標(biāo)題: Titlebook: E-Business and Telecommunications; International Joint Mohammad S. Obaidat,Joaquim Filipe Conference proceedings 2014 Springer-Verlag Berl [打印本頁] 作者: Garfield 時(shí)間: 2025-3-21 19:53
書目名稱E-Business and Telecommunications影響因子(影響力)
書目名稱E-Business and Telecommunications影響因子(影響力)學(xué)科排名
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Business and Telecommunications被引頻次
書目名稱E-Business and Telecommunications被引頻次學(xué)科排名
書目名稱E-Business and Telecommunications年度引用
書目名稱E-Business and Telecommunications年度引用學(xué)科排名
書目名稱E-Business and Telecommunications讀者反饋
書目名稱E-Business and Telecommunications讀者反饋學(xué)科排名
作者: 出汗 時(shí)間: 2025-3-21 23:50 作者: 顧客 時(shí)間: 2025-3-22 02:19
Bauarbeiten am Nachbargrundstücktrategies and the corresponding impacts on the business model. It reveals how the implementation of a VC affects a platform’s gatekeeper position, the encouragement of loyalty of stakeholder groups and the opening of new income streams for the platform.作者: Euthyroid 時(shí)間: 2025-3-22 07:47
https://doi.org/10.1007/978-3-662-26650-2arameters for modal and chromatic dispersion are estimated. Furthermore, taking given parameters of the dispersion into account, the introduced signal theoretic MIMO system model enables a reconstruction of the MIMO specific impulse responses.作者: 樣式 時(shí)間: 2025-3-22 11:23 作者: Cardiac-Output 時(shí)間: 2025-3-22 13:11 作者: Cardiac-Output 時(shí)間: 2025-3-22 17:40
Host Identity Detection in IPv6 Networks passive to end devices. In order to make the approach reliable, we studied the behaviour of current operating systems during IPv6 address assignments. We implemented a tool called . based on the proposed approach and tested it in a real network.作者: 古代 時(shí)間: 2025-3-22 21:50 作者: myopia 時(shí)間: 2025-3-23 01:50 作者: Pulmonary-Veins 時(shí)間: 2025-3-23 07:21
Long-Reach PONs Employing Directly Modulated Lasers for Provisioning of OFDM-UWB Radio Signals in Spwed also that, for optical channel spacing as narrow as 0.2?nm, the proposed system suffers from negligible linear inter-channel crosstalk. These results demonstrate that directly modulated LR-PONs can be employed as a reliable solution for provisioning of UWB signals to users’ premises located in sparse take-up geographies.作者: 有常識 時(shí)間: 2025-3-23 13:43 作者: 恫嚇 時(shí)間: 2025-3-23 15:27
Practical Instantaneous Frequency Analysis Experimentstime is required to restore power back to its nominal value. Whilst our experiments reveal IF does not bring specific benefits over usual power attacks when applied to unprotected designs, IF allows to obtain much better results in the presence of amplitude modification countermeasures.作者: cruise 時(shí)間: 2025-3-23 18:07
The Impact of Initial Delays in OSPF Routing of messages in the input buffers of routers. The studies are conducted using a simulated Petri net model. A heuristic for determining initial delays is proposed. And a core network in Germany serves as illustration.作者: 側(cè)面左右 時(shí)間: 2025-3-24 01:35 作者: 協(xié)迫 時(shí)間: 2025-3-24 03:59 作者: debris 時(shí)間: 2025-3-24 07:31 作者: 同來核對 時(shí)間: 2025-3-24 12:40
Representation of Signals and Systems, of messages in the input buffers of routers. The studies are conducted using a simulated Petri net model. A heuristic for determining initial delays is proposed. And a core network in Germany serves as illustration.作者: anchor 時(shí)間: 2025-3-24 18:00
überblick E-Learning-Evaluationskriterienination. By using techniques like encryption, address spoofing, signature poisoning and traffic analysis, the channel is able to hide the flows on the network without implicating the source and destination.作者: Ointment 時(shí)間: 2025-3-24 22:12
Conference proceedings 2014iewed and selected from 341 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, wireless information networks and systems.作者: hieroglyphic 時(shí)間: 2025-3-24 23:42 作者: Cacophonous 時(shí)間: 2025-3-25 04:31
0?%), repeated clicks on advertisements decrease their probability of purchasing. In contrast with this segment, we found a smaller segment of consumers (nearly 10?%) whose clicks on advertisements increase conversion probabilities. Our approaches will help managers to better understand consumer onl作者: 光滑 時(shí)間: 2025-3-25 09:22
https://doi.org/10.1007/978-3-322-92762-0nchmark administrations’ official web portals – and on the other hand, to present some best practices: initiatives which, according to the CWEI, allow the creation of empowerment by answering at citizens’ needs..The analysis was made on the web portals of the 104 Italian cities with over 60,000 inha作者: Mammal 時(shí)間: 2025-3-25 14:24
Mechanischer Vollausbruch im Felstunnelbau,following years we identified critical variables which allowed us to abstract and generalize a possible costing model. The model proposed could be used as a reference point for professionals working on the development of content in their estimation of costs linked to the design and development of le作者: 填滿 時(shí)間: 2025-3-25 17:37
Bayesian Optimization Overview,her parties. The framework consists of a series of trust models, which (i) enable the users and the data owners to decide whether to interact with a particular role for accessing and sharing data in the system and (ii) allow the role managers to evaluate the trustworthiness of users and data owners.作者: 為現(xiàn)場 時(shí)間: 2025-3-25 23:44 作者: 萬神殿 時(shí)間: 2025-3-26 01:20 作者: 訓(xùn)誡 時(shí)間: 2025-3-26 04:37 作者: Restenosis 時(shí)間: 2025-3-26 12:30 作者: mitral-valve 時(shí)間: 2025-3-26 15:16 作者: 宣傳 時(shí)間: 2025-3-26 20:36 作者: 我不重要 時(shí)間: 2025-3-26 21:15 作者: 保存 時(shí)間: 2025-3-27 01:49
Manipulation of Vectors and Matrices,S, IntServ and DiffServ introduce new mechanisms which can be used to offer QoS in high speed Next Generation Networks (NGN). This paper is focused essentially on QoS and QoE mechanisms in wired and wireless networks through the presentation of communication architectures and protocols.作者: Insufficient 時(shí)間: 2025-3-27 06:31 作者: opportune 時(shí)間: 2025-3-27 12:19 作者: 漸強(qiáng) 時(shí)間: 2025-3-27 14:47
QoS and QoE in the Next Generation Networks and Wireless NetworksS, IntServ and DiffServ introduce new mechanisms which can be used to offer QoS in high speed Next Generation Networks (NGN). This paper is focused essentially on QoS and QoE mechanisms in wired and wireless networks through the presentation of communication architectures and protocols.作者: 運(yùn)動吧 時(shí)間: 2025-3-27 19:56
Mohammad S. Obaidat,Joaquim FilipeIncludes supplementary material: 作者: 泥瓦匠 時(shí)間: 2025-3-28 00:51
Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/300023.jpg作者: Entreaty 時(shí)間: 2025-3-28 05:02
Manipulation of Vectors and Matrices,S, IntServ and DiffServ introduce new mechanisms which can be used to offer QoS in high speed Next Generation Networks (NGN). This paper is focused essentially on QoS and QoE mechanisms in wired and wireless networks through the presentation of communication architectures and protocols.作者: 上腭 時(shí)間: 2025-3-28 07:06
Recurrence Relations for Powers,to the constant frequency used in Fourier Transform, instantaneous frequency reflects local phase differences and allows detecting frequency variations. These variations reflect the processed binary data and are hence cryptanalytically useful. IF exploits the fact that after higher power drops more 作者: Water-Brash 時(shí)間: 2025-3-28 14:10 作者: INTER 時(shí)間: 2025-3-28 14:59 作者: fatty-acids 時(shí)間: 2025-3-28 20:55
An Introduction to Markov Chainscessary to know the identity of network users. With various methods for IPv6 address assignments, user identification in IPv6 networks is challenging. This paper proposes a new approach for user identity tracking in LANs. The approach is based on network control traffic that is already present in IP作者: 技術(shù) 時(shí)間: 2025-3-29 01:08 作者: HARD 時(shí)間: 2025-3-29 05:03
ution of the success of the companies’ marketing activities leads to a sophisticated allocation process. We developed a new approach to (1) address consumers’ buying decision processes, (2) to account for the effects of multiple online advertising channels, and (3) consequently attribute the success作者: 討人喜歡 時(shí)間: 2025-3-29 07:32 作者: 配偶 時(shí)間: 2025-3-29 14:25
https://doi.org/10.1007/978-3-322-92762-0 and Communication Technologies. Nowadays the performance of our cities depends only in small part on its infrastructure, as an increasing importance is given to the availability, quality and delivery of public services. In this context, citizens have new expectations based on involvement, collabora作者: 防水 時(shí)間: 2025-3-29 18:15 作者: JOG 時(shí)間: 2025-3-29 20:23
https://doi.org/10.1007/978-3-662-26650-2tical fiber transmission community, targeting at increased fiber throughput or improved bit-error rate performance. Mostly, the possible performance improvements are calculated by computer simulations, which require some knowledge about the underlying system. Here, measurements results can be helpfu作者: 小淡水魚 時(shí)間: 2025-3-30 03:50
ultiplexing (OFDM) ultra wideband (UWB) bands along sparse geographical areas. Particularly, we propose and demonstrate useful system design guidelines enabling the distribution of UWB signals along directly modulated LR-PONs with maximum reach exceeding 100?km. Adequate selection of the UWB signal 作者: isotope 時(shí)間: 2025-3-30 07:51
überblick E-Learning-Evaluationskriteriena undetectable communication channel between systems. This network channel is fully transparent to any network analysis and for hence to any interception and inspection on a network. InCC is capable to send messages on the same production network without compromising the existence of source and dest作者: 津貼 時(shí)間: 2025-3-30 12:01
Bayesian Optimization Overview,used access control model, can provide a flexible way for data owners to manage and share their data in the cloud environment. To enforce the access control policies in the cloud, several cryptographic RBAC schemes have been proposed recently, which integrate cryptographic techniques with RBAC model作者: 裁決 時(shí)間: 2025-3-30 14:27
QoS and QoE in the Next Generation Networks and Wireless NetworksS, IntServ and DiffServ introduce new mechanisms which can be used to offer QoS in high speed Next Generation Networks (NGN). This paper is focused essentially on QoS and QoE mechanisms in wired and wireless networks through the presentation of communication architectures and protocols.作者: CHOIR 時(shí)間: 2025-3-30 16:54
Practical Instantaneous Frequency Analysis Experimentsto the constant frequency used in Fourier Transform, instantaneous frequency reflects local phase differences and allows detecting frequency variations. These variations reflect the processed binary data and are hence cryptanalytically useful. IF exploits the fact that after higher power drops more 作者: maladorit 時(shí)間: 2025-3-30 22:21
The Impact of Initial Delays in OSPF Routingogy. This behavior is a consequence of the parallel activity of a program loop installed on each router. These loops may be more or less synchronized in accordance with a shift of the initial phase. This article explores the question of the values of these delays and their impact on the accumulation