派博傳思國際中心

標(biāo)題: Titlebook: Distributed Computing and Internet Technology; 15th International C Günter Fahrnberger,Sapna Gopinathan,Laxmi Parida Conference proceedings [打印本頁]

作者: 鳥場    時(shí)間: 2025-3-21 18:43
書目名稱Distributed Computing and Internet Technology影響因子(影響力)




書目名稱Distributed Computing and Internet Technology影響因子(影響力)學(xué)科排名




書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度




書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Distributed Computing and Internet Technology被引頻次




書目名稱Distributed Computing and Internet Technology被引頻次學(xué)科排名




書目名稱Distributed Computing and Internet Technology年度引用




書目名稱Distributed Computing and Internet Technology年度引用學(xué)科排名




書目名稱Distributed Computing and Internet Technology讀者反饋




書目名稱Distributed Computing and Internet Technology讀者反饋學(xué)科排名





作者: assent    時(shí)間: 2025-3-21 21:04
The Digital Turn: On the Quest for Holistic Approachesore. Apparently, the change is not straightforward. For a better digital future, a bigger perspective and greater responsibility for decisions around digital technologies seems to be necessary. Digitization has now become a social issue. A look at the basics and principles of digitalization will lea
作者: 為敵    時(shí)間: 2025-3-22 03:15
Secured Communications on Vehicular Networks over Cellular Networkss a WiFi designed for mobile networks, it is used for these communications. ITS-G5 is used by real vehicles over the world within deployment projects. These communications could be between vehicles denoted V2V communications or between vehicles and RSUs denoted V2I. The coverage of RSUs will never s
作者: Medicare    時(shí)間: 2025-3-22 06:02

作者: Demulcent    時(shí)間: 2025-3-22 11:05

作者: TIA742    時(shí)間: 2025-3-22 14:34

作者: TIA742    時(shí)間: 2025-3-22 20:33

作者: 新手    時(shí)間: 2025-3-22 21:51
Dr. Hadoop: In Search of a Needle in a Haystacke upon failure. The design is based on the Doubly Circular Linked List. However, the Dr. Hadoop considers the conventional hashing scheme of metadata. In this paper, Bloom Filter is integrated with Dr. Hadoop to boost up the metadata service performance. The conventional hashing is replaced by Bloom
作者: mighty    時(shí)間: 2025-3-23 04:01

作者: 失望昨天    時(shí)間: 2025-3-23 05:37
Supporting Transaction Predictability in Replicated DRTDBS transactions (RTTs) and preserving of the mutual consistency of replicated data. Previous researches in RDRTDBS have been concentrated mainly on designing of replica update techniques (RUTs) for soft and firm RTTs with sole correctness criteria of serializability and epsilon serializability. No wor
作者: nitroglycerin    時(shí)間: 2025-3-23 13:01

作者: MINT    時(shí)間: 2025-3-23 17:16

作者: 銼屑    時(shí)間: 2025-3-23 20:02

作者: 付出    時(shí)間: 2025-3-24 01:13

作者: 會犯錯(cuò)誤    時(shí)間: 2025-3-24 05:23

作者: 濃縮    時(shí)間: 2025-3-24 08:45
Event Detection and Aspects in Twitter: A BoW Approachrch problem. Among several techniques like statistical, graph-based, machine learning, NLP based and many such techniques, bag-of-words technique is simple and elegant. This paper reports an event detection technique using clustering of bag-of-words of a given set of tweets. The method proposed foll
作者: 芳香一點(diǎn)    時(shí)間: 2025-3-24 10:57
Conference proceedings 2019aneswar, India, in January 2019..The 18 full papers and 14 short papers presented together with 5 invited papers were carefully reviewed and selected from 115 submissions. The papers present research in three areas: distributed computing, Internet technologies, and societal applications..
作者: 狂熱語言    時(shí)間: 2025-3-24 17:07
0302-9743 ld in Bhubaneswar, India, in January 2019..The 18 full papers and 14 short papers presented together with 5 invited papers were carefully reviewed and selected from 115 submissions. The papers present research in three areas: distributed computing, Internet technologies, and societal applications..9
作者: Feigned    時(shí)間: 2025-3-24 21:01
The Fair and Responsible Use of Spacedigital technologies seems to be necessary. Digitization has now become a social issue. A look at the basics and principles of digitalization will lead us to some theses. With the help of some insights into companies, we embark on a search for successful practices and challenges in digital change.
作者: 顯示    時(shí)間: 2025-3-25 00:27

作者: 低三下四之人    時(shí)間: 2025-3-25 06:23

作者: Licentious    時(shí)間: 2025-3-25 09:02
The Fallacy of Corporate Moral Agencyholic EEG signal. These rhythm features were applied to ensemble subspace K NN classifier with 10-fold cross validation. The proposed method with ensemble subspace KNN classifier delivers best classification accuracy (98.25%) as compared with other existing techniques.
作者: PLAYS    時(shí)間: 2025-3-25 15:26
Research on CNN Parallel Computing and Learning Architecture Based on Real-Time Streaming Architectu in the case of achieving a recognition accuracy rate of 95%, the training time of single serial model is around 913?s, and in CNN-S model only needs 248?s. The acceleration ratio can reach 3.681. This shows that the CNN-S parallel model has better performance than single serial mode on training efficiency and cost of system resource.
作者: 泛濫    時(shí)間: 2025-3-25 18:17

作者: 繞著哥哥問    時(shí)間: 2025-3-25 20:33

作者: 不吉祥的女人    時(shí)間: 2025-3-26 03:09
Digital Society: A Computing Science Prospectivedresses some of the issues like modelling a netizen, communication, pressure group creation, electronic voting, law making and education for digital society; scopes the research challenges the issues offer.
作者: Neutral-Spine    時(shí)間: 2025-3-26 05:03
0302-9743 selected from 115 submissions. The papers present research in three areas: distributed computing, Internet technologies, and societal applications..978-3-030-05365-9978-3-030-05366-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: Keratectomy    時(shí)間: 2025-3-26 10:13
The Big Tokamaks: TFTR, JET, JT-60chedule length. We simulate the proposed algorithm on various scientific and random workflows of different size and category. The simulation results show that the proposed algorithm outperforms the existing scheduling algorithms.
作者: demote    時(shí)間: 2025-3-26 12:55
Transcervical Tubal Endoscopy: FalloposcopyUsing the results, a sensitivity analysis is performed in this paper. The weights are varied across thirty-four experiments. The result says that the minimum percentage of change required in the weight is 8.52% to alter the final ranking of alternatives.
作者: ordain    時(shí)間: 2025-3-26 18:38
The space debris environment and its impactsal verification framework based on abstractions and model checking for verifying safety properties. The framework is illustrated through an avionics case study involving an adaptive flight planning system.
作者: 闖入    時(shí)間: 2025-3-27 00:06
Early Years of the Fusion Effortod performance as compared to other variants of Bloom Filter. We conduct a series of rigorous experiments using Microsoft Traces to investigate the behavior of the rFilter on the Dr. Hadoop framework.
作者: Contend    時(shí)間: 2025-3-27 03:48
https://doi.org/10.1057/9780230510586 RDRTDBS and presents a processing plan that supports predictable execution of hard, soft and firm RTT along with maintaining the mutual consistency. The simulation results demonstrate that the proposed processing scheme enhances the performance of RDRTDBS beyond that offered by the existing RUTs.
作者: 花束    時(shí)間: 2025-3-27 08:56
Avionics Self-adaptive Software: Towards Formal Verification and Validational verification framework based on abstractions and model checking for verifying safety properties. The framework is illustrated through an avionics case study involving an adaptive flight planning system.
作者: 清楚    時(shí)間: 2025-3-27 12:28
Dr. Hadoop: In Search of a Needle in a Haystackod performance as compared to other variants of Bloom Filter. We conduct a series of rigorous experiments using Microsoft Traces to investigate the behavior of the rFilter on the Dr. Hadoop framework.
作者: 送秋波    時(shí)間: 2025-3-27 14:04
Supporting Transaction Predictability in Replicated DRTDBS RDRTDBS and presents a processing plan that supports predictable execution of hard, soft and firm RTT along with maintaining the mutual consistency. The simulation results demonstrate that the proposed processing scheme enhances the performance of RDRTDBS beyond that offered by the existing RUTs.
作者: heterodox    時(shí)間: 2025-3-27 20:11
Duplication Based Budget Effective Workflow Scheduling for Cloud Computingchedule length. We simulate the proposed algorithm on various scientific and random workflows of different size and category. The simulation results show that the proposed algorithm outperforms the existing scheduling algorithms.
作者: CAND    時(shí)間: 2025-3-27 22:32
A Sensitivity Analysis on Weight Sum Method MCDM Approach for Product RecommendationUsing the results, a sensitivity analysis is performed in this paper. The weights are varied across thirty-four experiments. The result says that the minimum percentage of change required in the weight is 8.52% to alter the final ranking of alternatives.
作者: 哪有黃油    時(shí)間: 2025-3-28 05:19
The Fair and Responsible Use of Space feature nowadays on any shared system. This issue should be considered on deployed VANETs in order to avoid tracking drivers who send their locations in awareness messages. The anonymity is ensured by changing the identity of users frequently using a strict process. Indeed, the new identities shall
作者: misshapen    時(shí)間: 2025-3-28 08:55
https://doi.org/10.1007/978-3-030-64344-7f the workflow to the VMs, such that the overall workflow execution time (makespan) is minimized and the assigned load on each VM is also balanced. With the rigorous experiments on scientific workflows, we show that the proposed approach performs better than PSO, GA and MPQGA (multiple priority queu
作者: 不近人情    時(shí)間: 2025-3-28 10:52

作者: 多余    時(shí)間: 2025-3-28 17:32
Defeat in War, Victory in Peacents are designed to evaluate the behaviors with three different scheduling policies. Simulation results show that over 15% performance gain, in the system adopted optimal data scheduling policy, can be achieved according to different working scenarios, in which network communication conditions and p
作者: 有抱負(fù)者    時(shí)間: 2025-3-28 22:17
The Fallacy of Corporate Moral Agencys and communication events. To overcome this drawback, the EVC can be used in conjunction with several scalability techniques that can allow the use of the EVC in practical applications. We then present a case study of detecting memory consistency errors in MPI one-sided applications using EVC.
作者: myriad    時(shí)間: 2025-3-29 01:21
Pelvic Inflammatory Disease — An Overview a keyword-based strategy. The obtained event detection result is presented and aspects of an event are evaluated in terms of precision and recall against human annotators. With concluding remark the paper presents its findings the possibility of enhancement in event detection as well as aspect find
作者: homocysteine    時(shí)間: 2025-3-29 06:48

作者: concert    時(shí)間: 2025-3-29 10:42
A Hybrid Meta-heuristic Approach for Load Balanced Workflow Scheduling in IaaS Cloudf the workflow to the VMs, such that the overall workflow execution time (makespan) is minimized and the assigned load on each VM is also balanced. With the rigorous experiments on scientific workflows, we show that the proposed approach performs better than PSO, GA and MPQGA (multiple priority queu
作者: 暫時(shí)中止    時(shí)間: 2025-3-29 14:53

作者: 高原    時(shí)間: 2025-3-29 18:18
Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoTnts are designed to evaluate the behaviors with three different scheduling policies. Simulation results show that over 15% performance gain, in the system adopted optimal data scheduling policy, can be achieved according to different working scenarios, in which network communication conditions and p
作者: expound    時(shí)間: 2025-3-29 20:04
On the Growth of the Prime Numbers Based Encoded Vector Clocks and communication events. To overcome this drawback, the EVC can be used in conjunction with several scalability techniques that can allow the use of the EVC in practical applications. We then present a case study of detecting memory consistency errors in MPI one-sided applications using EVC.
作者: Incorporate    時(shí)間: 2025-3-30 00:39
Event Detection and Aspects in Twitter: A BoW Approach a keyword-based strategy. The obtained event detection result is presented and aspects of an event are evaluated in terms of precision and recall against human annotators. With concluding remark the paper presents its findings the possibility of enhancement in event detection as well as aspect find
作者: accordance    時(shí)間: 2025-3-30 04:24
Distributed Computing and Internet Technology978-3-030-05366-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: GONG    時(shí)間: 2025-3-30 08:54

作者: SPASM    時(shí)間: 2025-3-30 14:49

作者: 迷住    時(shí)間: 2025-3-30 18:25

作者: 圍巾    時(shí)間: 2025-3-30 20:44
The Fair and Responsible Use of Spaces a WiFi designed for mobile networks, it is used for these communications. ITS-G5 is used by real vehicles over the world within deployment projects. These communications could be between vehicles denoted V2V communications or between vehicles and RSUs denoted V2I. The coverage of RSUs will never s
作者: 蘑菇    時(shí)間: 2025-3-31 03:20

作者: Endometrium    時(shí)間: 2025-3-31 05:34
https://doi.org/10.1007/978-3-030-64344-7g science can offer enabling netizens to active citizens is of interest for computing professionals. From computing science perspective, this paper addresses some of the issues like modelling a netizen, communication, pressure group creation, electronic voting, law making and education for digital s
作者: 馬具    時(shí)間: 2025-3-31 10:14





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
司法| 崇州市| 和田市| 普洱| 彰化市| 布拖县| 济宁市| 固始县| 济源市| 张家口市| 德阳市| 砀山县| 渝北区| 通化市| 泸水县| 达拉特旗| 双牌县| 洛隆县| 延庆县| 额尔古纳市| 大同县| 绥化市| 鹤岗市| 永丰县| 永春县| 濮阳市| 成武县| 哈密市| 临西县| 黑河市| 集贤县| 甘德县| 大荔县| 会泽县| 镇坪县| 驻马店市| 盐山县| 彭州市| 都兰县| 阜阳市| 荥经县|