標(biāo)題: Titlebook: Sustainability in Energy and Buildings; Proceedings of the 4 Anne Hakansson,Mattias H?jer,Lakhmi C Jain Conference proceedings 2013 Springe [打印本頁(yè)] 作者: ISH 時(shí)間: 2025-3-21 19:44
書(shū)目名稱(chēng)Sustainability in Energy and Buildings影響因子(影響力)
書(shū)目名稱(chēng)Sustainability in Energy and Buildings影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Energy and Buildings網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Sustainability in Energy and Buildings網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Energy and Buildings被引頻次
書(shū)目名稱(chēng)Sustainability in Energy and Buildings被引頻次學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Energy and Buildings年度引用
書(shū)目名稱(chēng)Sustainability in Energy and Buildings年度引用學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Energy and Buildings讀者反饋
書(shū)目名稱(chēng)Sustainability in Energy and Buildings讀者反饋學(xué)科排名
作者: 喃喃訴苦 時(shí)間: 2025-3-21 23:59 作者: Flustered 時(shí)間: 2025-3-22 01:49
Sustainability in Energy and Buildings978-3-642-36645-1Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: 慷慨不好 時(shí)間: 2025-3-22 04:58 作者: Fulsome 時(shí)間: 2025-3-22 09:34
Smart Innovation, Systems and Technologieshttp://image.papertrans.cn/t/image/882873.jpg作者: 內(nèi)疚 時(shí)間: 2025-3-22 13:20
https://doi.org/10.1007/978-3-642-36645-1Sustainability in Buildings; Sustainability in Energy作者: Rebate 時(shí)間: 2025-3-22 18:08
Transformational Role of Lochiel Park Green Village, demonstrates how structural change at the regime level has come from the experience of actors at the niche level. The creation of the Lochiel Park Green Village has allowed many organisations to gain a more detailed and practical understanding of sustainable housing, and has given organisations the作者: 錫箔紙 時(shí)間: 2025-3-22 23:09 作者: Indelible 時(shí)間: 2025-3-23 01:48
Using the Energy Signature Method to Estimate the Effective U-Value of Buildings,studied real-world houses. The results show that the increasingly strict U-value requirements of more recent building codes have resulted in lower U-values for newer buildings, and that static energy signature models can be used to estimate the effective U-value of buildings provided that the differ作者: 抒情短詩(shī) 時(shí)間: 2025-3-23 07:47
Analysis of Structural Changes of the Load Profiles of the German Residential Sector due to Decentrpeaks. At the same time, electricity generation from photovoltaic sources can entirely compensate this additional demand by e-mobility, if decentralized electricity generation can be matched with the electricity demand via demand-side-management (DSM) or storage devices.作者: 逗留 時(shí)間: 2025-3-23 09:42 作者: 牽索 時(shí)間: 2025-3-23 16:36 作者: 閑聊 時(shí)間: 2025-3-23 18:52
,Solar Collector Based on Heat Pipes for Building Fa?ades, not worse than of the other known ones made of heavier and more expensive copper with higher thermal conductance, or having entire rigid designs. Some variants of the developed solar collectors shaping of the assembled modules for building fa?ade or roof integration are proposed. Variously coloured作者: 徹底明白 時(shí)間: 2025-3-23 22:20 作者: 矛盾心理 時(shí)間: 2025-3-24 02:39
Conference proceedings 2013hnology for renewable energy and sustainability in the built environment, optimization and modeling techniques, information and communication technology usage, behavior and practice, including applications.作者: hallow 時(shí)間: 2025-3-24 08:25
2190-3018 bility in Energy and Buildings. Applicable areas include technology for renewable energy and sustainability in the built environment, optimization and modeling techniques, information and communication technology usage, behavior and practice, including applications.978-3-642-43491-4978-3-642-36645-1Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: 遺留之物 時(shí)間: 2025-3-24 14:11
y, concurrent care-of addresses reachability tests are used to verify mobile nodes’ reachability at the claimed care-of-addresses. In addition, this paper proposes the idea of segmenting the IPv6 address space into three parts: home addresses, care-of addresses, and stationary addresses to different作者: 膽汁 時(shí)間: 2025-3-24 15:34 作者: 外科醫(yī)生 時(shí)間: 2025-3-24 21:07
Giuseppe M. Tina,Cristina Ventura compare these with the stationary case, demonstrating that the additional cost of reprogramming in a mobile WSN is less than 25% of that in a stationary WSN and the additional cost of re-clustering in a mobile WSN is less than 9% of that in a stationary WSN. Authentication has an insignificant cost作者: Femine 時(shí)間: 2025-3-24 23:17 作者: 節(jié)省 時(shí)間: 2025-3-25 03:53 作者: 歌唱隊(duì) 時(shí)間: 2025-3-25 08:51 作者: Badger 時(shí)間: 2025-3-25 12:42
Hakan Hisarligils further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, comm作者: AER 時(shí)間: 2025-3-25 19:52 作者: zonules 時(shí)間: 2025-3-25 20:40 作者: Presbycusis 時(shí)間: 2025-3-26 01:20 作者: PAEAN 時(shí)間: 2025-3-26 05:02
Ricardo Ramírez Villegas,Bj?rn Frostellng the vulnerability dataset, which was obtained by scanning the IP addresses of several enterprises in Hebei Province, China. The experimental results show that the approach of using network security vulnerabilities to assess network security status is feasible.作者: fibula 時(shí)間: 2025-3-26 10:27 作者: Evacuate 時(shí)間: 2025-3-26 16:13
Anna Kramers protocols based on multi-key FHE, which supports multiple users and satisfies the semi-honest security model where cloud computing is outsourced. Our protocol requires no interaction from the data analysis and users during online secure classification. Performance evaluation demonstrates that our n作者: 只有 時(shí)間: 2025-3-26 20:47 作者: jovial 時(shí)間: 2025-3-26 22:02 作者: 音樂(lè)會(huì) 時(shí)間: 2025-3-27 01:44
Floriberta Binarti,Agustinus D. Istiadji,Prasasto Satwiko,Priyo T. Iswanto. To seek a solution, we propose a privacy-aware and time-limited data access control (PATLDAC) scheme for secure UAV data sharing in Cloud-based IoD. Specifically, PATLDAC achieves user privacy preserving through partially hidden access policy which conceals the values of attributes while leaves th作者: MOCK 時(shí)間: 2025-3-27 06:59
Abdolsalam Ebrahimpour,Yousef Karimi VahedPI call sequence as input for App visualization, and analyzes the classifier detection accuracy and detection time under each input characteristics. According to the experimental results, we found that using the API call sequence as the color visualization input feature can achieve the highest detec作者: 不如樂(lè)死去 時(shí)間: 2025-3-27 12:22 作者: Schlemms-Canal 時(shí)間: 2025-3-27 16:48 作者: 不能強(qiáng)迫我 時(shí)間: 2025-3-27 19:47
Farivar Fazelpour,Majid Vafaeipour,Omid Rahbari,Mohammad H. Valizadehraction between users. This framework would help lower the level of the complexity of the entire system and reduce the cost of authentication by leveraging edge cache. We prove the security of the proposed authentication scheme and present performance analysis to show its efficiency.作者: 財(cái)政 時(shí)間: 2025-3-28 01:40
its home link. The Mobile IPv6 protocol protects a home registration scheme against outsider attacks, but it fails to protect from attacks by legitimate mobile nodes behaving maliciously. A malicious mobile node could pretend to own a third-party’s address and luring its home agent to flood that vic作者: 憤怒歷史 時(shí)間: 2025-3-28 02:34
Stephen Robert Berryible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and impl作者: legacy 時(shí)間: 2025-3-28 09:16
Giuseppe M. Tina,Cristina Venturaible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and impl作者: ingrate 時(shí)間: 2025-3-28 12:10
Dimitrios N. Kaziolas,Iordanis Zygomalas,Georgios E. Stavroulakis,Dimitrios Emmanouloudis,Charalamboible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and impl作者: 華而不實(shí) 時(shí)間: 2025-3-28 14:43 作者: nauseate 時(shí)間: 2025-3-28 21:33
Vahid Sabouri,Paula Femeníasnot only address the consumer electronics market but are also increasingly being used in a business and industry context. Thus, we see a demand for research developing software systems comprising mobile devices with special respect to security concerns. In this paper we want to address this demand f作者: 悄悄移動(dòng) 時(shí)間: 2025-3-29 03:00 作者: 刻苦讀書(shū) 時(shí)間: 2025-3-29 05:15 作者: Precursor 時(shí)間: 2025-3-29 07:59
Stephen Lorimer,Marianne Jang,Korinna Thielenthe development of smart cities, smart transportation, and many other fields. In SIoT, the openness and mobility of objects are enhanced. However, this tends to lead to network data sparsity problems. By distinguishing explicit and implicit social relationships, we introduce an implicit social relat作者: 來(lái)自于 時(shí)間: 2025-3-29 12:13 作者: Vo2-Max 時(shí)間: 2025-3-29 16:47 作者: Infusion 時(shí)間: 2025-3-29 23:46 作者: 憤怒事實(shí) 時(shí)間: 2025-3-30 03:34
Anna Kramersrting ML typically process and classification manufacturing data services via cloud-based technologies. In order to achieve secure and efficient data collection and application, we design, implement and evaluate a new system employing a SVM classifier model over encrypted data (SVMCM-ED) based on mu作者: Latency 時(shí)間: 2025-3-30 06:43 作者: GULF 時(shí)間: 2025-3-30 09:36 作者: 浮夸 時(shí)間: 2025-3-30 12:51 作者: misshapen 時(shí)間: 2025-3-30 19:44
Abdolsalam Ebrahimpour,Yousef Karimi Vahed-classification of malicious App families is rarely studied. If we can visualize the Android malicious Apps as color images, we will get more features than using grayscale images. In this paper, a method of color visualization for Android Apps is proposed and implemented. Based on this, combined wit作者: 思考而得 時(shí)間: 2025-3-30 22:23 作者: 使迷惑 時(shí)間: 2025-3-31 02:36
Arefeh Hesaraki,Sture Holmbergfects the security of cyberspace. How to detect anonymous network flow to position the anonymous users, is becoming to a research hotspot. However, with rapid development of the encryption and network technology, it is a nontrivial task to detect and position the anonymous user in such a complex net作者: 不要不誠(chéng)實(shí) 時(shí)間: 2025-3-31 08:43
Farivar Fazelpour,Majid Vafaeipour,Omid Rahbari,Mohammad H. Valizadehal systems. While such systems present substantial security challenges for the host-centric communication with the growing trend of sensor data streams. Information Centric Networking (ICN) architecture suggests features exploitable in ICPS applications, reducing delivery latency and promoting quali作者: scotoma 時(shí)間: 2025-3-31 10:08 作者: Arboreal 時(shí)間: 2025-3-31 14:16 作者: 全部 時(shí)間: 2025-3-31 20:10