派博傳思國(guó)際中心

標(biāo)題: Titlebook: Cloud Computing and Security; Third International Xingming Sun,Han-Chieh Chao,Elisa Bertino Conference proceedings 2017 Springer Internati [打印本頁(yè)]

作者: Abridge    時(shí)間: 2025-3-21 17:52
書目名稱Cloud Computing and Security影響因子(影響力)




書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Cloud Computing and Security被引頻次




書目名稱Cloud Computing and Security被引頻次學(xué)科排名




書目名稱Cloud Computing and Security年度引用




書目名稱Cloud Computing and Security年度引用學(xué)科排名




書目名稱Cloud Computing and Security讀者反饋




書目名稱Cloud Computing and Security讀者反饋學(xué)科排名





作者: 反感    時(shí)間: 2025-3-21 22:38

作者: FELON    時(shí)間: 2025-3-22 00:51

作者: Insatiable    時(shí)間: 2025-3-22 04:48
A Novel Robust Reversible Watermarking Scheme Based on IWTs respectively. Firstly, the robust watermarks are embedded into the mid-low frequency coefficients after the image transformed from spatial domain to frequency domain. Then, side information that used to ensure the reversibility is embedded in spatial domain by the form of fragile watermarks. 5-3 i
作者: promote    時(shí)間: 2025-3-22 10:10

作者: WAG    時(shí)間: 2025-3-22 12:55

作者: WAG    時(shí)間: 2025-3-22 21:06

作者: Free-Radical    時(shí)間: 2025-3-22 22:46
Quantum Computer Simulation on GPU Cluster Incorporating Data Localitysable platform for this task. However, the high cost of communication between GPUs makes the simulation inefficiency. To overcome this drawback, we propose the following two methods. (1) A method for GPU cluster quantum simulation to improve the data locality is introduced, and two schemes for data
作者: Harbor    時(shí)間: 2025-3-23 01:46

作者: Agronomy    時(shí)間: 2025-3-23 09:33

作者: 永久    時(shí)間: 2025-3-23 12:47

作者: 營(yíng)養(yǎng)    時(shí)間: 2025-3-23 15:03
Improved STDM Watermarking Using Semantic Information-Based JND Model. The JND model can provide a superior tradeoff between robustness and fidelity. However, the conventional JND models are not fit for the quantization-based watermarking, as the image has been altered by watermarking embedding. In this paper, we present an improved spread transform dither modulation
作者: ingestion    時(shí)間: 2025-3-23 18:55

作者: fertilizer    時(shí)間: 2025-3-24 00:14

作者: Trypsin    時(shí)間: 2025-3-24 02:29
SIEM Based on Big Data Analysisment (SIEM) systems have faced with diversity of Volume Big data sources, so it is necessary that big data analysis should be used. This paper presents the architecture and principle of SIEM systems which use popular big data technology. The information security data is transferred from flume to Fli
作者: Gorilla    時(shí)間: 2025-3-24 10:04
Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant System The most effective way in green cloud computing is using virtual machine (VM) consolidation to pack VMs into a smaller amount of physical machines (PMs), which can save energy by switching off the idle PMs. However, in traditional static workload approach, VMs are over-provisioned with a static cap
作者: BIAS    時(shí)間: 2025-3-24 12:23

作者: JUST    時(shí)間: 2025-3-24 18:29

作者: Mortal    時(shí)間: 2025-3-24 21:09
,Bauelemente, Datenbl?tter, Grenzwerte,tum computers, the effects of the basic quantum gate and the equivalent relation are first briefly concluded in this paper. Base on the general-purpose graphics processing units (GPGPU) environment, the novel basic quantum gate simulation platform is achieved, on which any arbitrary quantum algorith
作者: Antarctic    時(shí)間: 2025-3-24 23:34
Abstraktion elektronischer Bauelemente,tly extracted from the received video file. It has the property that can well reduce the error propagated between spatially/temporally correlated macro-blocks. It is required that, the embedded information at the sender side should well capture/reflect the video characteristics. Moreover, the retrie
作者: 使成核    時(shí)間: 2025-3-25 05:12

作者: ATRIA    時(shí)間: 2025-3-25 11:04
Grundbegriffe der Elektrotechnik, transmitted in compressed form, so research and development of such a scheme is necessary. Hong et al. proposed a reversible information hiding based approach based on AMBTC compression of images to provide considerable embedding capacity and effectively reduce the bit-rate. However, it did not car
作者: 強(qiáng)有力    時(shí)間: 2025-3-25 11:56
,Nachhaltige Unternehmensführung,nt by intentional attackers, it has become a very important topic in image forensics. Most of the existing detection methods designed to region duplication are based on the exhaustive block-matching of image pixels or transformed coefficients. They may be not efficient when the duplicate regions are
作者: 草率男    時(shí)間: 2025-3-25 19:10

作者: 切掉    時(shí)間: 2025-3-25 21:26

作者: BANAL    時(shí)間: 2025-3-26 00:52
Kapitel 3: Anwendungen 1. Ordnung,watermarking schemes are proposed to prevent malicious attacks in recent years. An innovative algorithm is proposed in this work to resist key frames dropping and detect the subtitle tampered. Firstly, Simple Linear Iterative Clustering (SLIC) Superpixels are used to extract the natural codes of the
作者: WAG    時(shí)間: 2025-3-26 07:32

作者: 橢圓    時(shí)間: 2025-3-26 09:50

作者: 咽下    時(shí)間: 2025-3-26 13:56

作者: evasive    時(shí)間: 2025-3-26 17:23

作者: MINT    時(shí)間: 2025-3-26 21:46

作者: 色情    時(shí)間: 2025-3-27 01:09

作者: 附錄    時(shí)間: 2025-3-27 05:30

作者: 合同    時(shí)間: 2025-3-27 09:32

作者: 河潭    時(shí)間: 2025-3-27 14:53

作者: 窩轉(zhuǎn)脊椎動(dòng)物    時(shí)間: 2025-3-27 18:02

作者: Formidable    時(shí)間: 2025-3-27 23:57

作者: 左右連貫    時(shí)間: 2025-3-28 04:32

作者: 動(dòng)物    時(shí)間: 2025-3-28 08:49

作者: Efflorescent    時(shí)間: 2025-3-28 10:36

作者: 心胸狹窄    時(shí)間: 2025-3-28 16:51
Coverless Information Hiding Technology Research Based on News Aggregationhides N in a news web by changing the order of news headlines. Experimental results and analysis show that this method is robust for any current steganalysis algorithm, and effective for stego-message delivery.
作者: arthroplasty    時(shí)間: 2025-3-28 21:33

作者: countenance    時(shí)間: 2025-3-29 01:17

作者: 熄滅    時(shí)間: 2025-3-29 03:47

作者: Perceive    時(shí)間: 2025-3-29 10:14

作者: Parameter    時(shí)間: 2025-3-29 13:18
https://doi.org/10.34157/9783648157725ography method based on patched block. This strategy can make the post-processing sub-image be influenced by all the sub-images which have already embedded. The experimental results show that the proposed method is more secure than CMD image steganographic method.
作者: indignant    時(shí)間: 2025-3-29 18:54
Schnellfilter ihr Bau und Betrieb by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.
作者: Cosmopolitan    時(shí)間: 2025-3-29 22:37
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling Experimental results show that the proposed scheme can not only provide large watermark capacity and good imperceptibility, but also can resist the impact of print-scan on the image, and has strong robustness.
作者: synovium    時(shí)間: 2025-3-30 02:49

作者: 貪婪的人    時(shí)間: 2025-3-30 05:00
Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.
作者: 混合物    時(shí)間: 2025-3-30 08:45

作者: scotoma    時(shí)間: 2025-3-30 15:34

作者: candle    時(shí)間: 2025-3-30 19:42

作者: AWE    時(shí)間: 2025-3-30 20:48

作者: Ferritin    時(shí)間: 2025-3-31 01:36
SIEM Based on Big Data Analysisend, the full paper is summarized and the future work should be the usage of stream computing in the SIEM to solve inform security problem in large-scale network with the continuously producing information security data.
作者: 悄悄移動(dòng)    時(shí)間: 2025-3-31 05:06

作者: 招募    時(shí)間: 2025-3-31 11:34

作者: chemoprevention    時(shí)間: 2025-3-31 14:02
https://doi.org/10.1007/978-3-662-62146-2 frequent words distance, normal texts containing the secret information could be retrieved from the text database, and will be sent to the receiver without any modification. Because the embedding is not needed, the proposed method could be able to escape from almost all state-of-the-art steganalysis methods.




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
阆中市| 新余市| 昌江| 嵊州市| 察雅县| 蚌埠市| 盐源县| 乐业县| 罗平县| 青阳县| 河东区| 黑水县| 鄄城县| 巴塘县| 阳江市| 五家渠市| 忻城县| 鲁甸县| 专栏| 扶余县| 望谟县| 时尚| 龙门县| 茶陵县| 临猗县| 萍乡市| 达日县| 余干县| 岫岩| 宝清县| 锡林浩特市| 涟源市| 旬邑县| 安塞县| 神农架林区| 贺州市| 林西县| 定襄县| 新昌县| 河池市| 九龙城区|