標題: Titlebook: Information Computing and Applications; First International Rongbo Zhu,Yanchun Zhang,Chunfeng Liu Conference proceedings 2010 Springer Ber [打印本頁] 作者: 滋養(yǎng)物質(zhì) 時間: 2025-3-21 18:55
書目名稱Information Computing and Applications影響因子(影響力)
書目名稱Information Computing and Applications影響因子(影響力)學(xué)科排名
書目名稱Information Computing and Applications網(wǎng)絡(luò)公開度
書目名稱Information Computing and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Computing and Applications被引頻次
書目名稱Information Computing and Applications被引頻次學(xué)科排名
書目名稱Information Computing and Applications年度引用
書目名稱Information Computing and Applications年度引用學(xué)科排名
書目名稱Information Computing and Applications讀者反饋
書目名稱Information Computing and Applications讀者反饋學(xué)科排名
作者: 吞吞吐吐 時間: 2025-3-22 00:11
A Novel Approach for QoS Guided Metascheduler for P2P Grid Systemgenerates an optimal schedule so as to complete the tasks in a minimum time and to utilize the resources efficiently. Simulation results demonstrate that QPGM task scheduling algorithm can get better effect for a large scale optimization problem.作者: 受人支配 時間: 2025-3-22 03:27 作者: 做作 時間: 2025-3-22 05:15
Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange key exchange scheme (CL-SAKE for short) is proposed, and its security is proved in the extended random oracle model. As an application, an E-payment protocol based on the new CL-SAKE is then proposed, which achieves unforgeability and un-reusability of e-cash, customer anonymity and fair exchange.作者: APEX 時間: 2025-3-22 11:31 作者: Adherent 時間: 2025-3-22 14:01
Numerical Computing and Forecasting to Land Subsidence in Coastal Regions of Tangshannter water above. Finally, combine the mathematical model and the rate of land subsidence, establish the numerical analysis model about land subsidence. The results conform to the truth of subsidence of coastal areas.作者: confederacy 時間: 2025-3-22 21:06
Grey Correlation Analysis on the Influential Factors the Hospital Medical Expenditurel fee. It is the medicine expenses which should be cut mostly in order to control the excessive increase of hospital medical expenditure. In the study of hospital medical expenditure, the grey correlation analysis fully utilized information and data, and led to more reasonable conclusions.作者: 折磨 時間: 2025-3-22 22:44
Semantic Memory for Pervasive Architecture two ontologies linked to a reasoner an inference engine. To share and exchange information, an event knowledge representation language is used by semantic agents. This pervasive architecture brings other advantages: cooperation, redundancy, adaptability, interoperability and platforms independent.作者: 作繭自縛 時間: 2025-3-23 04:56
A Non-strategic Microeconomic Model for Single-Service Multi-rate Application Layer Multicasty network. We have modeled the application layer multicast network as a non-strategic competitive economy based on the theory of consumer-firm of microeconomics by leveraging the concept of Walrasian general equilibrium.作者: Texture 時間: 2025-3-23 08:36 作者: 清醒 時間: 2025-3-23 10:48
Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and Pricing calculation methods to determine the optimal order quantity and optimal sales price. Model in this paper is an extension of existing models, while the known model is a special case of this model. At last an simple example is given.作者: Addictive 時間: 2025-3-23 14:32 作者: 針葉類的樹 時間: 2025-3-23 19:45
Method for Evaluating QoS Trustworthiness in the Service Composition the dependent relation between estimated QoS and the environmental context effectively, and can insure the accuracy of trustworthiness evaluation. Meantime, the proposed service selection approach can improve the actual runtime performance of the selected service.作者: tinnitus 時間: 2025-3-24 00:58
Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairingsent than previous solutions in terms of communication complexity. In addition to the semantic security, we also present the authentication security to resist the undetectable on-line dictionary attacks.作者: MENT 時間: 2025-3-24 03:42
Bayesian Network Based on FTA for Safety Evaluation on Coalmine Haulage Systemion Ltd. Through the result of the analysis we point out the most important factors influencing the safety state. The corresponding countermeasures are put forward too. The evaluation result indicates that this method is easy and can be popularized.作者: Formidable 時間: 2025-3-24 09:48
Short Signature from the Bilinear Pairingscheme has short public parameters and the size of the signature achieves 160 bits. In addition, under the .-Exponent Computational Diffie-Hellman Problem(.-CDH), the new scheme is provable security. To the best of authors knowledge, this is the first scheme whose signature size achieves 160 bits based on the bilinear pairing.作者: cartilage 時間: 2025-3-24 12:58
The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithmsss in the field of individual credit risk assessment. So we constructed a practical method based on combined algorithms, and we tested it empirically. The result shows that the application of the method can achieve better accuracy than the BP neural network.作者: 露天歷史劇 時間: 2025-3-24 15:47 作者: 頭盔 時間: 2025-3-24 21:47
Leyou Zhang,Yupu Hu,Qing Wumanagement; and establish their own ethical and governance principles, applicable to the Board of Directors..Based on an extensive data base, collected painstakingly over five years, this book offers new insigh978-3-030-48529-0978-3-030-48527-6作者: stratum-corneum 時間: 2025-3-25 00:40 作者: 果仁 時間: 2025-3-25 07:23
Hong-Lin Zhang,Chun-Yuan Zhang,Dong Liu,Gui-Wu Xie作者: VALID 時間: 2025-3-25 09:12
Morteza Analoui,Mohammad Hossein Rezvanir providing descriptive statistics, correlations, and results, the chapter ends with some conclusions about the further developments to guide future research for scholars and academics as well as with some guidelines for practitioners interested in studying the good practices and the effectiveness o作者: TERRA 時間: 2025-3-25 15:11
D. Doreen Hephzibah Miriam,K. S. Easwarakumar of mergers and acquisitions, reorganizations, duties of corporate directors and officers, contractual issues relating to public and private offerings, and the many other substantive areas in which executives are engaged. However, today they must become aware of the possible criminal and tortious be作者: slipped-disk 時間: 2025-3-25 16:57
Ahmad Shukri Mohd Noor,Mustafa Mat Deris of mergers and acquisitions, reorganizations, duties of corporate directors and officers, contractual issues relating to public and private offerings, and the many other substantive areas in which executives are engaged. However, today they must become aware of the possible criminal and tortious be作者: frozen-shoulder 時間: 2025-3-25 23:55
Jixian Xiao,Fangling Lu,Xin Xiaonto three parts. First, the “social heterogeneity” that considers three elements: gender, age, and ethnicity. Second, the “occupational heterogeneity” that is composed of all the elements that characterize the professional and educational experiences of the board members, such as work experiences in作者: 教義 時間: 2025-3-26 03:14
Su-feng Yin,Xiao-jing Wang,Jian-hui Wu,Guo-li Wangnto three parts. First, the “social heterogeneity” that considers three elements: gender, age, and ethnicity. Second, the “occupational heterogeneity” that is composed of all the elements that characterize the professional and educational experiences of the board members, such as work experiences in作者: 哎呦 時間: 2025-3-26 05:55 作者: packet 時間: 2025-3-26 12:19
Chaoping Wang,Aimin Yang,Yan Sunt rather an excess of liquidity caused by a lack of investment-grade opportunities in which banks are able to invest accumulated savings. Domestic investment is further hindered by the low savings rates in many countries, where investors prefer to invest in physical commodities or livestock in line 作者: OGLE 時間: 2025-3-26 14:42 作者: 或者發(fā)神韻 時間: 2025-3-26 20:04 作者: Recess 時間: 2025-3-27 01:00
Jiajun Li,Liping Qin,Jia Zhaos risks; appoint and empower non-executive directors to achieve an effectivemonitoring of management; and establish their own ethical and governance principles, applicable to the Board of Directors..Based on an extensive data base, collected painstakingly over five years, this book offers new insigh作者: 擁擠前 時間: 2025-3-27 03:56
arly timely and useful as it combines both a review of the literature and robust empirical investigation.. .It will be an excellent reading for academics and practitioners interested in firm performance, corporate governance and stakeholder theory..978-3-030-56120-8作者: 一窩小鳥 時間: 2025-3-27 07:25
del for researchers approaching this topic.Empirically exami.This book explores diversity in boardrooms to highlight the link between the heterogeneous dimensions of board diversity and their impact on the firms. The book provides a brief definition of corporate governance and focuses on the role an作者: 放牧 時間: 2025-3-27 12:33 作者: 季雨 時間: 2025-3-27 17:20
D. Doreen Hephzibah Miriam,K. S. Easwarakumaroductory course in the study of law may be taught that the subject is divided into the categories of public or private; substantive or procedural; civil or criminal; national, regional, or international; and other artificial distinctions. Persons who have studied law for many decades see its unifyin作者: metropolitan 時間: 2025-3-27 20:19 作者: Cardioversion 時間: 2025-3-27 23:03 作者: FOLLY 時間: 2025-3-28 04:30
Su-feng Yin,Xiao-jing Wang,Jian-hui Wu,Guo-li Wangce the two main theories that support this relation: the agency theory and the resource dependency theory [In the following chapters, other theories are investigated, i.e., stewardship theory, entrenchment theory, and upper echelons theory (UET)]. I also highlight the potential benefits and costs as作者: Lipoma 時間: 2025-3-28 10:17
Ye Zhao,Shu-juan Liu,Yi-li Tanhe establishment of new markets. Despite this growth, very few of these markets and listed stocks have been included in popular investment benchmark indices (such as the Standard amp; Poor’s frontier market range), demonstrating the marginalization of this region in terms of attracting much needed i作者: Instantaneous 時間: 2025-3-28 12:40 作者: 殖民地 時間: 2025-3-28 15:18 作者: Ovulation 時間: 2025-3-28 20:15
Ming Chen,Kaigui Wu,Jie Xuhe establishment of new markets. Despite this growth, very few of these markets and listed stocks have been included in popular investment benchmark indices (such as the Standard amp; Poor’s frontier market range), demonstrating the marginalization of this region in terms of attracting much needed i作者: gene-therapy 時間: 2025-3-29 01:43
Leyou Zhang,Yupu Hu,Qing Wuel University VC award’ for best thesis of the academic yearEstablishing a corporate governance strategy that promotes the efficient use of organisational resources is instrumental in the economic growth of a country, as well as the successful management of firms.?.This book reviews existing literat作者: Trigger-Point 時間: 2025-3-29 03:40 作者: Excise 時間: 2025-3-29 10:10 作者: Debrief 時間: 2025-3-29 11:26 作者: 含沙射影 時間: 2025-3-29 18:05
Importance Measure Method for Dynamic Fault Tree Based on Isomorphic Nodeon, a new method using this information is presented. By means of creating an object for every node, identifying the isomorphic nodes and computing only once for the same kind of isomorphic nodes, this method reduces the number of states and the computation time. This method also introduces the idea作者: Fretful 時間: 2025-3-29 23:16 作者: 委托 時間: 2025-3-30 03:25
Dynamic Data Replication Strategy Based on Federation Data Grid Systemsn different access latency. This paper proposes a model of replication strategy in federated data grid that is known as dynamic replication for federation (DRF). DRF uses the concept of a defined ‘network core area’ (NCA) as the designated search area of which a search will be focussed. However, the作者: FIR 時間: 2025-3-30 06:27 作者: decipher 時間: 2025-3-30 09:42
Failure Recovery Mechanism in Neighbor Replica Distribution Architecturetolerant and failure recovery techniques based on replication. These recovery techniques such as Netarkivet’s data grid and fast disaster recovery mechanism for volume replication systems were implemented in two-replica distribution technique(TRDT) or primary-backup architecture. However, these tech作者: 殺蟲劑 時間: 2025-3-30 15:33 作者: Breach 時間: 2025-3-30 18:45 作者: 不在灌木叢中 時間: 2025-3-30 22:22
Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and Pricinh has an impact on the decision-making model, a new model is built up. While assuming the form of demand to meet the adding form, and considering the impact of the price on the demand rate and the impact of the demand rate on inventory item, we discuss a new subscription model, and give correspondin作者: 符合國情 時間: 2025-3-31 01:45 作者: 委托 時間: 2025-3-31 08:17
Discrete Construction of order-, Voronoi Diagramemely complex. While discrete algorithm is only concerned with positions of generators, so it is effective for constructing Voronoi diagrams with complicated shapes of Voronoi polygons. It can be applied to order-. Voronoi diagram with any generators, and can get over most shortcomings of traditiona作者: 心胸開闊 時間: 2025-3-31 10:13
Double Verifiably Encrypted Signature-Based Contract Signing Protocolpaper, we propose an efficient contract signing protocol based on the DVES scheme. A semi-trusted third party is involved in our protocol to ensure firness. Moreover, the new contract signing protocol satisfies the desirable properties: unforgeability, opacity, extractability, timeliness, effectiven作者: violate 時間: 2025-3-31 15:27
Semantic Memory for Pervasive Architecturens. Lots of researches have been done on intelligent and reactive architectures able to manage multiple events and act in the environment. In the Robotics domain, a decision process must be implemented in the robot brain or a collective intelligence to accomplish the multimodal interaction with huma作者: 不要不誠實 時間: 2025-3-31 20:28
Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchangen the E-payment applications of cross-domain and cross-organization scenarios because of certificate-based authentication and digital signature, like inconsistent public key certificates and a heavy certificate management burden. ID-based cryptography is adopted to solve those problems, but it suffe作者: AVANT 時間: 2025-4-1 00:42
Short Signature from the Bilinear Pairingnication complexity of any transmission. A new short signature scheme based on the bilinear pairing in the standard model is introduced. The proposed scheme has short public parameters and the size of the signature achieves 160 bits. In addition, under the .-Exponent Computational Diffie-Hellman Pro作者: 運動吧 時間: 2025-4-1 01:52
The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithmsbetter accuracy of decision-making. Over the past few years, the so-called combined algorithms have appeared in many fields, but they are always useless in the field of individual credit risk assessment. So we constructed a practical method based on combined algorithms, and we tested it empirically.作者: 平息 時間: 2025-4-1 07:48 作者: Seizure 時間: 2025-4-1 13:07
Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairingsd with a trusted server, to establish a common session key with the help of the trusted server. We propose a provably-secure 3-party PAKE protocol using bilinear pairings, and prove its security in the random oracle model. The proposed protocol requires four communication steps, which is more effici