派博傳思國際中心

標題: Titlebook: ; [打印本頁]

作者: 要旨    時間: 2025-3-21 17:37
書目名稱Green, Pervasive, and Cloud Computing影響因子(影響力)




書目名稱Green, Pervasive, and Cloud Computing影響因子(影響力)學科排名




書目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開度




書目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開度學科排名




書目名稱Green, Pervasive, and Cloud Computing被引頻次




書目名稱Green, Pervasive, and Cloud Computing被引頻次學科排名




書目名稱Green, Pervasive, and Cloud Computing年度引用




書目名稱Green, Pervasive, and Cloud Computing年度引用學科排名




書目名稱Green, Pervasive, and Cloud Computing讀者反饋




書目名稱Green, Pervasive, and Cloud Computing讀者反饋學科排名





作者: Ointment    時間: 2025-3-21 23:43

作者: 使激動    時間: 2025-3-22 03:24

作者: famine    時間: 2025-3-22 07:12
Withdrawn Ocular Stem Cell Studies,t a technique that allows to save space for storing keys in an HSM, thus reducing the number of needed HSMs. While saving space allows to reduce direct costs, it comes at the expense of computation time. We provide a preliminary experimental evaluation of the extra time needed.
作者: 附錄    時間: 2025-3-22 10:56

作者: Hangar    時間: 2025-3-22 14:12

作者: Hangar    時間: 2025-3-22 17:35

作者: EXULT    時間: 2025-3-23 00:18

作者: Extricate    時間: 2025-3-23 03:18

作者: dagger    時間: 2025-3-23 07:09
New Publicly Verifiable Computation for Batch Matrix Multiplication-preserving matrix transformation and matrix digest, our scheme can protect the secrecy of the client’s private matrix . and dramatically reduce the computation cost in both the key generation and the compute phases. The security analysis shows that the proposed scheme can also achieve the desired security properties under the co-CDH assumption.
作者: 輕浮思想    時間: 2025-3-23 10:12
Privacy Preserving Multimodal Biometric Authentication in the Clouding attacks are prevented that are applicable even if the templates are stored as encrypted. Finally, the scheme benefits from the advantages of multimodal biometrics and the efficiency of the underlying primitives with linear computation and communication overhead.
作者: 可商量    時間: 2025-3-23 17:39
https://doi.org/10.1007/b138573tight bounds for the problem. The computational results, carried out on benchmark instances, confirm the improvements of the bounds computed with respect to the other algorithms proposed in the literature.
作者: 圍巾    時間: 2025-3-23 20:58
Post Enucleation Socket Syndromelgorithms leveraging the introduced network structure in order to show the advantages to consider also “user-to-multimedia” relationships (in addition to the “user-to-user” ones) in the influence analysis problem. Preliminary experiments using data of several social media networks shows how our approach obtains very promising results.
作者: 埋伏    時間: 2025-3-23 22:49
Improved Upper and Lower Bounds for the Close Enough Traveling Salesman Problemtight bounds for the problem. The computational results, carried out on benchmark instances, confirm the improvements of the bounds computed with respect to the other algorithms proposed in the literature.
作者: granite    時間: 2025-3-24 06:09

作者: 消音器    時間: 2025-3-24 07:55

作者: Cholecystokinin    時間: 2025-3-24 11:32
Trust-ABAC Towards an Access Control System for the Internet of Thingsmulation. We used the OMNeT++ simulator to show the efficiency of our model in terms of power consumption, response time and the average number of messages generated by an access request. The obtained results of simulation prove the good scalability of our Trust-ABAC model.
作者: Nomadic    時間: 2025-3-24 14:53

作者: degradation    時間: 2025-3-24 20:15

作者: Accomplish    時間: 2025-3-25 02:36
Mark A. Prendes,Bryan R. Costinsed on antenna polarization in M-MIMO systems to re-group users. The proposed scheme effectively reduces the number of users within the beam coverage. On the other hand, we propose a method that adaptively selects channel estimation method according to the power of the user in SIC process to eliminate the effect.
作者: 不整齊    時間: 2025-3-25 05:57
Secure User Authentication on Smartphones via Sensor and Face Recognition on Short Video Clipsure authentication protocols. The main achievement of this work is to make the smartphone not only the cause of the problem but also part of the solution. Here, the Sensor Pattern Noise of the smartphone embedded camera and the HOG features of the user’s face are combined for a double check of user identity.
作者: 遺傳    時間: 2025-3-25 08:05
MOHAB: Mobile Hand-Based Biometric Recognition and availability, their use in this context appears particularly attractive. The work presented in this study aims at investigating at an high level the limitations of using hand geometry to enable biometric recognition on mobile. The first results obtained were encouraging let supposing potential margins of improvement of the proposed method.
作者: infarct    時間: 2025-3-25 12:10

作者: 使腐爛    時間: 2025-3-25 19:42
Withdrawn Ocular Stem Cell Studies,chieve high security standard, an HSM stores keys internally and never exposes them in plaintext; operations involving the keys are performed internally and only the result is given outside the HSM. Thus an HSM must have storage space to store all the keys that have to be managed. In real-world appl
作者: Subjugate    時間: 2025-3-25 22:37

作者: 使痛苦    時間: 2025-3-26 01:57
Edward J. Holland,Mark J. Mannis-compliance with the user’s preferences and/or regulations, the difficulty of the data flow tracking, etc. In particular, one unsolved problem is to ensure that customers data usage policies are enforced, regardless of who accesses the data, how they are processed, where are the data stored, transfe
作者: conformity    時間: 2025-3-26 07:48

作者: 脫離    時間: 2025-3-26 08:52

作者: Ordnance    時間: 2025-3-26 16:04
Devesh Kumawat,Pradeep Venkateshmomorphic network coding signatures in the random oracle model. But there are still no multi-source homomorphic network coding signatures in the standard model. How to construct it remains an open problem. In this paper, we propose the first multi-source homomorphic network coding signature in the s
作者: Freeze    時間: 2025-3-26 17:40

作者: 加花粗鄙人    時間: 2025-3-26 23:29
Fairooz P. Manjandavida,Shaifali Chaharcrypted storage and processing in the encrypted domain, the biometric database can be outsourced to the cloud. Our scheme is based on the combination of two different cryptographic primitives operating on encrypted biometric templates generated either from a single trait such as fingerprint or multi
作者: Gleason-score    時間: 2025-3-27 02:42

作者: 得意牛    時間: 2025-3-27 06:21
https://doi.org/10.1007/978-981-287-846-5owever, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-facto
作者: Verify    時間: 2025-3-27 12:16
Mark A. Prendes,Bryan R. Costinffect that occurs to the NOMA downlink and serial interference cancellation (SIC). To avoid near-far effect, we propose 3D beam forming application based on antenna polarization in M-MIMO systems to re-group users. The proposed scheme effectively reduces the number of users within the beam coverage.
作者: CUMB    時間: 2025-3-27 15:48

作者: 畢業(yè)典禮    時間: 2025-3-27 19:08
Surgical Anatomy of the Eyelid, in cloud platforms, VMs (. .) are easily affected by the synchronization latency problem which leads to serious performance degradation. There are two main reasons. The first is that a host is unaware of the synchronization requirements of the guest OS. The second is that the synchronization reques
作者: 閹割    時間: 2025-3-27 23:54
https://doi.org/10.1007/b138573ode if it passes through the neighborhood of that node. We introduce an improved version of the adaptive internal discretization scheme, recently proposed in the literature, and a heuristic that combines this scheme with to a second-order cone programming algorithm. Our heuristic is able to compute
作者: Decline    時間: 2025-3-28 06:00

作者: 錯事    時間: 2025-3-28 07:10
J. Javier Servat MD,Eric B. Baylin MD provisioning virtualized resources. Such data centers consume an enormous amount of energy, resulting in high operational cost and carbon dioxide emission. Meanwhile, cloud providers need to ensure Quality of Service (QoS) in the computing solution delivered to their customers, and hence must consi
作者: Finasteride    時間: 2025-3-28 13:17
Post Enucleation Socket Syndromey all the different kinds of relationships that are typical of these environments (among multimedia contents, among users and multimedia content and among users themselves) and to enable several kinds of analytics and applications. From the other hand, we have tested several influence maximization a
作者: 故意    時間: 2025-3-28 16:22

作者: CEDE    時間: 2025-3-28 22:28

作者: 盡管    時間: 2025-3-29 00:46
A Hybrid Approach for Private Data Protection in the Cloud-compliance with the user’s preferences and/or regulations, the difficulty of the data flow tracking, etc. In particular, one unsolved problem is to ensure that customers data usage policies are enforced, regardless of who accesses the data, how they are processed, where are the data stored, transfe
作者: organic-matrix    時間: 2025-3-29 05:41
An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Controlopriate alteration of signed message should be allowed for the purposes of privacy protection or bandwidth saving in some scenarios, such as medical record or official information disclosure. Redactable signatures, a branch of homomorphic signatures for editing, allow any redactor to remove some sub
作者: Obloquy    時間: 2025-3-29 10:34

作者: obeisance    時間: 2025-3-29 13:45
A Multi-source Homomorphic Network Coding Signature in the Standard Modelmomorphic network coding signatures in the random oracle model. But there are still no multi-source homomorphic network coding signatures in the standard model. How to construct it remains an open problem. In this paper, we propose the first multi-source homomorphic network coding signature in the s
作者: fallible    時間: 2025-3-29 15:42
Trust-ABAC Towards an Access Control System for the Internet of Thingslve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling betwee
作者: 預(yù)測    時間: 2025-3-29 22:58
Privacy Preserving Multimodal Biometric Authentication in the Cloudcrypted storage and processing in the encrypted domain, the biometric database can be outsourced to the cloud. Our scheme is based on the combination of two different cryptographic primitives operating on encrypted biometric templates generated either from a single trait such as fingerprint or multi
作者: CALL    時間: 2025-3-30 00:31
MOHAB: Mobile Hand-Based Biometric Recognitionh lines and taking into consideration different traits. On the other hand, few studies tackle its feasibility on mobile devices. Given their diffusion and availability, their use in this context appears particularly attractive. The work presented in this study aims at investigating at an high level
作者: LUDE    時間: 2025-3-30 04:56
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme owever, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-facto
作者: STEER    時間: 2025-3-30 09:03
A Study of Interference Cancellation for NOMA Downlink Near-Far Effect to Support Big Dataffect that occurs to the NOMA downlink and serial interference cancellation (SIC). To avoid near-far effect, we propose 3D beam forming application based on antenna polarization in M-MIMO systems to re-group users. The proposed scheme effectively reduces the number of users within the beam coverage.
作者: Precursor    時間: 2025-3-30 15:51
Dynamic Latency Sensitivity Recognition: An Application to Energy Saving sanitization of the Internet traffic is a real necessity. In this paper we will apply a dynamic statistical analysis to separate latency sensitive traffic from the latency insensitive one at the source. Then, we will calculate the energy savings that can be achieved by identifying and dropping all
作者: 拖債    時間: 2025-3-30 19:46

作者: constellation    時間: 2025-3-30 21:14

作者: Humble    時間: 2025-3-31 01:33
Object Storage in Cloud Computing Environments: An Availability Analysis in the form of objects accessible via REST APIs. An interesting implementation of OSS is based on Swift, a component of OpenStack, the most important platform exploited to deploy the Infrastructure as a Service (IaaS) paradigm. The present work is aimed at characterizing a Swift-based OSS from the
作者: 排斥    時間: 2025-3-31 08:30

作者: 沒有準備    時間: 2025-3-31 10:39
Influence Maximization in Social Media Networks Using Hypergraphsy all the different kinds of relationships that are typical of these environments (among multimedia contents, among users and multimedia content and among users themselves) and to enable several kinds of analytics and applications. From the other hand, we have tested several influence maximization a
作者: Scleroderma    時間: 2025-3-31 14:54





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
肇源县| 汝州市| 长白| 沂南县| 闻喜县| 长治市| 宁明县| 临澧县| 彭阳县| 新巴尔虎左旗| 金沙县| 蒙自县| 马尔康县| 长泰县| 宜宾市| 英超| 杨浦区| 万年县| 内黄县| 兴山县| 三台县| 基隆市| 大埔区| 南投县| 延安市| 玛沁县| 丘北县| 新兴县| 鹤峰县| 漠河县| 图木舒克市| 元朗区| 全州县| 康保县| 河间市| 黔江区| 信丰县| 昭通市| 连云港市| 山阳县| 永宁县|