派博傳思國(guó)際中心

標(biāo)題: Titlebook: e-Business and Telecommunications; International Confer Joaquim Filipe,Mohammad S. Obaidat Conference proceedings 2009 Springer-Verlag Berl [打印本頁(yè)]

作者: Racket    時(shí)間: 2025-3-21 16:56
書目名稱e-Business and Telecommunications影響因子(影響力)




書目名稱e-Business and Telecommunications影響因子(影響力)學(xué)科排名




書目名稱e-Business and Telecommunications網(wǎng)絡(luò)公開度




書目名稱e-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱e-Business and Telecommunications被引頻次




書目名稱e-Business and Telecommunications被引頻次學(xué)科排名




書目名稱e-Business and Telecommunications年度引用




書目名稱e-Business and Telecommunications年度引用學(xué)科排名




書目名稱e-Business and Telecommunications讀者反饋




書目名稱e-Business and Telecommunications讀者反饋學(xué)科排名





作者: 是他笨    時(shí)間: 2025-3-21 23:55
https://doi.org/10.1007/978-3-642-05197-5E-Business; Wireless; communication; cryptography; information; multimedia; search engine marketing (SEM)
作者: Delectable    時(shí)間: 2025-3-22 02:33

作者: 格言    時(shí)間: 2025-3-22 04:49
e-Business and Telecommunications978-3-642-05197-5Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 牽連    時(shí)間: 2025-3-22 09:14

作者: Mendicant    時(shí)間: 2025-3-22 15:41

作者: Mendicant    時(shí)間: 2025-3-22 18:42

作者: DOSE    時(shí)間: 2025-3-23 01:15
Susceptibility Testing of Dermatophytes,ree trial services targeting tourists on tour were set up, in this case on the ?land Islands in Finland. We identified that the major barrier for the non usage of the trial services was linked to the value aspect of the packaged tour that the trial group participated in. Also price transparency and
作者: 慢跑    時(shí)間: 2025-3-23 03:40

作者: coalition    時(shí)間: 2025-3-23 09:22

作者: Thyroiditis    時(shí)間: 2025-3-23 09:51
Interactive 3D Content Standards,s. This difficulty becomes more accentuated when the execution control assumes complex countless business processes. This work presents . (NPTool), a tool to control the execution of business processes. NPTool is supported by . (NPDL), a language for business processes specification that uses proces
作者: 枕墊    時(shí)間: 2025-3-23 15:32
https://doi.org/10.1007/978-981-13-2399-7ed as a key consideration when developing, maintaining and managing Websites. A study presented here of SEM practices of Irish small to medium enterprises (SMEs) reveals they plan to spend more resources on SEM in the future. Most firms utilize an informal SEM strategy, where Website optimization is
作者: 無(wú)彈性    時(shí)間: 2025-3-23 20:16

作者: GIDDY    時(shí)間: 2025-3-23 23:49
Flexibilities with Anonymous Functionsmaly scores of audit events are obtained by aggregating several local anomaly scores. Remarkably, most works focus on profile/model definition while critical issues of anomaly measuring, aggregating and thresholding are dealt with ”simplistically”. This paper addresses the issue of anomaly scoring a
作者: 大罵    時(shí)間: 2025-3-24 06:03
Dhruv Batra,Adarsh Kowdle,Tsuhan Chenes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an en
作者: 刺激    時(shí)間: 2025-3-24 06:51
Studies in Computational Intelligenceme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that
作者: 油氈    時(shí)間: 2025-3-24 13:54

作者: prediabetes    時(shí)間: 2025-3-24 17:16

作者: 忙碌    時(shí)間: 2025-3-24 19:50
Endre M. Lidal,Tor Langeland,Jens Grimsgaardability to trace and identify these buyers, while also allowing the seller to prove illegal acts to a third party. At the same time, an honest buyer is prevented from being falsely accused of illegal content distribution by the seller. Many protocols have been proposed with different approaches. One
作者: Fierce    時(shí)間: 2025-3-25 02:49

作者: 輕觸    時(shí)間: 2025-3-25 06:57
Conference proceedings 2009as. Their keynote speeches have contributed to heightening the overall quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a
作者: Dissonance    時(shí)間: 2025-3-25 08:19

作者: 消瘦    時(shí)間: 2025-3-25 14:32

作者: Encephalitis    時(shí)間: 2025-3-25 16:27
1865-0929 e. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a 978-3-642-05196-8978-3-642-05197-5Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: Medley    時(shí)間: 2025-3-25 21:39

作者: INCH    時(shí)間: 2025-3-26 01:11

作者: Nonconformist    時(shí)間: 2025-3-26 07:51
e-Business Innovation: The Next Decadeeconomy have been locked in 80-year cycles, which might imply that innovation is an economic driver, and vice versa. Based on this, some forecast that innovation and the economy might decrease sharply due to several forces: a) decreasing economic growth, b) increasing demand for custom services, c)
作者: 認(rèn)識(shí)    時(shí)間: 2025-3-26 10:36

作者: BABY    時(shí)間: 2025-3-26 16:35

作者: 本能    時(shí)間: 2025-3-26 20:23
Possible Determinants Affecting the Use of Mobile Tourism Servicesree trial services targeting tourists on tour were set up, in this case on the ?land Islands in Finland. We identified that the major barrier for the non usage of the trial services was linked to the value aspect of the packaged tour that the trial group participated in. Also price transparency and
作者: ARK    時(shí)間: 2025-3-26 21:38
Towards a Version-Based Approach to Deal with Business Process Evolutionas quickly as possible while keeping effectiveness, new business or production requirements. This paper proposes to adopt a version-based approach to support these dynamic evolutions of business processes (BP). Adopting this approach permits to keep chronological BP changes since several instances o
作者: apiary    時(shí)間: 2025-3-27 03:42
Comparing Consumer Resistance to Mobile Banking in Finland and Portugald how the five adoption barriers namely usage, value, risk, tradition and image, derived from the earlier literature, differ between these two countries. Using an Internet questionnaire a total of 3.597 usable responses was collected. A confirmatory factor analysis was implemented with SEM to build
作者: 600    時(shí)間: 2025-3-27 09:11

作者: Halfhearted    時(shí)間: 2025-3-27 12:00

作者: SHRIK    時(shí)間: 2025-3-27 13:43

作者: FLIP    時(shí)間: 2025-3-27 21:46
Aggregation and Thresholding Schemes for Anomaly-Based Approachesmaly scores of audit events are obtained by aggregating several local anomaly scores. Remarkably, most works focus on profile/model definition while critical issues of anomaly measuring, aggregating and thresholding are dealt with ”simplistically”. This paper addresses the issue of anomaly scoring a
作者: mechanism    時(shí)間: 2025-3-28 00:33
A Memory Efficient Network Encryption Schemees consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an en
作者: peritonitis    時(shí)間: 2025-3-28 04:19
Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that
作者: 啤酒    時(shí)間: 2025-3-28 06:32

作者: 草率男    時(shí)間: 2025-3-28 12:11
Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdaysday problem [9] allowed to speed-up several combinatorial attacks. However, in the case of NTRU we can not hope to to apply Wagner’s algorithm directly, as the search space does not behave nicely. In this paper we show that we can nevertheless draw profit from a multiple birthday approach. Our appro
作者: Directed    時(shí)間: 2025-3-28 14:57
On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authorityability to trace and identify these buyers, while also allowing the seller to prove illegal acts to a third party. At the same time, an honest buyer is prevented from being falsely accused of illegal content distribution by the seller. Many protocols have been proposed with different approaches. One
作者: maladorit    時(shí)間: 2025-3-28 19:17
RKRD: Runtime Kernel Rootkit Detections of stealth malware increases exponentially. Existing approaches have some advantages for ensuring system integrity but sophisticated techniques utilized by stealthy malware can thwart them. We propose Runtime Kernel Rootkit Detection (RKRD), a hardware-based, event-driven, secure and inclusionary
作者: Flinch    時(shí)間: 2025-3-29 02:31
Conference proceedings 2009Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided
作者: coddle    時(shí)間: 2025-3-29 05:28
Concepts in heterogeneous catalysis,g BP instances according to a new business process schema. The paper contribution is first a meta-model for designing versions of business processes considering the three dimensions of BP which are the informational, organizational and process dimensions. The paper also introduces a taxonomy of operations for business process version management.
作者: 利用    時(shí)間: 2025-3-29 07:38
https://doi.org/10.1007/978-981-13-2399-7ith the literature, measuring SEM performance remains a significant challenge with many firms unsure if they measure it effectively. An encouraging finding is that Irish SMEs adopt a positive ethical posture when undertaking SEM.
作者: Malaise    時(shí)間: 2025-3-29 11:44

作者: 紋章    時(shí)間: 2025-3-29 15:38
A Theory of Interactive Computationent model that speeds up the resilience improvement process with a tradeoff between connectivity and resiliency. In our method, . speeds up by introducing nodes that belong to future generations in the time scale. In this way, the duration that the adversary can make use of compromised keys become smaller.
作者: Buttress    時(shí)間: 2025-3-29 21:43
Planning and Producing the Infobase: Part I,e “storage requirement is by far the larger obstacle” [3] to attack NTRU by combinatorial attacks. Further, our attack is about 2. times faster than the space-reduced variant from [3] employing the same amount of memory.
作者: thyroid-hormone    時(shí)間: 2025-3-30 00:33
Integrated Discussion of Results, by events. Our RKRD implementation is guided by our goals of strong isolation, no modifications to target guest OS kernels, easy deployment, minimal infra-structure impact, and minimal performance overhead. We developed a system prototype and conducted a number of experiments which show that the per-formance impact of our solution is negligible.
作者: 共同確定為確    時(shí)間: 2025-3-30 07:03
Towards a Version-Based Approach to Deal with Business Process Evolutiong BP instances according to a new business process schema. The paper contribution is first a meta-model for designing versions of business processes considering the three dimensions of BP which are the informational, organizational and process dimensions. The paper also introduces a taxonomy of operations for business process version management.
作者: justify    時(shí)間: 2025-3-30 10:22
In Search of Search Engine Marketing Strategy Amongst SME’s in Irelandith the literature, measuring SEM performance remains a significant challenge with many firms unsure if they measure it effectively. An encouraging finding is that Irish SMEs adopt a positive ethical posture when undertaking SEM.
作者: 牙齒    時(shí)間: 2025-3-30 13:35

作者: MELON    時(shí)間: 2025-3-30 20:28
Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemesent model that speeds up the resilience improvement process with a tradeoff between connectivity and resiliency. In our method, . speeds up by introducing nodes that belong to future generations in the time scale. In this way, the duration that the adversary can make use of compromised keys become smaller.
作者: 護(hù)身符    時(shí)間: 2025-3-31 00:02
Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdayse “storage requirement is by far the larger obstacle” [3] to attack NTRU by combinatorial attacks. Further, our attack is about 2. times faster than the space-reduced variant from [3] employing the same amount of memory.
作者: 最初    時(shí)間: 2025-3-31 01:37

作者: 嘴唇可修剪    時(shí)間: 2025-3-31 08:18

作者: Hemodialysis    時(shí)間: 2025-3-31 09:35
A Memory Efficient Network Encryption Schemements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.
作者: intoxicate    時(shí)間: 2025-3-31 15:12
1865-0929 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that ar
作者: 沉思的魚    時(shí)間: 2025-3-31 20:44
Susceptibility Testing of Dermatophytes,non usage of the trial services was linked to the value aspect of the packaged tour that the trial group participated in. Also price transparency and ease of use especially ease to take new mobile services temporary into use should be highlighted in mobile tourism service development.
作者: 脊椎動(dòng)物    時(shí)間: 2025-4-1 01:19





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
秀山| 金塔县| 偏关县| 株洲县| 体育| 兴国县| 盐津县| 读书| 阜平县| 民勤县| 凉山| 朝阳县| 江门市| 革吉县| 内丘县| 九台市| 青龙| 福泉市| 民乐县| 琼海市| 远安县| 张家界市| 成都市| 晴隆县| 东源县| 金寨县| 玉树县| 大方县| 开封市| 运城市| 神木县| 湖口县| 祁连县| 邵东县| 金华市| 西林县| 浦东新区| 亚东县| 宜阳县| 宣化县| 敦化市|