標(biāo)題: Titlebook: Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf; Part III Zofia Wilimowska,Leszek Borz [打印本頁(yè)] 作者: 營(yíng)養(yǎng)品 時(shí)間: 2025-3-21 17:55
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次學(xué)科排名
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用學(xué)科排名
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋
書(shū)目名稱(chēng)Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋學(xué)科排名
作者: 無(wú)脊椎 時(shí)間: 2025-3-21 23:30
that “It’s a good rule of thumb that the value of a method is inversely proportional to its generality. A method for solving all problems can give you very little help with any particular problem” [140]. The method presented here has exactly the opposite properties. Far from trying to be a silver b作者: 仇恨 時(shí)間: 2025-3-22 02:12
Micha? J. Kowalski second section of the chapter covers that, with a focus on the two most commonly used fields: GF(.), with . prime, and GF(2.), with . a positive integer (The main aspect of the first two sections is the definition of . and ., the latter being the primary operation in elliptic-curve cryptosystems.) 作者: 津貼 時(shí)間: 2025-3-22 05:27 作者: Gorilla 時(shí)間: 2025-3-22 09:51
Agnieszka Szpara second section of the chapter covers that, with a focus on the two most commonly used fields: GF(.), with . prime, and GF(2.), with . a positive integer (The main aspect of the first two sections is the definition of . and ., the latter being the primary operation in elliptic-curve cryptosystems.) 作者: Repatriate 時(shí)間: 2025-3-22 15:18
Dorota Wi?cek,Dariusz Wi?cek second section of the chapter covers that, with a focus on the two most commonly used fields: GF(.), with . prime, and GF(2.), with . a positive integer (The main aspect of the first two sections is the definition of . and ., the latter being the primary operation in elliptic-curve cryptosystems.) 作者: 帶來(lái)墨水 時(shí)間: 2025-3-22 19:37 作者: Fecundity 時(shí)間: 2025-3-22 21:58 作者: 十字架 時(shí)間: 2025-3-23 03:27 作者: BOGUS 時(shí)間: 2025-3-23 05:47
Mariusz ?ytniewskihere is to append to a message a (relatively short) tail that depends in an essential way on every bit in the message and also on a key that is shared with the legitimate receiver..Some well-known bounds on the probability of successful substitution and impersonation will be given. Further, a direct作者: 昏睡中 時(shí)間: 2025-3-23 10:36 作者: 狂熱語(yǔ)言 時(shí)間: 2025-3-23 16:09 作者: 可觸知 時(shí)間: 2025-3-23 19:40
Ewa Dudek-Dyduchwill also appeal to advanced high school students and amateur mathematicians interested in this fascinating and topical subject..978-3-319-94817-1978-3-319-94818-8Series ISSN 1615-2085 Series E-ISSN 2197-4144 作者: ineptitude 時(shí)間: 2025-3-24 02:09
Quality of Investment Recommendation – Evidence Form Polish Capital Market, Income Approacherous examples of gross methodological errors in investment recommendations, however, common mistakes identified in other studies, like for example the excessive optimism for cash flow forecasting or overvaluation of the long-term cash flow growth rate, were not observed.作者: 表皮 時(shí)間: 2025-3-24 05:20
Crowdsourcing-Based Open Innovation Processes on the Internet, and motivating them make easier development of open innovations on crowdsourcing platforms. Companies can successfully innovate by using complementary resources of knowledge, innovative competencies and creative abilities of the crowd during execution of open innovation process activities on crowd作者: arbiter 時(shí)間: 2025-3-24 08:19 作者: 關(guān)節(jié)炎 時(shí)間: 2025-3-24 12:40 作者: 飾帶 時(shí)間: 2025-3-24 15:06
Przemys?aw Ignaciuk,?ukasz Wieczorekthe appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus..978-3-319-37309-6978-3-319-21936-3Series ISSN 1619-7100 Series E-ISSN 2197-845X 作者: gruelling 時(shí)間: 2025-3-24 21:22 作者: 行為 時(shí)間: 2025-3-24 23:16
2194-5357 Artificial Intelligence Methods, Knowledge Discovery and Data Mining, Big Data, Knowledge Discovery and Data Mining, Knowledge Based Management, Internet of Things, Cloud Computing and High Performance Computin978-3-319-67222-9978-3-319-67223-6Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 北極熊 時(shí)間: 2025-3-25 06:00 作者: Gobble 時(shí)間: 2025-3-25 10:51 作者: nuclear-tests 時(shí)間: 2025-3-25 15:19
Maciej Szmit,Anna Szmit,Magdalena D?bkowska,Dominika Lisiak-Felicka作者: Monolithic 時(shí)間: 2025-3-25 17:59
Information Systems Architecture and Technology: Proceedings of 38th International Conference on InfPart III作者: 放牧 時(shí)間: 2025-3-25 20:53
https://doi.org/10.1007/978-3-319-67223-6Risk Management; Information Systems; Information Systems Architecture; Computer Networks; ISAT 2017作者: 心神不寧 時(shí)間: 2025-3-26 01:30
978-3-319-67222-9Springer International Publishing AG 2018作者: 真 時(shí)間: 2025-3-26 06:50 作者: 聯(lián)合 時(shí)間: 2025-3-26 09:12 作者: 一起平行 時(shí)間: 2025-3-26 15:13
Zofia Wilimowska,Leszek Borzemski,Jerzy ?wi?tekPresents recent advances in Information Systems Architecture and Technology.Contains best papers presented at the 38th International Conference on Information Systems Architecture and Technology—ISAT 作者: 可以任性 時(shí)間: 2025-3-26 19:59
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465481.jpg作者: 音的強(qiáng)弱 時(shí)間: 2025-3-27 00:07 作者: 欲望小妹 時(shí)間: 2025-3-27 02:40 作者: FLIRT 時(shí)間: 2025-3-27 09:11
An Experimental Investigation of Lead Time and the Effect of Order Crossoverally dependent. This has a significant impact on how supply chain members should estimate lead times and lead time distributions. That lead times are in fact mutually dependent is a major finding and has implications for both practice and academia.作者: 俗艷 時(shí)間: 2025-3-27 10:43
The Influence of the Methods of Determining Cost Drivers Values on the Accuracy of Costs Estimation onents of the designed element and its manufacturing process. The proposed methods base on the assumed features of the designed product, current values of cost parameters and are adjusted to unit and small lot production systems.作者: AROMA 時(shí)間: 2025-3-27 15:13
The Stability of the Financial Indicators over Timee stability of calculated variables during the research period was measured by (1) the standard deviation and normal distribution, (2) the correlation matrix, and (3) the discriminant ability (by using the t-Student test). The results indicated a substantial degree of instability of analyzed indicators over the last decade.作者: 攤位 時(shí)間: 2025-3-27 19:14 作者: 邊緣帶來(lái)墨水 時(shí)間: 2025-3-27 22:27 作者: 消毒 時(shí)間: 2025-3-28 03:28 作者: outer-ear 時(shí)間: 2025-3-28 06:46
Optimization of Mesh-Type Logistic Networks for Achieving Max Service Rate Under Order-Up-To Inventoer service rate while minimizing the overall holding costs. In order to answer the computational challenges arising from the complexity of system structure a simple heuristic to tune the policy parameters is proposed and evaluated in numerical experiments.作者: 會(huì)議 時(shí)間: 2025-3-28 12:40
Dimensions of Business Ecosystem Efficiencyentified and systematized following the subject literature. Their analysis and own research allowed the authors to point out another model of measuring the efficiency of business ecosystems, which was named relational.作者: ligature 時(shí)間: 2025-3-28 17:22 作者: intangibility 時(shí)間: 2025-3-28 22:17 作者: Badger 時(shí)間: 2025-3-29 01:52
Application of Probability and Possibility Theory in Investment Appraisall point of view, in this article we propose methods to aggregate a p-box into a single cumulative distribution function. We demonstrate our approach on the example of the appraisal of an investment, where the distinction between different types of uncertainty is of great importance.作者: 使服水土 時(shí)間: 2025-3-29 03:47
Context Specification in Support of Business Processes and Knowledge Management Integration of the operation context of a business process oriented knowledge management system. The paper presents elements of a proposed methodology that refer to developing the context of knowledge usage as an element of a business process and IT system.作者: 技術(shù) 時(shí)間: 2025-3-29 09:42 作者: 能量守恒 時(shí)間: 2025-3-29 15:25 作者: tic-douloureux 時(shí)間: 2025-3-29 16:44
Ewa Dudek-Dyduchines classical ciphers, modern public key cryptosystems, andThis text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication..Beginning with classical ciphers and their cryptanalysis, this book proceeds to focus on modern public key cryptosystems作者: 乞丐 時(shí)間: 2025-3-29 22:57
Micha? J. Kowalskicurves: the main defining equations for the curves of interest and an explanation of the arithmetic operations of “addition” and “multiplication” in the context of elliptic curves. We shall follow standard practice and first define elliptic curves over the field of real numbers, with geometric and a作者: Gyrate 時(shí)間: 2025-3-30 01:02
government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation?involve much?computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cr作者: 鴿子 時(shí)間: 2025-3-30 07:14
Agnieszka Szparacurves: the main defining equations for the curves of interest and an explanation of the arithmetic operations of “addition” and “multiplication” in the context of elliptic curves. We shall follow standard practice and first define elliptic curves over the field of real numbers, with geometric and a作者: mechanism 時(shí)間: 2025-3-30 10:13
Dorota Wi?cek,Dariusz Wi?cekcurves: the main defining equations for the curves of interest and an explanation of the arithmetic operations of “addition” and “multiplication” in the context of elliptic curves. We shall follow standard practice and first define elliptic curves over the field of real numbers, with geometric and a作者: LATE 時(shí)間: 2025-3-30 16:01 作者: Limousine 時(shí)間: 2025-3-30 17:52
Sebastian Klaudiusz Tomczakin computer science, mathematics and engineering.Includes suIn this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions a作者: 憤憤不平 時(shí)間: 2025-3-30 23:35