標題: Titlebook: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf; Part III Zofia Wilimowska,Leszek Borz [打印本頁] 作者: ONSET 時間: 2025-3-21 16:32
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf影響因子(影響力)
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf影響因子(影響力)學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf網(wǎng)絡公開度
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf網(wǎng)絡公開度學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf被引頻次
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf被引頻次學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf年度引用
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf年度引用學科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf讀者反饋
書目名稱Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf讀者反饋學科排名
作者: indemnify 時間: 2025-3-21 20:25 作者: Lethargic 時間: 2025-3-22 01:29
Efficiency of Gradient Boosting Decision Trees Technique in Polish Companies’ Bankruptcy Prediction) models, with the technique called Gradient Boosting. In particular, the paper verifies two research hypotheses (verification was based on the balanced sample of Polish companies): [H1]: Gradient Boosted Decision Trees algorithm is more accurate than traditional bankruptcy prediction models: logit 作者: 蜿蜒而流 時間: 2025-3-22 05:34
Economic Determinants of the Effectiveness of Polish Enterprisesomic efficiency of an enterprise measured by selected financial indicators. The research was carried out by building econometric models taking into account a number of theoretically indicated external factors that could affect the economy of enterprises, and what is their statistical significance of作者: ablate 時間: 2025-3-22 12:34
Intellectual Resources in Polish Enterprises in the SME Sector - Analysis of the Obtained Research Re SME sector. This issue is a key factor for the development of this type of enterprises in Poland. The article presents the results of research including published statistical data (Polish and European reports) and own surveys carried out in a group of 32 enterprises belonging to the sector of smal作者: disparage 時間: 2025-3-22 13:51 作者: cinder 時間: 2025-3-22 17:49 作者: jocular 時間: 2025-3-22 23:11 作者: harpsichord 時間: 2025-3-23 03:08
Operational and Information Risk Management System Based on Assessment Model of Risk Culture Levelion risk management system. It propose a decision-making system based on various tactics, which based on strengthening zones of influence on the risk culture of organizations. Proposed classifications on the model used in one of the biggest commercial bank in Russian Federation with a separate struc作者: adequate-intake 時間: 2025-3-23 08:35
Impact of Volatility Risk on the TAIEX Option Returnnal option data. Our empirical results indicate that disparate volatility-risk factors have considerable effects on abnormal returns, and expect to create risk premium; specifically, the market risk premium, policy rewards, and fear index can lessen the return of 7.806%, 6.336%, and 1.294% per year,作者: Asymptomatic 時間: 2025-3-23 15:18
Selecting the Efficient Market Indicators in the Trading System on the Forex Marketcluded. The proposal can be implemented as an additional module included in the existing trading systems. We present a procedure, in which for a given initially considered indicators, only the selected ones being the most beneficial for a trader for a given time window are derived. In the procedure,作者: 積習難改 時間: 2025-3-23 20:49
Impact of the Size of Equity on Corporate Liquidity edge, whereas the improper one may lead up to many problems, among other things, the loss of corporate ability to pay off its financial obligations..This paper covered the analysis of fifteen thousand manufacturing companies, among them the ones, marked by high quantities of equity in the total ass作者: 殺菌劑 時間: 2025-3-24 00:43 作者: 邊緣帶來墨水 時間: 2025-3-24 04:53
The Role of Business Intelligence Tools in Harvesting Collective Intelligenceof collective intelligence. A questionnaire survey was developed to collect data from 9 firms across all industries with a sample of 89 respondents. Structural Equation Modeling, using smart PLS was conducted to analyze the data. The results indicated that business intelligent tools play a significa作者: Constituent 時間: 2025-3-24 09:37
The Concept of Conjoined Managementn of I&D (inclusion and diversity) strategies and train their management staff in diversity management. Those initiatives most often build implicitly on the assumption that workforce diversity is positively correlated with organizational performance which, as research results show, is somewhat debat作者: Capitulate 時間: 2025-3-24 14:29 作者: Custodian 時間: 2025-3-24 16:01 作者: Aura231 時間: 2025-3-24 19:02
Rogaway in light of revelations concerning mass surveillance. An ASA replaces an encryption scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance, while remaining undetected by users. Previous work posited that a particular class of AEAD scheme作者: 警告 時間: 2025-3-25 00:00 作者: 真繁榮 時間: 2025-3-25 05:32
Joanna Koczar,K. M. Selivanova,A. R. Akhmetshina,V. I. Vagizovading degrees, although they are important for pairing-based cryptography over composite-order groups. This paper analyzes efficient pairings on ordinary elliptic curves of embedding degree 1 and 2 from the point of shortening Miller’s loop. We first show that pairing lattices presented by Hess can b作者: tinnitus 時間: 2025-3-25 08:25 作者: 表被動 時間: 2025-3-25 13:01 作者: 木質(zhì) 時間: 2025-3-25 18:37 作者: AROMA 時間: 2025-3-25 23:44 作者: Brocas-Area 時間: 2025-3-26 02:20 作者: CHAFE 時間: 2025-3-26 04:59 作者: CURT 時間: 2025-3-26 10:12 作者: 怪物 時間: 2025-3-26 13:02
Przemys?aw Juszczuk,Lech Kru? the algorithm. This implies conversion of the classic statistical recursive expressions of the SC decoder into a suitable form, adapting them to the proposed metric, and properly expressing the initialization values for this metric. This leads to a simplified version of the logarithmic SC decoder, 作者: 高原 時間: 2025-3-26 17:14 作者: Keratectomy 時間: 2025-3-26 22:04 作者: paroxysm 時間: 2025-3-27 04:16
the algorithm. This implies conversion of the classic statistical recursive expressions of the SC decoder into a suitable form, adapting them to the proposed metric, and properly expressing the initialization values for this metric. This leads to a simplified version of the logarithmic SC decoder, 作者: Ruptured-Disk 時間: 2025-3-27 05:30 作者: Flinch 時間: 2025-3-27 12:37 作者: 認識 時間: 2025-3-27 13:53
Marian Hopej,Marcin Kandora the algorithm. This implies conversion of the classic statistical recursive expressions of the SC decoder into a suitable form, adapting them to the proposed metric, and properly expressing the initialization values for this metric. This leads to a simplified version of the logarithmic SC decoder, 作者: 受傷 時間: 2025-3-27 20:35 作者: oxidize 時間: 2025-3-27 23:13
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465482.jpg作者: Magnitude 時間: 2025-3-28 05:54 作者: 音樂會 時間: 2025-3-28 06:30 作者: pantomime 時間: 2025-3-28 11:23
https://doi.org/10.1007/978-3-319-99993-7Risk Management; Information Systems; Information Systems Architecture; Computer Networks; ISAT 2018作者: depreciate 時間: 2025-3-28 16:45 作者: Aggressive 時間: 2025-3-28 21:24
Impact of Volatility Risk on the TAIEX Option Returnnal option data. Our empirical results indicate that disparate volatility-risk factors have considerable effects on abnormal returns, and expect to create risk premium; specifically, the market risk premium, policy rewards, and fear index can lessen the return of 7.806%, 6.336%, and 1.294% per year, respectively.作者: Nmda-Receptor 時間: 2025-3-29 01:19 作者: Conquest 時間: 2025-3-29 05:21 作者: 填料 時間: 2025-3-29 10:10 作者: 笨拙的我 時間: 2025-3-29 14:31
resent a practical variant of our scheme, which is secure under stronger assumptions, along with parameter recommendations and promising implementation results. Finally, we present an approach for encrypting larger input sizes by extending ciphertexts to several ring elements via the CRT on the mess作者: Lipohypertrophy 時間: 2025-3-29 19:26
against a selection of AEAD implementations that are most used in practice. In contrast to prior work, our new class of attack targets the decryption algorithm rather than encryption. We argue that this attack represents an attractive opportunity for a mass surveillance adversary. Our work serves t作者: 木質(zhì) 時間: 2025-3-29 22:20 作者: 云狀 時間: 2025-3-30 01:07 作者: inscribe 時間: 2025-3-30 04:55
Joanna Wyrobek,Krzysztof Kluzastract total order relation, can be tested..We consider several instantiation of the model and different types of computational problems and prove a few known and new lower bounds for computational problems of interest in cryptography, for example that computing discrete logarithms is generically ha作者: harmony 時間: 2025-3-30 08:44
Anna Kamińska,Agnieszka Parkitna,Ma?gorzata Rutkowska,Arkadiusz Górski,Zofia Wilimowskasumptions about the security of the underlying trapdoor function. Hence we propose two new, simple methods for constructing a KEM where the security of the KEM is based on weak assumptions about the underlying function. Lastly we propose a new KEM based on the Rabin function that is both efficient a作者: PLE 時間: 2025-3-30 13:32
Aldona Dereń,Danuta Seretna-Sa?amaj,Jan Skoniecznyhat they often provide a good trade-o. between error-control power and complexity of decoding. The rate of a random error-control block array code, such as a product code, for example (classical product codes form a sub-class of array codes), is usually less than that of the best available alternati作者: savage 時間: 2025-3-30 17:30 作者: 斑駁 時間: 2025-3-30 21:13 作者: Prologue 時間: 2025-3-31 01:25 作者: 倫理學 時間: 2025-3-31 06:06
Maciej Romaniukf the algorithm, since neither is there a need to know the noise power variance of the channel, nor to perform complex and costly mathematical operations like exponentiations, quotients and products at that step. This complexity reduction is especially important for practical implementations of the 作者: EXULT 時間: 2025-3-31 11:36 作者: Agnosia 時間: 2025-3-31 14:04
Sebastian Klaudiusz Tomczakin particular entirely practical. Our approach is based on universal accumulators, which nicely fit to the underlying paradigm. Thereby, in contrast to existing accumulator-based revocation approaches, we do not require complex zero-knowledge proofs of knowledge (ZKPKs) to demonstrate the possession作者: 描繪 時間: 2025-3-31 19:05
Mariusz Czeka?a,Agnieszka Bukietyńska,Agnieszka Matylda Schlichtingerin particular entirely practical. Our approach is based on universal accumulators, which nicely fit to the underlying paradigm. Thereby, in contrast to existing accumulator-based revocation approaches, we do not require complex zero-knowledge proofs of knowledge (ZKPKs) to demonstrate the possession作者: otic-capsule 時間: 2025-3-31 21:50
f the algorithm, since neither is there a need to know the noise power variance of the channel, nor to perform complex and costly mathematical operations like exponentiations, quotients and products at that step. This complexity reduction is especially important for practical implementations of the 作者: 祖?zhèn)髫敭a(chǎn) 時間: 2025-4-1 04:09 作者: 貪婪性 時間: 2025-4-1 06:58
Marian Hopej,Marcin Kandorain particular entirely practical. Our approach is based on universal accumulators, which nicely fit to the underlying paradigm. Thereby, in contrast to existing accumulator-based revocation approaches, we do not require complex zero-knowledge proofs of knowledge (ZKPKs) to demonstrate the possession作者: 厭倦嗎你 時間: 2025-4-1 13:42
Marian Hopej,Marcin Kandoraf the algorithm, since neither is there a need to know the noise power variance of the channel, nor to perform complex and costly mathematical operations like exponentiations, quotients and products at that step. This complexity reduction is especially important for practical implementations of the 作者: Blanch 時間: 2025-4-1 17:16
2194-5357 on has prompted many decision-making bodies to introduce computer modelling of organisation management systems.? ..The three books present the peer-reviewed proceedings of the 39th International Conference “Inf978-3-319-99992-0978-3-319-99993-7Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: PAD416 時間: 2025-4-1 19:06 作者: 慢慢啃 時間: 2025-4-2 00:40 作者: Anal-Canal 時間: 2025-4-2 04:29
Relations Between the Use of Modern Technology and the Financial Results of the Financial Service See perspective of the positions the respondents held, the line of business of an enterprise and its location. The data were collected on the basis of tailored questionnaires. The statistical results were verified by the ANOVA variance analysis.