派博傳思國際中心

標題: Titlebook: Information Computing and Applications; Third International Baoxiang Liu,Maode Ma,Jincai Chang Conference proceedings 2012 Springer-Verlag [打印本頁]

作者: 閃爍    時間: 2025-3-21 18:30
書目名稱Information Computing and Applications影響因子(影響力)




書目名稱Information Computing and Applications影響因子(影響力)學科排名




書目名稱Information Computing and Applications網絡公開度




書目名稱Information Computing and Applications網絡公開度學科排名




書目名稱Information Computing and Applications被引頻次




書目名稱Information Computing and Applications被引頻次學科排名




書目名稱Information Computing and Applications年度引用




書目名稱Information Computing and Applications年度引用學科排名




書目名稱Information Computing and Applications讀者反饋




書目名稱Information Computing and Applications讀者反饋學科排名





作者: arthroscopy    時間: 2025-3-21 23:40

作者: Absenteeism    時間: 2025-3-22 02:22

作者: 激怒某人    時間: 2025-3-22 04:45
Information Computing and Applications978-3-642-34062-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 猛烈責罵    時間: 2025-3-22 09:10
Baoxiang Liu,Maode Ma,Jincai ChangUp-to-date results.Fast track conference proceedings.State-of-the-art report
作者: 親屬    時間: 2025-3-22 16:00

作者: FLAGR    時間: 2025-3-22 17:53

作者: Picks-Disease    時間: 2025-3-22 23:05

作者: guzzle    時間: 2025-3-23 04:49

作者: 合適    時間: 2025-3-23 05:48
Shan Jianfang,Liu Zongtiand, due to worldwide recession, rising fuel prices, and the onset of the Gulf War followed, further contributing to the downsizing of the aerospace workforce. But it is important to note that declining employment in aerospace manufacture during the 1990s occurred alongside a narrowing of the trade su
作者: 統(tǒng)治人類    時間: 2025-3-23 18:31

作者: 知識分子    時間: 2025-3-23 23:57

作者: 聯(lián)邦    時間: 2025-3-24 02:56

作者: 虛情假意    時間: 2025-3-24 08:50

作者: figment    時間: 2025-3-24 11:59
Junling Ren,Li Zhangand disruptive. This chapter suggests that the recognitions and perceptions of long-term environmental change are viewed differently by those who understand the corporation as either an economic or a political entity. It recommends that successfully recognizing and confronting long-term change requi
作者: 傻瓜    時間: 2025-3-24 18:19
Wei Zhu,Ping Sun,Ying nan Ma,Rui Song,Shi wei He,Ke Hui Liuforts to improve non-financial performance. This chapter analyses the non-financial behaviour of oil and gas companies in Central and Eastern Europe. The chosen research method was the content analysis of the sustainability, CSR or non-financial performance reports as well as the content of the comp
作者: defeatist    時間: 2025-3-24 23:03

作者: Expiration    時間: 2025-3-25 01:05

作者: BOOM    時間: 2025-3-25 04:40
Kaihua Wang,Wenxiang Zhang,Zhanji Guiapitel IV eine detaillierte Analyse der materiellen Regelungsmechanismen der Organüberwachung von japanischen Aktiengesellschaften sowie deren konzeptionelle Bewertung anhand der eingeführten Elementarfaktoren. Zum Abschlu? sind dann im Kapitel V noch einige wesentliche Reformans?tze zu diskutieren,
作者: Adulate    時間: 2025-3-25 08:21

作者: Feckless    時間: 2025-3-25 12:29
Ying Chen,Shaobai Zhangch in Kontinentaleuropa ist die Corporate Governance der Unternehmung sp?testens seit Beginn der neunziger Jahre zunehmend in den Fokus der ?ffentlichen Diskussion gerückt und hat mit der Verfassung des deutschen CorporateGovernance-Kodexes im Jahr 2002 bislang ihren H?hepunkt erreicht.
作者: 反復拉緊    時間: 2025-3-25 18:19
Ruei-Chang Chen,Shih-Fong Lee,Yeong-Chau Kuoch in Kontinentaleuropa ist die Corporate Governance der Unternehmung sp?testens seit Beginn der neunziger Jahre zunehmend in den Fokus der ?ffentlichen Diskussion gerückt und hat mit der Verfassung des deutschen CorporateGovernance-Kodexes im Jahr 2002 bislang ihren H?hepunkt erreicht.
作者: 偶像    時間: 2025-3-25 23:35
Guan Wei,Lv Yuanhaience identified by Enlightenment philosophers. ‘Whatever the origins of such visions the conception itself rests on the conviction that there exists true, immutable, universal, timeless objective values valid for all men, everywhere, at all times; that these values are at least in principle realisab
作者: 羊欄    時間: 2025-3-26 01:27
A Novel Event Network Matching Algorithmnt matching based on maximum similarity priority, relation matching based on isotropic-relational-distance matrix, and event network matching by integrating event matching and relation matching. The paper’s experimental results show that the method is feasible and reasonable.
作者: 枕墊    時間: 2025-3-26 06:17
Static Patterns Matching for High Speed Networksing but also provide the basic of reconfigurable implementation. Experimental results show that the realization is able to reach the theoretical bandwidth multiplying clock frequency by input data width.
作者: Axillary    時間: 2025-3-26 12:13
Webpage Information Hiding Algorithm Based on Integration of Tags and Data data to implement information hiding was established, and accordingly a hiding information algorithm was proposed. This algorithm improves the hiding capacity of the webpage information hiding, and also an attempt is made for the method of taking the webpage as the channels to transmit the secret information.
作者: 討好女人    時間: 2025-3-26 12:46
Dynamics and Simulations of Multi-species Competition-Predator System with Impulsively exponential stability of the system by using the comparison principle and the Lyapunov method. In addition, some numerical simulation shows that our models can occur in many forms of complexities including periodic oscillation and strange chaotic strange attractor.
作者: BUMP    時間: 2025-3-26 18:37

作者: 安裝    時間: 2025-3-27 00:05
Conference proceedings 2012opical sections on internet computing and applications, multimedia networking and computing, intelligent computing and applications, computational statistics and applications, cloud and evolutionary computing, computer engineering and applications, knowledge management and applications, communication technology and applications.
作者: Mirage    時間: 2025-3-27 04:49
A Password Authentication Scheme against Smart Card Security Breach table should not be involved in a good password authentication scheme with smart cards. In this paper, we propose a password authentication scheme against smart card security breach and without maintaining verification tables.
作者: 新奇    時間: 2025-3-27 09:16
Research on the Distal Supervised Learning Model of Speech Inversioneech signal is parameterized as acoustic parameters (APs) were compared with as mel-frequency cepstral coefficients (MFCCs). The results showed that distal supervised learning has a good estimation performance for tract variables.
作者: Recess    時間: 2025-3-27 12:33

作者: endocardium    時間: 2025-3-27 15:06

作者: 寒冷    時間: 2025-3-27 20:22
DFP-Growth: An Efficient Algorithm for Mining Frequent Patterns in Dynamic Databaserowth (DFP-Growth) to mine the frequent patterns from dynamic database. Experiments with three UCI datasets show that the DFP-Growth is up to 1.4 times faster than benchmarked FP-Growth, thus verify it efficiencies.
作者: offense    時間: 2025-3-28 01:48
Research on Purified Internet Environment for College Students impact and puts forward some feasible measures to regulate the internet behavior of students and provide a healthy and safe internet environment for students to fully utilize favorable opportunity and convenient condition brought about by network.
作者: Condescending    時間: 2025-3-28 03:38
0302-9743 ia networking and computing, intelligent computing and applications, computational statistics and applications, cloud and evolutionary computing, computer engineering and applications, knowledge management and applications, communication technology and applications.978-3-642-34061-1978-3-642-34062-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 礦石    時間: 2025-3-28 08:15

作者: Aggrandize    時間: 2025-3-28 10:52
Analysis on Key Nodes Behavior for Complex Software Network plays an important role in execution process of software system and the execution network can be divided into several levels, which has an important significance for maintenance and quality assurance for software.
作者: 殺子女者    時間: 2025-3-28 18:39
Location Method of Underground Pipeline Monitoring Point Based on Cavity Detectiontion around the underground pipeline, to make full use of the present resources, and to realize dynamic monitoring on the cavity evolution around the underground pipeline, and to predict and prevent major underground pipeline accidents effectively and scientificly.
作者: Gratuitous    時間: 2025-3-28 19:58

作者: Spinal-Tap    時間: 2025-3-29 00:31

作者: 紀念    時間: 2025-3-29 05:27
Research on Image Retrieval Based on Color and Shape Featuresonable range, the accuracy is lowered appropriately and the query speed is improved significantly. Experiments in traffic signs image library, show that the proposed method of recognition accuracy is better than traditional methods, and efficiency has improved.
作者: 愛社交    時間: 2025-3-29 09:51

作者: 憤世嫉俗者    時間: 2025-3-29 11:35
Conference proceedings 2012engde, China, in September 2012. The 100 revised full papers were carefully reviewed and selected from 1089 submissions. The papers are organized in topical sections on internet computing and applications, multimedia networking and computing, intelligent computing and applications, computational sta
作者: 平常    時間: 2025-3-29 18:58
A Novel Event Network Matching Algorithmion, which can provide support for text semantic information processing. The paper proposes a new three-step matching algorithm for event network: event matching based on maximum similarity priority, relation matching based on isotropic-relational-distance matrix, and event network matching by integ
作者: 現(xiàn)任者    時間: 2025-3-29 22:19
Static Patterns Matching for High Speed Networksf static pattern matching, which can process in parallel by using the matrix-and algorithm. This method can not only reduce the complexity of programming but also provide the basic of reconfigurable implementation. Experimental results show that the realization is able to reach the theoretical bandw
作者: Accrue    時間: 2025-3-30 00:49

作者: paleolithic    時間: 2025-3-30 07:53

作者: 罐里有戒指    時間: 2025-3-30 11:08

作者: custody    時間: 2025-3-30 13:56
A Vulnerability Attack Graph Generation Method Based on Scriptsfficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technolo
作者: 輕彈    時間: 2025-3-30 18:28

作者: 倫理學    時間: 2025-3-30 22:34
Analysis on Key Nodes Behavior for Complex Software Networkifference from previous work which based on structure network built on method association of software, we explore the topological characteristics of software execution behavior based on complex network and model the software execution network based on method invocation sequences. Taking typical open
作者: DOLT    時間: 2025-3-31 03:50
Webpage Information Hiding Algorithm Based on Integration of Tags and Datazed. Then according to the structural characteristics that the web was composed of the tags and data, the integration strategy using both the tags and data to implement information hiding was established, and accordingly a hiding information algorithm was proposed. This algorithm improves the hiding
作者: 懶洋洋    時間: 2025-3-31 07:53

作者: 被告    時間: 2025-3-31 10:55
Research on Purified Internet Environment for College Studentsood command of internet application and overall utilization of internet resources. On the same time the internet society has produced negative impacts on the college students. This article analyses the advantages and disadvantages of internet affecting college students in China, especially the moral
作者: 嚴厲譴責    時間: 2025-3-31 15:11
A Mobile-Certificate Security Method of Satellite-Earth Integration Networksation Network. A mobile-certificate authority Method based on PKI (Public Key Infrastructure) is proposed in this paper. Based on the RSA algorithm, the method realizes the anonymous authentication between neighboring nodes. It distributes the private key component to n nodes according to the thresh
作者: BET    時間: 2025-3-31 21:20

作者: 掙扎    時間: 2025-3-31 22:02

作者: heart-murmur    時間: 2025-4-1 02:34

作者: 最初    時間: 2025-4-1 08:09

作者: 機構    時間: 2025-4-1 12:58

作者: Urologist    時間: 2025-4-1 16:44

作者: 令人發(fā)膩    時間: 2025-4-1 22:09

作者: Accede    時間: 2025-4-2 00:42

作者: heirloom    時間: 2025-4-2 03:38

作者: 官僚統(tǒng)治    時間: 2025-4-2 07:27
Kunpeng Jiang,Huifang Guo,Shengping Zhu,Julong Lan of the ‘Rhenish system of capitalism’ to deliver economic performance without sacrificing social cohesion was running at an all-time high. From the early 1990s, however, as Germany wrestled with the challenges and costs of reunification, and then plunged into its worst recession since World War II,




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
环江| 雷山县| 团风县| 襄垣县| 剑川县| 临西县| 皋兰县| 九龙县| 浦东新区| 鄂托克旗| 漳浦县| 宁城县| 宁都县| 防城港市| 彭阳县| 镇远县| 文登市| 苏州市| 灵寿县| 合川市| 南乐县| 黄山市| 周至县| 濮阳市| 格尔木市| 商城县| 汉中市| 彰武县| 襄城县| 隆回县| 石嘴山市| 建阳市| 平武县| 津南区| 肥乡县| 分宜县| 黄石市| 清原| 宁河县| 宝坻区| 墨江|