標題: Titlebook: Scalable Information Systems; 4th International IC Peter Mueller,Jian-Nong Cao,Cho-Li Wang Conference proceedings 2009 ICST Institute for C [打印本頁] 作者: McKinley 時間: 2025-3-21 19:33
書目名稱Scalable Information Systems影響因子(影響力)
書目名稱Scalable Information Systems影響因子(影響力)學(xué)科排名
書目名稱Scalable Information Systems網(wǎng)絡(luò)公開度
書目名稱Scalable Information Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Scalable Information Systems被引頻次
書目名稱Scalable Information Systems被引頻次學(xué)科排名
書目名稱Scalable Information Systems年度引用
書目名稱Scalable Information Systems年度引用學(xué)科排名
書目名稱Scalable Information Systems讀者反饋
書目名稱Scalable Information Systems讀者反饋學(xué)科排名
作者: 厭食癥 時間: 2025-3-21 20:30 作者: CHYME 時間: 2025-3-22 02:40
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/s/image/861034.jpg作者: Proponent 時間: 2025-3-22 05:25 作者: essential-fats 時間: 2025-3-22 09:53 作者: 星球的光亮度 時間: 2025-3-22 14:24 作者: 聾子 時間: 2025-3-22 20:54 作者: Substance 時間: 2025-3-22 23:49
Yun-Chiu Ching,Ching-Hsien Hsu,Kuan-Ching Lidif- rentiated approach to investigate various types of IS outsourcing relationships and their c- racteristics depending on the underlying expectations of the outsourcing clients. Grounded on the current body of knowledge of the outsourcing research literature and a variety of current theories in the fields o978-3-8349-2275-5978-3-8349-6303-1作者: 深淵 時間: 2025-3-23 01:48 作者: Palpable 時間: 2025-3-23 07:32 作者: Reservation 時間: 2025-3-23 11:35
Rui Wang,Depei Qian,Danfeng Zhu,Qinglin Zhu,Zhongzhi Luancare (also called eHealth) is getting a bigger place into the manufacturers and medical companies, in order to incorporate products for assisted living and remote monitoring of health parameteres. At this point, the IEEE 1073, Personal Health Devices Working Group, stablish the framework for these k作者: 隨意 時間: 2025-3-23 16:50 作者: Preamble 時間: 2025-3-23 20:26 作者: Scleroderma 時間: 2025-3-23 23:10 作者: gait-cycle 時間: 2025-3-24 02:59 作者: CRUE 時間: 2025-3-24 06:34
Identify Intimate Social Relationship in Blogsphere,tionships are kept more stably and different bloggers maintain intimate relationship with the same blogger but they have no social interactions, which is named as the phenomena of familiar strange friends. These findings will contribute to the understanding of blogsphere and providing better blog se作者: Kidney-Failure 時間: 2025-3-24 13:07 作者: 礦石 時間: 2025-3-24 15:05
Measuring IP Address Fragmentation from BGP Routing Dynamics,ances. This is the direct reason of the BGP routing table’s inflation. We further conclude that by reallocating IP address blocks according to geography, we could significantly reduce the size of the global routing tables.作者: 羊齒 時間: 2025-3-24 19:59
On Improving Network Locality in BitTorrent-Like Systems,SPs for reducing transfer of cross-ISP by biased neighbor selection. Second, in order to decrease redundancy, we employ Advanced Tracker (AT) to record the information of pieces that owned by each ISP. Finally, we adopt dynamic priority allocation for improving the file download time. Experimental r作者: GONG 時間: 2025-3-25 00:39 作者: 過時 時間: 2025-3-25 04:30 作者: 責問 時間: 2025-3-25 09:52 作者: 不能強迫我 時間: 2025-3-25 15:42 作者: 青石板 時間: 2025-3-25 17:33 作者: 深淵 時間: 2025-3-25 20:02
A Self-adaptive Fault-Tolerant Mechanism in Wireless Sensor Networks,figures out the weighted volume between any two adjacent nodes. Moreover, we discussed and tried to solve the problems on FTMAWSS (fault-tolerant maximum average-weighted spanning subgraph) in weighted connected graph initiating from clustering WSNs. Because of the use of the tolerant fault, the cor作者: 包裹 時間: 2025-3-26 01:44 作者: 伸展 時間: 2025-3-26 04:28
Yen-Jun Chen,Ching-Hsien Hsu,Kuan-Ching Li,Hsi-Ya Chang,Shuen-Tai Wanggy shall be presented but an approach oriented on practical criteria coming closer to reality and offering methods, which can provide assistance on a case-by-case basis.978-3-662-51553-2978-3-662-43767-4作者: 把手 時間: 2025-3-26 11:06 作者: Ointment 時間: 2025-3-26 16:08 作者: neuron 時間: 2025-3-26 20:09 作者: 整理 時間: 2025-3-26 23:11
Xuejiao Liu,Debao Xiao,Nian Ma,Jie Yull them “securiteers”. They will add value to the business, improving the information security stance of organisations..978-94-007-3262-9978-90-481-8882-6Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 智力高 時間: 2025-3-27 03:01 作者: amorphous 時間: 2025-3-27 06:37
Alexander Aved,Kien A. Hua,Antoniya Petkovall them “securiteers”. They will add value to the business, improving the information security stance of organisations..978-94-007-3262-9978-90-481-8882-6Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 吹牛需要藝術(shù) 時間: 2025-3-27 11:31
Kun-Ming Yu,Yi-Yan Chang,Jiayi Zhou,Chun-Yuan Huang,Whei-meih Chang,Chun-Yuan Lin,Chuan Yi Tangll them “securiteers”. They will add value to the business, improving the information security stance of organisations..978-94-007-3262-9978-90-481-8882-6Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: Gastric 時間: 2025-3-27 13:53 作者: flamboyant 時間: 2025-3-27 19:30 作者: Omniscient 時間: 2025-3-27 23:01 作者: CREEK 時間: 2025-3-28 04:40 作者: 親密 時間: 2025-3-28 06:25
Yun-Chiu Ching,Ching-Hsien Hsu,Kuan-Ching Liation in the IT services industry. It has become an established business practice and a popular research issue. Along with this popularity, o- sourcing has changed tremendously over the past decades and so have its scope, complexity, and the variety of outsourcing options. Surprisingly, still many o作者: 障礙物 時間: 2025-3-28 13:24 作者: 割讓 時間: 2025-3-28 17:24 作者: exhilaration 時間: 2025-3-28 20:20 作者: 低三下四之人 時間: 2025-3-29 01:23
Baoning Niu,Jian Shiolled in the Building Construction Management Program at Purdue University. The e-assessment tool consists of two parts: a student’s component and an instructor’s component. The students’ component is a Virtual Learning Environment that can be used by students to review surveying concepts and practi作者: 察覺 時間: 2025-3-29 03:51 作者: boisterous 時間: 2025-3-29 09:04
Ma Xiu-ying,Lin Jia-junmputers and become active on April 26 and delete programs in hard drives, flash the BIOS, and brick the motherboard. The date was chosen as it is the anniversary of the Chernobyl nuclear meltdown. Back then, IT support staff informed users not to open their PCs on that date so that it would not be a作者: 使習(xí)慣于 時間: 2025-3-29 11:38
Siti M. Wasikon,Mustafa M. Deris processes by using an implementation framework and follow-uUse this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be impleme作者: 過去分詞 時間: 2025-3-29 16:38
Jie Yu,Chengfang Fang,Liming Lu,Zhoujun Li security professionals.Helps executives managing IT securit.IT securiteers - The human and technical dimension working for the organisation...Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT作者: nitroglycerin 時間: 2025-3-29 21:33 作者: 騷擾 時間: 2025-3-30 00:25
Tien-Hsiung Weng,Sheng-Wei Huang,Ruey-Kuen Perng,Ching-Hsien Hsu,Kuan-Ching Li security professionals.Helps executives managing IT securit.IT securiteers - The human and technical dimension working for the organisation...Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT作者: 者變 時間: 2025-3-30 06:18 作者: 千篇一律 時間: 2025-3-30 09:47 作者: depreciate 時間: 2025-3-30 14:16 作者: Geyser 時間: 2025-3-30 16:38 作者: 琺瑯 時間: 2025-3-30 21:19
A Fully Data-Driven Reconfigurable Architecture with Very Coarse-Grained Execution Units,omain applications to improve the cost performance of programmable architectures. However, after the granularity of EUs came up to the level of arithmetic logic unit (ALU) and multiplication accumulation unit (MAC), the trend almost stopped. At present, a great number of reconfigurable architectures作者: 令人苦惱 時間: 2025-3-31 03:11
Identify Intimate Social Relationship in Blogsphere,logsphere has evolved vast and complex social network through blogrolls, citation, reading, comments and other social activities. More attentions are paid on related research for the prevalence of blog. The paper proposes the definition of intimate relationship based on comments links to analyze soc作者: SKIFF 時間: 2025-3-31 08:10 作者: exceptional 時間: 2025-3-31 09:27
Measuring IP Address Fragmentation from BGP Routing Dynamics,aper, we measure the severity of address fragmentation, and try to figure out the relationship between Prefix-Distance and Network-Distance of current Internet by taking Geographic-Distance as an approximation of Network-Distance. We focus our measurement on the prefixes with relatively small Geogra作者: ANIM 時間: 2025-3-31 16:04 作者: 開始發(fā)作 時間: 2025-3-31 17:42 作者: foreign 時間: 2025-4-1 01:08 作者: Melanocytes 時間: 2025-4-1 05:31
Power Consumption Optimization of MPI Programs on Multi-core Clusters,world. In this generation, high speed CPU structures include multi-core CPU have been provided to bring more computational cycles yet efficiently managing power the system needs. Cluster of SMPs and Multi-core CPUs are designed to bring more computational cycles in a sole computing platform, unavoid作者: SPALL 時間: 2025-4-1 08:53
Scalable Workload Adaptation for Mixed Workload, by filtering or controlling the workload presented to it in order to meet its Service Level Objectives (SLOs). The overhead incurred by filtering or controlling the workload is an important factor affecting the effectiveness of workload adaptation. This paper investigates the overhead of AWMF, a fr作者: 粘土 時間: 2025-4-1 11:40
Tuning Performance of P2P Mesh Streaming System Using a Network Evolution Approach,cs, we propose several mechanisms at different system evolution stages. At the first stage, media server encodes the stream into multiple sub-streams of the same length. Redundancy is introduced by using Reed-Solomon (RS) coding before distributing the sub-streams to different successors. Each peer