作者: 吊胃口 時(shí)間: 2025-3-21 21:04
Soumaya Bel Hadj Youssef,Slim Rekhis,Noureddine Boudriga作者: NAVEN 時(shí)間: 2025-3-22 02:18
QoS-Aware Tactical Power Control for?5G?Networksw that, at the ESE, no player can increase its QoS without degrading the overall performance. Finally, in order to reach the ESE and the maximum network capacity, we propose a fully distributed scheme based on the Banach-Picard algorithm and show, through simulation results, its qualitative properti作者: 殘暴 時(shí)間: 2025-3-22 06:05
Quality of Experience in HTTP Adaptive Video Streaming Systems and buffer-based adaptation mechanisms. Extensive simulations using an MPEG/DASH client server application on ns-3 show that the proposed scheme performs remarkably well even under challenging network conditions.作者: 運(yùn)動(dòng)性 時(shí)間: 2025-3-22 11:06 作者: Choreography 時(shí)間: 2025-3-22 15:16
Imane Tamimi,El Khadir Lamrani,Mohamed El Kamilihostility to Catholicism, a belief in national exceptionalism and more—to argue that the United States was not a Christian nation, branding their opponents as fanatics who threatened both democratic liberties as well as true religion.?.978-3-030-02877-0作者: 大漩渦 時(shí)間: 2025-3-22 19:41 作者: 沒(méi)有貧窮 時(shí)間: 2025-3-22 22:55 作者: 別炫耀 時(shí)間: 2025-3-23 05:24
Sara Berri,Vineeth Varma,Samson Lasaulce,Mohammed Said Radjef,Jamal Daafouze phase space structure of cold stellar disks. The thesis subsequently determines the characteristic timescales and examines the signatures of secular evolution in this framework on two scales: from the kinetic evolution in galactic disks and their thickening via giant molecular clouds; all the way 作者: 即席演說(shuō) 時(shí)間: 2025-3-23 08:15
Hajar El Hammouti,Essaid Sabir,Hamidou Tembineg changing thoughts about Jesus over time. More specifically, R?is?nen observes, “We find two conflicting lines of Paul’s theology of the law. Paul asserts both the abolition of the law and also its permanently normative character,”. leading R?is?nen to suggest it “is not literally a law” (81). N. T作者: 字形刻痕 時(shí)間: 2025-3-23 10:54 作者: Carcinoma 時(shí)間: 2025-3-23 15:41 作者: 天真 時(shí)間: 2025-3-23 18:26
Anne Marie Amja,Abdel Obaid,Hafedh Mili,Zahi Jarirthat militant Islam became a potential threat, especially following the attacks on September 11, 2001 as well as the Cartoon Crisis in 2005/20066. The teaching of religion was in these years seen as an instrument to combat fundamentalism and terrorism.作者: 責(zé)怪 時(shí)間: 2025-3-23 23:07 作者: HILAR 時(shí)間: 2025-3-24 03:14
Houda Moudni,Mohamed Er-rouidi,Hassan Faouzi,Hicham Mouncif,Benachir El Hadadithis model, this book chapter describes how to apply the controllability and observability aspects of linear/non-linear systems to manage cybersecurity risk and resilience of cyber-physical systems. The purpose of employing controllability is to steer a system from an abnormal security state to a no作者: JAUNT 時(shí)間: 2025-3-24 08:29 作者: META 時(shí)間: 2025-3-24 13:24
Nabil Mesbahi,Hamza Dahmouniues, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.978-981-13-2522-9978-981-13-2523-6Series ISSN 2191-8112 Series E-ISSN 2191-8120 作者: 不合 時(shí)間: 2025-3-24 17:05 作者: glomeruli 時(shí)間: 2025-3-24 19:45
Rabii El Ghorfi,Mohamed El Aroussi,Mohamed Ouadou,Driss Aboutajdinewed by a literature review of trust in P2P systems. We then introduce and develop a Universal Trust Set as a foundation for building trustworthy environment, and then our approach for implementing the set, and the future of P2P systems where we will discuss other open issues that need addressing. We作者: 金哥占卜者 時(shí)間: 2025-3-25 02:14
Oussama Mjihil,Dijiang Huang,Abdelkrim Haqiqiderable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net- works. The book is targeted towards pr作者: 討人喜歡 時(shí)間: 2025-3-25 06:52 作者: SCORE 時(shí)間: 2025-3-25 09:08
A Formal Framework for Adaptationation method that consists of imposing constraints to restrain the behavior of components and transforming operators to modify a system’s architecture. We also integrate our approach on the use of a control loop. We simulate the model using a simple application from the medical field.作者: 安裝 時(shí)間: 2025-3-25 12:32 作者: 來(lái)自于 時(shí)間: 2025-3-25 18:44
A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Developmentserve the maximal possible number of incoming requests, maximize the connectivity between busy UAVs, and minimize the consumed UAV energy. A set of algorithms are provided for the re-deployment of idle UAVs, and the reallocation of data collection tasks of UAVs. A simulation is conducted to evaluate the proposal.作者: chalice 時(shí)間: 2025-3-25 21:02 作者: vocation 時(shí)間: 2025-3-26 00:37
Impact of Link Lifetime on QoS in Mobile Ad-Hoc Networkser to investigate the network connectivity properties by analyzing the link availability of a given node. Furthermore, to further understand the implication of link properties, analytical results are used to investigate network metrics that can be used in the ad-hoc routing design and the analysis of associated performance.作者: 抱怨 時(shí)間: 2025-3-26 08:10 作者: 自作多情 時(shí)間: 2025-3-26 09:41 作者: MAIZE 時(shí)間: 2025-3-26 14:07 作者: fructose 時(shí)間: 2025-3-26 17:51 作者: FORGO 時(shí)間: 2025-3-26 22:00 作者: Coordinate 時(shí)間: 2025-3-27 05:05
A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11 aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion作者: Indicative 時(shí)間: 2025-3-27 07:46
Leveraging User Intuition to Predict Item Popularity in Social Networks adopters (. being a small number around 5) has a higher predictive power than other non-temporal features, such as those related to the characteristics of the adopters. Here, we challenge this claim by proposing a new feature, based on the users’ intuitions, which is shown to provide significantly 作者: Notify 時(shí)間: 2025-3-27 10:12 作者: harmony 時(shí)間: 2025-3-27 14:42 作者: 文藝 時(shí)間: 2025-3-27 19:38
A Formal Framework for Adaptationself in response to context changes. Developing self-adaptive systems is a challenging problem in component-based software engineering. This paper presents a formal model and framework for component-based adaptation founded on process algebra. With respect to this semantic model, we propose an adapt作者: landmark 時(shí)間: 2025-3-28 01:31
A Comprehensive Study of Intelligent Transportation System Architectures for Road Congestion Avoidannd the economy. Thus, congestion avoidance is one of the main challenges facing ITS. In the aim of reducing the congestion problem, different ITS schemes were proposed. In this paper, we present a comprehensive study of the recent approaches dealing with the congestion issue. This study brings to th作者: Headstrong 時(shí)間: 2025-3-28 03:39
Enhancing Security in Optimized Link State Routing Protocol for Mobile Ad Hoc Networksnetwork, the dynamic topology and openness of wireless links. One of the most critical issues for MANETs is the security requirements. Hence, many researchers have focused their works on enhancing security in these networks. However, the security enhancements in routing protocols have been mostly pr作者: 高興去去 時(shí)間: 2025-3-28 07:34 作者: 染色體 時(shí)間: 2025-3-28 14:00 作者: 使饑餓 時(shí)間: 2025-3-28 16:15 作者: 打谷工具 時(shí)間: 2025-3-28 21:55 作者: bromide 時(shí)間: 2025-3-29 00:51 作者: OTTER 時(shí)間: 2025-3-29 04:51
Migration from Web Services to Cloud Services landscape of information technology. It has three services models namely, Software as a Service (SaaS). Platform as a Service (PaaS). Infrastructure as a Service (IaaS) and four deployment models (Private Cloud, Community Cloud, Public Cloud, Hybrid Cloud). In this paper, we have presented a compar作者: 用不完 時(shí)間: 2025-3-29 10:23 作者: Decongestant 時(shí)間: 2025-3-29 11:52
Conference proceedings 2017 in May 2017. . The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions. They were organized in topical sections named: context-awareness and autonomy paradigms; mobile edge networking and virtualization; ubiquitous internet of things: emerging technolog作者: Deject 時(shí)間: 2025-3-29 17:41 作者: Incommensurate 時(shí)間: 2025-3-29 23:39 作者: 粗野 時(shí)間: 2025-3-29 23:56
0302-9743 ubmissions. They were organized in topical sections named: context-awareness and autonomy paradigms; mobile edge networking and virtualization; ubiquitous internet of things: emerging technologies and breakthroughs; and enablers, challenges and applications.?.978-3-319-68178-8978-3-319-68179-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Lasting 時(shí)間: 2025-3-30 07:17
Studying Node Cooperation in Reputation Based Packet Forwarding Within Mobile Ad Hoc Networks conditions that result in cooperative behavior by studying the evolutionary stable states of the proposed game. Numerical analysis is provided to study the resulting equilibria and to illustrate how the proposed model performs compared to traditional models.作者: 尊嚴(yán) 時(shí)間: 2025-3-30 11:48
A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11per, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our reaction scheme and a resolution of the game by Kühn’s algorithm. A validation of results though the NS2 network simulator is then given to the end.作者: embolus 時(shí)間: 2025-3-30 13:31
Community Detection Through Topic Modeling in Social Networks users, the lowest layer would detect topics of interest of each user while the upper layer would form communities from generated topics. We conclude the paper stating our perspectives and future works.作者: 性學(xué)院 時(shí)間: 2025-3-30 19:29
A Comprehensive Study of Intelligent Transportation System Architectures for Road Congestion Avoidanthe travel delay. However, they are generally focusing on vehicles control and ignoring other elements, such as the use of the road in daily life. The current study presents a new direction of future researches on congestion management systems.作者: 煞費(fèi)苦心 時(shí)間: 2025-3-30 22:12
Enhancing Security in Optimized Link State Routing Protocol for Mobile Ad Hoc Networksty service such as authentication, data integrity, privacy and confidentiality. Also, the hash-chain is used to protect the mutable fields in the routing packets. Moreover, our proposal uses a timestamp to prevent the replay attack.作者: 乞討 時(shí)間: 2025-3-31 01:16
NGN Management with NGOSS Framework-Based IMS Use Caseework and IMS platform, the article proposes a new architecture of monitoring IMS services with correction of the Quality of Service (QoS) degradation. The performance of the proposed architecture is evaluated by experiments.作者: 急性 時(shí)間: 2025-3-31 06:54
Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Process of virtual machines and perform a parallel security analysis. We have performed experimental validation using a real networked system to show the performance improvement in comparison with MULVAL network security analyzer.作者: 下級(jí) 時(shí)間: 2025-3-31 09:13
tions (ASEAN) in particular and in the Asia Pacific Economic Co-operation (APEC) region in general, the trading countries of the world have taken a keen interest in this new and important change. This interest arises from the fact that Vietnam is a country in an early stage of economic development, 作者: 必死 時(shí)間: 2025-3-31 17:23
ominance of religious perspectives and theological voices that marked the emergence and establishment of "bioethics" in the late 1960s and 1970s has eroded steadily as philosophers, lawyers, and others have relativized their role and influ- ence, at best, or dismissed it entirely, at worst. The secu作者: Autobiography 時(shí)間: 2025-3-31 18:29 作者: 向下五度才偏 時(shí)間: 2025-3-31 22:09
Hajar El Hammouti,Essaid Sabir,Hamidou Tembinebout the law lead to much confusion about his theology and whether it could even be considered theology. For example, if Paul’s gospel is centered on the fact that, because of Christ, the law of circumcision has been abrogated, historians note that Paul contradicts himself when he claims that there 作者: installment 時(shí)間: 2025-4-1 02:03