標(biāo)題: Titlebook: Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe; Part I Leszek Borzemski,Jerzy ?wi?tek [打印本頁] 作者: Flexible 時(shí)間: 2025-3-21 17:58
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe影響因子(影響力)
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe影響因子(影響力)學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe網(wǎng)絡(luò)公開度
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe被引頻次
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe被引頻次學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe年度引用
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe年度引用學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe讀者反饋
書目名稱Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Confe讀者反饋學(xué)科排名
作者: 謊言 時(shí)間: 2025-3-21 22:31 作者: Antagonist 時(shí)間: 2025-3-22 01:45
A Large-Scale Customer-Facility Network Model for Customer Service Centre Location Applications bounds provided, even with a considerable computational effort. Two simple but scalable local search heuristics are computationally investigated, revealing their potential for solving such large-scale problems in practice.作者: 重力 時(shí)間: 2025-3-22 04:35
A Generic Approach to Schema Evolution in Live Relational Databasese backend. The only restriction to the changes that can be made relate to data type conversion for existing columns in the database. Foreign key constraints are supported and referential integrity is maintained during evolution.作者: Blood-Clot 時(shí)間: 2025-3-22 10:28
UAV Detection Employing Sensor Data Fusion and Artificial Intelligenceallel classification. In the present paper the identification and classification of drones is analyzed employing two CNNs, a multilayer perceptron (MLP) for acoustic pattern recognition and a self – organizing map (SOM) to recognize an object from a video stream.作者: 使成波狀 時(shí)間: 2025-3-22 13:57 作者: CUR 時(shí)間: 2025-3-22 19:05
An Architecture for Distributed Explorable HMD-Based Virtual Reality Environmentsable for lightweight VR devices with limited computational power, such as headsets and smartphones. We present an implementation of the architecture for an immersive service guide for household appliances, which is based on Unity and Samsung Gear VR.作者: synovial-joint 時(shí)間: 2025-3-22 21:39
Development of Parameter Measurement Method of Information Systems, the scale of the concealment parameter is determined and method of measurement of its value is reviewed. The research provides tools to use this parameter and illustrate an example of conduction of measurements in information systems.作者: 半圓鑿 時(shí)間: 2025-3-23 03:27 作者: 侵蝕 時(shí)間: 2025-3-23 06:32
A Web-Based Support for the Management and Evaluation of Measurement Data from Stress-Strain and Conting from the planning of experiments through to the evaluation of the measurement data could be supported by an appropriate work-flow to make sure that all meta-data is preserved to find and reuse the results.作者: 不容置疑 時(shí)間: 2025-3-23 13:15
Conference proceedings 2020s readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem..Managing a作者: 人類 時(shí)間: 2025-3-23 14:35 作者: 發(fā)電機(jī) 時(shí)間: 2025-3-23 20:21 作者: 偶然 時(shí)間: 2025-3-24 00:11
Leszek Borzemski,Jerzy ?wi?tek,Zofia WilimowskaPresents recent advances in Information Systems Architecture and Technology.Includes best papers presented at the 40th International Conference on Information Systems Architecture and Technology – ISA作者: neolith 時(shí)間: 2025-3-24 05:57
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465486.jpg作者: mediocrity 時(shí)間: 2025-3-24 10:15
978-3-030-30439-3Springer Nature Switzerland AG 2020作者: Malleable 時(shí)間: 2025-3-24 11:08 作者: 不規(guī)則的跳動 時(shí)間: 2025-3-24 15:25
On the Need of an Explainable Artificial IntelligenceThis plenary talk will explore a fascinating nex research field: the Explainable Artificial Intelligence (or XAI), whose goal if the building of explanatory models, to try and overcome the shortcomings of pure statistical learning by providing justifications, understandable by a human, for decisions or predictions made by them.作者: Orthodontics 時(shí)間: 2025-3-24 19:20
Models and Method for Estimate the Information-Time Characteristics of Real-Time Control SystemIn the work proposes models for describing and calculating the characteristics of automated real-time control systems at the conceptual design stage. The models are based on the proposed notion of a .-transaction.作者: 勤勉 時(shí)間: 2025-3-25 00:03 作者: cartilage 時(shí)間: 2025-3-25 03:41
Designing Information Integrating Systems Based on Co-shared Ontologiesxchanging which, in heterogeneous environment, is not easy task. So, various integrating systems have been proposed to overcome problems concerning data exchange in such diverse systems. The field of data integration has expanded in many directions, including schema matching, record linkage, data fu作者: 燒烤 時(shí)間: 2025-3-25 07:31 作者: verdict 時(shí)間: 2025-3-25 15:27
An Architecture for Distributed Explorable HMD-Based Virtual Reality Environments-specialists, requires new approaches to represent interaction in either a domain-specific or a generic way, which is neither directly related to 3D graphics nor animation. In this paper, we propose an architecture for distributed VR environments with an explorable representation of interaction base作者: 痛苦一下 時(shí)間: 2025-3-25 18:48 作者: 駁船 時(shí)間: 2025-3-25 23:44 作者: 前奏曲 時(shí)間: 2025-3-26 02:17
Development of Parameter Measurement Method of Information Systemsparameters need to be selected basing on the analysis of their functional characteristics. In this work are reviewed peculiarities of information systems parameters selection. For such systems it is important is not only to measure some values, but also setting boundaries, scale etc. In this work is作者: 直覺沒有 時(shí)間: 2025-3-26 06:11
Social Media Acceptance and Use Among University Students for Learning Purpose Using UTAUT Modelch is not work associated. The model is used to examine acceptance and willingness of University students’ use of social media for learning purposes. Social and peer influence are relevant factors that influence the acceptance of social media for learning purposes. Access to social media might be de作者: largesse 時(shí)間: 2025-3-26 08:51
A Generic Approach to Schema Evolution in Live Relational DatabasesGeneRelDB, which allows the schema of a relational database to evolve during run time without the need to rewrite database queries in the application code. It is designed to run as an abstraction layer, handling all communication (queries and data exchange) between the user interface and the databas作者: Gentry 時(shí)間: 2025-3-26 12:42
The Concept of a Flexible Database - Implementation of Inheritance and Polymorphismr are still relational databases (RDB). Designing a relational database requires a lot of experience - not only in computer science. The initial database structure depends on the current customer expectations. These expectations, however, change during operation of the application. Changes in the ap作者: MIR 時(shí)間: 2025-3-26 17:55 作者: 人類學(xué)家 時(shí)間: 2025-3-26 22:19
Heuristic Algorithm for Recovering a Physical Structure of Spreadsheet Headerocument tables plays a crucial role in its further usage including analysis and integration. The visual or logical structure of table elements might differ from its physical structure. Such differences cause difficulties for automated table processing and understanding. Automated correction from phy作者: Commonplace 時(shí)間: 2025-3-27 04:36 作者: 無脊椎 時(shí)間: 2025-3-27 06:51 作者: 悲觀 時(shí)間: 2025-3-27 11:43 作者: 責(zé)難 時(shí)間: 2025-3-27 17:29
Olesya Afanasyevaeir input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of consta作者: Delectable 時(shí)間: 2025-3-27 19:19
Joseph Bamidele Awotunde,Roseline Oluwaseun Ogundokun,Femi E. Ayo,Gbemisola J. Ajamu,Emmanuel Abidemeir input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of consta作者: palliative-care 時(shí)間: 2025-3-27 22:36
eir input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of consta作者: Badger 時(shí)間: 2025-3-28 03:19 作者: Commonwealth 時(shí)間: 2025-3-28 07:07 作者: Duodenitis 時(shí)間: 2025-3-28 11:02
C?t?lin Dumitrescu,Marius Minea,Petrica Ciotirnaeeir input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of consta作者: Hypomania 時(shí)間: 2025-3-28 15:37 作者: Protein 時(shí)間: 2025-3-28 21:34 作者: 確定方向 時(shí)間: 2025-3-29 00:16
Steffen Scholz,Ahmed Elkaseer,Mahmoud Salem,Veit Hagenmeyercomputational complexity and cryptography.Introduces general.Locally computable (NC.0.) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographi作者: 胰島素 時(shí)間: 2025-3-29 06:41 作者: Commonwealth 時(shí)間: 2025-3-29 11:02
The Meaning of Solution Space Modelling and Knowledge-Based Product Configurators for Smart Service red, the smart product checks for consistency with the solution space. Only if it is approved the reconfiguration is implemented, either by reparametrization of software/control units or by the exchange of physical components. Such interrelationships are already being discussed in the field of knowl作者: DRILL 時(shí)間: 2025-3-29 13:41
Social Media Acceptance and Use Among University Students for Learning Purpose Using UTAUT Modelher important factor is peer influence that is found to be an important factor. The perception of students would also be affected if social media are perceived only for social activities such as watching films, playing the game and relaxing with family and friends.作者: 肥料 時(shí)間: 2025-3-29 19:28 作者: calumniate 時(shí)間: 2025-3-29 21:13
Conference proceedings 2020ntific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems...This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT),作者: CROAK 時(shí)間: 2025-3-30 01:45 作者: 打擊 時(shí)間: 2025-3-30 05:33
David Chalupa,Peter Nielsen,Zbigniew Banaszak,Grzegorz Bocewiczand notes on recent developments..The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are 978-3-662-50713-1978-3-642-17367-7Series ISSN 1619-7100 Series E-ISSN 2197-845X 作者: Horizon 時(shí)間: 2025-3-30 11:06 作者: Omniscient 時(shí)間: 2025-3-30 14:57
Waldemar Pokutaand notes on recent developments..The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are 978-3-662-50713-1978-3-642-17367-7Series ISSN 1619-7100 Series E-ISSN 2197-845X 作者: 共同給與 時(shí)間: 2025-3-30 19:12 作者: Breach 時(shí)間: 2025-3-30 20:55 作者: puzzle 時(shí)間: 2025-3-31 01:19 作者: Immunoglobulin 時(shí)間: 2025-3-31 07:28
Jakub Flotyński,Anna Englert,Adrian Nowak,Krzysztof Walczak作者: neoplasm 時(shí)間: 2025-3-31 13:15 作者: 貪婪地吃 時(shí)間: 2025-3-31 17:22
Joseph Bamidele Awotunde,Roseline Oluwaseun Ogundokun,Femi E. Ayo,Gbemisola J. Ajamu,Emmanuel AbidemACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments..The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are 作者: 分貝 時(shí)間: 2025-3-31 20:04
ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments..The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are