派博傳思國際中心

標題: Titlebook: E-Business and Telecommunications; 13th International J Mohammad S. Obaidat Conference proceedings 2017 Springer International Publishing A [打印本頁]

作者: affected    時間: 2025-3-21 17:27
書目名稱E-Business and Telecommunications影響因子(影響力)




書目名稱E-Business and Telecommunications影響因子(影響力)學(xué)科排名




書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度




書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱E-Business and Telecommunications被引頻次




書目名稱E-Business and Telecommunications被引頻次學(xué)科排名




書目名稱E-Business and Telecommunications年度引用




書目名稱E-Business and Telecommunications年度引用學(xué)科排名




書目名稱E-Business and Telecommunications讀者反饋




書目名稱E-Business and Telecommunications讀者反饋學(xué)科排名





作者: 低位的人或事    時間: 2025-3-21 20:37
Multipath Forwarding in Named Data Networking: Flow, Fairness, and Context-Awarenessis paper, we elicit essential requirements for forwarding strategies and show that existing strategies struggle to fully fulfill these requirements. After that, we investigate how to unlock the full capabilities of NDN by enabling the consideration of context information in the forwarding plane. In
作者: PHON    時間: 2025-3-22 03:39

作者: Incisor    時間: 2025-3-22 07:55

作者: 厚臉皮    時間: 2025-3-22 10:55

作者: Headstrong    時間: 2025-3-22 14:17

作者: Headstrong    時間: 2025-3-22 18:49

作者: 釘牢    時間: 2025-3-23 00:14

作者: Tincture    時間: 2025-3-23 04:04
Hardware Implementation of HS1-SIVn this paper. Given implementation of HS1-SIV cipher was developed in such a way to be conforming to the specification of the authenticated cipher as well as a hardware API. The implemented API is conforming to the specifications of the GMU Hardware API for authenticated ciphers. The VHDL implementa
作者: 細絲    時間: 2025-3-23 07:38
Runtime Classification of Mobile Malware for?Resource-Constrained Devicesof existing malware are challenging tasks and most of the currently proposed solutions are focused on only one of the mentioned aspects..In this work, we propose a solution that is able to detect malware that appears at runtime and, at the same time, provides useful information to discriminate betwe
作者: GNAT    時間: 2025-3-23 13:00

作者: Ceremony    時間: 2025-3-23 17:22

作者: Spina-Bifida    時間: 2025-3-23 19:06

作者: 表被動    時間: 2025-3-23 23:59
Attribute-Based Privacy-Friendly Access Control with Contextke strong authentication. We propose a secure and privacy-friendly way to augment authentication mechanisms of Online services by taking context into account. Contextual information, such as location, proximity or the current role of a user in a system is useful to help authenticate and authorize us
作者: AVOW    時間: 2025-3-24 05:37

作者: 吝嗇性    時間: 2025-3-24 07:46

作者: QUAIL    時間: 2025-3-24 12:19
Completing Your Knowledge of Azure SQL, present at SMEs as well as the PSS research. To attract interest of SMEs in PSS a framework that is suitable to fit their needs is required. Hence, a first step is presented in this paper as the interaction based approach will help to make complex PSS frameworks applicable for SMEs.
作者: Carcinogenesis    時間: 2025-3-24 16:12

作者: 凝結(jié)劑    時間: 2025-3-24 19:39
BDS/GPS Dual-Mode Software Receiver the hidden secret. They can later be unveiled in another multi-party computation..This work is an extended version of a conference paper?[.]. In this version, we work out the details of our construction. Our results corroborate the feasibility of an electronic voting machine that is oblivious to th
作者: faction    時間: 2025-3-25 02:59

作者: Insufficient    時間: 2025-3-25 06:48

作者: 凹槽    時間: 2025-3-25 09:26

作者: corporate    時間: 2025-3-25 12:48
Security Framework for Adopting Mobile Applications in Small and Medium Enterprisesa mobile security framework that mainly supports SMEs by adopting mobile applications. Potential threats have been included in a risk catalogue, which forms a main component of the presented framework. This catalogue will help business users in extending their awareness of possible mobile security r
作者: 健忘癥    時間: 2025-3-25 19:09

作者: AGATE    時間: 2025-3-25 21:34
Runtime Classification of Mobile Malware for?Resource-Constrained Devicesype of malware is being executed. In order to achieve low consumption, we minimize the set of observed system parameters to only the most informative ones for both detection and classification and we offload part of the calculations related to discrimination between diverse types of malware to an ex
作者: elastic    時間: 2025-3-26 00:38

作者: ureter    時間: 2025-3-26 06:50

作者: 態(tài)度暖昧    時間: 2025-3-26 12:16

作者: Indict    時間: 2025-3-26 15:29

作者: Sedative    時間: 2025-3-26 20:00
Ancient Salt Roads in Northern China,k caching, fairness, Interest aggregation, context-awareness, and scalability. We expect . to be a step closer to adaptive, effective and efficient forwarding that satisfies both NDN consumers and providers.
作者: 鋼筆記下懲罰    時間: 2025-3-27 00:03
ng both static and dynamic aspects of collaboration versions. Secondly, it presents a mapping approach for deducing version of choreography from version of collaboration. Thirdly, it introduces the BPMN4V-Modeler, which is an implementation of BPMN4V on top of the well-known BPMN-Modeler Eclipse plug-in.
作者: SPASM    時間: 2025-3-27 01:20

作者: 性別    時間: 2025-3-27 07:18
https://doi.org/10.1007/978-94-011-6660-7y set at 32 bytes. Based on the performance results obtained hardware API overhead was calculated which is equal to 8% for 8-byte data length and 15% for 2048-byte data length when compared to the cipher-core.
作者: 我悲傷    時間: 2025-3-27 11:34

作者: Magisterial    時間: 2025-3-27 13:43

作者: overture    時間: 2025-3-27 19:54

作者: Feckless    時間: 2025-3-28 00:56

作者: Little    時間: 2025-3-28 03:41
User Perceptions of Internet of Things (IoT) Systemsthirty-three (33) fundamental factors. Also, it formally defines these thirty-three (33) factors in order to establish a universally accepted model regarding user perceptions of a particular IoT system.
作者: 鬼魂    時間: 2025-3-28 06:18

作者: epicondylitis    時間: 2025-3-28 11:34

作者: 遠足    時間: 2025-3-28 14:42
Conference proceedings 2011Latest editione device and this is the reason why the features can be useful to distinguish the owner from an impostor. Results show that our system, modeling the user behavior of 21 volunteer participants, obtains encouraging results, since we measured a precision in distinguishing an impostor from the owner between 99% and 100%.
作者: 貪心    時間: 2025-3-28 22:23

作者: 猛烈責(zé)罵    時間: 2025-3-29 01:26
A Methodology for Silent and Continuous Authentication in Mobile Environmente device and this is the reason why the features can be useful to distinguish the owner from an impostor. Results show that our system, modeling the user behavior of 21 volunteer participants, obtains encouraging results, since we measured a precision in distinguishing an impostor from the owner between 99% and 100%.
作者: Arboreal    時間: 2025-3-29 06:25

作者: Genetics    時間: 2025-3-29 11:12
https://doi.org/10.1007/978-3-642-52720-3zes edit control between two or more contents, and is effective with Internet contents such as consumer generated media represented by YouTube. We also evaluate the security of our proposed scheme against various attacks.
作者: RUPT    時間: 2025-3-29 13:18

作者: 不確定    時間: 2025-3-29 17:00

作者: 不幸的人    時間: 2025-3-29 22:18

作者: 恃強凌弱的人    時間: 2025-3-29 23:57

作者: Obsequious    時間: 2025-3-30 06:36

作者: 截斷    時間: 2025-3-30 11:51
ess Management (BPM) systems must face before their definitive acceptance and use in companies. This issue has mainly been investigated in the context of intra-organizational processes but it received little attention in the context of Inter-organizational Processes (IoP), which correspond to proces




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
太湖县| 如东县| 保山市| 布拖县| 沅陵县| 邳州市| 堆龙德庆县| 长岭县| 武邑县| 松江区| 通海县| 施秉县| 页游| 大名县| 绩溪县| 临邑县| 溆浦县| 贵港市| 安龙县| 全椒县| 化德县| 昌江| 南澳县| 巧家县| 望奎县| 农安县| 格尔木市| 玉树县| 凤山县| 易门县| 翁牛特旗| 巴中市| 富源县| 临安市| 瑞丽市| 大同市| 龙门县| 崇礼县| 慈溪市| 富裕县| 洞口县|