標題: Titlebook: Ubiquitous Computing and Ambient Intelligence; 11th International C Sergio F. Ochoa,Pritpal Singh,José Bravo Conference proceedings 2017 Sp [打印本頁] 作者: TOUT 時間: 2025-3-21 17:54
書目名稱Ubiquitous Computing and Ambient Intelligence影響因子(影響力)
書目名稱Ubiquitous Computing and Ambient Intelligence影響因子(影響力)學科排名
書目名稱Ubiquitous Computing and Ambient Intelligence網(wǎng)絡(luò)公開度
書目名稱Ubiquitous Computing and Ambient Intelligence網(wǎng)絡(luò)公開度學科排名
書目名稱Ubiquitous Computing and Ambient Intelligence被引頻次
書目名稱Ubiquitous Computing and Ambient Intelligence被引頻次學科排名
書目名稱Ubiquitous Computing and Ambient Intelligence年度引用
書目名稱Ubiquitous Computing and Ambient Intelligence年度引用學科排名
書目名稱Ubiquitous Computing and Ambient Intelligence讀者反饋
書目名稱Ubiquitous Computing and Ambient Intelligence讀者反饋學科排名
作者: 免除責任 時間: 2025-3-21 20:45 作者: 急急忙忙 時間: 2025-3-22 01:30 作者: arrhythmic 時間: 2025-3-22 07:15 作者: Saline 時間: 2025-3-22 10:03
Fátima Castro-Jul,Denis Conan,Sophie Chabridon,Rebeca P. Díaz Redondo,Ana Fernández Vilas,Chantal Ta as regulated by the Italian Civil Code and then the new regime introduced by Legislative Decree 70/2003 which implements EU Directive 2000/31 on E-Commerce. The chapter focuses on the most critical issues, such as the relevance of actual knowledge and the system of notice and takedown. It offers an作者: 皺痕 時間: 2025-3-22 15:25 作者: 水汽 時間: 2025-3-22 19:14
Teresa Cristóbal,Gabino Padrón,Alexis Quesada-Arencibia,Francisco Alayón,Carmelo R. Garcíaas primary metabolic reactions and primary metabolic products. In addition, however, a wide variety of biochemical pathways are characteristic of only a few species of organisms, of single "chemical races" or even of a certain stage of differentiation of special- ized cells. Such pathways are collec作者: Magisterial 時間: 2025-3-22 21:53
Rafael J. Valdivieso-Sarabia,Oscar Marín-Alonso,Fernando G. Guerrero-Gómez,Francisco J. Ferrández-Pasolubility and non-targeted site accumulation in addition to the diseased site, the potent of the phytochemicals is not at the desired level. In addition, quickly metabolized properties of the compounds are also critical obstacles in reaching the potent of the compound. In order to overcome the ment作者: Optometrist 時間: 2025-3-23 02:25 作者: 壯麗的去 時間: 2025-3-23 09:34 作者: 提名的名單 時間: 2025-3-23 10:24 作者: 細胞學 時間: 2025-3-23 14:21 作者: engrave 時間: 2025-3-23 21:48 作者: 結(jié)構(gòu) 時間: 2025-3-24 00:45
Rodrigo René Cura,Romina Stickar,Claudio Delrieux,Fernando Tohmé,Leo Ordinez,Damián Barryest group of secondary natural products.. These structurally diverse compounds typically contain oxygen atoms at alternate positions that are derived from the carbonyl groups of the fatty acid precursors by way of poly-β-ketoacylthioester intermediates. In fact, the name “polyketide” was coined abou作者: Aggressive 時間: 2025-3-24 02:23
Moisés Lodeiro-Santiago,Pino Caballero-Gil,Cándido Caballero-Gil,Félix Herrera PrianoNishiyama was right in observing the prevalence of various patterns of the . system that institutionalized esoteric operations. His observation is overall still valid today, and the esotericist enterprise (e.g., schools of dancing, tea ceremony, flower arrangement, etc.) remains in working order, al作者: 摸索 時間: 2025-3-24 06:55 作者: 書法 時間: 2025-3-24 11:54 作者: harangue 時間: 2025-3-24 17:16
Conference proceedings 2017ed from 100 submissions. The papers are presented in six tracks and two special sessions. These are Ambient Assisted Living, Human-Computer Interaction, Ambient Intelligence for Health, Internet of Things and Smart Cities, Ad-hoc and Sensor Networks, Sustainability, Socio-Cognitive and Affective Computing, AmI-Systems and Machine Learning..作者: 陰郁 時間: 2025-3-24 21:37
0302-9743 tous Computing and Ambient Intelligence, UCAmI 2017, held in Philadelphia, PA, USA in November 2017.. The 60 revised full papers and 22 short papers presented were carefully reviewed and selected from 100 submissions. The papers are presented in six tracks and two special sessions. These are Ambient作者: 節(jié)省 時間: 2025-3-25 00:51 作者: gnarled 時間: 2025-3-25 05:04
Combining Fog Architectures and Distributed Event-Based Systems for Mobile Sensor Location Certificaen on cloud architectures, which have no means to support location certification. To meet the need for location certification support in urban distributed event-based systems (DEBS), we propose three different fog architectures targeted at scenarios with mobile event producers.作者: bisphosphonate 時間: 2025-3-25 09:38 作者: EWE 時間: 2025-3-25 11:54
Modeling the Origin-Destination Matrix with?Incomplete Informationof transfers and passenger identification, using only boarding and alighting counts. The model is based on a system of linear diophantine equations, together with a method that computes the general solution and reduces the evaluation space, achieving useful estimations in polynomial time.作者: indices 時間: 2025-3-25 17:51 作者: Salivary-Gland 時間: 2025-3-25 21:16
0302-9743 Assisted Living, Human-Computer Interaction, Ambient Intelligence for Health, Internet of Things and Smart Cities, Ad-hoc and Sensor Networks, Sustainability, Socio-Cognitive and Affective Computing, AmI-Systems and Machine Learning..978-3-319-67584-8978-3-319-67585-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: fertilizer 時間: 2025-3-26 01:47
Scheduler for Automatic Management of Maintenance Jobs in Large-Size Systems: A Case Study Applied tme period required by the job to be executed. The scheduler uses intelligent strategies to satisfy constraints of each job in order to get a scheduling according to the criterion of the manager of maintenance. A case study is applied to smart city.作者: Tincture 時間: 2025-3-26 06:41 作者: Working-Memory 時間: 2025-3-26 09:03 作者: 無法治愈 時間: 2025-3-26 12:51
Improving Tourist Experience Through an IoT Application Based on FatBeaconsartphone with Bluetooth Low Energy (BLE) can be used to receive touristic information, even in uncovered areas, such as rural or mountain destinations. This work does not only show the applicability of the new FatBeacon protocol, but it also presents a performance comparison of different BLE technologies used for similar touristic applications.作者: arterioles 時間: 2025-3-26 17:42
Protecting Industry 4.0 Systems Against the Malicious Effects of Cyber-Physical Attacks. The proposal is based on a specific description language (CP-ADL) for cyber-physical attacks, and a mathematical framework allowing a decision making about the most adequate defense strategy. Finally, and experimental validation is provided, showing with our proposal the impact of cyber-physical attacks is highly reduced.作者: 盡責 時間: 2025-3-26 22:58
Multi-layer Security Mechanism for Networked Embedded Devicesmunication technologies which have been driving the fourth generation revolution in?today’s industry and networks. This technology allows for better integrated communications, integrated local and global control, supervision and maintenance. Billions of smart devices are being implemented - from sma作者: 小爭吵 時間: 2025-3-27 02:20 作者: Hormones 時間: 2025-3-27 07:25 作者: Hyperplasia 時間: 2025-3-27 10:01
IOT Service Recommendation Strategy Based on Attribute Relevanced device service are computed, and the recommendation system is recommended based on the calculation results. In order to solve the cold start problem, we propose the tensor linear regression model. The experiment results show the recommendation strategy was effective.作者: 手銬 時間: 2025-3-27 14:59 作者: Explicate 時間: 2025-3-27 18:30
Scheduler for Automatic Management of Maintenance Jobs in Large-Size Systems: A Case Study Applied ty services, comply with regulations and extend lifespan of urban equipment and infrastructure without neglecting the proper use of resources to execute maintenance jobs. Cities can generate hundreds or thousands of maintenance jobs during a particular time period. These jobs can be generated automat作者: Medicaid 時間: 2025-3-27 23:54
User-Centered Design of Agriculture Automation Systems Using Internet of Things Paradigmf Things represents the pervasive presence of a variety of objects (devices, sensors, actuators, mobile phones), which are able to interact with each other, cooperate and create new interfaces (human-machine and machine-machine), to reach common goals. Automation on agriculture systems, or precision作者: debacle 時間: 2025-3-28 03:13 作者: 手榴彈 時間: 2025-3-28 09:29
A Secure, Out-of-Band, Mechanism to Manage Internet of Things Devicesd assistive services are deployed in an environment. In this study, a Smart Home in a Box (SHIB) has been devised as an AAL solution. This SHIB relies upon Internet of Things (IoT) devices, such as thermal vision sensors, within an environment to function. Each SHIB deployment consists of IoT device作者: Mhc-Molecule 時間: 2025-3-28 13:18
Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryptioossible time and cost. It is composed of a mobile application (assigned to medical staff and helpers), a web service and Near Field Communication wristbands assigned to victims. The mobile application is devoted to providing medical staff with the geolocation of victims as well as with an assistant 作者: preeclampsia 時間: 2025-3-28 17:15 作者: rheumatology 時間: 2025-3-28 22:38 作者: 不發(fā)音 時間: 2025-3-29 02:43 作者: finale 時間: 2025-3-29 04:51 作者: Homocystinuria 時間: 2025-3-29 10:15
A Dictionary Based Protocol over LoRa (Long Range) Technology for Applications in Internet of Thingsics equipment, sharing information and enabling interaction with them from anywhere. A very important aspect in IoT applications is the communication protocols used by sensors for sending and exchange information. Traditional protocols used so far do not have the scope and ability to manage a growin作者: HERTZ 時間: 2025-3-29 15:20
Improving Tourist Experience Through an IoT Application Based on FatBeaconson where no Internet connection is available. Rather than advertising a URL to load a web page, the FatBeacon protocol has the ability to broadcast any basic web contents actually hosted on the device. In particular, FatBeacons are here used to improve the tourist experience in places with no Intern作者: chuckle 時間: 2025-3-29 17:53
Protecting Industry 4.0 Systems Against the Malicious Effects of Cyber-Physical Attacks traditional definition of “cyber-attack” is not enough to represent all the situations may occur. Furthermore, traditional security policies and defense strategies are not designed to be effective in scenarios mixing cyber and physical elements. In this context, this work presents a new idea about 作者: Insubordinate 時間: 2025-3-29 22:31
Fuzzy-Based Approach of Concept Alignmenttching use mapping approaches in order to achieve interoperability between heterogeneous sources. The use of multiple similarity measures that take into account lexical, structural and semantic properties of the concepts is often found in schema matching for the purpose of data integration, sharing 作者: 高深莫測 時間: 2025-3-30 03:14 作者: Vulvodynia 時間: 2025-3-30 05:36
IOT Service Recommendation Strategy Based on Attribute Relevanced device service are computed, and the recommendation system is recommended based on the calculation results. In order to solve the cold start problem, we propose the tensor linear regression model. The experiment results show the recommendation strategy was effective.作者: hypnotic 時間: 2025-3-30 11:49
978-3-319-67584-8Springer International Publishing AG 2017作者: aqueduct 時間: 2025-3-30 13:18 作者: Ingenuity 時間: 2025-3-30 17:30
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/u/image/940226.jpg作者: Prosaic 時間: 2025-3-31 00:18 作者: 不滿分子 時間: 2025-3-31 01:48
Sergio F. Ochoa,Pritpal Singh,José BravoIncludes supplementary material: 作者: 頑固 時間: 2025-3-31 08:57
Alexandra Rivero-García,Candelaria Hernández-Goya,Iván Santos-González,Pino Caballero-Gil作者: 懶鬼才會衰弱 時間: 2025-3-31 09:20