標題: Titlebook: E-Business and Telecommunication Networks; Third International Joaquim Filipe,Mohammad S. Obaidat Conference proceedings 2008 Springer-Ver [打印本頁] 作者: exposulate 時間: 2025-3-21 17:03
書目名稱E-Business and Telecommunication Networks影響因子(影響力)
書目名稱E-Business and Telecommunication Networks影響因子(影響力)學科排名
書目名稱E-Business and Telecommunication Networks網(wǎng)絡(luò)公開度
書目名稱E-Business and Telecommunication Networks網(wǎng)絡(luò)公開度學科排名
書目名稱E-Business and Telecommunication Networks被引頻次
書目名稱E-Business and Telecommunication Networks被引頻次學科排名
書目名稱E-Business and Telecommunication Networks年度引用
書目名稱E-Business and Telecommunication Networks年度引用學科排名
書目名稱E-Business and Telecommunication Networks讀者反饋
書目名稱E-Business and Telecommunication Networks讀者反饋學科排名
作者: Overdose 時間: 2025-3-22 00:03 作者: 移動 時間: 2025-3-22 02:27
https://doi.org/10.1007/978-3-0348-7836-4ements) are essential because they grant guarantees about how a service must be provided or consumed. We define service trading as the process of locating, selecting, negotiating, and creating SLAs. Although automating the service trading process is a key characteristic of a real-time enterprise, to作者: faddish 時間: 2025-3-22 05:18
Inhibition of carotenoid biosynthesis,ess control on all grid elements. The overhead generated by such an approach may however limit the advantages of grid computing systems; particularly, when the network experiences different types of variations. This paper examines the integration of the notion of adaptive grid service along with sec作者: Etching 時間: 2025-3-22 08:46
Carotenoids as Antidiabetic Agents,Auctioneer is typically paid a commission on the number of bids matched and the volume of quantity traded. Previous algorithms have concentrated on price issues. This paper presents several market clearing algorithms that focus solely on allocating quantity among matching buy and sell bids. The goal作者: Distribution 時間: 2025-3-22 14:58 作者: Distribution 時間: 2025-3-22 17:58 作者: ingenue 時間: 2025-3-22 23:55
Carotisstenosen und -verschlüssed its behaviors, and then it focuses on the modification of that trust function by considering diverse scenarios. After that, the paper proposes a new approach with a specific functionality. The main goals are to support good agents strongly, block bad ones and create opportunities for newcomers or 作者: 修正案 時間: 2025-3-23 04:52 作者: vitreous-humor 時間: 2025-3-23 09:37
A. E. Freeland,M. A. Tucci,V. Sudryptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trad作者: 含糊 時間: 2025-3-23 13:13
Clinical Presentations and Diagnosis,ctions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical作者: 抵制 時間: 2025-3-23 15:10 作者: 大量殺死 時間: 2025-3-23 18:06 作者: 維持 時間: 2025-3-24 00:32
Technical Drawing and Geometry,rol policy prescribed by the traditional separation kernel paradigm, we describe an orthogonal, finer-grained flow control policy by extending the protection of elements to subjects and resources, as well as blocks, within a partitioned system. We show how least privilege applied to the actions of s作者: 良心 時間: 2025-3-24 05:02 作者: cacophony 時間: 2025-3-24 09:42 作者: 男生戴手銬 時間: 2025-3-24 13:57 作者: 吞噬 時間: 2025-3-24 17:07
Jean-Bernard Layan,Mihoub Mezouaghilculate the network resources to be allocated along the nodes belonging to its corresponding Label-Switched-Path (LSP)..This paper provides an analytical model to estimate the lower limit of the bandwidth that needs to be allocated to a TT loaded with a heterogeneous set of voice connections. Our mo作者: jet-lag 時間: 2025-3-24 22:02 作者: Employee 時間: 2025-3-25 02:55 作者: Infuriate 時間: 2025-3-25 06:37
Towards Automated Service Tradingt are necessary to carry out this automated service trading, we motivate and introduce the idea of trading protocols, and we define the elements that are necessary to support an automated decision-making in service trading.作者: jet-lag 時間: 2025-3-25 09:38 作者: 保守 時間: 2025-3-25 12:32 作者: Additive 時間: 2025-3-25 18:13
Secure Online English Auctions by separate companies to ensure anonymity and fairness. Our scheme solves the problems of the existing English auction schemes and has following characteristics: ., ., ., ., . and .. Our scheme has comparable efficiency to the existing schemes for the enhanced security and privacy it provides.作者: 貞潔 時間: 2025-3-25 22:55 作者: 縮影 時間: 2025-3-26 02:31
Design and Implementation of Video on Demand Services over a Peer-to-Peer Multioverlay Networkllow peers to search for a specific media object over the entire network efficiently, and stream the media object from a group of the peers. We employ a layered architecture consisting of four major tiers: Peer Discovery Layer, Content Lookup Layer, Media Streaming Layer, and Playback Control Layer.作者: unstable-angina 時間: 2025-3-26 05:10
Conference proceedings 2008l quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-Business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy ex作者: Abominate 時間: 2025-3-26 11:26 作者: overrule 時間: 2025-3-26 16:26 作者: BARK 時間: 2025-3-26 17:19
Arthroscopic Criteria to Date Traumasfic redirection attack, based on spoofed ARP packets, in switched LAN networks are discussed. Our work is concerned with the detection of malicious network traffic redirection attack, at the Data Link layer. Other works proposed protection mechanisms against this attack, but at the Application layer作者: Nutrient 時間: 2025-3-26 23:08
Clinical examination of the wrist by separate companies to ensure anonymity and fairness. Our scheme solves the problems of the existing English auction schemes and has following characteristics: ., ., ., ., . and .. Our scheme has comparable efficiency to the existing schemes for the enhanced security and privacy it provides.作者: institute 時間: 2025-3-27 02:28
https://doi.org/10.1007/978-981-99-9046-7esults show that the bit rate needed to transmit the adapted bitstreams can be reduced significantly. Especially in the case of a static camera and a fixed background, this bit rate reduction has very little impact on the visual quality. Another advantage of the adaptation process is the fact that t作者: FLIT 時間: 2025-3-27 07:30
Muriel Beser Hugosson,Staffan Algersllow peers to search for a specific media object over the entire network efficiently, and stream the media object from a group of the peers. We employ a layered architecture consisting of four major tiers: Peer Discovery Layer, Content Lookup Layer, Media Streaming Layer, and Playback Control Layer.作者: 枯萎將要 時間: 2025-3-27 12:16 作者: 激勵 時間: 2025-3-27 16:22 作者: enumaerate 時間: 2025-3-27 19:56 作者: 殺人 時間: 2025-3-27 23:52 作者: graphy 時間: 2025-3-28 02:23 作者: 相符 時間: 2025-3-28 07:28 作者: 輕率的你 時間: 2025-3-28 11:48 作者: 休閑 時間: 2025-3-28 17:44 作者: opportune 時間: 2025-3-28 21:34
Efficient All-or-Nothing Encryption Using CTR Moderyptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trad作者: leniency 時間: 2025-3-29 02:59 作者: circuit 時間: 2025-3-29 04:04
Secure Online English Auctions items,?etc.). Online auctions such as those used by eBay are based on a type of auction referred to as an English auction. Dispite the English auction being the most popular type of auction, it has received less security coverage than other types of auctions (e.g.,?sealed-bid auctions). An existing作者: GAVEL 時間: 2025-3-29 09:51 作者: 樹上結(jié)蜜糖 時間: 2025-3-29 12:24
Least Privilege in Separation Kernelsrol policy prescribed by the traditional separation kernel paradigm, we describe an orthogonal, finer-grained flow control policy by extending the protection of elements to subjects and resources, as well as blocks, within a partitioned system. We show how least privilege applied to the actions of s作者: 使出神 時間: 2025-3-29 16:19 作者: obnoxious 時間: 2025-3-29 20:25 作者: 獎牌 時間: 2025-3-30 03:38
Design and Implementation of Video on Demand Services over a Peer-to-Peer Multioverlay Networkn to reduce the burden on central video servers with the single point of failure. Conventional P2P techniques for realizing VoD services only consider data between active peers in the same VoD session. They never consider those inactive peers that have left the session but may still hold partial med作者: 馬賽克 時間: 2025-3-30 04:49
Traffic Trunk Parameters for Voice Transport over MPLSlculate the network resources to be allocated along the nodes belonging to its corresponding Label-Switched-Path (LSP)..This paper provides an analytical model to estimate the lower limit of the bandwidth that needs to be allocated to a TT loaded with a heterogeneous set of voice connections. Our mo作者: Prologue 時間: 2025-3-30 11:37 作者: enterprise 時間: 2025-3-30 16:25
Reputation Management Service for Peer-to-Peer Enterprise Architectureslized trust and security management able to cope with several threats. The underlying analytical model is introduced and discussed, together with a simulation-based evaluation of the robustness against malicious negative feedbacks.作者: Mortal 時間: 2025-3-30 19:05 作者: 鋼筆尖 時間: 2025-3-30 22:45
https://doi.org/10.1007/978-3-030-41138-1and comprehensively explain the scaling observed in social networks. In the presented study, a novel system-theoretic modeling approach is proposed and successfully applied to determine important characteristics of a communication network and to analyze consumer behavior on the WWW.作者: 夜晚 時間: 2025-3-31 04:47
https://doi.org/10.1007/978-1-349-02727-9anaged by system administrators. Therefore, in this paper we present an user friendly approach to policy specification, based on the use of high level templates and common desktop applications. These templates are easily built from XML schemas, and once they have been filled, a XACML policy is automatically generated using a XML transformation.作者: Ruptured-Disk 時間: 2025-3-31 07:41
Modeling the Dynamics of Social Networksand comprehensively explain the scaling observed in social networks. In the presented study, a novel system-theoretic modeling approach is proposed and successfully applied to determine important characteristics of a communication network and to analyze consumer behavior on the WWW.作者: Defiance 時間: 2025-3-31 10:10 作者: BOLT 時間: 2025-3-31 16:11