標(biāo)題: Titlebook: Distributed Computing and Internet Technology; 14th International C Atul Negi,Raj Bhatnagar,Laxmi Parida Conference proceedings 2018 Spring [打印本頁] 作者: JAR 時間: 2025-3-21 18:35
書目名稱Distributed Computing and Internet Technology影響因子(影響力)
書目名稱Distributed Computing and Internet Technology影響因子(影響力)學(xué)科排名
書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度
書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Distributed Computing and Internet Technology被引頻次
書目名稱Distributed Computing and Internet Technology被引頻次學(xué)科排名
書目名稱Distributed Computing and Internet Technology年度引用
書目名稱Distributed Computing and Internet Technology年度引用學(xué)科排名
書目名稱Distributed Computing and Internet Technology讀者反饋
書目名稱Distributed Computing and Internet Technology讀者反饋學(xué)科排名
作者: 有害處 時間: 2025-3-21 22:56 作者: 單調(diào)性 時間: 2025-3-22 02:35 作者: Acumen 時間: 2025-3-22 07:49
https://doi.org/10.1057/9781137346568easy, security and privacy concern of App installed on mobile phone poses a potential threat to user of mobile phone. Users typically do not pay much attention at the time of App installation before accepting the privacy terms display on his/her mobile phone. In this paper, we present a security mon作者: PURG 時間: 2025-3-22 09:32 作者: Calculus 時間: 2025-3-22 15:57 作者: Calculus 時間: 2025-3-22 21:06 作者: 事與愿違 時間: 2025-3-23 00:20 作者: Repetitions 時間: 2025-3-23 04:44 作者: Flounder 時間: 2025-3-23 09:07
https://doi.org/10.1007/978-3-030-59951-5lustering is the estimation of initial centroids which influence the performance of the algorithm. To overcome this issue, optimization algorithms like Bat and Firefly are executed as pre-processing step. These algorithms return optimal centroids which is given as input to the K-Means algorithm. Clu作者: BROTH 時間: 2025-3-23 11:45
Scientific Communication and Codifications has emerged in recent years as an important paradigm for feature selection i.e. finding Reduct of conditional attributes in given data set. Two control strategies for Reduct Computation are Sequential Forward Selection (SFS), Sequential Backward Elimination(SBE). With the objective of scalable fea作者: Femine 時間: 2025-3-23 15:38 作者: Enteropathic 時間: 2025-3-23 21:27
CETA: Gold Standard or Greenwashing?mart city, the number of handovers also increases proportionately. Minimization of the handoff latency is crucial to provide a better quality of service for vehicles to have access different ITS services and applications. Increased handover latency can cause an interruption in vehicle-to-infrastruct作者: ANTIC 時間: 2025-3-24 02:01
The Evolution of the Primate FootThe problem under consideration is called the minimum cost dominating tree problem [.]. It arises in the context of wireless mobile communication, when building a . is required.作者: originality 時間: 2025-3-24 03:36 作者: CRP743 時間: 2025-3-24 09:48 作者: gentle 時間: 2025-3-24 11:42
Formal Verification of Optimizing CompilersFormally verifying that a compiler, especially an optimizing one, maintains the semantics of its input has been a challenging problem. This paper surveys several of the main efforts in the area and describes recent efforts that target the LLVM compiler infrastructure while taking a novel viewpoint on the problem.作者: 法律的瑕疵 時間: 2025-3-24 16:27 作者: 值得尊敬 時間: 2025-3-24 21:06 作者: 沉思的魚 時間: 2025-3-25 00:45 作者: STIT 時間: 2025-3-25 04:38 作者: 格子架 時間: 2025-3-25 08:14 作者: 有限 時間: 2025-3-25 12:36 作者: META 時間: 2025-3-25 17:12 作者: 含水層 時間: 2025-3-25 21:19 作者: thrombus 時間: 2025-3-26 03:18 作者: CLAIM 時間: 2025-3-26 05:24
Secure Synthesis of IoT via Readers-Writers Flow Modelquirements of the IoT. We demonstrate how the methodology concretely enables us to derive the constraints to be satisfied by the underlying components and enabled communications. A case study of a healthcare IoT implementation is discussed to illustrate the advantages of the methodology.作者: 只有 時間: 2025-3-26 10:33
Auditing Access to Private Data on Android Platformde level. The experimental results show that the proposed security monitor can effectively detect private or sensitive data access of Apps with almost no overhead on power consumption of mobile phone and App performance.作者: TAIN 時間: 2025-3-26 14:44 作者: 植物學(xué) 時間: 2025-3-26 20:03 作者: 易發(fā)怒 時間: 2025-3-26 23:28 作者: Infusion 時間: 2025-3-27 02:21
Hearing in Nonarthropod Invertebrates platforms. In this paper, we focus on the time-triggered scheduling of both independent and dependent mixed-criticality jobs on an identical multiprocessor platform. We show that our algorithm is more efficient than the Mixed criticality Priority Improvement (MCPI) algorithm, the only existing such algorithm for a multiprocessor platform.作者: 空洞 時間: 2025-3-27 07:34
Conference proceedings 2018aneswar, India, in January 2018..The 9 full papers, 11 short papers and 3 poster papers presented in this?book were carefully reviewed and selected from 120?submissions. The ICDCIT conference focusses on security and privacy;?.distributed and multiprocessing approaches; networks protocols and applic作者: 宮殿般 時間: 2025-3-27 13:30 作者: 高興去去 時間: 2025-3-27 16:47 作者: 雕鏤 時間: 2025-3-27 18:43 作者: 自然環(huán)境 時間: 2025-3-28 01:55
Studies in Industrial Organizationps the process..The problem that we addressed in this paper is - effective utilization of chain of trust results to improve performance of the DNSSEC protocol. We proposed temporal BDI (Belief Desire Intention) based approach to enhance the performance of DNSSEC.作者: Inflated 時間: 2025-3-28 05:54 作者: 乞討 時間: 2025-3-28 07:35
https://doi.org/10.1007/978-3-030-59951-5stering is carried out on large data sets, therefore Apache Spark, an open source software framework is used. The performance of the optimization algorithms is evaluated and the best algorithm is determined.作者: 謙卑 時間: 2025-3-28 11:10 作者: 東西 時間: 2025-3-28 14:43
A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment Systemtion a layered approach for NFC-enabled mobile payment system is proposed. The layered approach for fraud analytic will provide a solution based on transaction risk-modeling, business rule-based, and cross-field referencing. 作者: 庇護(hù) 時間: 2025-3-28 18:46 作者: 不幸的人 時間: 2025-3-29 00:54
Andrew C. Mason,Klaus Schildbergeron running inside the VM. This paper discusses the performance of Hadoop when VMs are migrated from one host to another. Experiment shows that job completion time, average downtime as well as average migration time gets increased with increase in the number of VMs that are migrated.作者: 發(fā)酵 時間: 2025-3-29 05:59
Effect of Live Migration on Virtual Hadoop Clusteron running inside the VM. This paper discusses the performance of Hadoop when VMs are migrated from one host to another. Experiment shows that job completion time, average downtime as well as average migration time gets increased with increase in the number of VMs that are migrated.作者: 茁壯成長 時間: 2025-3-29 09:46
Review of Approaches for Linked Data Ontology Enrichmenthe edges correspond to logical statements that link these resources using binary relations of interest in the domain. The framework provides a standardized way of describing a domain of interest so that the description is machine-processable. This enables applications to share data and knowledge abo作者: LIKEN 時間: 2025-3-29 13:00 作者: insecticide 時間: 2025-3-29 18:26 作者: resistant 時間: 2025-3-29 21:09
Auditing Access to Private Data on Android Platformeasy, security and privacy concern of App installed on mobile phone poses a potential threat to user of mobile phone. Users typically do not pay much attention at the time of App installation before accepting the privacy terms display on his/her mobile phone. In this paper, we present a security mon作者: 使絕緣 時間: 2025-3-30 00:03
Privacy Preserving Data Utility Mining Using Perturbatione disclosure risks that one may encounter when releasing data to outside parties. Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. Privacy Preserving Utility Mining (PPUM) is an extension of作者: 胰島素 時間: 2025-3-30 06:52
BDI Based Performance Enhancement in DNSSECm the intended tsk, the DNSSEC protocol primarily uses a technique called .. During chain of trust construction, the DNSSEC protocol actually ensures the identity/credentials of each node that come across with its parent node. Finally, when it reaches to the point of trust anchor (i.e. root), it sto作者: CEDE 時間: 2025-3-30 08:26
A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment Systemle use smart phone’s to imperforate their mobile banking activities which in turn results in fraudulent activities. The fast growing use of electronic payments has increased the demand for emphatic, decisive and real time based method for fraud detection and prevention. To prevent fraudulent transac作者: 修剪過的樹籬 時間: 2025-3-30 13:00
Time-Triggered Scheduling for Multiprocessor Mixed-Criticality Systems. The increasing complexity in the design of mixed-criticality real-time systems has motivated researchers to move from uniprocessor to multiprocessor platforms. In this paper, we focus on the time-triggered scheduling of both independent and dependent mixed-criticality jobs on an identical multipro作者: defibrillator 時間: 2025-3-30 17:27
Effect of Live Migration on Virtual Hadoop Cluster it is now feasible to deploy Hadoop in private or public cloud environment which offers unique benefits like scalability, high availability etc. Live migration is an important feature provided by virtualization that migrate a running VM from one physical host to another to facilitate load balancing作者: 廢除 時間: 2025-3-30 21:13