標(biāo)題: Titlebook: Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf; Adam Grzech,Jerzy ?wi?tek,Leszek Bor [打印本頁] 作者: PLY 時間: 2025-3-21 17:09
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf影響因子(影響力)
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf影響因子(影響力)學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf網(wǎng)絡(luò)公開度
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf被引頻次
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf被引頻次學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf年度引用
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf年度引用學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf讀者反饋
書目名稱Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf讀者反饋學(xué)科排名
作者: GIDDY 時間: 2025-3-21 23:25 作者: 生銹 時間: 2025-3-22 01:27 作者: 伙伴 時間: 2025-3-22 06:15 作者: JUST 時間: 2025-3-22 12:09 作者: COUCH 時間: 2025-3-22 16:32
Some Remarks on Security Protocols Verification Toolsc tools for verifying properties of such protocols have been proposed and used. These tools allow to find weaknesses in many variants of the protocols proposed so far. However, these tools are not entirely bug-free. In this paper, we investigate some selected problems of well known, and widely used 作者: Paleontology 時間: 2025-3-22 17:39
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewallrvices. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea a作者: covert 時間: 2025-3-23 00:48
Analysis of the Minutia Groups Base of Currents Algorithms ‘Pasterns’ Databasehich can be easily broken and they not tolerate fingerprint damage. As most of new algorithms use different representation of fingerprints pattern than old one, authors present their own algorithm, which can work with existing database of fingerprints’ patterns and also without changes of sensors.作者: 露天歷史劇 時間: 2025-3-23 02:31 作者: anthropologist 時間: 2025-3-23 06:40
Distributed Computing Architecture on Epiphany MIMD Acceleratorspular, but still very interesting, like Epiphany. There is also a growing popularity of cheap, credit-card-sized devices offering advanced features and high computational power. One of this kind of devices is the Parallella board that focuses on the parallel computing and features the Epiphany copro作者: Scintillations 時間: 2025-3-23 10:37
A Fail-Safe NVRAM Based Mechanism for Efficient Creation and Recovery of Data Copies in Parallel MPIe target a cluster environment in which each node has an NVRAM installed in it. Our previously developed extension to the MPI I/O API can take advantage of NVRAM regions in order to provide an NVRAM based cache like mechanism to significantly speed up I/O operations and allow to preload large files 作者: 屈尊 時間: 2025-3-23 15:38 作者: fodlder 時間: 2025-3-23 18:01
Transient Processing Analysis in a Finite-Buffer Queueing Model with Setup Timesestarts the operation after the idle period, a random-length setup time is needed to achieve full readiness for the work, during which the service process is suspended. A system of integral equations for time-dependent departure process, conditioned by the initial buffer state, is built. The solutio作者: 使饑餓 時間: 2025-3-23 22:29
Analysis of Routing Protocols Metrics for Wireless Mesh Networksprotocols are crucial element for performance of mesh networks, they ensure even flow of data packets and reduce negative influence of interferences. The article contains an overview of routing protocols used in the network mesh. As part of the research includes a comparative analysis of representat作者: 公社 時間: 2025-3-24 03:51
Energy Efficient Dynamic Load Balancing in Multipath TCP for Mobile Devices the communication purposes. On the other hand, a variant of TCP that allows for simultaneous transmission over different paths has been developed. This paper addresses the problem of optimal load distribution among the interfaces available at a networking device, e.g. mobile phone, with the objecti作者: Arrhythmia 時間: 2025-3-24 10:20 作者: Debility 時間: 2025-3-24 14:44
of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes...CryptoGraphics: Exploiting Graphics Cards for Security. explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the secur作者: 拾落穗 時間: 2025-3-24 14:56 作者: Metamorphosis 時間: 2025-3-24 19:59 作者: 含沙射影 時間: 2025-3-25 02:43
Viktor Melnyk,Ivan Lopitof detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes...CryptoGraphics: Exploiting Graphics Cards for Security. explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the secur作者: Collision 時間: 2025-3-25 06:29 作者: Excise 時間: 2025-3-25 08:06 作者: 使人入神 時間: 2025-3-25 14:53
Sabina Szymoniak,Olga Siedlecka-Lamch,Miros?aw Kurkowskie GPU. The lessons learned from developing the OpenGL version of AES and from considering other symmetric key ciphers indicate GPUs are suitable for some, but not all symmetric key ciphers. GPUs can be used to offload a shared system CPU in applications using stream ciphers and which allow large seg作者: Cognizance 時間: 2025-3-25 16:26 作者: Truculent 時間: 2025-3-25 20:43 作者: Obstreperous 時間: 2025-3-26 03:35
Micha? Szczepanik,Ireneusz J. Jó?wiak,Karol Stasiński,Pawe? Wicharyand life-threatening infections of the central nervous system. Following inhalation of yeasts or desiccated basidiospores into the lung alveoli, resident pulmonary phagocytic cells aid in the identification and eradication of . yeast through their arsenal of pattern recognition receptors (PRRs). PRR作者: 有說服力 時間: 2025-3-26 05:31
and life-threatening infections of the central nervous system. Following inhalation of yeasts or desiccated basidiospores into the lung alveoli, resident pulmonary phagocytic cells aid in the identification and eradication of . yeast through their arsenal of pattern recognition receptors (PRRs). PRR作者: 滑稽 時間: 2025-3-26 09:11
Leila Helali,Zaki Brahmiand life-threatening infections of the central nervous system. Following inhalation of yeasts or desiccated basidiospores into the lung alveoli, resident pulmonary phagocytic cells aid in the identification and eradication of . yeast through their arsenal of pattern recognition receptors (PRRs). PRR作者: 改進(jìn) 時間: 2025-3-26 12:59
?ukasz Faberand life-threatening infections of the central nervous system. Following inhalation of yeasts or desiccated basidiospores into the lung alveoli, resident pulmonary phagocytic cells aid in the identification and eradication of . yeast through their arsenal of pattern recognition receptors (PRRs). PRR作者: Suggestions 時間: 2025-3-26 19:20 作者: Atrium 時間: 2025-3-26 22:10 作者: Obsequious 時間: 2025-3-27 02:00 作者: 采納 時間: 2025-3-27 06:09
Wojciech M. Kempa,Dariusz Kurzykprove constantly existing and develop new algorithms that will ensure accurate and secure data transfer. This leads to the intensive development of coding theory and cryptography as scientific fields which solve these problems. To ensure efficient and secure data transmission at the same time, the c作者: 隨意 時間: 2025-3-27 10:43
Piotr Owczarek,Maciej Piechowiak,Piotr Zwierzykowskiing compliance, regulations and laws.Features current exampl.Cryptocurrencies and digital assets are increasingly garnering interest from institutional investors. This is on top of the already strong support in place for cryptocurrencies such as Bitcoin from the retail investor. With this rapid grow作者: hemophilia 時間: 2025-3-27 15:34 作者: 冷峻 時間: 2025-3-27 19:14
Adam Grzech,Jerzy ?wi?tek,Leszek BorzemskiPresents recent advances in Information Systems Architecture and Technology.Contains best papers presented at the 37th International Conference on Information Systems Architecture and Technology – ISA作者: 處理 時間: 2025-3-28 01:32 作者: AXIS 時間: 2025-3-28 05:53 作者: 男生如果明白 時間: 2025-3-28 08:24 作者: 駭人 時間: 2025-3-28 13:52 作者: 顯示 時間: 2025-3-28 14:53
Optimization of Read-Only Memory Program Models Mapping into the FPGA Architecture integral circuit architecture will be considered. The existing approaches to the data compression in the read-only memory devices are analyzed and, alternatively, a new approach is suggested allowing a high degree of compression to be achieved and the FPGA resources to be used more rationally.作者: surmount 時間: 2025-3-28 22:14
Analysis of the Minutia Groups Base of Currents Algorithms ‘Pasterns’ Databasehich can be easily broken and they not tolerate fingerprint damage. As most of new algorithms use different representation of fingerprints pattern than old one, authors present their own algorithm, which can work with existing database of fingerprints’ patterns and also without changes of sensors.作者: Occipital-Lobe 時間: 2025-3-28 23:29
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall a real life network topology show that by generating undetected low bandwidth but malicious network traffic causing collisions in the firewall’s hash table we cause the firewall to become unreachable or even announce a segmentation fault and reboot itself.作者: Leaven 時間: 2025-3-29 05:06 作者: 對待 時間: 2025-3-29 09:39 作者: cumber 時間: 2025-3-29 13:37 作者: Abbreviate 時間: 2025-3-29 16:02
Viktor Melnyk,Ivan LopitGPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system..作者: 杠桿支點 時間: 2025-3-29 22:43 作者: Filibuster 時間: 2025-3-30 01:20
GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system..作者: 搜集 時間: 2025-3-30 05:38 作者: acolyte 時間: 2025-3-30 11:27 作者: Neutropenia 時間: 2025-3-30 14:17
Adam Czubak,Marcin Szymanekhout describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology..The first sections of this book can be used as a textbook for an introd作者: 和諧 時間: 2025-3-30 17:11
Micha? Szczepanik,Ireneusz J. Jó?wiak,Karol Stasiński,Pawe? Wicharyl to accurately measure phagocytosis of fungal cells. It has the capacity to measure two distinct steps of phagocytosis: association/attachment and internalization in a high-throughput and quantitative manner that is difficult to achieve with other technologies. Results from these IFC studies allow 作者: debouch 時間: 2025-3-30 21:57
l to accurately measure phagocytosis of fungal cells. It has the capacity to measure two distinct steps of phagocytosis: association/attachment and internalization in a high-throughput and quantitative manner that is difficult to achieve with other technologies. Results from these IFC studies allow 作者: Ornithologist 時間: 2025-3-31 01:57