標題: Titlebook: Materials for Construction and Civil Engineering; Science, Processing, M. Clara Gon?alves,Fernanda Margarido Book 2015 Springer Internation [打印本頁] 作者: Nonchalant 時間: 2025-3-21 18:58
書目名稱Materials for Construction and Civil Engineering影響因子(影響力)
書目名稱Materials for Construction and Civil Engineering影響因子(影響力)學科排名
書目名稱Materials for Construction and Civil Engineering網絡公開度
書目名稱Materials for Construction and Civil Engineering網絡公開度學科排名
書目名稱Materials for Construction and Civil Engineering被引頻次
書目名稱Materials for Construction and Civil Engineering被引頻次學科排名
書目名稱Materials for Construction and Civil Engineering年度引用
書目名稱Materials for Construction and Civil Engineering年度引用學科排名
書目名稱Materials for Construction and Civil Engineering讀者反饋
書目名稱Materials for Construction and Civil Engineering讀者反饋學科排名
作者: Obloquy 時間: 2025-3-21 20:15
http://image.papertrans.cn/m/image/625836.jpg作者: 假 時間: 2025-3-22 02:20
Organic Coatings,properties is made, dealing namely with the components and their role in the coating performance, the properties of the dry coating, the degradation mechanisms and finally the specific properties for coatings designed for various substrates. The chapter is meant to provide non-experts with a general look over the world of organic coatings.作者: iodides 時間: 2025-3-22 05:07 作者: stressors 時間: 2025-3-22 10:21 作者: Collar 時間: 2025-3-22 13:41 作者: opportune 時間: 2025-3-22 19:55 作者: 楓樹 時間: 2025-3-22 21:39
Inês Flores-Colen,Jorge de Britontrustworthy remote servers. The execution of such worms triggers the Cross-Site Scripting (XSS) attack on the mobile cloud-based Online Social Network (OSN). The framework executes in two steps. Initially, it extracts the Uniform Resource Identifier (URI) links embedded in the HTTP response for ext作者: 不利 時間: 2025-3-23 05:20
Jorge de Brito,Inês Flores-Colenstricted Identification and Pseudonymous Signature schemes designed by the German Federal Office for Information Security for German personal identity cards. The main properties are that a user can authenticate himself with a single private key (stored on a smart-card), but nevertheless the user’s I作者: 額外的事 時間: 2025-3-23 08:30
Manuel Vieirantrustworthy remote servers. The execution of such worms triggers the Cross-Site Scripting (XSS) attack on the mobile cloud-based Online Social Network (OSN). The framework executes in two steps. Initially, it extracts the Uniform Resource Identifier (URI) links embedded in the HTTP response for ext作者: 畸形 時間: 2025-3-23 12:27
José Neves,António Correia Diogo,Luís de Picado Santosed by Chen in 1994, it is defined in two different types; an oblivious signature with . messages and, an oblivious signature with . keys. In an oblivious signature with . messages, it allows a signature requester to get a signature on 1-out-of-. messages while during the signing process, the signer 作者: Angioplasty 時間: 2025-3-23 14:54
Rogério Cola?obe vulnerable to security threats affecting DNS servers or exploiting the DNS protocol. In this paper, we address DNS protocol exploitation that causes data breaches via DNS tunneling, where an attacker employs techniques to exfiltrate sensitive data from a victim network. This usually happens by br作者: 幻想 時間: 2025-3-23 21:19 作者: Lasting 時間: 2025-3-24 01:47
M. Clara Gon?alvess scenario may expose a good chance for cybercriminals to launch charging attacks and steal user’s private information. Juice filming charging (JFC) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen 作者: 剛開始 時間: 2025-3-24 04:34
Pedro Miguel Amaral,Jorge C. Fernandes,Vera Pires,Luis Guerra Rosabe vulnerable to security threats affecting DNS servers or exploiting the DNS protocol. In this paper, we address DNS protocol exploitation that causes data breaches via DNS tunneling, where an attacker employs techniques to exfiltrate sensitive data from a victim network. This usually happens by br作者: 漂白 時間: 2025-3-24 10:25 作者: textile 時間: 2025-3-24 12:15 作者: 憎惡 時間: 2025-3-24 16:46
Helena Cruz,Dennis Jones,Lina Nunesorganizations in social networks in huge quantities. One of the most important non-resolved topics is the Fake News propagation problem. Fake news propagates because of several reasons, one of which is non-trustworthy users. These users, some with malicious intentions, and some with low social media作者: 截斷 時間: 2025-3-24 19:33 作者: Inordinate 時間: 2025-3-25 01:20
M. Clara Gon?alves for facilitating the adoption of edge computing.Gives multi.This book provides a hands-on experience in software and hardware engineering of IoT devices in edge and cloud computing systems, by putting in practice state-of-the-art concepts of hardware devices, networking and computing software. It p作者: GIDDY 時間: 2025-3-25 03:39
Jo?o Salvador Fernandes,Fátima Montemorice state-of-the-art concepts of hardware devices, networking and computing software. It proposes a Network of Things Engineering (NoTE) Lab, with seven hands-on lab modules covering topics ranging from “Interfacing sensors and actuators” and “Connecting IoT and Edge with MQTT" to “Data pipelining i作者: rectocele 時間: 2025-3-25 10:31 作者: mastoid-bone 時間: 2025-3-25 11:48 作者: 托人看管 時間: 2025-3-25 16:48
Fernanda Margaridoll perform environmental monitoring, provide security assurance, assist in healthcare services and facilitate factory automation. In remote sensing scenarios, one or more applications are connected to a sensor network through a communication network. The sensors in the sensor network make measuremen作者: 相同 時間: 2025-3-25 22:49
Pedro Pontíficetures using network science-based analysis. Furthermore, it argues that certain dynamical behaviours can stem from the existence of specific motifs in the network representation..Over the last decade, network science has become a widely applied methodology for the analysis of dynamical systems. Repr作者: 符合你規(guī)定 時間: 2025-3-26 01:28 作者: obstinate 時間: 2025-3-26 04:29
Renders,inder type and production site. Renders’ performance characteristics, in fresh and hardened state, are described, focusing on requirements, testing methods and standards. Design and construction recommendations are synthetized in terms of materials (binders, aggregates, admixtures and additions/fill作者: 矛盾心理 時間: 2025-3-26 10:22 作者: exquisite 時間: 2025-3-26 14:33 作者: HALO 時間: 2025-3-26 20:45 作者: Ingenuity 時間: 2025-3-26 22:31 作者: 充滿裝飾 時間: 2025-3-27 02:39
Ceramics,ls. Ceramic technology has evolved greatly from the past to today and is the result of the evolution of the products themselves. To gain the desired results and more complex, demanding products, there needed to be an upgrade in technology..The chapter will discuss only the main ceramic construction 作者: Facilities 時間: 2025-3-27 05:50
Glass,aterial and one of the few building materials that combines tradition with technological innovation. Glass is a product that harmonises colour, reflectance, transparency or opacity, texture and thickness, flatness or curvature with, for example, some control over opacity or self-cleaning properties,作者: champaign 時間: 2025-3-27 09:56 作者: Physiatrist 時間: 2025-3-27 14:25 作者: Pepsin 時間: 2025-3-27 17:53
Fibre-Reinforced Polymer (FRP) Composites,ield of application of fibre reinforced polymer (FRP) composites used in civil engineering applications. Subsequently, detailed information is provided about the following three main types of FRP shapes used in structural applications: (1) glass fibre-reinforced polymer (GFRP) pultruded profiles; (2作者: Lipoprotein 時間: 2025-3-27 22:35
Wood,ith a minimum of modification, widely known and still mainly processed on an empirical knowledge basis. Since wood is a natural material, there is a plethora of information about its production, about the forestry concerns in environmental terms and the wood’s value within the context of sustainabil作者: 多樣 時間: 2025-3-28 04:23 作者: Glucocorticoids 時間: 2025-3-28 09:48
Nanomaterials,ale, .science, .technology, and .fabrication are the key words of this new paradigm. But how can nanotechnology be defined? Nanotechnology is all about the study and development of new functional artificial materials/systems whose structures and components exhibited novel and significantly improved 作者: 或者發(fā)神韻 時間: 2025-3-28 14:24
Corrosion,egies for reducing the impact of corrosion, preserving the material integrity..It overviews the most important concepts related to corrosion and its impact on material life cycle, being organised in five subchapters dealing respectively with the definition and impact of corrosion, the electrochemica作者: 厭倦嗎你 時間: 2025-3-28 16:47 作者: 嬰兒 時間: 2025-3-28 19:59 作者: 定點 時間: 2025-3-29 00:31 作者: nascent 時間: 2025-3-29 03:19 作者: jaundiced 時間: 2025-3-29 08:28
Hydraulic Binders,ter presents a brief history of hydraulic binder’s discovery and use as well as the environmental and economic context of cement industry. It, then, describes the chemistry and properties of currently most used hydraulic binders—common cements and hydraulic limes—and that of the more promising binde作者: 食道 時間: 2025-3-29 11:38
Ornamental Stones,nstruction products and their requirements are introduced according to specific applications. A particular analysis of the fixing systems for stone cladding is made. The final part of this chapter is dedicated to conservation, durability and maintenance of stone construction products. A final approa作者: 神圣將軍 時間: 2025-3-29 15:49
Cork,ulating joints and expansion or compression joints; and anti-vibration devices for machinery and insulation for industrial refrigeration systems. Cork products are also very important from an ecological standpoint, because cork is a renewable product, used in long-life products, helping to boost CO.作者: Lumbar-Stenosis 時間: 2025-3-29 21:18 作者: Pulmonary-Veins 時間: 2025-3-30 03:29 作者: Epidural-Space 時間: 2025-3-30 04:50
Carla Costan the text corpus, and learn topical word embeddings based on both words and their topics. We conduct experiments on several datasets. The experimental results show that our model outperforms typical text categorization models, especially when the text in the dataset have a similar structure.作者: Pageant 時間: 2025-3-30 11:57 作者: Brochure 時間: 2025-3-30 12:51
Jorge de Brito,Inês Flores-Colen or compromised, the user can revoke it (leaving his other devices intact)..In particular, in this way we create a strong authentication framework for cloud users, where the cloud does not learn indirectly personal data. In the standard solutions there is no way to avoid leaking information that, fo作者: contrast-medium 時間: 2025-3-30 17:15
Manuel Vieirae vulnerabilities of XSS attack on the OSN. The prototype of our framework was developed in Java and integrated the functionality of its components on the virtual machines of mobile cloud platforms. The experimental testing and performance evaluation of our work was carried out on the open source OS作者: 一個攪動不安 時間: 2025-3-30 23:00 作者: Ointment 時間: 2025-3-31 03:12
Rogério Cola?ory effective to detect these anomalies, either. Using some of the available DNS tunneling tools we first show how this phenomenon can occur. Then, we discuss our technique which employs a special ensemble of machine learning algorithms to build a robust classifier to detect such attacks. Our ensembl作者: 不能根除 時間: 2025-3-31 08:42
Joaquim Valente de Almeidary effective to detect these anomalies, either. Using some of the available DNS tunneling tools we first show how this phenomenon can occur. Then, we discuss our technique which employs a special ensemble of machine learning algorithms to build a robust classifier to detect such attacks. Our ensembl作者: 北極人 時間: 2025-3-31 12:23
M. Clara Gon?alvesith over 500 participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate m作者: Enervate 時間: 2025-3-31 16:39 作者: optic-nerve 時間: 2025-3-31 19:32 作者: cleaver 時間: 2025-4-1 01:40