標(biāo)題: Titlebook: Advances in Information Technology; 6th International Co Borworn Papasratorn,Nipon Charoenkitkarn,Vithida C Conference proceedings 2013 Spr [打印本頁] 作者: 拐杖 時間: 2025-3-21 19:48
書目名稱Advances in Information Technology影響因子(影響力)
書目名稱Advances in Information Technology影響因子(影響力)學(xué)科排名
書目名稱Advances in Information Technology網(wǎng)絡(luò)公開度
書目名稱Advances in Information Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Information Technology被引頻次
書目名稱Advances in Information Technology被引頻次學(xué)科排名
書目名稱Advances in Information Technology年度引用
書目名稱Advances in Information Technology年度引用學(xué)科排名
書目名稱Advances in Information Technology讀者反饋
書目名稱Advances in Information Technology讀者反饋學(xué)科排名
作者: optional 時間: 2025-3-21 21:02 作者: 不透明性 時間: 2025-3-22 03:03 作者: 多嘴 時間: 2025-3-22 06:01 作者: obtuse 時間: 2025-3-22 11:37
Icon Placement Regularization for Jammed Profiles: Applications to Web-Registered Personnel Mining,ryption is conducted on both the message and the produced signature. The construction was first formally (The idea without proof was already known, for instance, it was mentioned in Damg?rd and Pedersen (New convertible undeniable signature schemes. In: Maurer UM (ed) Advances in cryptology - EUROCR作者: 嚴(yán)厲譴責(zé) 時間: 2025-3-22 16:29 作者: 圖表證明 時間: 2025-3-22 20:39
Efficient Code Obfuscation for Android,ification isjob one in today‘s modem design process. Statistics tell us that the verification process takes up a majority of the overall work. Chips that come back dead on arrival scream that verification is at fault for not finding the mistakes. How do we ensure success? After an accomplishment, ha作者: mastoid-bone 時間: 2025-3-23 00:57 作者: Buttress 時間: 2025-3-23 04:46
Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of Eentation complemented by numerous case studies.Includes suppAt the dawn of the 21st century and the information age, communication and c- puting power are becoming ever increasingly available, virtually pervading almost every aspect of modern socio-economical interactions. Consequently, the potentia作者: Camouflage 時間: 2025-3-23 07:40 作者: Limousine 時間: 2025-3-23 11:18
Event-Driven Implementation of Layer-7 Load Balancer, interested in one of the key pre-conditions for related international treaties: the verification of compliance with such treaties. This book presents an up-to-date exposition of the latest developments in science and practice of international verification. It contains an account of the experience w作者: Chandelier 時間: 2025-3-23 15:17 作者: mastoid-bone 時間: 2025-3-23 18:04 作者: gene-therapy 時間: 2025-3-23 22:23
Modified Deformable Parts Model for Side Profile Facial Feature Detection,e idea of finite local model-checking, which was introduced by Stirling and Walker: rather than traversing the entire state space of a model, as is done for model-checking in the sense of Emerson, Clarke et ai. (checking whether a (finite) model satisfies a formula), local model-checking asks whethe作者: 畫布 時間: 2025-3-24 06:10
1865-0929 sented in this volume were carefully reviewed and selected from numerous submissions. They deal with all areas related to applied information technology.978-3-319-03782-0978-3-319-03783-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 天然熱噴泉 時間: 2025-3-24 08:33
Analyses of Processing Contamination,ree alternative layouts were suggested by SLP and each layout was evaluated using simulation. Comparison between the alternative layouts and current layout was also made. The simulation results illustrate that the first alternative layout is the best solution to improve the company’s layout problems.作者: panorama 時間: 2025-3-24 14:11
City Branding and the Tourist Gazerning process and interaction, immediated learning outcomes, and long-term learning outcomes. These factors are used to propose a conceptual framework of hybrid self-regulated and collaborative learning for EUT that aims at improving performance of EUT.作者: 極力證明 時間: 2025-3-24 16:15
Expos and the Rhetoric of Sustainability,varying number of concurrent users. The results obtained for each optimization technique are then reported in a tabular format. The maximum reduction in end user response time was achieved for hardware optimization which requires Moodle server and database to be installed on solid state disk.作者: Biomarker 時間: 2025-3-24 19:29 作者: 庇護 時間: 2025-3-24 23:43
https://doi.org/10.1007/978-3-319-11233-6t single-pass algorithm, ., to quickly mine patterns with frequent/regular appearance. Experimental results show that our approach can effectively and efficiently discover the valuable patterns that meet the users’ interest.作者: exhibit 時間: 2025-3-25 05:23
https://doi.org/10.1007/978-94-011-3700-3or longer runs than its training periods, and 5) in terms of scalability and economy, i-Cloud is suitable for small cache sizes whereas nonintelligent-mode i-Cloud suffices larger cache sizes and the realization of responsive cloud services...作者: medieval 時間: 2025-3-25 09:21
Citrus Oils, Aromas, and Essencesol law for industrial application. A convenient formulation is in order to compute physical parameters of the machine. The back-propagation learning process algorithm is briefly presented and tested with different configuration of motor induction. Verification of the validity and feasibility of the technique is obtained from simulation results.作者: incubus 時間: 2025-3-25 15:06
https://doi.org/10.1007/978-3-030-60717-3hat although all four dimensions significantly impact perceived usefulness, system quality followed by trust are the two most important factors. The study has important implications for website designers, developers and researchers.作者: Landlocked 時間: 2025-3-25 18:13 作者: 調(diào)整 時間: 2025-3-25 23:33
https://doi.org/10.1007/978-1-4615-4973-4llocations. The latter is a set of high dimensional and sparsely discrete-valued big data in the real world. Through these experiments, it was recognized that the presented method, which combines multidimensional scaling, KPCA and the regularization, is applicable to a wide class of jammed big data for generating a user-friendly GUI.作者: Ruptured-Disk 時間: 2025-3-26 02:20 作者: Frequency-Range 時間: 2025-3-26 04:39 作者: NEG 時間: 2025-3-26 09:50 作者: adj憂郁的 時間: 2025-3-26 15:37
Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of Esystems) are just as frequently being reported. In addition, many of today’s products and services are presently being deployed in a highly competitive environment wherein a product or service is succeeding in 978-3-642-42316-1978-3-642-15228-3作者: 靦腆 時間: 2025-3-26 19:57 作者: 收藏品 時間: 2025-3-27 00:45 作者: Arthropathy 時間: 2025-3-27 03:07 作者: 貪婪的人 時間: 2025-3-27 07:44
Exploring Video Steganography for Hiding Images Based on Similar Lifting Wavelet Coefficients,978-3-658-26160-3作者: 完全 時間: 2025-3-27 11:24 作者: albuminuria 時間: 2025-3-27 15:09
Identifying Factors Influencing Hybrid Self-regulated and Collaborative Learning: Toward an End-Use978-1-349-10143-6作者: atopic 時間: 2025-3-27 19:48
Assessing the Differential Effect of Web Usability Dimensions on Perceived Usefulness of a B2C E-Co978-3-322-94684-3作者: archetype 時間: 2025-3-28 00:03 作者: 思考 時間: 2025-3-28 04:58 作者: 營養(yǎng) 時間: 2025-3-28 07:46
Rotor Time Constant Identification Approaches Based on Back-Propagation Neural Network for Indirectntisemitismus in die muslimische Welt getragenen Topos, der dort inzwischen einen zentralen Stellenwert einnimmt und sich insbesondere in einer antizionistischen Variante gegen Israel, aber ebenso gegen Juden überhaupt richtet (vgl. zum Antisemitismus in der arabischen Welt: Tibi 2003).作者: 傲慢物 時間: 2025-3-28 11:46 作者: Defense 時間: 2025-3-28 14:35
A Review of Security Risks in the Mobile Telecommunication Packet Core Network, a unified platform and convergence to a unified language enable the development of a unified verification methodology that can be used on a wide range of SoC projects. ARM and Synopsys have worked together to define just such a methodology in the Verification Methodology Manual for SystemVerilog. T作者: 能夠支付 時間: 2025-3-28 19:26 作者: thrombosis 時間: 2025-3-29 00:03
Effect of Training Sample on Reconstructing 3D Face Shapes from Feature Points,c models can be used for verification and controller synthesis, the book also outlines several key results for the verification and controller design of finite systems. Several examples illustrate the different methods and techniques discussed in the book..978-1-4419-5498-5978-1-4419-0224-5作者: 刺激 時間: 2025-3-29 03:44
Analysis of Optimization Techniques to Improve User Response Time of Web Applications and Their Impant techniques, the stages to which they are applicable and their effectiveness in improving real-time software reliability. 1.2 The characteristics of real-time software As well as the enhanced reliability requirement discussed above, real-time software has a number of other distinguishing characteristics. F978-3-642-70226-6978-3-642-70224-2作者: 瑣事 時間: 2025-3-29 10:06
Event-Driven Implementation of Layer-7 Load Balancer,storical science. Among the topics covered are: INF Treaty, nuclear test ban, control of mobile missiles, and fissile material, demilitarization of space, stability and reductions of conventional forces, ban on chemical weapons. .From the Reviews:. ".Verfication of Arms . .Reductions. is packed with作者: Wernickes-area 時間: 2025-3-29 14:09
Modified Deformable Parts Model for Side Profile Facial Feature Detection, boolean connectives from powerful fix-point operators (which make the logic more expressive than many other temporal logics), it is possible to give a rela- tively straightforward set of rules for constructing a tableau. Much of the subtlety is removed from the tableau itself, and put into a relati作者: Outwit 時間: 2025-3-29 16:19
Physical and Chemical Contaminationficient selections. The experiments also consider the different payload image size in the video file. For all the results, the proposed approach with similar coefficients and lifting multi-level wavelet transform has a better PSNR for all the test cases.作者: 燒烤 時間: 2025-3-29 21:39 作者: Militia 時間: 2025-3-30 02:17 作者: MAPLE 時間: 2025-3-30 07:52
John P. Houghton,Andrew Stevensoid market which shows how feasible it is to reverse a targeted application; (2) a proposed obfuscator implementation whose transformations defeat current popular static analysis tools while maintaining a low level of added time and memory overhead.作者: 長處 時間: 2025-3-30 11:35 作者: osteocytes 時間: 2025-3-30 16:06 作者: 拾落穗 時間: 2025-3-30 17:02
City Diplomacy: A Strategic Choice,esults showed that both the robot and the virtual human performed satisfactorily in their social interactions though the performances varied slightly.We also found a trade-off between the attributes and the performances of the agents. The results will help develop intelligent social agents of differ作者: aspersion 時間: 2025-3-30 23:39
Borworn Papasratorn,Nipon Charoenkitkarn,Vithida CProceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013作者: 墊子 時間: 2025-3-31 01:28 作者: mediocrity 時間: 2025-3-31 08:16
https://doi.org/10.1007/978-3-319-11233-6rms of frequency and regularity to determine significant of patterns under user-given support and regularity thresholds. However, it is well-known that setting of thresholds to discover the most interesting results is a very difficult task and it is more reasonable to avoid specifying the suitable t作者: 沖突 時間: 2025-3-31 09:22
https://doi.org/10.1007/978-981-99-8699-6continue to be a major provider of information in the future. In recent years, however there has been a significant change: information about natural disasters has increasingly been disseminated on a large scale on social media platforms. These media are typically faster but may be less reliable. Th作者: 努力趕上 時間: 2025-3-31 16:32
https://doi.org/10.1007/978-94-011-3700-3twork-bandwidth saturation and public cloud data-out overspends. Client-side cloud caching is a solution. This paper presents the core mechanism of the cloud caching, called i-Cloud cache replacement policy. Simulation results showed that 1) i-Cloud could deliver stable performances and outperformed作者: elastic 時間: 2025-3-31 19:11
Physical and Chemical Contaminations such as security, privacy etc. This paper interests in the video steganography method, where the image is hidden in a video file. The approach uses the intensity features together with the lifting multiple discrete wavelet transform. The approach contains two steps. First, we bring the secret imag作者: 娘娘腔 時間: 2025-4-1 00:20
Citrus Oils, Aromas, and EssencesIt is well known that in this IFOC scheme, the induction machine parameters change widely during the operation of the drive especially the value of rotor time constant which varies with rotor temperature and flux level of the machine. Therefore, the quality of the drive system decreases if no means 作者: hermetic 時間: 2025-4-1 03:54 作者: Defense 時間: 2025-4-1 07:46 作者: Thyroiditis 時間: 2025-4-1 12:19
Yosvanis Acanda,Chunxia Wang,Amit Levycketing across the world. For the successful implementation of a B2C E-business, it is necessary to understand the trust issues associated with the online environment which holds the customer back from shopping online. This paper proposes a framework for assessing the level of trust in any B2C E-Com作者: 滋養(yǎng) 時間: 2025-4-1 17:43