派博傳思國際中心

標題: Titlebook: Information Computing and Applications; First International Rongbo Zhu,Yanchun Zhang,Chunfeng Liu Conference proceedings 2010 Springer Ber [打印本頁]

作者: 滋養(yǎng)物質(zhì)    時間: 2025-3-21 18:55
書目名稱Information Computing and Applications影響因子(影響力)




書目名稱Information Computing and Applications影響因子(影響力)學(xué)科排名




書目名稱Information Computing and Applications網(wǎng)絡(luò)公開度




書目名稱Information Computing and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Computing and Applications被引頻次




書目名稱Information Computing and Applications被引頻次學(xué)科排名




書目名稱Information Computing and Applications年度引用




書目名稱Information Computing and Applications年度引用學(xué)科排名




書目名稱Information Computing and Applications讀者反饋




書目名稱Information Computing and Applications讀者反饋學(xué)科排名





作者: 吞吞吐吐    時間: 2025-3-22 00:11
A Novel Approach for QoS Guided Metascheduler for P2P Grid Systemgenerates an optimal schedule so as to complete the tasks in a minimum time and to utilize the resources efficiently. Simulation results demonstrate that QPGM task scheduling algorithm can get better effect for a large scale optimization problem.
作者: 受人支配    時間: 2025-3-22 03:27

作者: 做作    時間: 2025-3-22 05:15
Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange key exchange scheme (CL-SAKE for short) is proposed, and its security is proved in the extended random oracle model. As an application, an E-payment protocol based on the new CL-SAKE is then proposed, which achieves unforgeability and un-reusability of e-cash, customer anonymity and fair exchange.
作者: APEX    時間: 2025-3-22 11:31

作者: Adherent    時間: 2025-3-22 14:01
Numerical Computing and Forecasting to Land Subsidence in Coastal Regions of Tangshannter water above. Finally, combine the mathematical model and the rate of land subsidence, establish the numerical analysis model about land subsidence. The results conform to the truth of subsidence of coastal areas.
作者: confederacy    時間: 2025-3-22 21:06
Grey Correlation Analysis on the Influential Factors the Hospital Medical Expenditurel fee. It is the medicine expenses which should be cut mostly in order to control the excessive increase of hospital medical expenditure. In the study of hospital medical expenditure, the grey correlation analysis fully utilized information and data, and led to more reasonable conclusions.
作者: 折磨    時間: 2025-3-22 22:44
Semantic Memory for Pervasive Architecture two ontologies linked to a reasoner an inference engine. To share and exchange information, an event knowledge representation language is used by semantic agents. This pervasive architecture brings other advantages: cooperation, redundancy, adaptability, interoperability and platforms independent.
作者: 作繭自縛    時間: 2025-3-23 04:56
A Non-strategic Microeconomic Model for Single-Service Multi-rate Application Layer Multicasty network. We have modeled the application layer multicast network as a non-strategic competitive economy based on the theory of consumer-firm of microeconomics by leveraging the concept of Walrasian general equilibrium.
作者: Texture    時間: 2025-3-23 08:36

作者: 清醒    時間: 2025-3-23 10:48
Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and Pricing calculation methods to determine the optimal order quantity and optimal sales price. Model in this paper is an extension of existing models, while the known model is a special case of this model. At last an simple example is given.
作者: Addictive    時間: 2025-3-23 14:32

作者: 針葉類的樹    時間: 2025-3-23 19:45
Method for Evaluating QoS Trustworthiness in the Service Composition the dependent relation between estimated QoS and the environmental context effectively, and can insure the accuracy of trustworthiness evaluation. Meantime, the proposed service selection approach can improve the actual runtime performance of the selected service.
作者: tinnitus    時間: 2025-3-24 00:58
Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairingsent than previous solutions in terms of communication complexity. In addition to the semantic security, we also present the authentication security to resist the undetectable on-line dictionary attacks.
作者: MENT    時間: 2025-3-24 03:42
Bayesian Network Based on FTA for Safety Evaluation on Coalmine Haulage Systemion Ltd. Through the result of the analysis we point out the most important factors influencing the safety state. The corresponding countermeasures are put forward too. The evaluation result indicates that this method is easy and can be popularized.
作者: Formidable    時間: 2025-3-24 09:48
Short Signature from the Bilinear Pairingscheme has short public parameters and the size of the signature achieves 160 bits. In addition, under the .-Exponent Computational Diffie-Hellman Problem(.-CDH), the new scheme is provable security. To the best of authors knowledge, this is the first scheme whose signature size achieves 160 bits based on the bilinear pairing.
作者: cartilage    時間: 2025-3-24 12:58
The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithmsss in the field of individual credit risk assessment. So we constructed a practical method based on combined algorithms, and we tested it empirically. The result shows that the application of the method can achieve better accuracy than the BP neural network.
作者: 露天歷史劇    時間: 2025-3-24 15:47

作者: 頭盔    時間: 2025-3-24 21:47
Leyou Zhang,Yupu Hu,Qing Wumanagement; and establish their own ethical and governance principles, applicable to the Board of Directors..Based on an extensive data base, collected painstakingly over five years, this book offers new insigh978-3-030-48529-0978-3-030-48527-6
作者: stratum-corneum    時間: 2025-3-25 00:40

作者: 果仁    時間: 2025-3-25 07:23
Hong-Lin Zhang,Chun-Yuan Zhang,Dong Liu,Gui-Wu Xie
作者: VALID    時間: 2025-3-25 09:12
Morteza Analoui,Mohammad Hossein Rezvanir providing descriptive statistics, correlations, and results, the chapter ends with some conclusions about the further developments to guide future research for scholars and academics as well as with some guidelines for practitioners interested in studying the good practices and the effectiveness o
作者: TERRA    時間: 2025-3-25 15:11
D. Doreen Hephzibah Miriam,K. S. Easwarakumar of mergers and acquisitions, reorganizations, duties of corporate directors and officers, contractual issues relating to public and private offerings, and the many other substantive areas in which executives are engaged. However, today they must become aware of the possible criminal and tortious be
作者: slipped-disk    時間: 2025-3-25 16:57
Ahmad Shukri Mohd Noor,Mustafa Mat Deris of mergers and acquisitions, reorganizations, duties of corporate directors and officers, contractual issues relating to public and private offerings, and the many other substantive areas in which executives are engaged. However, today they must become aware of the possible criminal and tortious be
作者: frozen-shoulder    時間: 2025-3-25 23:55
Jixian Xiao,Fangling Lu,Xin Xiaonto three parts. First, the “social heterogeneity” that considers three elements: gender, age, and ethnicity. Second, the “occupational heterogeneity” that is composed of all the elements that characterize the professional and educational experiences of the board members, such as work experiences in
作者: 教義    時間: 2025-3-26 03:14
Su-feng Yin,Xiao-jing Wang,Jian-hui Wu,Guo-li Wangnto three parts. First, the “social heterogeneity” that considers three elements: gender, age, and ethnicity. Second, the “occupational heterogeneity” that is composed of all the elements that characterize the professional and educational experiences of the board members, such as work experiences in
作者: 哎呦    時間: 2025-3-26 05:55

作者: packet    時間: 2025-3-26 12:19
Chaoping Wang,Aimin Yang,Yan Sunt rather an excess of liquidity caused by a lack of investment-grade opportunities in which banks are able to invest accumulated savings. Domestic investment is further hindered by the low savings rates in many countries, where investors prefer to invest in physical commodities or livestock in line
作者: OGLE    時間: 2025-3-26 14:42

作者: 或者發(fā)神韻    時間: 2025-3-26 20:04

作者: Recess    時間: 2025-3-27 01:00
Jiajun Li,Liping Qin,Jia Zhaos risks; appoint and empower non-executive directors to achieve an effectivemonitoring of management; and establish their own ethical and governance principles, applicable to the Board of Directors..Based on an extensive data base, collected painstakingly over five years, this book offers new insigh
作者: 擁擠前    時間: 2025-3-27 03:56
arly timely and useful as it combines both a review of the literature and robust empirical investigation.. .It will be an excellent reading for academics and practitioners interested in firm performance, corporate governance and stakeholder theory..978-3-030-56120-8
作者: 一窩小鳥    時間: 2025-3-27 07:25
del for researchers approaching this topic.Empirically exami.This book explores diversity in boardrooms to highlight the link between the heterogeneous dimensions of board diversity and their impact on the firms. The book provides a brief definition of corporate governance and focuses on the role an
作者: 放牧    時間: 2025-3-27 12:33

作者: 季雨    時間: 2025-3-27 17:20
D. Doreen Hephzibah Miriam,K. S. Easwarakumaroductory course in the study of law may be taught that the subject is divided into the categories of public or private; substantive or procedural; civil or criminal; national, regional, or international; and other artificial distinctions. Persons who have studied law for many decades see its unifyin
作者: metropolitan    時間: 2025-3-27 20:19

作者: Cardioversion    時間: 2025-3-27 23:03

作者: FOLLY    時間: 2025-3-28 04:30
Su-feng Yin,Xiao-jing Wang,Jian-hui Wu,Guo-li Wangce the two main theories that support this relation: the agency theory and the resource dependency theory [In the following chapters, other theories are investigated, i.e., stewardship theory, entrenchment theory, and upper echelons theory (UET)]. I also highlight the potential benefits and costs as
作者: Lipoma    時間: 2025-3-28 10:17
Ye Zhao,Shu-juan Liu,Yi-li Tanhe establishment of new markets. Despite this growth, very few of these markets and listed stocks have been included in popular investment benchmark indices (such as the Standard amp; Poor’s frontier market range), demonstrating the marginalization of this region in terms of attracting much needed i
作者: Instantaneous    時間: 2025-3-28 12:40

作者: 殖民地    時間: 2025-3-28 15:18

作者: Ovulation    時間: 2025-3-28 20:15
Ming Chen,Kaigui Wu,Jie Xuhe establishment of new markets. Despite this growth, very few of these markets and listed stocks have been included in popular investment benchmark indices (such as the Standard amp; Poor’s frontier market range), demonstrating the marginalization of this region in terms of attracting much needed i
作者: gene-therapy    時間: 2025-3-29 01:43
Leyou Zhang,Yupu Hu,Qing Wuel University VC award’ for best thesis of the academic yearEstablishing a corporate governance strategy that promotes the efficient use of organisational resources is instrumental in the economic growth of a country, as well as the successful management of firms.?.This book reviews existing literat
作者: Trigger-Point    時間: 2025-3-29 03:40

作者: Excise    時間: 2025-3-29 10:10

作者: Debrief    時間: 2025-3-29 11:26

作者: 含沙射影    時間: 2025-3-29 18:05
Importance Measure Method for Dynamic Fault Tree Based on Isomorphic Nodeon, a new method using this information is presented. By means of creating an object for every node, identifying the isomorphic nodes and computing only once for the same kind of isomorphic nodes, this method reduces the number of states and the computation time. This method also introduces the idea
作者: Fretful    時間: 2025-3-29 23:16

作者: 委托    時間: 2025-3-30 03:25
Dynamic Data Replication Strategy Based on Federation Data Grid Systemsn different access latency. This paper proposes a model of replication strategy in federated data grid that is known as dynamic replication for federation (DRF). DRF uses the concept of a defined ‘network core area’ (NCA) as the designated search area of which a search will be focussed. However, the
作者: FIR    時間: 2025-3-30 06:27

作者: decipher    時間: 2025-3-30 09:42
Failure Recovery Mechanism in Neighbor Replica Distribution Architecturetolerant and failure recovery techniques based on replication. These recovery techniques such as Netarkivet’s data grid and fast disaster recovery mechanism for volume replication systems were implemented in two-replica distribution technique(TRDT) or primary-backup architecture. However, these tech
作者: 殺蟲劑    時間: 2025-3-30 15:33

作者: Breach    時間: 2025-3-30 18:45

作者: 不在灌木叢中    時間: 2025-3-30 22:22
Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and Pricinh has an impact on the decision-making model, a new model is built up. While assuming the form of demand to meet the adding form, and considering the impact of the price on the demand rate and the impact of the demand rate on inventory item, we discuss a new subscription model, and give correspondin
作者: 符合國情    時間: 2025-3-31 01:45

作者: 委托    時間: 2025-3-31 08:17
Discrete Construction of order-, Voronoi Diagramemely complex. While discrete algorithm is only concerned with positions of generators, so it is effective for constructing Voronoi diagrams with complicated shapes of Voronoi polygons. It can be applied to order-. Voronoi diagram with any generators, and can get over most shortcomings of traditiona
作者: 心胸開闊    時間: 2025-3-31 10:13
Double Verifiably Encrypted Signature-Based Contract Signing Protocolpaper, we propose an efficient contract signing protocol based on the DVES scheme. A semi-trusted third party is involved in our protocol to ensure firness. Moreover, the new contract signing protocol satisfies the desirable properties: unforgeability, opacity, extractability, timeliness, effectiven
作者: violate    時間: 2025-3-31 15:27
Semantic Memory for Pervasive Architecturens. Lots of researches have been done on intelligent and reactive architectures able to manage multiple events and act in the environment. In the Robotics domain, a decision process must be implemented in the robot brain or a collective intelligence to accomplish the multimodal interaction with huma
作者: 不要不誠實    時間: 2025-3-31 20:28
Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchangen the E-payment applications of cross-domain and cross-organization scenarios because of certificate-based authentication and digital signature, like inconsistent public key certificates and a heavy certificate management burden. ID-based cryptography is adopted to solve those problems, but it suffe
作者: AVANT    時間: 2025-4-1 00:42
Short Signature from the Bilinear Pairingnication complexity of any transmission. A new short signature scheme based on the bilinear pairing in the standard model is introduced. The proposed scheme has short public parameters and the size of the signature achieves 160 bits. In addition, under the .-Exponent Computational Diffie-Hellman Pro
作者: 運動吧    時間: 2025-4-1 01:52
The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithmsbetter accuracy of decision-making. Over the past few years, the so-called combined algorithms have appeared in many fields, but they are always useless in the field of individual credit risk assessment. So we constructed a practical method based on combined algorithms, and we tested it empirically.
作者: 平息    時間: 2025-4-1 07:48

作者: Seizure    時間: 2025-4-1 13:07
Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairingsd with a trusted server, to establish a common session key with the help of the trusted server. We propose a provably-secure 3-party PAKE protocol using bilinear pairings, and prove its security in the random oracle model. The proposed protocol requires four communication steps, which is more effici




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
绥棱县| 祥云县| 汉沽区| 镇坪县| 安远县| 迁安市| 古田县| 米泉市| 梅州市| 望奎县| 凤凰县| 武城县| 清河县| 万州区| 阿拉善右旗| 逊克县| 习水县| 大石桥市| 南郑县| 黑山县| 临沂市| 尼玛县| 江城| 大理市| 霍山县| 建始县| 理塘县| 钦州市| 柞水县| 德格县| 广水市| 黑龙江省| 宝清县| 佛教| 石景山区| 城市| 遂平县| 寻乌县| 门源| 甘肃省| 宁强县|