找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing; 10th EAI Internation Lianyong Qi,Mohammad R. Khosravi,Varun G. Menon Conference proceedings 2021 ICST Institute for Comput

[復(fù)制鏈接]
樓主: T-Lymphocyte
31#
發(fā)表于 2025-3-26 22:32:35 | 只看該作者
A Fraud Detection Approach Based on Combined Feature Weighting. We first introduce the data preprocessing measures for handling imbalanced fraud detection dataset. Then we compare related models to implement fraudster recognition. We also propose a feature selection approach based on combined feature weights. Some future research interests are also envisioned.
32#
發(fā)表于 2025-3-27 02:40:05 | 只看該作者
Research on Distributed Trust Management in IoTposed trust mechanism, trustrank is quantified by normative trust and risk measures. Performance analysis shows that the proposed trust mechanism has a higher probability of high trust device being selected and higher success rate of cooperation.
33#
發(fā)表于 2025-3-27 09:01:23 | 只看該作者
34#
發(fā)表于 2025-3-27 09:29:38 | 只看該作者
A Dual-Index Based Representation for Processing XPath Queries on Very Large XML Documentss remains a challenge in case XML documents are very large. In this study, we implemented a tree-shaped data structure called partial tree that is intrinsically suitable for large XML document processing with multiple computers. Our implementation uses two index sets to accelerate the evaluation of
35#
發(fā)表于 2025-3-27 14:16:57 | 只看該作者
IAS-BERT: An Information Gain Association Vector Semi-supervised BERT Model for Sentiment Analysisal Encoder Representations from Transformers (BERT), as one of those models, has achieved excellent results in various tasks of NLP since its emergence. But it still has shortcomings, such as poor capability of extracting local features and exploding of training gradients. After analyzing the shortc
36#
發(fā)表于 2025-3-27 20:17:07 | 只看該作者
A Concept Lattice Method for Eliminating Redundant Featuresormation from omics genes quickly. Feature selection is an important step of data preprocessing, and it is one of the key factors affecting the capability of algorithm information extraction. Since single feature selection method causes the deviation of feature subsets, we introduce ensemble learnin
37#
發(fā)表于 2025-3-28 01:43:20 | 只看該作者
Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detectionome the targets of malicious attacks or hackers due to the centralization of data storage and computing facilities. Most intrusion attacks to cloud servers are often originated from inner or external networks. Intrusion detection is a prerequisite to designing anti-intrusion countermeasures of cloud
38#
發(fā)表于 2025-3-28 03:28:52 | 只看該作者
39#
發(fā)表于 2025-3-28 09:34:25 | 只看該作者
40#
發(fā)表于 2025-3-28 13:33:57 | 只看該作者
Lightweight Anonymous Communication Model Based on Anonymous IBE have a greater demand for privacy. In addition, the development of mobile Internet and cloud computing requires the communication model to be as efficient and low-bandwidth as possible on the basis of security. In order to achieve the goal of protecting users’ data privacy, this paper firstly prese
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 17:06
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
峨眉山市| 广饶县| 惠安县| 岳池县| 大冶市| 岱山县| 曲阳县| 宜川县| 武冈市| 茌平县| 威海市| 鄂托克旗| 桃园市| 安丘市| 南投县| 杨浦区| 如东县| 崇义县| 于都县| 拉孜县| 米易县| 江孜县| 平果县| 库伦旗| 叶城县| 阿拉善右旗| 盘锦市| 泰来县| 肇州县| 井冈山市| 英德市| 龙州县| 深圳市| 宜黄县| 姜堰市| 兴海县| 桓台县| 色达县| 阜新市| 抚松县| 当阳市|