派博傳思國際中心

標題: Titlebook: Scalable Information Systems; 4th International IC Peter Mueller,Jian-Nong Cao,Cho-Li Wang Conference proceedings 2009 ICST Institute for C [打印本頁]

作者: McKinley    時間: 2025-3-21 19:33
書目名稱Scalable Information Systems影響因子(影響力)




書目名稱Scalable Information Systems影響因子(影響力)學(xué)科排名




書目名稱Scalable Information Systems網(wǎng)絡(luò)公開度




書目名稱Scalable Information Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Scalable Information Systems被引頻次




書目名稱Scalable Information Systems被引頻次學(xué)科排名




書目名稱Scalable Information Systems年度引用




書目名稱Scalable Information Systems年度引用學(xué)科排名




書目名稱Scalable Information Systems讀者反饋




書目名稱Scalable Information Systems讀者反饋學(xué)科排名





作者: 厭食癥    時間: 2025-3-21 20:30

作者: CHYME    時間: 2025-3-22 02:40
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/s/image/861034.jpg
作者: Proponent    時間: 2025-3-22 05:25

作者: essential-fats    時間: 2025-3-22 09:53

作者: 星球的光亮度    時間: 2025-3-22 14:24

作者: 聾子    時間: 2025-3-22 20:54

作者: Substance    時間: 2025-3-22 23:49
Yun-Chiu Ching,Ching-Hsien Hsu,Kuan-Ching Lidif- rentiated approach to investigate various types of IS outsourcing relationships and their c- racteristics depending on the underlying expectations of the outsourcing clients. Grounded on the current body of knowledge of the outsourcing research literature and a variety of current theories in the fields o978-3-8349-2275-5978-3-8349-6303-1
作者: 深淵    時間: 2025-3-23 01:48

作者: Palpable    時間: 2025-3-23 07:32

作者: Reservation    時間: 2025-3-23 11:35
Rui Wang,Depei Qian,Danfeng Zhu,Qinglin Zhu,Zhongzhi Luancare (also called eHealth) is getting a bigger place into the manufacturers and medical companies, in order to incorporate products for assisted living and remote monitoring of health parameteres. At this point, the IEEE 1073, Personal Health Devices Working Group, stablish the framework for these k
作者: 隨意    時間: 2025-3-23 16:50

作者: Preamble    時間: 2025-3-23 20:26

作者: Scleroderma    時間: 2025-3-23 23:10

作者: gait-cycle    時間: 2025-3-24 02:59

作者: CRUE    時間: 2025-3-24 06:34
Identify Intimate Social Relationship in Blogsphere,tionships are kept more stably and different bloggers maintain intimate relationship with the same blogger but they have no social interactions, which is named as the phenomena of familiar strange friends. These findings will contribute to the understanding of blogsphere and providing better blog se
作者: Kidney-Failure    時間: 2025-3-24 13:07

作者: 礦石    時間: 2025-3-24 15:05
Measuring IP Address Fragmentation from BGP Routing Dynamics,ances. This is the direct reason of the BGP routing table’s inflation. We further conclude that by reallocating IP address blocks according to geography, we could significantly reduce the size of the global routing tables.
作者: 羊齒    時間: 2025-3-24 19:59
On Improving Network Locality in BitTorrent-Like Systems,SPs for reducing transfer of cross-ISP by biased neighbor selection. Second, in order to decrease redundancy, we employ Advanced Tracker (AT) to record the information of pieces that owned by each ISP. Finally, we adopt dynamic priority allocation for improving the file download time. Experimental r
作者: GONG    時間: 2025-3-25 00:39

作者: 過時    時間: 2025-3-25 04:30

作者: 責問    時間: 2025-3-25 09:52

作者: 不能強迫我    時間: 2025-3-25 15:42

作者: 青石板    時間: 2025-3-25 17:33

作者: 深淵    時間: 2025-3-25 20:02
A Self-adaptive Fault-Tolerant Mechanism in Wireless Sensor Networks,figures out the weighted volume between any two adjacent nodes. Moreover, we discussed and tried to solve the problems on FTMAWSS (fault-tolerant maximum average-weighted spanning subgraph) in weighted connected graph initiating from clustering WSNs. Because of the use of the tolerant fault, the cor
作者: 包裹    時間: 2025-3-26 01:44

作者: 伸展    時間: 2025-3-26 04:28
Yen-Jun Chen,Ching-Hsien Hsu,Kuan-Ching Li,Hsi-Ya Chang,Shuen-Tai Wanggy shall be presented but an approach oriented on practical criteria coming closer to reality and offering methods, which can provide assistance on a case-by-case basis.978-3-662-51553-2978-3-662-43767-4
作者: 把手    時間: 2025-3-26 11:06

作者: Ointment    時間: 2025-3-26 16:08

作者: neuron    時間: 2025-3-26 20:09

作者: 整理    時間: 2025-3-26 23:11
Xuejiao Liu,Debao Xiao,Nian Ma,Jie Yull them “securiteers”. They will add value to the business, improving the information security stance of organisations..978-94-007-3262-9978-90-481-8882-6Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: 智力高    時間: 2025-3-27 03:01

作者: amorphous    時間: 2025-3-27 06:37
Alexander Aved,Kien A. Hua,Antoniya Petkovall them “securiteers”. They will add value to the business, improving the information security stance of organisations..978-94-007-3262-9978-90-481-8882-6Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: 吹牛需要藝術(shù)    時間: 2025-3-27 11:31
Kun-Ming Yu,Yi-Yan Chang,Jiayi Zhou,Chun-Yuan Huang,Whei-meih Chang,Chun-Yuan Lin,Chuan Yi Tangll them “securiteers”. They will add value to the business, improving the information security stance of organisations..978-94-007-3262-9978-90-481-8882-6Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: Gastric    時間: 2025-3-27 13:53

作者: flamboyant    時間: 2025-3-27 19:30

作者: Omniscient    時間: 2025-3-27 23:01

作者: CREEK    時間: 2025-3-28 04:40

作者: 親密    時間: 2025-3-28 06:25
Yun-Chiu Ching,Ching-Hsien Hsu,Kuan-Ching Liation in the IT services industry. It has become an established business practice and a popular research issue. Along with this popularity, o- sourcing has changed tremendously over the past decades and so have its scope, complexity, and the variety of outsourcing options. Surprisingly, still many o
作者: 障礙物    時間: 2025-3-28 13:24

作者: 割讓    時間: 2025-3-28 17:24

作者: exhilaration    時間: 2025-3-28 20:20

作者: 低三下四之人    時間: 2025-3-29 01:23
Baoning Niu,Jian Shiolled in the Building Construction Management Program at Purdue University. The e-assessment tool consists of two parts: a student’s component and an instructor’s component. The students’ component is a Virtual Learning Environment that can be used by students to review surveying concepts and practi
作者: 察覺    時間: 2025-3-29 03:51

作者: boisterous    時間: 2025-3-29 09:04
Ma Xiu-ying,Lin Jia-junmputers and become active on April 26 and delete programs in hard drives, flash the BIOS, and brick the motherboard. The date was chosen as it is the anniversary of the Chernobyl nuclear meltdown. Back then, IT support staff informed users not to open their PCs on that date so that it would not be a
作者: 使習(xí)慣于    時間: 2025-3-29 11:38
Siti M. Wasikon,Mustafa M. Deris processes by using an implementation framework and follow-uUse this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be impleme
作者: 過去分詞    時間: 2025-3-29 16:38
Jie Yu,Chengfang Fang,Liming Lu,Zhoujun Li security professionals.Helps executives managing IT securit.IT securiteers - The human and technical dimension working for the organisation...Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT
作者: nitroglycerin    時間: 2025-3-29 21:33

作者: 騷擾    時間: 2025-3-30 00:25
Tien-Hsiung Weng,Sheng-Wei Huang,Ruey-Kuen Perng,Ching-Hsien Hsu,Kuan-Ching Li security professionals.Helps executives managing IT securit.IT securiteers - The human and technical dimension working for the organisation...Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT
作者: 者變    時間: 2025-3-30 06:18

作者: 千篇一律    時間: 2025-3-30 09:47

作者: depreciate    時間: 2025-3-30 14:16

作者: Geyser    時間: 2025-3-30 16:38

作者: 琺瑯    時間: 2025-3-30 21:19
A Fully Data-Driven Reconfigurable Architecture with Very Coarse-Grained Execution Units,omain applications to improve the cost performance of programmable architectures. However, after the granularity of EUs came up to the level of arithmetic logic unit (ALU) and multiplication accumulation unit (MAC), the trend almost stopped. At present, a great number of reconfigurable architectures
作者: 令人苦惱    時間: 2025-3-31 03:11
Identify Intimate Social Relationship in Blogsphere,logsphere has evolved vast and complex social network through blogrolls, citation, reading, comments and other social activities. More attentions are paid on related research for the prevalence of blog. The paper proposes the definition of intimate relationship based on comments links to analyze soc
作者: SKIFF    時間: 2025-3-31 08:10

作者: exceptional    時間: 2025-3-31 09:27
Measuring IP Address Fragmentation from BGP Routing Dynamics,aper, we measure the severity of address fragmentation, and try to figure out the relationship between Prefix-Distance and Network-Distance of current Internet by taking Geographic-Distance as an approximation of Network-Distance. We focus our measurement on the prefixes with relatively small Geogra
作者: ANIM    時間: 2025-3-31 16:04

作者: 開始發(fā)作    時間: 2025-3-31 17:42

作者: foreign    時間: 2025-4-1 01:08

作者: Melanocytes    時間: 2025-4-1 05:31
Power Consumption Optimization of MPI Programs on Multi-core Clusters,world. In this generation, high speed CPU structures include multi-core CPU have been provided to bring more computational cycles yet efficiently managing power the system needs. Cluster of SMPs and Multi-core CPUs are designed to bring more computational cycles in a sole computing platform, unavoid
作者: SPALL    時間: 2025-4-1 08:53
Scalable Workload Adaptation for Mixed Workload, by filtering or controlling the workload presented to it in order to meet its Service Level Objectives (SLOs). The overhead incurred by filtering or controlling the workload is an important factor affecting the effectiveness of workload adaptation. This paper investigates the overhead of AWMF, a fr
作者: 粘土    時間: 2025-4-1 11:40
Tuning Performance of P2P Mesh Streaming System Using a Network Evolution Approach,cs, we propose several mechanisms at different system evolution stages. At the first stage, media server encodes the stream into multiple sub-streams of the same length. Redundancy is introduced by using Reed-Solomon (RS) coding before distributing the sub-streams to different successors. Each peer




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
嵊州市| 红安县| 禹城市| 武清区| 峨边| 新津县| 轮台县| 博湖县| 鹤壁市| 河东区| 临沭县| 叶城县| 兴业县| 临湘市| 交城县| 班玛县| 汕头市| 呼和浩特市| 博野县| 林芝县| 阿尔山市| 阿图什市| 宁明县| 突泉县| 冷水江市| 晋州市| 肃宁县| 桂阳县| 拜泉县| 丰顺县| 皋兰县| 平阳县| 米易县| 师宗县| 秀山| 桦南县| 南丰县| 宜兰县| 门源| 昆山市| 兴业县|