標(biāo)題: Titlebook: e-Infrastructure and e-Services for Developing Countries; 8th International Co Tegawendé F. Bissyande,Oumarou Sie Conference proceedings 20 [打印本頁] 作者: 頌歌 時(shí)間: 2025-3-21 18:20
書目名稱e-Infrastructure and e-Services for Developing Countries影響因子(影響力)
書目名稱e-Infrastructure and e-Services for Developing Countries影響因子(影響力)學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries網(wǎng)絡(luò)公開度
書目名稱e-Infrastructure and e-Services for Developing Countries網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries被引頻次
書目名稱e-Infrastructure and e-Services for Developing Countries被引頻次學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries年度引用
書目名稱e-Infrastructure and e-Services for Developing Countries年度引用學(xué)科排名
書目名稱e-Infrastructure and e-Services for Developing Countries讀者反饋
書目名稱e-Infrastructure and e-Services for Developing Countries讀者反饋學(xué)科排名
作者: Antigen 時(shí)間: 2025-3-21 23:26
e-Infrastructure and e-Services for Developing Countries8th International Co作者: Filibuster 時(shí)間: 2025-3-22 04:18 作者: FUSC 時(shí)間: 2025-3-22 07:23
A Mobile System for Managing Personal Finances Synchronouslyempts have been made by way of software applications; however, these attempts fail. This paper intends to design and implement a system that addresses some of the financial management challenges faced by SMMEs. To achieve this, features of similar systems were studies intensively through related wor作者: affluent 時(shí)間: 2025-3-22 09:00 作者: Incommensurate 時(shí)間: 2025-3-22 15:02
Redesigning Mobile Phone Contact List to Integrate African Social Practicesose based on awareness, addressed many issues of social interest such as group communication or social ties building and strengthening. Yet, the mobile devices contact lists, as they are designed until now, do not efficiently take into account the social connections. Besides, the social connections 作者: Incommensurate 時(shí)間: 2025-3-22 19:57 作者: Rankle 時(shí)間: 2025-3-22 23:37
Towards Inclusive Social Networks for the Developing Worldeliable Internet connectivity, literacy) that exclude scores of potential end-users, especially in the developing world. Including these potential end-users will require lifting those two assumptions. This paper is a first step towards inclusive social networks in the developing world. It proposes a作者: assent 時(shí)間: 2025-3-23 04:20
Multi-diffusion Degree Centrality Measure to Maximize the Influence Spread in the Multilayer Social zes the information spread in a multilayer social network. In our works, we focus in the determination of the seeds by proposing a centrality measure called .-. . (denoted by .) based on . . model. We consider the . persons as the most influential. This centrality measure uses firstly, the diffusion作者: PLE 時(shí)間: 2025-3-23 05:59 作者: Dissonance 時(shí)間: 2025-3-23 13:17
G-Cloud: Opportunities and Security Challenges for Burkina Faso the challenges ahead. In particular, we consider the case of the G-Cloud project engaged by the government of Burkina Faso to boost the ICT economy, improve administration-citizen relations, and strengthen the education system. Through this article, we try to show the actors, that the G-Cloud to be作者: 抵消 時(shí)間: 2025-3-23 14:06
Mobile VPN Schemes: Technical Analysis and Experimentsde not only secure tunnels but also session continuity mechanisms despite location change or connection disruptions. These mechanisms enable secure sessions to survive in dynamic/mobile environments without requiring a renegotiation of security keys during the session resumption phase. In this paper作者: Thyroiditis 時(shí)間: 2025-3-23 18:11 作者: debouch 時(shí)間: 2025-3-24 01:03 作者: TRAWL 時(shí)間: 2025-3-24 05:23 作者: 拾落穗 時(shí)間: 2025-3-24 07:20 作者: 單調(diào)性 時(shí)間: 2025-3-24 12:41
Design and Implementation of an Internet of Things Communications System for Legacy Device Control a. For instance, citizens in many developing countries lack access to energy, and suffer from a lack of energy independence, scarcity, and high energy costs. Efforts are underway to make energy generation, transmission, and consumption more efficient via the application of modern communications and c作者: ligature 時(shí)間: 2025-3-24 18:34
Classification of Water Pipeline Failure Consequence Index in High-Risk Zones: A Study of South Afrimild, these consequences can however, fluctuate to severe or fatal, especially in high risk locations. Utility personnel are therefore pressured to employ up-to-par operational policies in attempt to minimize possible fatalities. This however, may be overwhelming considering inherent uncertainties t作者: Intact 時(shí)間: 2025-3-24 19:02
Exploring Crowdfunding Performance of Agricultural Ventures: Evidence from FlyingV in Taiwanthis study explored the characteristics and crowdfunding performance of agricultural projects. A total of 112 projects were selected from one of the largest crowdfunding platforms in Asia. The results showed most of the agricultural projects were grouped under the categories of leisure, public, or l作者: jungle 時(shí)間: 2025-3-25 01:13
1867-8211 ucture and e-Services for Developing Countries, AFRICOMM 2016, held in Ouagadougou, Burkina Faso, in December 2016.. The 44 papers were carefully selected from 57 submissions and cover topics such as: mobile and social networks; cloud, VPN and overlays; IoT, water, land, agriculture; networks, TVWS;作者: LIMN 時(shí)間: 2025-3-25 06:40
Forschungsdesign der Untersuchung,concluding that enshrined systems and processes that steer the changes in mobile technology disempower African inputs and represent a continuation of the single use of situated techniques, skills, methods and processes in the production of core mobile technologies, all conceptualised outside Africa.作者: chandel 時(shí)間: 2025-3-25 10:59
Interessengeleitete Rechnungslegungssions to survive in dynamic/mobile environments without requiring a renegotiation of security keys during the session resumption phase. In this paper, we compare four open-source mobile VPNs in terms of functionality and performance.作者: VOC 時(shí)間: 2025-3-25 13:31 作者: Meager 時(shí)間: 2025-3-25 16:56
Frederik Dilling,Kathrin Holten,Ingo Witzke analyze many Facebook pages of political parties and media. We find that the campaign debates have been focused on campaign slogans and on the candidates rather than their political programs. Our findings show that the Facebook pages content reflect the election result. The most quoted candidate has been the winner.作者: 祖?zhèn)髫?cái)產(chǎn) 時(shí)間: 2025-3-25 20:21
Zusammenfassung und Schlussbetrachtung, probability for each person in each layer. Secondly, it uses the contribution of the first neighbors in the diffusion process. To show the performance of our approach, we compare it with the existing heuristics like . . .. With software . and . ., we show that .-. . is more performant than the benchmark heuristic.作者: NUL 時(shí)間: 2025-3-26 02:05
Interessen als Konzept der Sozialtheorie, a vector of opportunities and sustainable development for Burkina Faso, pre-conditions and challenges are facing particularly in terms of security in the cloud environment and the challenge on the supply in sufficient quantity and quality of electric power.作者: Nefarious 時(shí)間: 2025-3-26 04:48
Analysis of the 2015 Presidential Campaign of Burkina Faso Expressed on Facebook analyze many Facebook pages of political parties and media. We find that the campaign debates have been focused on campaign slogans and on the candidates rather than their political programs. Our findings show that the Facebook pages content reflect the election result. The most quoted candidate has been the winner.作者: 不朽中國(guó) 時(shí)間: 2025-3-26 12:00 作者: venous-leak 時(shí)間: 2025-3-26 13:14 作者: 稀釋前 時(shí)間: 2025-3-26 18:23
Interdisziplin?re Systemanalysee access to their financial information anywhere, have access to real time data, reduce the amount of time needed to enter data in the system and a system that is easy to use. Usability testing was done and the result was a system that was 20% better in keeping records compared to the user’s manual accounting system.作者: mechanism 時(shí)間: 2025-3-27 00:35
,Husserl und pr?reflektive Kognition,otten or concerned by homonymy. Focusing on African social practices and behaviors, this paper proposed to redesign the contact list by integrating social relations that link people. This redesigning is accompanied with novel functionalities that will facilitate contacts retrieval, homonymy resolving and contacts remembering.作者: 主動(dòng) 時(shí)間: 2025-3-27 03:14 作者: Expressly 時(shí)間: 2025-3-27 05:37 作者: BRAND 時(shí)間: 2025-3-27 12:43
Interessengeleitete Unternehmensbewertung layer connections of mobile users. Secure and resilient sessions allow user connections to survive network failures as opposed to regular transport layer secured connections used by traditional VPN protocols.作者: Creatinine-Test 時(shí)間: 2025-3-27 16:28 作者: jaundiced 時(shí)間: 2025-3-27 21:51 作者: semiskilled 時(shí)間: 2025-3-27 22:08 作者: 前面 時(shí)間: 2025-3-28 02:42 作者: 饑荒 時(shí)間: 2025-3-28 09:08 作者: organism 時(shí)間: 2025-3-28 12:21 作者: 喚醒 時(shí)間: 2025-3-28 18:04
Xj-ASD: Towards a j-ASD DSL eXtension for Application Deployment in Cloud-Based Environmentone, PC, etc. …), it occurs to ensure compliance of the data formats of these environments to that of Cloud platform. This conformity proves a prerequisite for deployment on a device from a cloud. To address these compliance constraints, we formalize them in matrix form and propose the use of a constraint solver.作者: MAG 時(shí)間: 2025-3-28 20:17
https://doi.org/10.1007/978-3-658-37830-1 an overview of the causes and impacts of pipeline failure. We aggregate and classify failure consequences in a select high risk zone into four indexes; and finally, we outline how BNs can accommodate these indexes for pipeline failure prediction modeling. These indexes function as effective surrogate inputs where data is unavailable.作者: Palliation 時(shí)間: 2025-3-29 01:10
https://doi.org/10.1007/978-3-531-90602-7ors had significant effects on the crowdfunding performance of the agricultural projects. The findings suggest project initiators may need to diversify project categories, set a relatively low funding target, and expand social network to increase number of contributors.作者: 自由職業(yè)者 時(shí)間: 2025-3-29 03:38
Classification of Water Pipeline Failure Consequence Index in High-Risk Zones: A Study of South Afri an overview of the causes and impacts of pipeline failure. We aggregate and classify failure consequences in a select high risk zone into four indexes; and finally, we outline how BNs can accommodate these indexes for pipeline failure prediction modeling. These indexes function as effective surrogate inputs where data is unavailable.作者: 冷漠 時(shí)間: 2025-3-29 08:56
Exploring Crowdfunding Performance of Agricultural Ventures: Evidence from FlyingV in Taiwanors had significant effects on the crowdfunding performance of the agricultural projects. The findings suggest project initiators may need to diversify project categories, set a relatively low funding target, and expand social network to increase number of contributors.作者: homocysteine 時(shí)間: 2025-3-29 14:49
Africa’s Non-inclusion in Defining Fifth Generation Mobile Networksconcluding that enshrined systems and processes that steer the changes in mobile technology disempower African inputs and represent a continuation of the single use of situated techniques, skills, methods and processes in the production of core mobile technologies, all conceptualised outside Africa.作者: Biomarker 時(shí)間: 2025-3-29 18:06
Mobile VPN Schemes: Technical Analysis and Experimentsssions to survive in dynamic/mobile environments without requiring a renegotiation of security keys during the session resumption phase. In this paper, we compare four open-source mobile VPNs in terms of functionality and performance.作者: 低三下四之人 時(shí)間: 2025-3-29 21:08
WAZIUP: A Low-Cost Infrastructure for Deploying IoT in Developing Countries be addressed in the context of African rural applications. We then describe the WAZIUP low-cost and long-range IoT framework. The framework takes cost of hardware and services as the main challenge to be addressed as well as offering quick appropriation and customization possibilities by third-parties.作者: growth-factor 時(shí)間: 2025-3-30 03:00
1867-8211 cted from 57 submissions and cover topics such as: mobile and social networks; cloud, VPN and overlays; IoT, water, land, agriculture; networks, TVWS; learning; crypto and services..978-3-319-66741-6978-3-319-66742-3Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: Kinetic 時(shí)間: 2025-3-30 04:45 作者: 否認(rèn) 時(shí)間: 2025-3-30 09:07
978-3-319-66741-6ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018作者: ARBOR 時(shí)間: 2025-3-30 14:27 作者: Meager 時(shí)間: 2025-3-30 20:03 作者: Trigger-Point 時(shí)間: 2025-3-30 23:49
https://doi.org/10.1007/978-3-663-10384-4urable computing resources. The adoption of this new technology within companies is restricted by security constraints. In this paper, we present the most significant risks that could affect organizations intending to deploy Cloud technology and security measures to be in place to reduce the impact of risks based on a literature review.作者: Obsequious 時(shí)間: 2025-3-31 04:32