show that the proposed security monitor can effectively detect private or sensitive data access of Apps with almost no overhead on power consumption of mobile phone and App performance.
作者: TAIN    時間: 2025-3-26 14:44

作者: 植物學(xué)    時間: 2025-3-26 20:03

作者: 易發(fā)怒    時間: 2025-3-26 23:28

作者: Infusion    時間: 2025-3-27 02:21
Hearing in Nonarthropod Invertebrates platforms. In this paper, we focus on the time-triggered scheduling of both independent and dependent mixed-criticality jobs on an identical multiprocessor platform. We show that our algorithm is more efficient than the Mixed criticality Priority Improvement (MCPI) algorithm, the only existing such algorithm for a multiprocessor platform.
作者: 空洞    時間: 2025-3-27 07:34
Conference proceedings 2018aneswar, India, in January 2018..The 9 full papers, 11 short papers and 3 poster papers presented in this?book were carefully reviewed and selected from 120?submissions. The ICDCIT conference focusses on security and privacy;?.distributed and multiprocessing approaches; networks protocols and applic
作者: 宮殿般    時間: 2025-3-27 13:30

作者: 高興去去    時間: 2025-3-27 16:47

作者: 雕鏤    時間: 2025-3-27 18:43

作者: 自然環(huán)境    時間: 2025-3-28 01:55
Studies in Industrial Organizationps the process..The problem that we addressed in this paper is - effective utilization of chain of trust results to improve performance of the DNSSEC protocol. We proposed temporal BDI (Belief Desire Intention) based approach to enhance the performance of DNSSEC.
作者: Inflated    時間: 2025-3-28 05:54

作者: 乞討    時間: 2025-3-28 07:35
https://doi.org/10.1007/978-3-030-59951-5stering is carried out on large data sets, therefore Apache Spark, an open source software framework is used. The performance of the optimization algorithms is evaluated and the best algorithm is determined.
作者: 謙卑    時間: 2025-3-28 11:10

作者: 東西    時間: 2025-3-28 14:43
A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment Systemtion a layered approach for NFC-enabled mobile payment system is proposed. The layered approach for fraud analytic will provide a solution based on transaction risk-modeling, business rule-based, and cross-field referencing.
作者: 庇護(hù)    時間: 2025-3-28 18:46

作者: 不幸的人    時間: 2025-3-29 00:54
Andrew C. Mason,Klaus Schildbergeron running inside the VM. This paper discusses the performance of Hadoop when VMs are migrated from one host to another. Experiment shows that job completion time, average downtime as well as average migration time gets increased with increase in the number of VMs that are migrated.
作者: 發(fā)酵    時間: 2025-3-29 05:59
Effect of Live Migration on Virtual Hadoop Clusteron running inside the VM. This paper discusses the performance of Hadoop when VMs are migrated from one host to another. Experiment shows that job completion time, average downtime as well as average migration time gets increased with increase in the number of VMs that are migrated.
作者: 茁壯成長    時間: 2025-3-29 09:46
Review of Approaches for Linked Data Ontology Enrichmenthe edges correspond to logical statements that link these resources using binary relations of interest in the domain. The framework provides a standardized way of describing a domain of interest so that the description is machine-processable. This enables applications to share data and knowledge abo
作者: LIKEN    時間: 2025-3-29 13:00

作者: insecticide    時間: 2025-3-29 18:26

作者: resistant    時間: 2025-3-29 21:09
Auditing Access to Private Data on Android Platformeasy, security and privacy concern of App installed on mobile phone poses a potential threat to user of mobile phone. Users typically do not pay much attention at the time of App installation before accepting the privacy terms display on his/her mobile phone. In this paper, we present a security mon
作者: 使絕緣    時間: 2025-3-30 00:03
Privacy Preserving Data Utility Mining Using Perturbatione disclosure risks that one may encounter when releasing data to outside parties. Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. Privacy Preserving Utility Mining (PPUM) is an extension of
作者: 胰島素    時間: 2025-3-30 06:52
BDI Based Performance Enhancement in DNSSECm the intended tsk, the DNSSEC protocol primarily uses a technique called .. During chain of trust construction, the DNSSEC protocol actually ensures the identity/credentials of each node that come across with its parent node. Finally, when it reaches to the point of trust anchor (i.e. root), it sto
作者: CEDE    時間: 2025-3-30 08:26
A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment Systemle use smart phone’s to imperforate their mobile banking activities which in turn results in fraudulent activities. The fast growing use of electronic payments has increased the demand for emphatic, decisive and real time based method for fraud detection and prevention. To prevent fraudulent transac
作者: 修剪過的樹籬    時間: 2025-3-30 13:00
Time-Triggered Scheduling for Multiprocessor Mixed-Criticality Systems. The increasing complexity in the design of mixed-criticality real-time systems has motivated researchers to move from uniprocessor to multiprocessor platforms. In this paper, we focus on the time-triggered scheduling of both independent and dependent mixed-criticality jobs on an identical multipro
作者: defibrillator    時間: 2025-3-30 17:27
Effect of Live Migration on Virtual Hadoop Cluster it is now feasible to deploy Hadoop in private or public cloud environment which offers unique benefits like scalability, high availability etc. Live migration is an important feature provided by virtualization that migrate a running VM from one physical host to another to facilitate load balancing
作者: 廢除    時間: 2025-3-30 21:13





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
合作市| 铁岭市| 平果县| 双城市| 永州市| 永川市| 齐河县| 含山县| 邻水| 明水县| 达日县| 扶绥县| 库车县| 石城县| 商城县| 九龙城区| 湘潭市| 晴隆县| 措美县| 呼伦贝尔市| 三亚市| 青神县| 电白县| 龙海市| 台北县| 旺苍县| 甘洛县| 屏山县| 什邡市| 嘉祥县| 宿松县| 保德县| 策勒县| 揭阳市| 普陀区| 察雅县| 新河县| 赤水市| 泊头市| 罗甸县| 望都县|