標題: Titlebook: Information Computing and Applications; Third International Baoxiang Liu,Maode Ma,Jincai Chang Conference proceedings 2012 Springer-Verlag [打印本頁] 作者: 閃爍 時間: 2025-3-21 18:30
書目名稱Information Computing and Applications影響因子(影響力)
書目名稱Information Computing and Applications影響因子(影響力)學科排名
書目名稱Information Computing and Applications網絡公開度
書目名稱Information Computing and Applications網絡公開度學科排名
書目名稱Information Computing and Applications被引頻次
書目名稱Information Computing and Applications被引頻次學科排名
書目名稱Information Computing and Applications年度引用
書目名稱Information Computing and Applications年度引用學科排名
書目名稱Information Computing and Applications讀者反饋
書目名稱Information Computing and Applications讀者反饋學科排名
作者: arthroscopy 時間: 2025-3-21 23:40 作者: Absenteeism 時間: 2025-3-22 02:22 作者: 激怒某人 時間: 2025-3-22 04:45
Information Computing and Applications978-3-642-34062-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 猛烈責罵 時間: 2025-3-22 09:10
Baoxiang Liu,Maode Ma,Jincai ChangUp-to-date results.Fast track conference proceedings.State-of-the-art report作者: 親屬 時間: 2025-3-22 16:00 作者: FLAGR 時間: 2025-3-22 17:53 作者: Picks-Disease 時間: 2025-3-22 23:05 作者: guzzle 時間: 2025-3-23 04:49 作者: 合適 時間: 2025-3-23 05:48
Shan Jianfang,Liu Zongtiand, due to worldwide recession, rising fuel prices, and the onset of the Gulf War followed, further contributing to the downsizing of the aerospace workforce. But it is important to note that declining employment in aerospace manufacture during the 1990s occurred alongside a narrowing of the trade su作者: 統(tǒng)治人類 時間: 2025-3-23 18:31 作者: 知識分子 時間: 2025-3-23 23:57 作者: 聯(lián)邦 時間: 2025-3-24 02:56 作者: 虛情假意 時間: 2025-3-24 08:50 作者: figment 時間: 2025-3-24 11:59
Junling Ren,Li Zhangand disruptive. This chapter suggests that the recognitions and perceptions of long-term environmental change are viewed differently by those who understand the corporation as either an economic or a political entity. It recommends that successfully recognizing and confronting long-term change requi作者: 傻瓜 時間: 2025-3-24 18:19
Wei Zhu,Ping Sun,Ying nan Ma,Rui Song,Shi wei He,Ke Hui Liuforts to improve non-financial performance. This chapter analyses the non-financial behaviour of oil and gas companies in Central and Eastern Europe. The chosen research method was the content analysis of the sustainability, CSR or non-financial performance reports as well as the content of the comp作者: defeatist 時間: 2025-3-24 23:03 作者: Expiration 時間: 2025-3-25 01:05 作者: BOOM 時間: 2025-3-25 04:40
Kaihua Wang,Wenxiang Zhang,Zhanji Guiapitel IV eine detaillierte Analyse der materiellen Regelungsmechanismen der Organüberwachung von japanischen Aktiengesellschaften sowie deren konzeptionelle Bewertung anhand der eingeführten Elementarfaktoren. Zum Abschlu? sind dann im Kapitel V noch einige wesentliche Reformans?tze zu diskutieren,作者: Adulate 時間: 2025-3-25 08:21 作者: Feckless 時間: 2025-3-25 12:29
Ying Chen,Shaobai Zhangch in Kontinentaleuropa ist die Corporate Governance der Unternehmung sp?testens seit Beginn der neunziger Jahre zunehmend in den Fokus der ?ffentlichen Diskussion gerückt und hat mit der Verfassung des deutschen CorporateGovernance-Kodexes im Jahr 2002 bislang ihren H?hepunkt erreicht.作者: 反復拉緊 時間: 2025-3-25 18:19
Ruei-Chang Chen,Shih-Fong Lee,Yeong-Chau Kuoch in Kontinentaleuropa ist die Corporate Governance der Unternehmung sp?testens seit Beginn der neunziger Jahre zunehmend in den Fokus der ?ffentlichen Diskussion gerückt und hat mit der Verfassung des deutschen CorporateGovernance-Kodexes im Jahr 2002 bislang ihren H?hepunkt erreicht.作者: 偶像 時間: 2025-3-25 23:35
Guan Wei,Lv Yuanhaience identified by Enlightenment philosophers. ‘Whatever the origins of such visions the conception itself rests on the conviction that there exists true, immutable, universal, timeless objective values valid for all men, everywhere, at all times; that these values are at least in principle realisab作者: 羊欄 時間: 2025-3-26 01:27
A Novel Event Network Matching Algorithmnt matching based on maximum similarity priority, relation matching based on isotropic-relational-distance matrix, and event network matching by integrating event matching and relation matching. The paper’s experimental results show that the method is feasible and reasonable.作者: 枕墊 時間: 2025-3-26 06:17
Static Patterns Matching for High Speed Networksing but also provide the basic of reconfigurable implementation. Experimental results show that the realization is able to reach the theoretical bandwidth multiplying clock frequency by input data width.作者: Axillary 時間: 2025-3-26 12:13
Webpage Information Hiding Algorithm Based on Integration of Tags and Data data to implement information hiding was established, and accordingly a hiding information algorithm was proposed. This algorithm improves the hiding capacity of the webpage information hiding, and also an attempt is made for the method of taking the webpage as the channels to transmit the secret information.作者: 討好女人 時間: 2025-3-26 12:46
Dynamics and Simulations of Multi-species Competition-Predator System with Impulsively exponential stability of the system by using the comparison principle and the Lyapunov method. In addition, some numerical simulation shows that our models can occur in many forms of complexities including periodic oscillation and strange chaotic strange attractor.作者: BUMP 時間: 2025-3-26 18:37 作者: 安裝 時間: 2025-3-27 00:05
Conference proceedings 2012opical sections on internet computing and applications, multimedia networking and computing, intelligent computing and applications, computational statistics and applications, cloud and evolutionary computing, computer engineering and applications, knowledge management and applications, communication technology and applications.作者: Mirage 時間: 2025-3-27 04:49
A Password Authentication Scheme against Smart Card Security Breach table should not be involved in a good password authentication scheme with smart cards. In this paper, we propose a password authentication scheme against smart card security breach and without maintaining verification tables.作者: 新奇 時間: 2025-3-27 09:16
Research on the Distal Supervised Learning Model of Speech Inversioneech signal is parameterized as acoustic parameters (APs) were compared with as mel-frequency cepstral coefficients (MFCCs). The results showed that distal supervised learning has a good estimation performance for tract variables.作者: Recess 時間: 2025-3-27 12:33 作者: endocardium 時間: 2025-3-27 15:06 作者: 寒冷 時間: 2025-3-27 20:22
DFP-Growth: An Efficient Algorithm for Mining Frequent Patterns in Dynamic Databaserowth (DFP-Growth) to mine the frequent patterns from dynamic database. Experiments with three UCI datasets show that the DFP-Growth is up to 1.4 times faster than benchmarked FP-Growth, thus verify it efficiencies.作者: offense 時間: 2025-3-28 01:48
Research on Purified Internet Environment for College Students impact and puts forward some feasible measures to regulate the internet behavior of students and provide a healthy and safe internet environment for students to fully utilize favorable opportunity and convenient condition brought about by network.作者: Condescending 時間: 2025-3-28 03:38
0302-9743 ia networking and computing, intelligent computing and applications, computational statistics and applications, cloud and evolutionary computing, computer engineering and applications, knowledge management and applications, communication technology and applications.978-3-642-34061-1978-3-642-34062-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 礦石 時間: 2025-3-28 08:15 作者: Aggrandize 時間: 2025-3-28 10:52
Analysis on Key Nodes Behavior for Complex Software Network plays an important role in execution process of software system and the execution network can be divided into several levels, which has an important significance for maintenance and quality assurance for software.作者: 殺子女者 時間: 2025-3-28 18:39
Location Method of Underground Pipeline Monitoring Point Based on Cavity Detectiontion around the underground pipeline, to make full use of the present resources, and to realize dynamic monitoring on the cavity evolution around the underground pipeline, and to predict and prevent major underground pipeline accidents effectively and scientificly.作者: Gratuitous 時間: 2025-3-28 19:58 作者: Spinal-Tap 時間: 2025-3-29 00:31 作者: 紀念 時間: 2025-3-29 05:27
Research on Image Retrieval Based on Color and Shape Featuresonable range, the accuracy is lowered appropriately and the query speed is improved significantly. Experiments in traffic signs image library, show that the proposed method of recognition accuracy is better than traditional methods, and efficiency has improved.作者: 愛社交 時間: 2025-3-29 09:51 作者: 憤世嫉俗者 時間: 2025-3-29 11:35
Conference proceedings 2012engde, China, in September 2012. The 100 revised full papers were carefully reviewed and selected from 1089 submissions. The papers are organized in topical sections on internet computing and applications, multimedia networking and computing, intelligent computing and applications, computational sta作者: 平常 時間: 2025-3-29 18:58
A Novel Event Network Matching Algorithmion, which can provide support for text semantic information processing. The paper proposes a new three-step matching algorithm for event network: event matching based on maximum similarity priority, relation matching based on isotropic-relational-distance matrix, and event network matching by integ作者: 現(xiàn)任者 時間: 2025-3-29 22:19
Static Patterns Matching for High Speed Networksf static pattern matching, which can process in parallel by using the matrix-and algorithm. This method can not only reduce the complexity of programming but also provide the basic of reconfigurable implementation. Experimental results show that the realization is able to reach the theoretical bandw作者: Accrue 時間: 2025-3-30 00:49 作者: paleolithic 時間: 2025-3-30 07:53 作者: 罐里有戒指 時間: 2025-3-30 11:08 作者: custody 時間: 2025-3-30 13:56
A Vulnerability Attack Graph Generation Method Based on Scriptsfficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technolo作者: 輕彈 時間: 2025-3-30 18:28 作者: 倫理學 時間: 2025-3-30 22:34
Analysis on Key Nodes Behavior for Complex Software Networkifference from previous work which based on structure network built on method association of software, we explore the topological characteristics of software execution behavior based on complex network and model the software execution network based on method invocation sequences. Taking typical open作者: DOLT 時間: 2025-3-31 03:50
Webpage Information Hiding Algorithm Based on Integration of Tags and Datazed. Then according to the structural characteristics that the web was composed of the tags and data, the integration strategy using both the tags and data to implement information hiding was established, and accordingly a hiding information algorithm was proposed. This algorithm improves the hiding作者: 懶洋洋 時間: 2025-3-31 07:53 作者: 被告 時間: 2025-3-31 10:55
Research on Purified Internet Environment for College Studentsood command of internet application and overall utilization of internet resources. On the same time the internet society has produced negative impacts on the college students. This article analyses the advantages and disadvantages of internet affecting college students in China, especially the moral作者: 嚴厲譴責 時間: 2025-3-31 15:11
A Mobile-Certificate Security Method of Satellite-Earth Integration Networksation Network. A mobile-certificate authority Method based on PKI (Public Key Infrastructure) is proposed in this paper. Based on the RSA algorithm, the method realizes the anonymous authentication between neighboring nodes. It distributes the private key component to n nodes according to the thresh作者: BET 時間: 2025-3-31 21:20 作者: 掙扎 時間: 2025-3-31 22:02 作者: heart-murmur 時間: 2025-4-1 02:34 作者: 最初 時間: 2025-4-1 08:09 作者: 機構 時間: 2025-4-1 12:58 作者: Urologist 時間: 2025-4-1 16:44 作者: 令人發(fā)膩 時間: 2025-4-1 22:09 作者: Accede 時間: 2025-4-2 00:42 作者: heirloom 時間: 2025-4-2 03:38 作者: 官僚統(tǒng)治 時間: 2025-4-2 07:27
Kunpeng Jiang,Huifang Guo,Shengping Zhu,Julong Lan of the ‘Rhenish system of capitalism’ to deliver economic performance without sacrificing social cohesion was running at an all-time high. From the early 1990s, however, as Germany wrestled with the challenges and costs of reunification, and then plunged into its worst recession since World War II,