標(biāo)題: Titlebook: E-Business and Telecommunications; 11th International J Mohammad S. Obaidat,Andreas Holzinger,Joaquim Fili Conference proceedings 2015 Spri [打印本頁] 作者: 佯攻 時(shí)間: 2025-3-21 16:29
書目名稱E-Business and Telecommunications影響因子(影響力)
書目名稱E-Business and Telecommunications影響因子(影響力)學(xué)科排名
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Business and Telecommunications被引頻次
書目名稱E-Business and Telecommunications被引頻次學(xué)科排名
書目名稱E-Business and Telecommunications年度引用
書目名稱E-Business and Telecommunications年度引用學(xué)科排名
書目名稱E-Business and Telecommunications讀者反饋
書目名稱E-Business and Telecommunications讀者反饋學(xué)科排名
作者: nauseate 時(shí)間: 2025-3-21 23:18
y with new public management concepts. However, service consumers can hardly see the need to consume Cloud-based services, because convincing “Cloud-only” applications are still missing. Different revenue streams are discussed.作者: guzzle 時(shí)間: 2025-3-22 03:57 作者: LEVY 時(shí)間: 2025-3-22 05:27
Hollow-Core Antiresonant Fibers, protocol that is secure in the id-CK+ model based on the hardness assumption of the CDH problem. Additionally, both our schemes satisfy several other security properties such as forward secrecy, resistance to reflection attacks etc.作者: FLIC 時(shí)間: 2025-3-22 09:51
Trust Revoked — Practical Evaluation of OCSP- and CRL-Checking Implementationsrying behavior, from silently accepting any certificates to completely blocking access. In addition we search an existing data-set of X.509v3 HTTPS certificates for revocation information, finding that almost 85?% of them contain neither CRL nor OCSP information, thereby rendering any practical revocation attempt nearly useless.作者: 易于交談 時(shí)間: 2025-3-22 14:39 作者: 易于交談 時(shí)間: 2025-3-22 17:08 作者: AV-node 時(shí)間: 2025-3-23 01:03 作者: ostrish 時(shí)間: 2025-3-23 04:13 作者: 真繁榮 時(shí)間: 2025-3-23 06:51 作者: Morbid 時(shí)間: 2025-3-23 11:16 作者: Obverse 時(shí)間: 2025-3-23 15:04 作者: 我不重要 時(shí)間: 2025-3-23 18:31
https://doi.org/10.1007/978-3-642-47869-7ers and Third Parties; and (b) extract potential revenue models. It focuses on trade-offs between control in the ecosystem and the creation of value. Finally, it discusses how current developments contribute to changes in the position of the user within the ecosystem, and if mutually beneficial interaction can come about.作者: forager 時(shí)間: 2025-3-23 23:31
Autophagy Regulation of Innate Immunitylecommunication between roaming transmission equipments. Experiments reveal that the proposed techniques enable the transmission laser beam to locate the target receiver accurately and to pursue the unstable transmission apparatus, and that the communication quality is as high as optical fiber network.作者: 嗎啡 時(shí)間: 2025-3-24 04:18
https://doi.org/10.1007/978-94-009-8727-2ess policies, i.e., . as well as . of attributes. The proposed . is secure assuming the hardness of standard assumptions in the presence of malicious adversary in full-simulation security model. It exhibits significant improvement over the existing similar schemes in terms of both communication and computation.作者: 易受刺激 時(shí)間: 2025-3-24 08:01
Blueprints of an Automated Android Test-Beds possible) the devices participating in the experiment. Moreover, the virtual test-bed provides a wide variety of data collection possibilities while the physical one has a leaner design allowing to perform experiments in a more ad hoc way (with the devices available in a room).作者: 褪色 時(shí)間: 2025-3-24 11:36
A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocolin each message and communicating nodes. We use . (Security Protocol Animator) for . (Automated Validation of Internet Security Protocols and Applications) tool for analysis and validation of our scheme. The obtained validation results show that the scheme is safe.作者: 隼鷹 時(shí)間: 2025-3-24 18:33 作者: 改變 時(shí)間: 2025-3-24 19:45 作者: FLIP 時(shí)間: 2025-3-25 01:27
Transmission Laser Beam Control Techniques for Active Free Space Optics Systemslecommunication between roaming transmission equipments. Experiments reveal that the proposed techniques enable the transmission laser beam to locate the target receiver accurately and to pursue the unstable transmission apparatus, and that the communication quality is as high as optical fiber network.作者: 充滿裝飾 時(shí)間: 2025-3-25 03:26 作者: 沖突 時(shí)間: 2025-3-25 11:02
Conference proceedings 2015ienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conf作者: 流眼淚 時(shí)間: 2025-3-25 15:05
1865-0929 mmunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems..978-3-319-25914-7978-3-319-25915-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 鋪?zhàn)?nbsp; 時(shí)間: 2025-3-25 19:30
Zero-Forcing Equalisation of Measured Optical Multimode MIMO Channelsas signal deconvolution is critical in noisy environments. That’s why different approaches such as Wiener and parametric filtering are studied with respect to different optimization criteria. Using these obtained impulse responses a baseband MIMO data transmission is modelled. In order to create ort作者: 心胸開闊 時(shí)間: 2025-3-25 23:42
ARES: An Adaptive, Resilient, Estimation Scheme for Enforcing Bandwidth Allocation in XG-PON SystemsIn this work, a resilient coordination scheme is presented that intends to ensure high-efficient traffic delivery under pressing traffic conditions. In order to achieve that, a sophisticated machine learning model is proposed that coordinates the Optical Networks Units (ONUs) based on their traffic 作者: Glossy 時(shí)間: 2025-3-26 01:37
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Netwois problem formally, showing it to be NP-hard and then provide an approximation algorithm that exhibits several useful properties. Finally, we compare recent approach for selecting a subset of distraction clusters with our prototypal implementation of the proposed framework and then unveil experimen作者: 空氣 時(shí)間: 2025-3-26 04:59 作者: DAMP 時(shí)間: 2025-3-26 10:12 作者: landfill 時(shí)間: 2025-3-26 13:54
Conference proceedings 2015viewed and selected from 328 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems..作者: 追逐 時(shí)間: 2025-3-26 18:14
Automorphic Forms and Lie Superalgebrasas signal deconvolution is critical in noisy environments. That’s why different approaches such as Wiener and parametric filtering are studied with respect to different optimization criteria. Using these obtained impulse responses a baseband MIMO data transmission is modelled. In order to create ort作者: OVERT 時(shí)間: 2025-3-26 21:55 作者: lymphedema 時(shí)間: 2025-3-27 03:03 作者: 自制 時(shí)間: 2025-3-27 05:58
https://doi.org/10.1007/978-3-031-69312-0ound of communication from the original signers to the proxy signer. Thus our scheme requires significantly less operation time in the practical implementation and also increases the actual security by reducing the components available to an adversary to attack. Finally, we compare our scheme with a作者: 輕而薄 時(shí)間: 2025-3-27 09:38
Hyaluronic Acid Filler Impurities, counterparts, revealing and analyzing the significant gap between the two. Finally, we provide a comparison between the Safe Browsing API implementation in Google Chrome and the Safe Browsing Lookup API, revealing significant inconsistencies between the two mechanisms.作者: APNEA 時(shí)間: 2025-3-27 16:10 作者: 變態(tài) 時(shí)間: 2025-3-27 19:24 作者: 新鮮 時(shí)間: 2025-3-28 00:31
978-3-319-25914-7Springer International Publishing Switzerland 2015作者: ascend 時(shí)間: 2025-3-28 02:53 作者: commonsense 時(shí)間: 2025-3-28 09:34 作者: STALE 時(shí)間: 2025-3-28 12:24 作者: patella 時(shí)間: 2025-3-28 15:49 作者: Irritate 時(shí)間: 2025-3-28 21:12 作者: Metamorphosis 時(shí)間: 2025-3-29 01:55
s are needed. At the same time, Cloud computing has emerged as a new way to digitize the public sector, but thus far there is only little experience in this domain. Therefore, ETH Zurich and the University of Zurich jointly set up a Cloud stack to experiment with HPC service provision and correspond作者: 多山 時(shí)間: 2025-3-29 05:07 作者: Urea508 時(shí)間: 2025-3-29 10:35 作者: irreducible 時(shí)間: 2025-3-29 14:32 作者: ENDOW 時(shí)間: 2025-3-29 16:57 作者: Osteoporosis 時(shí)間: 2025-3-29 20:43
t-mean-square polynomial regression for the estimation of incoming traffic and adaptive least-mean-squares filtering for the estimation of the EPON cycle duration. Given these estimates, the ONU successfully predicts its bandwidth requirements at the next available transmission opportunity and commu作者: 是剝皮 時(shí)間: 2025-3-30 03:02
Autophagy Regulation of Innate Immunity two active free-space-optical terminals, which are equipped with galvanic scanners, E/O and O/E converters and are able to control laser beam discharging directions. Two alignment strategies are proposed with regard to the transient and steady state of optical signal transmission. Search method for作者: 變異 時(shí)間: 2025-3-30 05:40 作者: agitate 時(shí)間: 2025-3-30 10:16 作者: 熔巖 時(shí)間: 2025-3-30 15:06 作者: 制定法律 時(shí)間: 2025-3-30 18:05
Hollow-Core Antiresonant Fibers,in certificateless cryptography that is an extension of earlier models. We note that the existing pairing free protocols are not secure in our model. We design an efficient pairing-free, single round protocol that is secure in our model based on the hardness assumption of the Computational Diffie He作者: RENAL 時(shí)間: 2025-3-30 22:55
Hyaluronic Acid Filler Impurities, devices for web browsing, accessing email services and social networking is also getting continuously more popular. The same holds true for other more sensitive online activities, such as online shopping, contactless payments, and web banking. However, the security mechanisms available on smartphon