標(biāo)題: Titlebook: Computer Science and its Applications; Ubiquitous Informati James J. (Jong Hyuk) Park,Ivan Stojmenovic,Gangman Conference proceedings 2015 [打印本頁(yè)] 作者: 萬(wàn)能 時(shí)間: 2025-3-21 19:53
書目名稱Computer Science and its Applications影響因子(影響力)
書目名稱Computer Science and its Applications影響因子(影響力)學(xué)科排名
書目名稱Computer Science and its Applications網(wǎng)絡(luò)公開(kāi)度
書目名稱Computer Science and its Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Computer Science and its Applications被引頻次
書目名稱Computer Science and its Applications被引頻次學(xué)科排名
書目名稱Computer Science and its Applications年度引用
書目名稱Computer Science and its Applications年度引用學(xué)科排名
書目名稱Computer Science and its Applications讀者反饋
書目名稱Computer Science and its Applications讀者反饋學(xué)科排名
作者: CAJ 時(shí)間: 2025-3-21 20:57 作者: 飲料 時(shí)間: 2025-3-22 01:29 作者: Orgasm 時(shí)間: 2025-3-22 06:02 作者: 江湖郎中 時(shí)間: 2025-3-22 09:02 作者: 卡死偷電 時(shí)間: 2025-3-22 15:14 作者: 卡死偷電 時(shí)間: 2025-3-22 19:45
Measuring and Surveying Bisexuality,ities. Thus, it is crucial to consider device capabilities to provide seamless multi-screen services in conjunction with these devices. In this paper, we present an adaptive transformation engine to efficiently support smooth multi-screen services using smart devices. The proposed engine dynamically作者: 公理 時(shí)間: 2025-3-22 23:43
https://doi.org/10.1007/978-90-481-9163-5 keys proposed by Bogdanov et al. in 2007. Higher-order differential attack is one of the cryptanalytic techniques exploiting a low algebraic degree of an encryption/decryption function. In 2013 Wu et al. reported the 16th-order differential attack on 10-round variant of PRESENT, which requires 2. p作者: 貝雷帽 時(shí)間: 2025-3-23 02:33
https://doi.org/10.1007/978-90-481-9163-5tal Signal Processor) for recognizing hand gestures. The DSP based stereo camera module with high resolution and wide angle lens was developed for the hand gesture recognition. In addition, a hand gesture recognition system was developed with the camera module and PC based application. It recognizes作者: 完成才能戰(zhàn)勝 時(shí)間: 2025-3-23 06:19 作者: 跳動(dòng) 時(shí)間: 2025-3-23 11:34
Game in Africa: Seizing the Opportunityg, power and physical resources. Owing to the dynamic nature of the vehicular cloud, continuous monitoring on trust attributes in necessary to enforce service-level agreement, This paper proposes RA-VTrust, Reputation-based Adaptive Vehicular Trust model for efficiently evaluating the competence of 作者: Encapsulate 時(shí)間: 2025-3-23 16:32 作者: 闖入 時(shí)間: 2025-3-23 19:17 作者: CANDY 時(shí)間: 2025-3-24 01:02
https://doi.org/10.1057/9781137516541llocation and task. In order to improve a performance, the scheduling may consider a resource evaluation. However, a resources state shows an uncertainty to evaluate the subject. In this paper, we propose of fuzzy logic-drive resource evaluation to solve this uncertainty for automated negotiation wi作者: 北極人 時(shí)間: 2025-3-24 06:26 作者: Gyrate 時(shí)間: 2025-3-24 07:33 作者: 審問(wèn),審訊 時(shí)間: 2025-3-24 12:58
Changing Economic Environment in Asiain terms of energy consumption. LEACH (low energy adaptive clustering hierarchy), a protocol that periodically changes the cluster head, averages the power consumption of all nodes. Some researchers have suggested the use of a security system for LEACH, but such systems create a possibility in which作者: Customary 時(shí)間: 2025-3-24 18:49 作者: 冒失 時(shí)間: 2025-3-24 20:16 作者: Somber 時(shí)間: 2025-3-25 00:55
The Asian Conglomerates at a Crossroadsed protocols in SCADA networks. However, it provides no inherent security mechanisms. Therefore, the Modbus protocol is susceptible to the type of attack that injects false Modbus commands by fabrication or modification. In this paper, we propose an abnormal behavior detection method by using normal作者: metropolitan 時(shí)間: 2025-3-25 04:19
The Asian Conglomerates at a Crossroadsnitoring and analysis. The idea is to integrate depth sensor and motion sensor. We illustrate the sensor fusion concept and implement the wireless fall detection sensor sub-system. We experiment with angular acceleration data in three limbs parts of human test target. Different life patterns of elde作者: jumble 時(shí)間: 2025-3-25 08:07
Computer Science and its Applications978-3-662-45402-2Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 拉開(kāi)這車床 時(shí)間: 2025-3-25 13:54 作者: 青石板 時(shí)間: 2025-3-25 17:34
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/c/image/233802.jpg作者: vocation 時(shí)間: 2025-3-26 00:03 作者: 訓(xùn)誡 時(shí)間: 2025-3-26 03:06 作者: 貪婪的人 時(shí)間: 2025-3-26 04:45
https://doi.org/10.1007/978-90-481-9163-5 hand gesture recognition. In addition, a hand gesture recognition system was developed with the camera module and PC based application. It recognizes the movement and click gesture by analyzing the location and shape change of fingertips in real time作者: 喧鬧 時(shí)間: 2025-3-26 08:30 作者: 易怒 時(shí)間: 2025-3-26 16:12
Game in Africa: Seizing the OpportunityIS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the experimental results it can be seen that the protection method can better protect the privacy of WHOIS information in DNS.作者: 誘騙 時(shí)間: 2025-3-26 18:04 作者: 長(zhǎng)矛 時(shí)間: 2025-3-27 00:26
Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart Devices, we present an adaptive transformation engine to efficiently support smooth multi-screen services using smart devices. The proposed engine dynamically adapts user interfaces to make it suitable for smart devices. In addition, it supports real-time media transcoding and streaming so as to provide these devices with suitable media contents.作者: STELL 時(shí)間: 2025-3-27 01:29 作者: 無(wú)畏 時(shí)間: 2025-3-27 08:29 作者: Cumbersome 時(shí)間: 2025-3-27 10:04
Research on Privacy Protection of WHOIS Information in DNS,IS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the experimental results it can be seen that the protection method can better protect the privacy of WHOIS information in DNS.作者: ARY 時(shí)間: 2025-3-27 16:54 作者: Bronchial-Tubes 時(shí)間: 2025-3-27 18:06
Conference proceedings 2015s a comprehensive conference focused on the various aspects of advances in engineering systems in computer science, and applications, including ubiquitous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and wi作者: 紳士 時(shí)間: 2025-3-27 23:47
1876-1100 ng Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application..978-3-662-51619-5978-3-662-45402-2Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 值得 時(shí)間: 2025-3-28 02:10 作者: 職業(yè)拳擊手 時(shí)間: 2025-3-28 09:06
Changing Economic Environment in Asiaropose a secrecy multiplication based on Shamir’s (k, n)-threshold secret-sharing scheme that uses only . servers. Through this scheme, the system can realize secrecy calculation without altering the threshold level.作者: TAP 時(shí)間: 2025-3-28 14:29
The Asian Conglomerates at a Crossroadsmotion data for correct classification purpose. We discovered that the trained weights and bios from the neural network based on three limbs parts measurement data has allowed us to differentiate fall from regular walk motion with high accuracy.作者: 瘙癢 時(shí)間: 2025-3-28 15:18
A Reputation-Based Adaptive Trust Management System for Vehicular Clouds, most suitable trust for vehicular services because it is performed by considering vehicular service level agreement (VSLA) documents and reputation services. The performance of RA-VTrust is evaluated through a simulation.作者: CAMP 時(shí)間: 2025-3-28 19:44 作者: 神圣將軍 時(shí)間: 2025-3-29 01:20 作者: chassis 時(shí)間: 2025-3-29 05:33
Conference proceedings 2015tous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application..作者: labile 時(shí)間: 2025-3-29 11:06
The Changing Definition of Masculinityincluding imperceptibility (such as PSNR, NC) and robustness (such as Filtering, Gaussian noise, Rotation and Salt and Pepper). Experimental results demonstrate that the proposed scheme shows superior performance in the presence of signal processing attracks.作者: 鳴叫 時(shí)間: 2025-3-29 13:23 作者: 急急忙忙 時(shí)間: 2025-3-29 16:59
Game in Africa: Seizing the Opportunity), which not only uses the words themselves, but relations between them as well. Evaluation experiment and analysis confirm that our techniques have better recommendation results and effects on cold-start scenarios.作者: abnegate 時(shí)間: 2025-3-29 23:13 作者: Enervate 時(shí)間: 2025-3-30 00:45
,Performance of a Hybrid DCT SVD Visually Imperceptible Digital Watermarking? against Signal Processincluding imperceptibility (such as PSNR, NC) and robustness (such as Filtering, Gaussian noise, Rotation and Salt and Pepper). Experimental results demonstrate that the proposed scheme shows superior performance in the presence of signal processing attracks.作者: babble 時(shí)間: 2025-3-30 05:22 作者: Curmudgeon 時(shí)間: 2025-3-30 11:49 作者: expound 時(shí)間: 2025-3-30 13:20 作者: 變白 時(shí)間: 2025-3-30 18:08 作者: maculated 時(shí)間: 2025-3-30 23:41
The Changing Definition of Masculinity former velocity data of GPS until next the GPS signal is received. The performance of the hybrid navigation system was confirmed through the experiment comparing the actual route and the calculated route, where the calculated route of the simplified hybrid navigation system is the same with the actual route.作者: BRINK 時(shí)間: 2025-3-31 02:46 作者: Rodent 時(shí)間: 2025-3-31 06:06
Robert G. Patman,Timothy G. Ferneriency and performance of architecture. The scenario has been developed and implemented in OMnet++ simulator. The simulation results reveal that the ERAGHC is better than the previous schemes in term of packet delivery ratio, packet delay and overall efficiency.作者: Demonstrate 時(shí)間: 2025-3-31 13:07 作者: 抱怨 時(shí)間: 2025-3-31 14:13
Doryane Kermel-Torrès,Philippe Scharose a novel key exchange scheme that does not include nodes that cannot perform key exchange. Even if many nodes are stolen, the proposed scheme ensures that the analysis of keys in other nodes is not possible, in the case where the attacker cannot intercept communication between any of them.作者: analogous 時(shí)間: 2025-3-31 18:14
The Asian Conglomerates at a Crossroads traffic pattern. Most of all, the proposed method is performed according to the analysis of only Modbus/TCP request messages. Therefore, it has the benefit of detecting abnormal behavior on even with the simple traffic pattern learning.作者: Inertia 時(shí)間: 2025-3-31 22:50 作者: engagement 時(shí)間: 2025-4-1 03:31
A Simplified Hybrid Navigation System Design of a Mobile Robot Using Kalman Filter, former velocity data of GPS until next the GPS signal is received. The performance of the hybrid navigation system was confirmed through the experiment comparing the actual route and the calculated route, where the calculated route of the simplified hybrid navigation system is the same with the actual route.