International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
An Optimized Parallel Algorithm for Exact String Matching Using Message Passing Interface 一种基于消息传递接口的精确字符串匹配优化并行算法
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_11
Sucharitha Shetty, B. D. Rao, S. Prabhu
{"title":"An Optimized Parallel Algorithm for Exact String Matching Using Message Passing Interface","authors":"Sucharitha Shetty, B. D. Rao, S. Prabhu","doi":"10.1007/978-981-13-2907-4_11","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_11","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing Resource Scheduling Optimization Based on Chaotic Firefly Algorithm Based on the Tent Mapping 基于Tent映射的混沌萤火虫算法的云计算资源调度优化
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_10
X. Xie, Mengnan Qiu
{"title":"Cloud Computing Resource Scheduling Optimization Based on Chaotic Firefly Algorithm Based on the Tent Mapping","authors":"X. Xie, Mengnan Qiu","doi":"10.1007/978-981-13-2907-4_10","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_10","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Memory Allocation of Embedded Real-Time Operating System Based on TLSF 基于TLSF的嵌入式实时操作系统动态内存分配
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_3
Xiao-hui Cheng, Haodong Tang
{"title":"Dynamic Memory Allocation of Embedded Real-Time Operating System Based on TLSF","authors":"Xiao-hui Cheng, Haodong Tang","doi":"10.1007/978-981-13-2907-4_3","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Tree Based Approach for Concept Maps Construction in Adaptive Learning Systems 自适应学习系统中基于树的概念图构建方法
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_15
Niharika Gupta, Vipul Mayank, M. Geetha, Shwetha Rai, Shyam S Karanth
{"title":"A Tree Based Approach for Concept Maps Construction in Adaptive Learning Systems","authors":"Niharika Gupta, Vipul Mayank, M. Geetha, Shwetha Rai, Shyam S Karanth","doi":"10.1007/978-981-13-2907-4_15","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_15","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126288500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual Attention and Memory Augmented Activity Recognition and Behavioral Prediction 视觉注意与记忆增强活动识别与行为预测
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_8
Nidhinandana Salian
{"title":"Visual Attention and Memory Augmented Activity Recognition and Behavioral Prediction","authors":"Nidhinandana Salian","doi":"10.1007/978-981-13-2907-4_8","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_8","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130129205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments 云计算环境下的多用户保序加密方案
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_2
Taoshen Li, Xiong Zhou, Ruwei Wang
{"title":"Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments","authors":"Taoshen Li, Xiong Zhou, Ruwei Wang","doi":"10.1007/978-981-13-2907-4_2","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_2","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114901416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis to Enhance Detection of Latent Astroturfing Groups in Online Social Networks 情感分析增强在线社交网络中潜在群体的检测
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_7
N. Alallaq, Muhmmad Al-Khiza'ay, Mohammed Iqbal Dohan, Xin Han
{"title":"Sentiment Analysis to Enhance Detection of Latent Astroturfing Groups in Online Social Networks","authors":"N. Alallaq, Muhmmad Al-Khiza'ay, Mohammed Iqbal Dohan, Xin Han","doi":"10.1007/978-981-13-2907-4_7","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_7","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model of Decision Making for Agents Based on Relationship Coefficient 基于关系系数的agent决策模型
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_17
Zheng Wang, Jiang Yu
{"title":"Model of Decision Making for Agents Based on Relationship Coefficient","authors":"Zheng Wang, Jiang Yu","doi":"10.1007/978-981-13-2907-4_17","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_17","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128244429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Computing Security Model Based on Type System 基于类型系统的分布式计算安全模型
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_9
Yong Huang, Yongsheng Li, Q. Jin
{"title":"Distributed Computing Security Model Based on Type System","authors":"Yong Huang, Yongsheng Li, Q. Jin","doi":"10.1007/978-981-13-2907-4_9","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_9","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115315683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotion Recognition in a Conversational Context 会话语境中的情绪识别
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_18
B. Chakraborty, M. Geetha
{"title":"Emotion Recognition in a Conversational Context","authors":"B. Chakraborty, M. Geetha","doi":"10.1007/978-981-13-2907-4_18","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_18","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信