標(biāo)題: Titlebook: Network and Parallel Computing; 9th IFIP Internation James J. Park,Albert Zomaya,Sartaj Sahni Conference proceedings 2012 IFIP Internationa [打印本頁] 作者: 太平間 時間: 2025-3-21 16:09
書目名稱Network and Parallel Computing影響因子(影響力)
書目名稱Network and Parallel Computing影響因子(影響力)學(xué)科排名
書目名稱Network and Parallel Computing網(wǎng)絡(luò)公開度
書目名稱Network and Parallel Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Network and Parallel Computing被引頻次
書目名稱Network and Parallel Computing被引頻次學(xué)科排名
書目名稱Network and Parallel Computing年度引用
書目名稱Network and Parallel Computing年度引用學(xué)科排名
書目名稱Network and Parallel Computing讀者反饋
書目名稱Network and Parallel Computing讀者反饋學(xué)科排名
作者: BURSA 時間: 2025-3-21 23:15
Jian Xiao,Yu Zhang,Shuwei Chen,Huashan Yuolta a fisici, informatici, radiologi e tecnici di laboratorio che si occupano di "image processing"...Dalla Presentazione di Enzo Grossi.."... Alcuni dettagli possono sfuggire, altri aspetti notevoli, come un piccolo nodulo di 1 mm, possono essere non visti: sono i limiti dell‘occhio umano. E‘ in q作者: 取消 時間: 2025-3-22 03:38
Jintao Meng,Jianrui Yuan,Jiefeng Cheng,Yanjie Wei,Shengzhong Fengrtanto rivolta a fisici, informatici, radiologi e tecnici di laboratorio che si occupano di "image processing"...Dalla Presentazione di Enzo Grossi.."... Alcuni dettagli possono sfuggire, altri aspetti notevoli, come un piccolo nodulo di 1 mm, possono essere non visti: sono i limiti dell‘occhio umano. E‘ in q978-88-470-5548-3978-88-470-0444-3作者: Expediency 時間: 2025-3-22 07:15
Yizhuo Wang,Weixing Ji,Feng Shi,Qi Zuo,Ning Dengrtanto rivolta a fisici, informatici, radiologi e tecnici di laboratorio che si occupano di "image processing"...Dalla Presentazione di Enzo Grossi.."... Alcuni dettagli possono sfuggire, altri aspetti notevoli, come un piccolo nodulo di 1 mm, possono essere non visti: sono i limiti dell‘occhio umano. E‘ in q978-88-470-5548-3978-88-470-0444-3作者: companion 時間: 2025-3-22 08:43
Shahnawaz Talpur,Feng Shi,Yizhuo Wangolta a fisici, informatici, radiologi e tecnici di laboratorio che si occupano di "image processing"...Dalla Presentazione di Enzo Grossi.."... Alcuni dettagli possono sfuggire, altri aspetti notevoli, come un piccolo nodulo di 1 mm, possono essere non visti: sono i limiti dell‘occhio umano. E‘ in q作者: 馬具 時間: 2025-3-22 13:15
Jae-Young Leertanto rivolta a fisici, informatici, radiologi e tecnici di laboratorio che si occupano di "image processing"...Dalla Presentazione di Enzo Grossi.."... Alcuni dettagli possono sfuggire, altri aspetti notevoli, come un piccolo nodulo di 1 mm, possono essere non visti: sono i limiti dell‘occhio umano. E‘ in q978-88-470-5548-3978-88-470-0444-3作者: endocardium 時間: 2025-3-22 20:32
Ralph Duncan,Peder Jungck,Kenneth Ross,Dwight Mulcahyrtanto rivolta a fisici, informatici, radiologi e tecnici di laboratorio che si occupano di "image processing"...Dalla Presentazione di Enzo Grossi.."... Alcuni dettagli possono sfuggire, altri aspetti notevoli, come un piccolo nodulo di 1 mm, possono essere non visti: sono i limiti dell‘occhio umano. E‘ in q978-88-470-5548-3978-88-470-0444-3作者: adduction 時間: 2025-3-22 22:47 作者: institute 時間: 2025-3-23 04:57 作者: Ordnance 時間: 2025-3-23 05:34 作者: dictator 時間: 2025-3-23 10:47 作者: adipose-tissue 時間: 2025-3-23 14:51
Muhammad Ahmed,Xu Huang,Dharmendra Sharmaolta a fisici, informatici, radiologi e tecnici di laboratorio che si occupano di "image processing"...Dalla Presentazione di Enzo Grossi.."... Alcuni dettagli possono sfuggire, altri aspetti notevoli, come un piccolo nodulo di 1 mm, possono essere non visti: sono i limiti dell‘occhio umano. E‘ in q作者: 酷熱 時間: 2025-3-23 18:54 作者: MANIA 時間: 2025-3-23 23:52 作者: Cirrhosis 時間: 2025-3-24 02:45
DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph first operations was computing expensive, and the second one was impractical, and the last one did not benefit either the quality of contigs or the efficiency of the assembler. Our assembler was focused only on efficient and effective error removal and path reduction operations. Applying DGraph to 作者: 協(xié)迫 時間: 2025-3-24 07:03 作者: 相信 時間: 2025-3-24 12:58
An Analysis of Privacy Preserving Data Aggregation Protocols for WSNsta aggregation protocols for WSNs and highlight their major limitations. We claim that in future such limitations can be corrected. Our ongoing work is to propose an alternative solution to overcome such limitations, but this will be presented in a future paper.作者: intrude 時間: 2025-3-24 18:55 作者: Metamorphosis 時間: 2025-3-24 19:06 作者: 分貝 時間: 2025-3-25 01:13
Haitao Jiang,Yun Xu,Yin Liao,Guojie Jin,Guoliang Chen作者: 違反 時間: 2025-3-25 06:45 作者: deviate 時間: 2025-3-25 10:49 作者: Tractable 時間: 2025-3-25 15:22 作者: commune 時間: 2025-3-25 19:41
James J. Park,Albert Zomaya,Sartaj SahniState-of-the-art research.Fast-track conference porceedings.Unique visibility作者: BAIL 時間: 2025-3-25 22:27 作者: 預(yù)示 時間: 2025-3-26 00:21 作者: Overthrow 時間: 2025-3-26 05:26
Conference proceedings 2012gju, Korea, in September 2012. The 38 papers presented were carefully reviewed and selected from 136 submissions. The papers are organized in the following topical sections: algorithms, scheduling, analysis, and data mining; network architecture and protocol design; network security; paralel, distri作者: Vertical 時間: 2025-3-26 09:48 作者: 可用 時間: 2025-3-26 16:35
Are Heterogeneous Cellular Networks Superior to Homogeneous Ones?reas. And, a user mobility pattern is defined to model real communication environment. Our simulation results show that the HTCN requires less power (in Watt/km./Mbps) and achieves higher throughput compared to the HMCN.作者: Anthology 時間: 2025-3-26 17:25
NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluationes the dynamic control system simulator, Ptolemy II and the network simulator, NS-2. We demonstrate the validation of the tool by presenting a case study of platoon longitudinal control in AHS (Automatic Highway System).作者: 易于交談 時間: 2025-3-26 21:10 作者: DRAFT 時間: 2025-3-27 04:08 作者: 鬧劇 時間: 2025-3-27 06:52
Fast Parallel Garner Algorithm for Chinese Remainder Theoremthe parallel algorithm and the sequential algorithm are calculated to make the quantitative comparison based on our previous work about some fundamental parallel algorithms. The performance evaluation shows high efficiency of the proposed parallel algorithm compared to the sequential one.作者: xanthelasma 時間: 2025-3-27 13:21
Conference proceedings 2012buted, and virtualization techniques; performance modeling, prediction, and tuning; resource management; ubiquitous communications and networks; and web, communication, and cloud computing. In addition, a total of 37 papers selected from five satellite workshops (ATIMCN, ATSME, Cloud&Grid, DATICS, and UMAS 2012) are included.作者: TRAWL 時間: 2025-3-27 14:06
0302-9743 IFIP International Conference on Network and Parallel Computing, NPC 2012, held in Gwangju, Korea, in September 2012. The 38 papers presented were carefully reviewed and selected from 136 submissions. The papers are organized in the following topical sections: algorithms, scheduling, analysis, and d作者: synovium 時間: 2025-3-27 20:55
Knowledge-Based Adaptive Self-Schedulingat load balancing and minimizing synchronization overhead. In addition, we extend KASS to apply on loop nests and adjust the chunk sizes at runtime. The experimental results show that KASS performs 4.8% to 16.9% better than the existing self- scheduling schemes, and up to 21% better than the affinity scheduling scheme.作者: 圓木可阻礙 時間: 2025-3-28 01:24
Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networksss probabilities to destinations. DS&W routing protocol can dramatically reduce the overhead ratio in DTNs. Simulation results also evident that DS&W protocol outperforms other existing DTN routing protocols.作者: consolidate 時間: 2025-3-28 05:54 作者: graphy 時間: 2025-3-28 06:59
Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websitesrength of the obfuscation. In this system performance is improved and the number of false positives and negatives are reduced. Based on the strength of obfuscation in the JavaScript code, a website is determined to be benign or malicious.作者: elastic 時間: 2025-3-28 11:36 作者: 幼兒 時間: 2025-3-28 16:46
0302-9743 diction, and tuning; resource management; ubiquitous communications and networks; and web, communication, and cloud computing. In addition, a total of 37 papers selected from five satellite workshops (ATIMCN, ATSME, Cloud&Grid, DATICS, and UMAS 2012) are included.978-3-642-35605-6978-3-642-35606-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 非秘密 時間: 2025-3-28 20:12
An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneousl for MTC scheduling. Experimental results show that these application-level scheduling approaches, when equipped with task bundling, can deliver good performance for Many-Task Computing in terms of both Makespan and Flowtime.作者: optional 時間: 2025-3-29 01:55
Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multip based on the premise of locality in communication. The dynamic (contention) software simulation of TBHIN shows that the stronger the locality in communication, the lower the delay of the communication.作者: Traumatic-Grief 時間: 2025-3-29 04:37
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis embed the essence of a management information base (MIB) into iTrace messages, named MIB-ITrace-CP, in order to improve the accuracy and efficiency of the original ICMP-based Traceback. Through our implementations on a Testbed@TWISC platform, we validated our approach and demonstrated the feasibility of practical network forensics.作者: 完全 時間: 2025-3-29 10:15 作者: COMMA 時間: 2025-3-29 11:27 作者: 被告 時間: 2025-3-29 16:43
ete di pixel tra loro connessi che si sviluppa nel tempo, tramite operazioni locali, deterministiche e iterative. L‘immagine cosi‘ trasformata puo‘ mostrare, in uno spazio dimensionale più ampio, delle regolarità morfologiche e dinamiche che, nelle dimensioni originarie, sarebbero non visibili oppur作者: 細絲 時間: 2025-3-29 22:41 作者: 破譯密碼 時間: 2025-3-30 03:21 作者: glacial 時間: 2025-3-30 07:47 作者: acolyte 時間: 2025-3-30 09:29 作者: Canyon 時間: 2025-3-30 13:59
Jae-Young Leea in una rete di pixel tra loro connessi che si sviluppa nel tempo, tramite operazioni locali, deterministiche e iterative. L‘immagine cosi‘ trasformata puo‘ mostrare, in uno spazio dimensionale più ampio, delle regolarità morfologiche e dinamiche che, nelle dimensioni originarie, sarebbero non visi作者: 沙漠 時間: 2025-3-30 19:53 作者: 痛苦一生 時間: 2025-3-31 00:05 作者: pacific 時間: 2025-3-31 04:53 作者: albuminuria 時間: 2025-3-31 06:49 作者: 險代理人 時間: 2025-3-31 11:17 作者: 逗留 時間: 2025-3-31 14:39
Muhammad Ahmed,Xu Huang,Dharmendra Sharmaete di pixel tra loro connessi che si sviluppa nel tempo, tramite operazioni locali, deterministiche e iterative. L‘immagine cosi‘ trasformata puo‘ mostrare, in uno spazio dimensionale più ampio, delle regolarità morfologiche e dinamiche che, nelle dimensioni originarie, sarebbero non visibili oppur作者: 我怕被刺穿 時間: 2025-3-31 20:55
Bo-Chao Cheng,Guo-Tan Liao,Ching-Kai Lin,Shih-Chun Hsu,Ping-Hai Hsu,Jong Hyuk Parka in una rete di pixel tra loro connessi che si sviluppa nel tempo, tramite operazioni locali, deterministiche e iterative. L‘immagine cosi‘ trasformata puo‘ mostrare, in uno spazio dimensionale più ampio, delle regolarità morfologiche e dinamiche che, nelle dimensioni originarie, sarebbero non visi作者: 機構(gòu) 時間: 2025-3-31 23:54
Ding Wang,Chun-guang Ma,Sen-dong Zhao,Chang-li Zhoua in una rete di pixel tra loro connessi che si sviluppa nel tempo, tramite operazioni locali, deterministiche e iterative. L‘immagine cosi‘ trasformata puo‘ mostrare, in uno spazio dimensionale più ampio, delle regolarità morfologiche e dinamiche che, nelle dimensioni originarie, sarebbero non visi