找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing; 10th EAI Internation Lianyong Qi,Mohammad R. Khosravi,Varun G. Menon Conference proceedings 2021 ICST Institute for Comput

[復(fù)制鏈接]
樓主: T-Lymphocyte
31#
發(fā)表于 2025-3-26 22:32:35 | 只看該作者
A Fraud Detection Approach Based on Combined Feature Weighting. We first introduce the data preprocessing measures for handling imbalanced fraud detection dataset. Then we compare related models to implement fraudster recognition. We also propose a feature selection approach based on combined feature weights. Some future research interests are also envisioned.
32#
發(fā)表于 2025-3-27 02:40:05 | 只看該作者
Research on Distributed Trust Management in IoTposed trust mechanism, trustrank is quantified by normative trust and risk measures. Performance analysis shows that the proposed trust mechanism has a higher probability of high trust device being selected and higher success rate of cooperation.
33#
發(fā)表于 2025-3-27 09:01:23 | 只看該作者
34#
發(fā)表于 2025-3-27 09:29:38 | 只看該作者
A Dual-Index Based Representation for Processing XPath Queries on Very Large XML Documentss remains a challenge in case XML documents are very large. In this study, we implemented a tree-shaped data structure called partial tree that is intrinsically suitable for large XML document processing with multiple computers. Our implementation uses two index sets to accelerate the evaluation of
35#
發(fā)表于 2025-3-27 14:16:57 | 只看該作者
IAS-BERT: An Information Gain Association Vector Semi-supervised BERT Model for Sentiment Analysisal Encoder Representations from Transformers (BERT), as one of those models, has achieved excellent results in various tasks of NLP since its emergence. But it still has shortcomings, such as poor capability of extracting local features and exploding of training gradients. After analyzing the shortc
36#
發(fā)表于 2025-3-27 20:17:07 | 只看該作者
A Concept Lattice Method for Eliminating Redundant Featuresormation from omics genes quickly. Feature selection is an important step of data preprocessing, and it is one of the key factors affecting the capability of algorithm information extraction. Since single feature selection method causes the deviation of feature subsets, we introduce ensemble learnin
37#
發(fā)表于 2025-3-28 01:43:20 | 只看該作者
Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detectionome the targets of malicious attacks or hackers due to the centralization of data storage and computing facilities. Most intrusion attacks to cloud servers are often originated from inner or external networks. Intrusion detection is a prerequisite to designing anti-intrusion countermeasures of cloud
38#
發(fā)表于 2025-3-28 03:28:52 | 只看該作者
39#
發(fā)表于 2025-3-28 09:34:25 | 只看該作者
40#
發(fā)表于 2025-3-28 13:33:57 | 只看該作者
Lightweight Anonymous Communication Model Based on Anonymous IBE have a greater demand for privacy. In addition, the development of mobile Internet and cloud computing requires the communication model to be as efficient and low-bandwidth as possible on the basis of security. In order to achieve the goal of protecting users’ data privacy, this paper firstly prese
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 10:42
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
疏附县| 广平县| 肥城市| 固镇县| 麻江县| 莎车县| 沁源县| 乐清市| 萝北县| 新乡市| 乌兰浩特市| 囊谦县| 成安县| 漳州市| 科技| 凭祥市| 宣汉县| 民县| 崇仁县| 延川县| 宜丰县| 宁安市| 西吉县| 罗山县| 台东市| 萍乡市| 家居| 永兴县| 天水市| 余姚市| 汝城县| 梨树县| 吴忠市| 当雄县| 邓州市| 兴文县| 黄大仙区| 宜昌市| 石屏县| 无极县| 东乡县|