派博傳思國際中心

標(biāo)題: Titlebook: Computer and Information Science 2015; Roger Lee Conference proceedings 2016 Springer International Publishing Switzerland 2016 14th ACIS/ [打印本頁]

作者: Combat    時(shí)間: 2025-3-21 20:01
書目名稱Computer and Information Science 2015影響因子(影響力)




書目名稱Computer and Information Science 2015影響因子(影響力)學(xué)科排名




書目名稱Computer and Information Science 2015網(wǎng)絡(luò)公開度




書目名稱Computer and Information Science 2015網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer and Information Science 2015被引頻次




書目名稱Computer and Information Science 2015被引頻次學(xué)科排名




書目名稱Computer and Information Science 2015年度引用




書目名稱Computer and Information Science 2015年度引用學(xué)科排名




書目名稱Computer and Information Science 2015讀者反饋




書目名稱Computer and Information Science 2015讀者反饋學(xué)科排名





作者: 帽子    時(shí)間: 2025-3-21 23:33

作者: BOLT    時(shí)間: 2025-3-22 04:07
Acts of Omission in the “War on Terrorism” discrete driving states (i.e., go straights) on the basis of Gaussian Mixture Model (GMM) and plot state transition graphs of the discrete driving states to model driver’s behavior. The driver model obtained by above method showed the characteristic driving behaviors of novice drivers in the simula
作者: 萬靈丹    時(shí)間: 2025-3-22 05:13
Introduction: Purpose and Summary, unlikely lead to an error. The likelihood is evaluated using . defined by the user. We enhanced the search engine of JPF to implement DFHS and LTL search. Experimental results show that DFHS performs better than current algorithms for both safety and LTL properties of programs in many cases.
作者: Allodynia    時(shí)間: 2025-3-22 10:27
Derrida, Rushdie and the Ethics of Mortalityhability automaton (RA), that relates any of its transitions to a path of the TPTIO. The RA computation takes the TPTIO transitions as a coverage criterion. The transitions of the RA, thus the paths of the TPTIO are used for generating test cases that aim at covering the reachable locations and transitions of the TPAIO.
作者: artless    時(shí)間: 2025-3-22 16:15

作者: artless    時(shí)間: 2025-3-22 19:01
Depth-First Heuristic Search for Software Model Checking, unlikely lead to an error. The likelihood is evaluated using . defined by the user. We enhanced the search engine of JPF to implement DFHS and LTL search. Experimental results show that DFHS performs better than current algorithms for both safety and LTL properties of programs in many cases.
作者: Dri727    時(shí)間: 2025-3-23 01:02

作者: 暫時(shí)休息    時(shí)間: 2025-3-23 03:01
Instruction Level Loop De-optimization,n TIC6x, a digital signal processor with a compiler supporting instruction level parallelism. The algorithms developed in this paper should help interested readers gain insight especially in the difficult tasks of loop rerolling and software de-pipelining, the necessary steps to decompile loops at instruction level.
作者: 流出    時(shí)間: 2025-3-23 08:09

作者: 壓碎    時(shí)間: 2025-3-23 10:34
Architecture for Intelligent Transportation System Based in a General Traffic Ontology,llows interoperability is needed. In this paper an ontology-based system to provide roadside assistance is proposed, providing drivers making decisions in different situations, taking into account information on different traffic-related elements such as routes, traffic signs, traffic regulations and weather elements.
作者: Asperity    時(shí)間: 2025-3-23 16:11

作者: 裙帶關(guān)系    時(shí)間: 2025-3-23 21:19

作者: maculated    時(shí)間: 2025-3-23 22:11

作者: WAG    時(shí)間: 2025-3-24 04:51
Conference proceedings 2016hange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them..
作者: GOAD    時(shí)間: 2025-3-24 06:33
Ani L. Katchova Ph.D.,Timothy A. Woods Ph.D.ional system. For this purposes, this paper adopts the Common Vulnerability Scoring System (CVSS) and proposes a Meta model for security measure in Web ETL processes enabling security manager to asset anticipated vulnerabilities.
作者: Cognizance    時(shí)間: 2025-3-24 10:56

作者: 籠子    時(shí)間: 2025-3-24 17:15

作者: SOB    時(shí)間: 2025-3-24 21:54
https://doi.org/10.1057/9781137001931utomatically adapted to the learner’s profiles that evolve over time and are syntactically, semantically and structurally heterogeneous. An experimental study shows the effectiveness of our architecture.
作者: 襲擊    時(shí)間: 2025-3-25 00:51
The Unbearable Lightness of Actsork Facebook. It consists in the extraction of opinion data on Facebook pages (e.g. comments), its pre-processing, sentiment analysis and classification, reformatting and loading into the Data WeBhouse (DWB).
作者: HALL    時(shí)間: 2025-3-25 05:34

作者: ectropion    時(shí)間: 2025-3-25 08:31

作者: 不幸的人    時(shí)間: 2025-3-25 15:27

作者: Throttle    時(shí)間: 2025-3-25 15:49
,A Novel Architecture for Learner’s Profiles Interoperability,utomatically adapted to the learner’s profiles that evolve over time and are syntactically, semantically and structurally heterogeneous. An experimental study shows the effectiveness of our architecture.
作者: Entrancing    時(shí)間: 2025-3-25 23:56
ETL Design Toward Social Network Opinion Analysis,ork Facebook. It consists in the extraction of opinion data on Facebook pages (e.g. comments), its pre-processing, sentiment analysis and classification, reformatting and loading into the Data WeBhouse (DWB).
作者: probate    時(shí)間: 2025-3-26 03:54
1860-949X n Science ICIS 2015 held June 29 – July 1, 2015 in Las Vegas.This edited book presents scientific results of the 14.th. IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bri
作者: nonsensical    時(shí)間: 2025-3-26 07:39

作者: lesion    時(shí)間: 2025-3-26 11:33
https://doi.org/10.1057/9780230371125se to apply an approach we developed in a previous work to test the robustness of a very restrictive and important security property, which is non-interference. We consider the case of distributed component-based systems, where avoiding interference can represent a real challenge, especially when exchanging messages between heterogeneous entities.
作者: nonradioactive    時(shí)間: 2025-3-26 13:34

作者: 捐助    時(shí)間: 2025-3-26 19:56

作者: misshapen    時(shí)間: 2025-3-26 22:11

作者: investigate    時(shí)間: 2025-3-27 01:07
Yasha Rohwer Ph.D.,Randall Westgren Ph.D.llows interoperability is needed. In this paper an ontology-based system to provide roadside assistance is proposed, providing drivers making decisions in different situations, taking into account information on different traffic-related elements such as routes, traffic signs, traffic regulations and weather elements.
作者: PACT    時(shí)間: 2025-3-27 07:52
Charles P. Webel,John A. Arnaldie safe region, query result remains unchanged and a request for recomputation of query does not have to be made to the server. This significantly improves the performance of algorithm because the expensive recomputation is not required as long as the query and data objects are within their respective safe exit points.
作者: 逃避責(zé)任    時(shí)間: 2025-3-27 10:43
Acts of Omission in the “War on Terrorism”st and effect sizes. These results indicate that the methods SVM same # (1) and SVM Ward (3) can improve the accuracy of estimating the amount of effort in terms of the mean percentage of predictions that fall within 25?% of the actual value.
作者: 同音    時(shí)間: 2025-3-27 16:14
https://doi.org/10.1057/9780230371125eria not used previously such as Davies Bouldin index, and Silhouette index. The multi-SOM algorithm is compared to k-means and Birch methods. Results developed with R language show that it is more efficient than classical clustering methods.
作者: 最小    時(shí)間: 2025-3-27 20:53
Conference proceedings 2016as held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exc
作者: Hectic    時(shí)間: 2025-3-28 01:17
Roger LeeRecent research in Computer and Information Science.Edited outcome of the 14th ACIS/IEEE International Conference on Computer and Information Science ICIS 2015 held June 29 – July 1, 2015 in Las Vegas
作者: ALE    時(shí)間: 2025-3-28 02:45
Studies in Computational Intelligencehttp://image.papertrans.cn/c/image/234366.jpg
作者: 煉油廠    時(shí)間: 2025-3-28 08:16
Computer and Information Science 2015978-3-319-23467-0Series ISSN 1860-949X Series E-ISSN 1860-9503
作者: 嚴(yán)峻考驗(yàn)    時(shí)間: 2025-3-28 10:25
The Fallacy of “Competition” in Agriculture mobile phones, and digital cameras or in large scale servers. Reasons of so much popularity of flash memory are its characteristics; low power consumption, non-volatility, high performance, shock resistance and portability. However due to some of its hardware characteristics, a software layer calle
作者: 試驗(yàn)    時(shí)間: 2025-3-28 16:50
Ani L. Katchova Ph.D.,Timothy A. Woods Ph.D.ey also have to patch up the increasing number of software security vulnerabilities. They need to perform a risk evaluation in order to determine the priority of patching-up vulnerabilities. The use of quantitative security assessment methods enables efficient prioritization of security efforts and
作者: spinal-stenosis    時(shí)間: 2025-3-28 20:20

作者: 死貓他燒焦    時(shí)間: 2025-3-29 01:11

作者: EVICT    時(shí)間: 2025-3-29 06:30
Introduction: Purpose and Summary,g, and discovery capabilities. In these applications, the key relevant feature of the technique is the ability to compare objects (such as documents and queries) based on the semantics of their constituents. These comparisons are carried out in a high-dimensional vector space. That space is generate
作者: 輕浮女    時(shí)間: 2025-3-29 11:10

作者: Omnipotent    時(shí)間: 2025-3-29 15:17

作者: Popcorn    時(shí)間: 2025-3-29 18:53

作者: LINE    時(shí)間: 2025-3-29 20:57

作者: ineluctable    時(shí)間: 2025-3-30 03:19

作者: 青少年    時(shí)間: 2025-3-30 05:08
Acts of Omission in the “War on Terrorism” to define the bins: (1) the same amount of data in a bin (SVM same #), (2) the same range for each bin (SVM same range) and (3) the bins made by Ward’s method (SVM Ward). We carry out evaluation experiments to compare the accuracy of the proposed SVM models with that of the .-SVR using Welch’s .-te
作者: scrape    時(shí)間: 2025-3-30 12:15
https://doi.org/10.1057/9780230371125rove the testing process of security properties, formal methods of specification are developed to automatically generate tests. In this work, we propose to apply an approach we developed in a previous work to test the robustness of a very restrictive and important security property, which is non-int
作者: AVID    時(shí)間: 2025-3-30 13:50

作者: Charitable    時(shí)間: 2025-3-30 17:40

作者: groggy    時(shí)間: 2025-3-30 22:46

作者: Morsel    時(shí)間: 2025-3-31 04:36

作者: Vulnerary    時(shí)間: 2025-3-31 08:09
https://doi.org/10.1007/978-3-319-23467-014th ACIS/IEEE; 14th ICIS; Computational Intelligence; Computer Science; ICIS; ICIS 2015; Information Scie
作者: 拋物線    時(shí)間: 2025-3-31 12:08
978-3-319-37379-9Springer International Publishing Switzerland 2016
作者: 阻礙    時(shí)間: 2025-3-31 15:04
,: States Aware Fully Associative FTL for Multitasking Environment, mobile phones, and digital cameras or in large scale servers. Reasons of so much popularity of flash memory are its characteristics; low power consumption, non-volatility, high performance, shock resistance and portability. However due to some of its hardware characteristics, a software layer calle
作者: 我要威脅    時(shí)間: 2025-3-31 18:29
Security Measures for Web ETL Processes,ey also have to patch up the increasing number of software security vulnerabilities. They need to perform a risk evaluation in order to determine the priority of patching-up vulnerabilities. The use of quantitative security assessment methods enables efficient prioritization of security efforts and
作者: 一個(gè)攪動(dòng)不安    時(shí)間: 2025-3-31 22:52
Automated Negotiating Agent Based on Evolutionary Stable Strategies, agent that is based on the expected utility value at the equilibrium point of an evolutionary stable strategy (ESS). Furthermore, we show the evaluation results of negotiating simulations, and demonstrate that our agent outperforms existing agents under the negotiation rules of the 2014 Internation
作者: 柔軟    時(shí)間: 2025-4-1 04:46
Architecture for Intelligent Transportation System Based in a General Traffic Ontology,portation. A crucial element for the success of these systems is that vehicles can exchange information not only among themselves but with other elements in the road infrastructure through different applications. For the success of this exchange of information, a common framework of knowledge that a




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
上犹县| 梓潼县| 田东县| 丰宁| 志丹县| 汝州市| 家居| 杨浦区| 襄汾县| 大名县| 车险| 南京市| 长白| 青神县| 乐安县| 石台县| 永吉县| 白玉县| 西丰县| 弥渡县| 公主岭市| 桐庐县| 元江| 浑源县| 江油市| 田林县| 博乐市| 台前县| 温泉县| 二连浩特市| 洪湖市| 咸阳市| 盘山县| 蚌埠市| 鹿邑县| 古浪县| 黑龙江省| 珠海市| 蒲城县| 邵阳县| 金昌市|