標(biāo)題: Titlebook: Web and Big Data; 5th International Jo Leong Hou U,Marc Spaniol,Junying Chen Conference proceedings 2021 Springer Nature Switzerland AG 202 [打印本頁] 作者: estrange 時(shí)間: 2025-3-21 18:46
書目名稱Web and Big Data影響因子(影響力)
書目名稱Web and Big Data影響因子(影響力)學(xué)科排名
書目名稱Web and Big Data網(wǎng)絡(luò)公開度
書目名稱Web and Big Data網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Web and Big Data被引頻次
書目名稱Web and Big Data被引頻次學(xué)科排名
書目名稱Web and Big Data年度引用
書目名稱Web and Big Data年度引用學(xué)科排名
書目名稱Web and Big Data讀者反饋
書目名稱Web and Big Data讀者反饋學(xué)科排名
作者: 侵害 時(shí)間: 2025-3-21 20:46 作者: 脫落 時(shí)間: 2025-3-22 02:58 作者: uncertain 時(shí)間: 2025-3-22 06:39
Web and Big Data978-3-030-85896-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 提升 時(shí)間: 2025-3-22 11:34 作者: CURB 時(shí)間: 2025-3-22 14:58 作者: Mediocre 時(shí)間: 2025-3-22 19:23 作者: Simulate 時(shí)間: 2025-3-23 00:07
Jun Li,Zhihan Yan,Zehang Lin,Xingyun Liu,Hong Va Leong,Nancy Xiaonan Yu,Qing Li作者: Range-Of-Motion 時(shí)間: 2025-3-23 04:11
Qianyu Yu,Shuo Yang,Zhiqiang Zhang,Ya-Lin Zhang,Binbin Hu,Ziqi Liu,Kai Huang,Xingyu Zhong,Jun Zhou,Y作者: anaerobic 時(shí)間: 2025-3-23 08:35
Co-authorship Prediction Based on Temporal Graph Attentionstatic KGs. Therefore, we propose a temporal graph attention network to model the temporal interactions between the neighbors and encapsulate the spatiotemporal context information of the entities. In addition, we also capture the semantic information and multi-hop neighborhood information of the en作者: idiopathic 時(shí)間: 2025-3-23 11:52
Degree-Specific Topology Learning for Graph Convolutional Networkce; besides, we add edges between the low-degree nodes and their connectionless neighbors with high similarity in the attribute space. Experiments conducted on several popular datasets demonstrate the effectiveness of our topology learning method.作者: 邊緣 時(shí)間: 2025-3-23 16:50 作者: 情愛 時(shí)間: 2025-3-23 20:21
Simplifying Graph Convolutional Networks as Matrix Factorizationhe task of semi-supervised node classification, the experimental results illustrate that UCMF achieves similar or superior performances compared with GCN. Meanwhile, distributed UCMF significantly outperforms distributed GCN methods, which shows that UCMF can greatly benefit complex real-world appli作者: 難聽的聲音 時(shí)間: 2025-3-24 01:47
Degree-Specific Topology Learning for Graph Convolutional Networkce; besides, we add edges between the low-degree nodes and their connectionless neighbors with high similarity in the attribute space. Experiments conducted on several popular datasets demonstrate the effectiveness of our topology learning method.作者: 本土 時(shí)間: 2025-3-24 03:45
Simplifying Graph Convolutional Networks as Matrix Factorizationhe task of semi-supervised node classification, the experimental results illustrate that UCMF achieves similar or superior performances compared with GCN. Meanwhile, distributed UCMF significantly outperforms distributed GCN methods, which shows that UCMF can greatly benefit complex real-world appli作者: tolerance 時(shí)間: 2025-3-24 08:21
Resource Trading with Hierarchical Game for Computing-Power Network Marketetwork. In this paper, we propose a computing-power market framework and formulate resource trading as a three-stage Stackelberg game. We prove the existence of Stackelberg equilibrium (SE) in game. Then the dynamic-game reinforcement learning (DG-RL) algorithm is designed to solve the optimization 作者: 免除責(zé)任 時(shí)間: 2025-3-24 11:59
Analyze and Evaluate Database-Backed Web Applications with WTool to generate configurable benchmark scripts based on collected queries. The user can use the scripts to simulate the database access of a specific application for performance evaluation. To demonstrate the usage WTool, we analyze 16 open-source web applications. We introduce several simple optimizat作者: monochromatic 時(shí)間: 2025-3-24 17:59 作者: arrhythmic 時(shí)間: 2025-3-24 22:25
Analyze and Evaluate Database-Backed Web Applications with WTool to generate configurable benchmark scripts based on collected queries. The user can use the scripts to simulate the database access of a specific application for performance evaluation. To demonstrate the usage WTool, we analyze 16 open-source web applications. We introduce several simple optimizat作者: 厭食癥 時(shí)間: 2025-3-25 00:30 作者: Fibrin 時(shí)間: 2025-3-25 03:44
An Efficient Bucket Logging for Persistent Memory). BKL uses the per-transaction log structure (i.e., bucket) to store logs internally and ensures efficient writing of metadata and logs. Benefit from multi version concurrency control, BKL only records small fixed-size log entries to implement fast logging and crash recovery. Moreover, we optimize 作者: 哀求 時(shí)間: 2025-3-25 07:29 作者: AMEND 時(shí)間: 2025-3-25 13:51
Data Poisoning Attacks on Crowdsourcing Learningl-world datasets demonstrates that our attack can significantly decrease the test accuracy of trained classifiers. We verified that the labels generated with our strategy can be transferred to attack a broad family of crowdsourcing learning models in a black-box setting, indicating its applicability作者: 變化無常 時(shí)間: 2025-3-25 18:50 作者: Eclampsia 時(shí)間: 2025-3-25 20:18 作者: 圓錐 時(shí)間: 2025-3-26 02:31
ties as the BSW scheme but does not rely on collision resistant hash functions. Instead, we use a target collision resistant hash function, which is a strictly weaker primitive than a collision resistant hash function. Our scheme is, in terms of the signature size and the computational cost, as efficient as the BSW scheme.作者: Cerebrovascular 時(shí)間: 2025-3-26 08:16 作者: 厚顏 時(shí)間: 2025-3-26 11:13 作者: 大喘氣 時(shí)間: 2025-3-26 12:47
Guanghua Li,Qiyan Li,Jingqiao Liu,Yuanyuan Zhu,Ming Zhongatabase based provenance model, ., can be easily mapped to the FLOQ model; and iv) We show by examples that FLOQ is expressive enough to formulate common provenance queries, including all the provenance challenge queries proposed in the provenance challenge series.作者: gout109 時(shí)間: 2025-3-26 20:07
Gang Wang,Qi Peng,Yanfeng Zhang,Mingyang Zhangt publication of the PROV standard for provenance on the Web, which the two authors actively help shape in the Provenance Working Group at the World Wide Web Consortium, this Synthesis lecture is a hands-on introduction to PROV aimed at Web and linked data professionals. By means of recipes, illustr作者: VOC 時(shí)間: 2025-3-26 21:30 作者: Vaginismus 時(shí)間: 2025-3-27 04:23 作者: 跟隨 時(shí)間: 2025-3-27 07:07
n Prototyp einer internetbasierten Anwendung, die Kennzahlen erfasst, Logistikprozesse analysiert und spezifische Inhalte einer Wissensplattform für eine gezielte Prozessverbesserung den identifizierten Schwachstellen zuordnet..978-3-8244-8026-5978-3-322-81685-6作者: 野蠻 時(shí)間: 2025-3-27 10:37
Xiyan Xu,Jiwu Shurollierenden Machthaber aus, sondern entsteht aus der Akzeptanz des sp?teren Machtunterworfenen. Unternehmen stellen aber keine Dyaden, sondern strukturierte Handlungsfelder dar. In Unternehmen geht Macht daher in Steuerung über. Vor allem vier dominante Steuerungsstrategien sind dabei festzustellen: die tech978-3-7908-0647-2978-3-642-58075-8作者: 偉大 時(shí)間: 2025-3-27 15:28 作者: 平項(xiàng)山 時(shí)間: 2025-3-27 19:47 作者: cauda-equina 時(shí)間: 2025-3-27 22:00 作者: Conserve 時(shí)間: 2025-3-28 04:41
Dongdong Jin,Peng Cheng,Xuemin Lin,Lei Chenill present some of the existent results, exciting opportunities, and future challenges that stem from bringing together two research directions that for more than twenty years have developed largely indpendently.作者: Creatinine-Test 時(shí)間: 2025-3-28 08:15
Qiang Liu,Haoli Zhang,Zhaocheng Liuen determined to be standardized by the NIST after three rounds of evaluation, and is the only one that does not rely on (structural) lattice problems. This work increases the diversity of provable and practical post-quantum signatures, as the NIST is calling.作者: 顯微鏡 時(shí)間: 2025-3-28 10:33
Judith Hermanns,Anton Tsitsulin,Marina Munkhoeva,Alex Bronstein,Davide Mottin,Panagiotis Karrasovenance in a multi-disciplinary workflow system and introduce how generic provenance capture can be facilitated in Kepler’s actor-oriented workflow environment. We also describe the usage of the stored provenance information for efficient rerun of scientific workflows.作者: 滔滔不絕地講 時(shí)間: 2025-3-28 16:14 作者: 翻布尋找 時(shí)間: 2025-3-28 22:28 作者: 一個(gè)攪動(dòng)不安 時(shí)間: 2025-3-29 01:47
Chunxi Zhang,Rong Zhang,Qian Su,Aoying Zhou Steuerung in Bezug auf die Fallstudie diskutiert, unter Bezug auf die Gütekriterien der Fallstudienforschung generalisiert und letztendlich bewertet (Abschnitt 4.5). Dieses bildet die Voraussetzung einer kritischen Reflexion des Forschungsbeitrags im fünften und letzten Kapitel dieser Arbeit.作者: 青少年 時(shí)間: 2025-3-29 03:19
Dongdong Jin,Peng Cheng,Xuemin Lin,Lei Chenqueries to recover Bob’s randomness for any security levels of I (AES-128), III (AES-192), and V (AES-256), respectively in CRYSTALS-KYBER. Simultaneously, no more than 6, 6, and 4 queries are required to recover Bob’s secret for security levels I, III, and V in SABER.作者: 墻壁 時(shí)間: 2025-3-29 07:26
Jiahou Cheng,Mengqing Luo,Xin Li,Hui Yanith anonymous credentials such that the delegator can detect the signing key theft even if one-time delegation is broken while also achieving unlinkability for both the delegator and cloud servers. Further we show its application to an e-cash scheme, which can prevent double-spending.作者: originality 時(shí)間: 2025-3-29 14:30
ypes is, in most common cases, the best possible: only new nodes have to be processed. We also identify and analyse the exception scenarios. Finally, although our library of types, in theory, can be exponentially large, we present empirical results that show it is quite compact in practice.作者: carotid-bruit 時(shí)間: 2025-3-29 19:23 作者: blister 時(shí)間: 2025-3-29 23:09
ngs . that are almost bijective like Boneh and Franklin’s, or achieve a weaker property like “almost surjectivity” (in the sense that .). And we show that the lack of such constructions is no wonder: almost surjective Icart-like encoding cannot exist to non-supersingular elliptic curves.作者: 少量 時(shí)間: 2025-3-30 00:20
Judith Hermanns,Anton Tsitsulin,Marina Munkhoeva,Alex Bronstein,Davide Mottin,Panagiotis Karras challenge in turning the pairing-based instantiation of . into the world of lattice-based cryptography, and based on the hardness of learning with errors (.) problem, we prove that our new scheme is selectively secure in the standard model.作者: 懶惰民族 時(shí)間: 2025-3-30 05:03 作者: inhumane 時(shí)間: 2025-3-30 11:01
Jiaxiang Huang,Hao Lin,Junjie Yaoe, and its precursors can invade micropores in rock fragments sufficiently to prevent their identification. Of lesser importance, but locally troublesome, is the loss of primary textures of carbonate and other rock fragments that undergo recrystallization or severe compaction.作者: MERIT 時(shí)間: 2025-3-30 15:26
Qianyu Yu,Shuo Yang,Zhiqiang Zhang,Ya-Lin Zhang,Binbin Hu,Ziqi Liu,Kai Huang,Xingyu Zhong,Jun Zhou,Yn the . becomes a primary predicate of differentiation and affirmation in Bataille, its dissymetry is immediately palpable: “And this movement of my thought which flees me, not only can I not avoid it, but there is no instant so secret that it does not animate me. Thus I speak, everything in me gives itself to others.”.作者: 必死 時(shí)間: 2025-3-30 18:59
Jun Li,Zhihan Yan,Zehang Lin,Xingyun Liu,Hong Va Leong,Nancy Xiaonan Yu,Qing Livgl. Teece 2007, 1344; Rothaermel/Hess 2007, 898; Lee/Kelley 2008, 155). Anschlussf?hig ist die Auffassung, dass die F?higkeit von Unternehmen, Innovationen zu generieren oder zu implementieren, selbst der Kategorie der dynamischen F?higkeiten zuzuordnen ist (vgl. Eisenhardt/Martin 2000, 1107; Zollo/Winter 2002, 340; Pisano 2000, 151).作者: Morbid 時(shí)間: 2025-3-30 20:52
ature, VANETs have serious security and privacy issues that need to be addressed. The conditional privacy-preserving authentication protocol is one important tool to satisfy the security and privacy requirements. Many such schemes employ the certificateless signature, which not only avoids the key m作者: GRIEF 時(shí)間: 2025-3-31 02:18
or vice versa, in an invertible way. The most practical approach proposed to achieve this for an elliptic curve . has been the use of (piecewise) algebraic maps . called (deterministic, constant-time) “encoding functions”, for which numerous constructions have been proposed in recent years, starting作者: TEN 時(shí)間: 2025-3-31 05:37 作者: 搖曳 時(shí)間: 2025-3-31 12:50
order to sign (arbitrarily) long messages. Recent successful collision finding attacks against practical hash functions would indicate that constructing practical collision resistant hash functions is difficult to achieve. Thus, it is worth considering to relax the requirement of collision resistanc作者: FLOAT 時(shí)間: 2025-3-31 14:11
Dongdong Jin,Peng Cheng,Xuemin Lin,Lei Chenain proofs that are most of the time incomplete and ocasionally flawed. Arguably, this indicates that the provable security paradigm is heading towards an undesirable crisis of rigor..Significant research efforts are under way in order to correct this state of affairs. Examples, from the inside of t作者: enhance 時(shí)間: 2025-3-31 19:39 作者: 警告 時(shí)間: 2025-4-1 01:30 作者: glisten 時(shí)間: 2025-4-1 02:56
Qiang Liu,Haoli Zhang,Zhaocheng Liuryptography (NP-Complete and quantum-resistant). We present a Sigma Protocol to prove the knowledge of LRMC. Comparing with the need for several matrices in the public key of MinRank-based constructions such as Courtois (ASIACRYPT 2001) and Bellini et al. (PQCrypto 2022), the benefits of using LRMC 作者: 使出神 時(shí)間: 2025-4-1 06:32 作者: EXULT 時(shí)間: 2025-4-1 11:05 作者: Blasphemy 時(shí)間: 2025-4-1 16:56
Qiang Liu,Haoli Zhang,Zhaocheng Liueatment and a control group, how can we reject the possibility that bias or lurking variables, rather than the treatment, caused the difference? We have seen that randomization, control, or replication and triangulation are the tools that help to make bias, confounding, and a common response unlikel作者: Calculus 時(shí)間: 2025-4-1 20:33
in social media poses a new challenge to consumers who have to discern whether a piece of information published in social media is reliable. For example, it can be difficult to understand the motivations behind a statement passed from one user to another, without knowing the person who originated th作者: 微枝末節(jié) 時(shí)間: 2025-4-2 01:04 作者: 狂怒 時(shí)間: 2025-4-2 06:28
Gang Wang,Qi Peng,Yanfeng Zhang,Mingyang Zhang. However, recent studies in biomedical research have highlighted key challenges in scientific reproducibility as more than 70% of researchers in a survey of more than 1500 participants were not able to reproduce results from other groups and 50% of researchers were not able to reproduce their own e作者: 翅膀拍動(dòng) 時(shí)間: 2025-4-2 10:08 作者: 摘要 時(shí)間: 2025-4-2 11:30 作者: Flirtatious 時(shí)間: 2025-4-2 17:45
Jiaxiang Huang,Hao Lin,Junjie Yaosses operate from the zone of weathering to the deep subsurface where diagenesis grades into metamorphism. Of greatest importance is the total dissolution of grains of feldspar, rock fragments, and heavy minerals by corrosive meteoric or subsurface waters to severely modify original sand composition作者: 全能 時(shí)間: 2025-4-2 21:49
Gang Wang,Qi Peng,Yanfeng Zhang,Mingyang Zhang, at a click of a button. With Web 2.0, users are no longer passive consumers, but active publishers and curators of data. Hence, from science to food manufacturing, from data journalism to personal well-being, from social media to art, there is a strong interest in provenance, a description of what作者: 我邪惡 時(shí)間: 2025-4-3 00:59 作者: NAIVE 時(shí)間: 2025-4-3 07:17
Zhou Zhou,XuJia Yaon . is on everyone‘s lips within advertising language, although its conceptual foundation in marketing science remains thin and requires further clarification. This study attempts to fill this gap by defining and conceptualizing the construct of customer inspiration with the theories-in-use approach作者: Trochlea 時(shí)間: 2025-4-3 11:50
Qingzhong Bao,Xiaoxu Ren,Chunfeng Liu,Xin Wang,Xiaofei Wang,Chao Qiu of a heated controversy over enclosure, and often late in date. None of this material can be regarded as wholly satisfactory as a basis for the study of farming history. Fortunately, however, there exists in many parts of England a mass of contemporary record material about local farming which is p作者: musicologist 時(shí)間: 2025-4-3 15:26