標題: Titlebook: E-Technologies: Embracing the Internet of Things; 7th International Co Esma A?meur,Umar Ruhi,Michael Weiss Conference proceedings 2017 Spri [打印本頁] 作者: commotion 時間: 2025-3-21 17:03
書目名稱E-Technologies: Embracing the Internet of Things影響因子(影響力)
書目名稱E-Technologies: Embracing the Internet of Things影響因子(影響力)學科排名
書目名稱E-Technologies: Embracing the Internet of Things網(wǎng)絡(luò)公開度
書目名稱E-Technologies: Embracing the Internet of Things網(wǎng)絡(luò)公開度學科排名
書目名稱E-Technologies: Embracing the Internet of Things被引頻次
書目名稱E-Technologies: Embracing the Internet of Things被引頻次學科排名
書目名稱E-Technologies: Embracing the Internet of Things年度引用
書目名稱E-Technologies: Embracing the Internet of Things年度引用學科排名
書目名稱E-Technologies: Embracing the Internet of Things讀者反饋
書目名稱E-Technologies: Embracing the Internet of Things讀者反饋學科排名
作者: 改革運動 時間: 2025-3-21 21:35 作者: Alopecia-Areata 時間: 2025-3-22 02:08
AHL: Model-Driven Engineering of Android Applications with BLE Peripheralsnguage and a corresponding code-generation framework that enables the easy and rapid development of the core elements of a typical BLE-enabled data-collection application in this architecture. The generated code is functional and does not need any modifications. This model-driven application-constru作者: 小歌劇 時間: 2025-3-22 07:12 作者: expire 時間: 2025-3-22 09:16
Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solutionments. The proposed solution includes adopting a certified access control policy language such as ACCPL (A Certified Access Core Policy Language). ACCPL comes with formal proofs of important properties, and our proposed solution includes adopting it to facilitate various analyses and proof of reason作者: 作繭自縛 時間: 2025-3-22 16:48 作者: 作繭自縛 時間: 2025-3-22 20:00
Evaluating the Potential of Technology in Justice Systems Using Goal Modelinghe goals of different stakeholders in justice systems so that selected technologies are well-aligned with the needs of such systems. Goal models also support trade-off analysis in this context. Conclusion: A justice-aware modeling approach has the potential of helping justice stakeholders to better 作者: 領(lǐng)導(dǎo)權(quán) 時間: 2025-3-22 23:34
An OLAP Rule Environment for Reactive Performance Monitoringyped the environment using QuickForms and a custom-built OLAP rule engine. Predictive modeling, traditional rule engines, and our OLAP rule engine are compared in terms of their support for reactive performance monitoring.作者: ethnology 時間: 2025-3-23 04:33
Towards an Adaptive Learning Framework for MOOCsptive techniques so as to present personalized learning experiences, having as basis dynamic assessment and data collecting on the course. They count on networks of prerequisites and deal with learners according to their different personalized paths through the content. This has been described by th作者: 忙碌 時間: 2025-3-23 08:47 作者: Admonish 時間: 2025-3-23 10:53
Sam A. McClintock,William C. Purdyoing beyond trust evaluation to outline actions for directing trustees, instead of trustors, to build a higher level of trust and have a greater impact on the results of interactions. Reaching a higher degree of trust can be challenging, especially when explicit feedback is not available. This paper作者: prostatitis 時間: 2025-3-23 17:42
Key Technologies on New Energy Vehiclesed for continuing or revoking the access decision. We leveraged the capability of Session Initiation Protocol (SIP) to manage the communication between entities in order to provide a mechanism to handle the continuous enforcement of the obligation. Meanwhile, we present several scenarios which indic作者: 填滿 時間: 2025-3-23 21:27 作者: BIPED 時間: 2025-3-24 01:42 作者: 行為 時間: 2025-3-24 02:46 作者: Brittle 時間: 2025-3-24 08:49
A. F. Diaz,J. F. Rubinson,H. B. Mark Jr.anizational goals, and stakeholder satisfaction. We demonstrate the capabilities of the proposed approach with an illustrative example (increasing patient satisfaction in an Emergency Room). Preliminary results show the feasibility of the approach as well as many potential benefits over existing app作者: FER 時間: 2025-3-24 13:33 作者: 傀儡 時間: 2025-3-24 16:55
Bound and Resonant States in Confined Atoms,yped the environment using QuickForms and a custom-built OLAP rule engine. Predictive modeling, traditional rule engines, and our OLAP rule engine are compared in terms of their support for reactive performance monitoring.作者: MILL 時間: 2025-3-24 21:40
Rui Zhou,James E. Norton,David A. Deanptive techniques so as to present personalized learning experiences, having as basis dynamic assessment and data collecting on the course. They count on networks of prerequisites and deal with learners according to their different personalized paths through the content. This has been described by th作者: Flinch 時間: 2025-3-25 02:49 作者: Condescending 時間: 2025-3-25 05:29
J?rg Birkelbach,Hartwig Spetsmannd automation patterns to generate the BPMN . model; and (3) we use the resulting . BPMN model to derive analysis and design software artifacts. In this paper, we focus on the first two steps of the approach.作者: Lobotomy 時間: 2025-3-25 07:49
A Business Process Re-Engineering Approach to Transform BPMN Models to Software Artifactsd automation patterns to generate the BPMN . model; and (3) we use the resulting . BPMN model to derive analysis and design software artifacts. In this paper, we focus on the first two steps of the approach.作者: 大溝 時間: 2025-3-25 13:56 作者: Arthritis 時間: 2025-3-25 18:28 作者: 細節(jié) 時間: 2025-3-25 21:24 作者: Hangar 時間: 2025-3-26 01:08
https://doi.org/10.1007/978-3-540-95964-9 IND-CCA2 attacks and malleability of homomorphic encryption schemes. Our protocol solves this problem with the authenticated encryption scheme called encrypt-then-mac [.]. We implemented our proposed protocol on the Android platform and we show that the proposed system and protocol can achieve a high level of privacy and secrecy.作者: 浮雕寶石 時間: 2025-3-26 06:27 作者: 甜瓜 時間: 2025-3-26 10:45 作者: PACK 時間: 2025-3-26 12:59 作者: 群居男女 時間: 2025-3-26 18:21
Supervised Methods to Support Online Scientific Data Triageage on distinct data. The presented approaches were developed to be integrated as a part of web-based systems, providing real time feedback to health and biomedical professionals. All systems are publicly available as open-source.作者: 易于 時間: 2025-3-27 00:30
A New Scalable and Performance-Enhancing Bootstrap Aggregating Scheme for Variables Selectione and selecting a subset of the cost-effective predictors. The generalization was seen to improve significantly in terms of recognition accuracy when the proposed system, which is named ., is tested on QoS for Real-World Web Services. Good experimental studies demonstrate the effectiveness of our Wrapper model.作者: 槍支 時間: 2025-3-27 05:02
Conference proceedings 2017May 2017.. This year’s conference drew special attention to the ever-increasing role of the Internet of Things (IoT); and the contributions span a variety of application domains such as e-Commerce, e-Health, e-Learning, and e-Justice, comprising research from models and architectures, methodology pr作者: Firefly 時間: 2025-3-27 08:48 作者: tariff 時間: 2025-3-27 13:15
Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Ender to access information at anytime and anywhere. The traditional access control mechanisms cannot appropriately protect the access and usage of digital resources in the highly distributed and heterogeneous computing environment. In such an environment, enforcing continuously the access control pol作者: 種植,培養(yǎng) 時間: 2025-3-27 15:16 作者: catagen 時間: 2025-3-27 20:24 作者: Airtight 時間: 2025-3-28 01:37
Insider Threat Likelihood Assessment for Flexible Access Control should be the risk of authorizing accesses under various assumptions, and one of the notions of risk is threat likelihood. Access control systems deals essentially with insider threats coming from people within the organization, such as employees, business associates or contractors, who could viola作者: 灰姑娘 時間: 2025-3-28 02:56
Compliance Verification Algorithm for Computer Systems Security Policiesem is then developed for assessing whether policies are satisfied for a given model of a computer system. A practical example and an implementation within a theorem prover show the effectiveness of our specification and verification technique.作者: JAMB 時間: 2025-3-28 07:28
Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution Linux Security Module (LSM) implementing a mandatory access control mechanism. SELinux integrates user identity, roles, and type security attributes for stating rules in security policies. As SELinux policies are developed and maintained by security administrators, they often become quite complex, 作者: 擴張 時間: 2025-3-28 13:17 作者: 和平主義 時間: 2025-3-28 16:38
Activity-based Process Integration in Healthcare with the User Requirements Notationrements. In particular, the introduction of a new process or information system in healthcare is a challenging task, especially in the absence of mature practices for requirements engineering and process modeling. Most of today’s healthcare process research is focused on mappings between existing pr作者: ARCH 時間: 2025-3-28 21:13 作者: 不妥協(xié) 時間: 2025-3-29 00:35 作者: DOLT 時間: 2025-3-29 06:16 作者: Acclaim 時間: 2025-3-29 08:49 作者: Arteriography 時間: 2025-3-29 12:39
A New Scalable and Performance-Enhancing Bootstrap Aggregating Scheme for Variables Selectionredictive power..In this paper, we introduce a new conceptual model for variables selection which includes subset generation, Ensemble learning, models selection and validation. Particularly, we addressed the problem of searching for and discarding irrelevant variables, scoring variables by relevanc作者: exceptional 時間: 2025-3-29 16:19 作者: Semblance 時間: 2025-3-29 20:17
Esma A?meur,Umar Ruhi,Michael WeissIncludes supplementary material: 作者: 初次登臺 時間: 2025-3-30 02:30 作者: Optimum 時間: 2025-3-30 04:13
E-Technologies: Embracing the Internet of Things978-3-319-59041-7Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: 外形 時間: 2025-3-30 10:46 作者: 材料等 時間: 2025-3-30 14:44