標題: Titlebook: Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf; Leszek Borzemski,Adam Grzech,Zofia W [打印本頁] 作者: Halloween 時間: 2025-3-21 19:56
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf影響因子(影響力)
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf影響因子(影響力)學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf網(wǎng)絡公開度
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf網(wǎng)絡公開度學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf被引頻次
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf被引頻次學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf年度引用
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf年度引用學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf讀者反饋
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf讀者反饋學科排名
作者: 團結 時間: 2025-3-21 22:00
phic system and its variants....Cryptanalytic Attacks on RSA. is designed for a professional audience of practitioners and researchers in industry and academia and as a reference or secondary text for advanced level students in computer science, applied mathematics, electrical?& communication engineering...978-1-4419-4310-1978-0-387-48742-7作者: Osteoporosis 時間: 2025-3-22 02:32
Marcin Relichphic system and its variants....Cryptanalytic Attacks on RSA. is designed for a professional audience of practitioners and researchers in industry and academia and as a reference or secondary text for advanced level students in computer science, applied mathematics, electrical?& communication engineering...978-1-4419-4310-1978-0-387-48742-7作者: ARIA 時間: 2025-3-22 06:32
Krystian ?apaphic system and its variants....Cryptanalytic Attacks on RSA. is designed for a professional audience of practitioners and researchers in industry and academia and as a reference or secondary text for advanced level students in computer science, applied mathematics, electrical?& communication engineering...978-1-4419-4310-1978-0-387-48742-7作者: 陶瓷 時間: 2025-3-22 12:28 作者: judiciousness 時間: 2025-3-22 13:40
Edyta Kucharska,Katarzyna Grobler-D?bska,Krzysztof R?czkaphic system and its variants....Cryptanalytic Attacks on RSA. is designed for a professional audience of practitioners and researchers in industry and academia and as a reference or secondary text for advanced level students in computer science, applied mathematics, electrical?& communication engineering...978-1-4419-4310-1978-0-387-48742-7作者: 剛開始 時間: 2025-3-22 19:56 作者: 從容 時間: 2025-3-23 00:54 作者: vitrectomy 時間: 2025-3-23 02:35
Roman Simińskit III, Creating Your Own Crypto, teaches you how to launch your own crypto project and create your own cryptocurrency..What You Will Learn..Know how cryptography, Bitcoin, and other cryptos work.Understand how crypto becomes money, and how crypto exchanges work.Use crypto as a payment method.Buy you作者: Hectic 時間: 2025-3-23 06:05
t III, Creating Your Own Crypto, teaches you how to launch your own crypto project and create your own cryptocurrency..What You Will Learn..Know how cryptography, Bitcoin, and other cryptos work.Understand how crypto becomes money, and how crypto exchanges work.Use crypto as a payment method.Buy you作者: COLIC 時間: 2025-3-23 09:48 作者: receptors 時間: 2025-3-23 13:53 作者: 卷發(fā) 時間: 2025-3-23 20:30
Franti?ek Babi?,Barbora ?urováate your own cryptocurrency..What You Will Learn..Know how cryptography, Bitcoin, and other cryptos work.Understand how crypto becomes money, and how crypto exchanges work.Use crypto as a payment method.Buy you978-1-4842-8320-2978-1-4842-8321-9作者: EPT 時間: 2025-3-23 23:02 作者: trigger 時間: 2025-3-24 03:09
Micha? Turek,Jan Werewka,Dariusz Pa?kaate your own cryptocurrency..What You Will Learn..Know how cryptography, Bitcoin, and other cryptos work.Understand how crypto becomes money, and how crypto exchanges work.Use crypto as a payment method.Buy you978-1-4842-8320-2978-1-4842-8321-9作者: Complement 時間: 2025-3-24 08:25 作者: 門閂 時間: 2025-3-24 12:42 作者: FOVEA 時間: 2025-3-24 15:30 作者: 非實體 時間: 2025-3-24 20:27
S?awomir Hanczewski,Maciej Stasiak,Piotr Zwierzykowski show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers..978-3-031-44809-6978-3-031-44807-2作者: 有幫助 時間: 2025-3-25 01:51 作者: 尋找 時間: 2025-3-25 04:31 作者: 吊胃口 時間: 2025-3-25 11:14
2194-5357 d Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management...Part IV—dealing with topics including, but not limited to,978-3-319-46582-1978-3-319-46583-8Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 祖?zhèn)髫敭a(chǎn) 時間: 2025-3-25 14:33
Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf作者: 膽大 時間: 2025-3-25 18:12 作者: 發(fā)源 時間: 2025-3-25 21:56 作者: Immunization 時間: 2025-3-26 04:10 作者: 亂砍 時間: 2025-3-26 05:08 作者: 牌帶來 時間: 2025-3-26 08:38
The Scrum Pricing Model for Developing a Common Software Framework in a Multi-project Environmentiggered by one customer can be beneficial for all parties taking part in the framework development, with justified share of the price. In such situations a common base for software development pricing techniques must be established. It will depend on different factors, such as: team effort, team vel作者: 減至最低 時間: 2025-3-26 15:01 作者: 在駕駛 時間: 2025-3-26 16:50 作者: Ligament 時間: 2025-3-26 22:41 作者: 相容 時間: 2025-3-27 02:53
Leszek Borzemski,Adam Grzech,Zofia WilimowskaPresents recent advances in Information Systems Architecture and Technology.Contains best papers presented at the 37th International Conference on Information Systems Architecture and Technology – ISA作者: 責難 時間: 2025-3-27 08:53 作者: UTTER 時間: 2025-3-27 11:55 作者: PLIC 時間: 2025-3-27 14:55
Weighted Fuzzy Genetic Programming Algorithm for Structure and Parameters Selection of Fuzzy Systemsoperators, using weights of fuzzy rules, using fitness function criteria designed for fuzzy genetic programming and using dynamic links between fuzzy rules and fuzzy rules base. The proposed method was tested with use of typical nonlinear modelling problems.作者: photopsia 時間: 2025-3-27 21:37
Queuing Model of Wireless Access System results obtained in the study were then compared with the results of a simulation, which confirmed the essential and required accuracy of the proposed model. The model developed in the study can be used to analyse, design and optimize present-day wireless access system.作者: BILK 時間: 2025-3-27 23:08
Clustering Algorithms and Data Streams for Supervised Control of Data and Prevention of Threats in Mse (.)—as well as other mechanisms connected with data streams. The proposed solution is based on the process of monitoring the incoming server requests obtained from mobile devices which use server application to connect to the data.作者: 相反放置 時間: 2025-3-28 02:08 作者: 木質 時間: 2025-3-28 08:34
The Experimental Evaluation of Rules Partitioning Conception for Knowledge Base Systemsr additional data necessary for storing information about rules groups. The effectiveness evaluation of the forward and backward inference algorithms was the main goal of the second part of the experiments.作者: 冷淡周邊 時間: 2025-3-28 14:02 作者: –吃 時間: 2025-3-28 17:37
The Process of Verifying the Implementation of Design Patterns—Used Data Modelsnd a repository of implementation of patterns containing information describing the implementation of design patterns. The proposed solution will make it possible to show implementation errors and potential problems.作者: DUST 時間: 2025-3-28 21:36
Dynamic Visualization of Generalized One-Sided Concept Lattices and Their Reductions is large number of concepts for visualization to user. The solution is to provide user with the reduction methods and advanced dynamic visualization of concept lattices and their reductions. In this paper we introduce and compare some of the implemented visualizations and reductions applied to concept lattices generated from input data.作者: 防御 時間: 2025-3-29 01:28 作者: NAV 時間: 2025-3-29 05:28
Pre-testing of Polish Translation of System Usability Scale (SUS)lish and English SUS score. The validity of Polish SUS version measured by correlations with other usability metrics, including Computer System Usability Questionnaire (CSUQ) and Net Promoter Score (NPS) is sufficient. The Polish version of System Usability Scale is a valuable tool for quick usability assessment.作者: 清唱劇 時間: 2025-3-29 10:26 作者: 詳細目錄 時間: 2025-3-29 11:28 作者: 團結 時間: 2025-3-29 18:55
curity.Includes supplementary material: .RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today‘s digital world, for which its three inventors Rivest, Shamir and Adl作者: Coronary-Spasm 時間: 2025-3-29 23:06
curity.Includes supplementary material: .RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today‘s digital world, for which its three inventors Rivest, Shamir and Adl作者: 長處 時間: 2025-3-30 01:41 作者: 光滑 時間: 2025-3-30 06:14 作者: Psychogenic 時間: 2025-3-30 10:02
Mariusz Chmielewski,Piotr St?porcurity.Includes supplementary material: .RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today‘s digital world, for which its three inventors Rivest, Shamir and Adl作者: magenta 時間: 2025-3-30 13:05 作者: fledged 時間: 2025-3-30 17:17 作者: 搖晃 時間: 2025-3-30 20:59
Pawe? Sitek,Jaros?aw Wikarekitions, suggesting that they have evolved in a relatively rapid and divergent way. In this chapter, we explore the selective pressures responsible for the evolution of genital morphology in the Lepidoptera, emphasizing the possible role of post-copulatory intersexual selection (PCIS)mechanisms (cryp作者: 蒙太奇 時間: 2025-3-31 03:51
Roman Simiński cryptocurrencies and describes in this book the technology and economics of cryptocurrencies as preparation for crypto trading, investing, and other business activities. A detailed overview of special topics includes security, privacy, and usability of crypto as a mainstream payment system...Part I作者: 一回合 時間: 2025-3-31 06:35
cryptocurrencies and describes in this book the technology and economics of cryptocurrencies as preparation for crypto trading, investing, and other business activities. A detailed overview of special topics includes security, privacy, and usability of crypto as a mainstream payment system...Part I作者: Nausea 時間: 2025-3-31 10:12