標(biāo)題: Titlebook: International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions; álvaro Herrero,Václav Sná?el,Emilio Corchado Conference procee [打印本頁(yè)] 作者: Flange 時(shí)間: 2025-3-21 19:32
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions影響因子(影響力)
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions影響因子(影響力)學(xué)科排名
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions網(wǎng)絡(luò)公開(kāi)度
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions被引頻次
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions被引頻次學(xué)科排名
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions年度引用
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions年度引用學(xué)科排名
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions讀者反饋
書目名稱International Joint Conference CISIS’12-ICEUTE′12-SOCO′12 Special Sessions讀者反饋學(xué)科排名
作者: Debrief 時(shí)間: 2025-3-21 21:11
Abdallah Ghourabi,Tarek Abbes,Adel Bouhoula features are relevant to the struggling care sector. As Western societies age, the demand for care services rises, yet the workforce does not grow at the same rate. This book explores the potential of social robots to support the workforce and enhance the well-being of residents in care homes..Usin作者: CURB 時(shí)間: 2025-3-22 04:26 作者: Ledger 時(shí)間: 2025-3-22 08:32
Eugene Semenkin,Maria Semenkina,Ilia Panfilovare relevant to the struggling care sector. As Western societies age, the demand for care services rises, yet the workforce does not grow at the same rate. This book explores the potential of social robots to support the workforce and enhance the well-being of residents in care homes..Using a socio-作者: dyspareunia 時(shí)間: 2025-3-22 12:40 作者: Repetitions 時(shí)間: 2025-3-22 15:43
Camelia-M. Pintea,Petrica C. Popare relevant to the struggling care sector. As Western societies age, the demand for care services rises, yet the workforce does not grow at the same rate. This book explores the potential of social robots to support the workforce and enhance the well-being of residents in care homes..Using a socio-作者: 針葉類的樹 時(shí)間: 2025-3-22 17:24 作者: 想象 時(shí)間: 2025-3-22 23:07 作者: Osmosis 時(shí)間: 2025-3-23 02:16 作者: flex336 時(shí)間: 2025-3-23 08:10 作者: 偽造者 時(shí)間: 2025-3-23 11:12
Félix Brezo,José Gaviria de la Puerta,Igor Santos,David Barroso,Pablo Garcia Bringaslity (VR) game about sustainability. Utilizing methods like workshops and focus group interviews, as part of a participatory approach, we seek to gain a unique insight into the students’ own perspectives and experiences with videogames and how the student actively could integrate their interest and 作者: 詼諧 時(shí)間: 2025-3-23 15:37 作者: 鄙視 時(shí)間: 2025-3-23 21:45
O. Delgado-Mohatar,A. Fúster-Sabaterluding preferred joint angles and sensitive joint angles (acceptable posture changes). However, differences in anthropometric characteristics across racial populations and the lack of field research limit the application of relevant conclusions to the Chinese driver. This study conducted a field tes作者: Inveterate 時(shí)間: 2025-3-24 02:07 作者: climax 時(shí)間: 2025-3-24 04:12 作者: harbinger 時(shí)間: 2025-3-24 10:29
Ivan Zelinka,Filip Merhaut,Lenka Skanderovarnment institutions. The responsibility of government websites extends beyond just providing information; they must ensure that the information is easily accessible and understandable. This paper analyzes and redesigns the United States Department of Labor’s website. The research began by examining 作者: offense 時(shí)間: 2025-3-24 13:22
Radek Vala,David Malaník,Roman Ja?ekmong them, those dimensions related to different languages and cultures. Digital communication has tackled such differences, and the need to address different target locales in different ways, through so-called “Localization”, which can be considered as a cultural translation. Localization includes 作者: 無(wú)禮回復(fù) 時(shí)間: 2025-3-24 16:10 作者: Merited 時(shí)間: 2025-3-24 21:36
Micha? Chora?,Rafa? Kozik,Damian Puchalski,Witold Ho?ubowiczing process within the architectural domain and among architectural design students has not been sufficiently addressed in education and scientific research. This study explores the design thinking process of the design students while working in a conventional design studio context, further, expandi作者: 親愛(ài) 時(shí)間: 2025-3-25 02:24
Micha? Chora?,Rafa? Kozik,Rafa? Renk,Witold Ho?ubowiczf the digital economy, the agricultural sector has also been exploring innovative strategies combined with gamification thinking, and how to precisely help farmers in the digital era is an important topic. Digitalisation has become a new trend in agriculture and rural development. In order to promot作者: Defraud 時(shí)間: 2025-3-25 03:35
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques,urity managers to collect valuable information about the techniques and motivations of the attackers. However, when the amount of collected data in honeypots becomes very large, the analysis performed by a human security administrator tends to be very difficult, tedious and time consuming task. To f作者: 負(fù)擔(dān) 時(shí)間: 2025-3-25 11:23
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes,any threats, vulnerabilities, and risks to which organizations maybe be exposed. In this paper, we discuss the need to provide a standard representation of security countermeasures in order to automate the selection of countermeasures for business processes. The main contribution lies in the specifi作者: scrape 時(shí)間: 2025-3-25 13:05 作者: Entreaty 時(shí)間: 2025-3-25 18:13
Clustering for Intrusion Detection: Network Scans as a Case of Study,adding automatic response to this visualization-based IDS by means of clustering techniques. As a sample case of study for the proposed clustering extension, it has been applied to the identification of different network scans. The aim is checking whether clustering and projection techniques could b作者: Aphorism 時(shí)間: 2025-3-25 23:13
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model,tive problem. We propose in this paper a new conceptual model . for .. The proposed technique could be used with machine learning based intrusion detection techniques. Our novel model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the i作者: 偽善 時(shí)間: 2025-3-26 00:40
Equivalent Inner Key Recovery Attack to NMAC, related key setting, by applying a generalized birthday attack with two groups. We can recover the equivalent inner key of NMAC in about 2. on-line MAC queries. The assumption of that the underlying hash function must be collision resistant is dropped in the security proof of NMAC. However, our res作者: CHYME 時(shí)間: 2025-3-26 06:50
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems that supports the use of regular expressions in the patterns, and validate its use as part of the signature matching process, a critical component of modern intrusion detection systems. Our approach uses a hybrid memory storage mechanism, an adaptation of the Smith-Waterman local-sequence alignment作者: 得罪 時(shí)間: 2025-3-26 11:06
Tracking Traitors in Web Services via Blind Signatures,e illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization.作者: 音樂(lè)會(huì) 時(shí)間: 2025-3-26 16:34
C&C Techniques in Botnet Development, services and the increasing number of daily transactions performed in the cloud, makes them an attractive target for cybercriminals who have evolved their old IRC-based communication channels, into decentralized P2P networks, HTTP/S botnets and even Twitter-controlled networks. Against this backgro作者: Psychogenic 時(shí)間: 2025-3-26 20:40 作者: cochlea 時(shí)間: 2025-3-26 23:20 作者: forager 時(shí)間: 2025-3-27 03:19
Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS R manner for multi-hop forwarding. Due to the mobile nature of the nodes in mobile ad hoc networks, the applications of these networks are diverse, ranging from home networking to intelligent transport, military exercises and campus network. However, this mobility of nodes makes the network vulnerabl作者: CALL 時(shí)間: 2025-3-27 06:58
On Fitness Function Based upon Quasigroups Power Sequences,ne on evolutionary search for quasigroups by defining fitness functions based on heterogeneous sequences generated during the exponentiation of quasigroups elements. In this paper, we explore how succeed a genetic algorithm in search for maximum of the best fitness function and some statistics about作者: 生銹 時(shí)間: 2025-3-27 11:58
Usability of Software Intrusion-Detection System in Web Applications,n and do not rely on the other network hardware components. Discussed intrusion detection system solution is connected directly with the web application and is based on the real-time request analysis. The main opportunities of proposed principle are very low cost and simple implementation. Proposal 作者: 心胸狹窄 時(shí)間: 2025-3-27 14:43
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protectconsideration. Since RSA is a difficult problem, we make use of the Genetic Algorithm (GA) metaheuristic to provide near-optimal solutions to the problem. We investigate the effectiveness of GA for a set of network scenarios. Evaluation results show that the proposed algorithm outperforms reference 作者: intimate 時(shí)間: 2025-3-27 19:20
Information Exchange Mechanism between Federated Domains: P2P Approach,obust, self path-replicated and resilient communication between different domains in federation (between Decision Modules), P2P technology is used. This approach allows the proposed system to overcome IP addressing issues and minimize the configuration cost. Exchanging information between federated 作者: 可行 時(shí)間: 2025-3-27 23:39
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes,cation of security pattern as standard representation for countermeasures. Classical security pattern structure is extended to incorporate new features that enable the automatic selection of security patterns. Furthermore, a prototype has been developed which support the specification of security patterns in a graphical way.作者: cunning 時(shí)間: 2025-3-28 03:10
Clustering for Intrusion Detection: Network Scans as a Case of Study,e compatible and consequently applied to a continuous network flow for intrusion detection. A comprehensive experimental study has been carried out on previously generated real-life data sets. Empirical results suggest that projection and clustering techniques could work in unison to enhance MOVICAB-IDS.作者: 完成才能戰(zhàn)勝 時(shí)間: 2025-3-28 07:58 作者: 男學(xué)院 時(shí)間: 2025-3-28 14:26
Software Implementation of Linear Feedback Shift Registers over Extended Fields,out for diverse extended fields and different architectures. Numerical results prove that extended fields provide speedup factors up to 10.15. The benefits of these fields are clear for LFSR applications included cryptographic applications.作者: 珊瑚 時(shí)間: 2025-3-28 16:56 作者: 豐滿中國(guó) 時(shí)間: 2025-3-28 18:54 作者: 煞費(fèi)苦心 時(shí)間: 2025-3-29 00:25
Equivalent Inner Key Recovery Attack to NMAC,AC queries. The assumption of that the underlying hash function must be collision resistant is dropped in the security proof of NMAC. However, our result shows that NMAC, even instantiated with a collision resistant Merkle-Damg?rd hash function, is not secure as its designer claimed.作者: 壁畫 時(shí)間: 2025-3-29 06:57
Tracking Traitors in Web Services via Blind Signatures,er from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used.作者: 暖昧關(guān)系 時(shí)間: 2025-3-29 09:44
How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation,ll national production after a several periods of increasing levels of fiscal illusion. We modeled this strategy as a “dictator game,” in which we show that a state that constantly deceives its citizens is a source of national instability, deeply harming its national security.作者: 踉蹌 時(shí)間: 2025-3-29 14:41
Information Exchange Mechanism between Federated Domains: P2P Approach,is approach allows the proposed system to overcome IP addressing issues and minimize the configuration cost. Exchanging information between federated domains enables detection of complex distributed attacks and increases situational awareness of the network administrators.作者: amenity 時(shí)間: 2025-3-29 19:20
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques,d on different machine learning techniques to analyze collected data in a Web Services Honeypot. The aim of this approach is to identify and characterize attacks targeting Web services using three classifiers (SVM, SVM Regression and Apriori) depending on the nature of collected data.作者: 相符 時(shí)間: 2025-3-29 22:26 作者: 外星人 時(shí)間: 2025-3-30 00:30 作者: amputation 時(shí)間: 2025-3-30 07:36
2194-5357 t Conference Computational Intelligence in Security for Info.This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012..CISIS aims作者: NEXUS 時(shí)間: 2025-3-30 08:35 作者: 項(xiàng)目 時(shí)間: 2025-3-30 14:53 作者: 諄諄教誨 時(shí)間: 2025-3-30 17:28 作者: Expressly 時(shí)間: 2025-3-30 20:49
reference book for bridge engineers and consultants engaged in research, design, construction, and maintenance of suspension bridges. It can also be adopted as a textbook for teachers and students of bridge engineering in the teaching of suspension bridges..978-981-99-8396-4978-981-99-8394-0作者: DNR215 時(shí)間: 2025-3-31 03:45
Abdallah Ghourabi,Tarek Abbes,Adel Bouhoulae options for social care workers and, when integrated into daily routines, can provide brief respite periods. Additionally, they positively impact residents by engaging them in cognitive and physical activities. However, the robots can only assist, and not replace, care workers..978-3-658-45232-2978-3-658-45233-9作者: ENDOW 時(shí)間: 2025-3-31 06:53
Angel Jesus Varela-Vaca,Robert Warschofsky,Rafael M. Gasca,Sergio Pozo,Christoph Meinele options for social care workers and, when integrated into daily routines, can provide brief respite periods. Additionally, they positively impact residents by engaging them in cognitive and physical activities. However, the robots can only assist, and not replace, care workers..978-3-658-45232-2978-3-658-45233-9作者: overwrought 時(shí)間: 2025-3-31 13:13
Eugene Semenkin,Maria Semenkina,Ilia Panfilovfor social care workers and, when integrated into daily routines, can provide brief respite periods. Additionally, they positively impact residents by engaging them in cognitive and physical activities. However, the robots can only assist, and not replace, care workers..作者: 賞心悅目 時(shí)間: 2025-3-31 13:40 作者: RUPT 時(shí)間: 2025-3-31 20:30 作者: Feigned 時(shí)間: 2025-3-31 23:39
R. Durán Díaz,L. Hernández Encinas,J. Mu?oz MasquéRa?=?0.3~0.5. After the inner and outer liners and other components have been densified and processed, the SiC rivets are used for on-line riveting, which achieves a connection result equivalent to “metal riveting” after CVI-SiC deposition, improves the ability of components to maintain the profile,作者: 吊胃口 時(shí)間: 2025-4-1 02:09 作者: surrogate 時(shí)間: 2025-4-1 08:07 作者: 序曲 時(shí)間: 2025-4-1 12:44
J. A. álvarez-Bermejo,J. A. López-Ramosvisitor conduct at exhibitions, morphing them into avid knowledge seekers. We challenge the adequacy of current user experience models in portraying exhibitions striving to provide both enlightenment and an immersive experience. Consequently, we introduce a framework for museum interactions that dee作者: Autobiography 時(shí)間: 2025-4-1 16:48 作者: Accommodation 時(shí)間: 2025-4-1 22:30