AST/UCMA/ISA/ACN最新文献

筛选
英文 中文
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm 基于快速slp增长算法的有效最小关联规则挖掘
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_28
Z. Abdullah, T. Herawan, M. M. Deris
{"title":"Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm","authors":"Z. Abdullah, T. Herawan, M. M. Deris","doi":"10.1007/978-3-642-13577-4_28","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_28","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"19 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120970951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol 高速数据传输协议实用安全机制的安全性分析
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_9
D. Bernardo, D. Hoang
{"title":"Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol","authors":"D. Bernardo, D. Hoang","doi":"10.1007/978-3-642-13577-4_9","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_9","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' “无线传感器网络中双因素用户认证”的安全性分析
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_5
M. Khan, K. Alghathbar
{"title":"Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'","authors":"M. Khan, K. Alghathbar","doi":"10.1007/978-3-642-13577-4_5","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_5","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model 标准模型下基于id的多接收者匿名签名加密方案
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_2
Bo Zhang, Qiuliang Xu
{"title":"An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model","authors":"Bo Zhang, Qiuliang Xu","doi":"10.1007/978-3-642-13577-4_2","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_2","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115759809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming 基于容错和递归分割的蜂鸣声查询新方法
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_49
Xiaohong Yang, Qingcai Chen, Xiaolong Wang
{"title":"A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming","authors":"Xiaohong Yang, Qingcai Chen, Xiaolong Wang","doi":"10.1007/978-3-642-13577-4_49","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_49","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Topic Detection by Topic Model Induced Distance Using Biased Initiation 基于偏置起始的话题模型诱导距离的话题检测
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_27
Yonghui Wu, Yuxin Ding, Xiaolong Wang, Jun Xu
{"title":"Topic Detection by Topic Model Induced Distance Using Biased Initiation","authors":"Yonghui Wu, Yuxin Ding, Xiaolong Wang, Jun Xu","doi":"10.1007/978-3-642-13577-4_27","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_27","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High Performance MAC Architecture for 3GPP Modem 3GPP调制解调器的高性能MAC架构
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_20
Sejin Park, Yong Kim, Inchul Song, Kichul Han, Jookwang Kim, Kyungho Kim
{"title":"High Performance MAC Architecture for 3GPP Modem","authors":"Sejin Park, Yong Kim, Inchul Song, Kichul Han, Jookwang Kim, Kyungho Kim","doi":"10.1007/978-3-642-13577-4_20","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_20","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks 无线传感器网络中频率不完全同步协同通信的能量效率
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_19
S. Naqvi, S. Berber, Z. Salcic
{"title":"Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks","authors":"S. Naqvi, S. Berber, Z. Salcic","doi":"10.1007/978-3-642-13577-4_19","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_19","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks 基于启发式移动汇聚的动态路由缓解无线传感器网络能量空洞
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_14
Seong-Yong Choi, Jinsu Kim, Seungjin Han, Jun-Hyeog Choi, K. Rim, Jung-Hyun Lee
{"title":"Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks","authors":"Seong-Yong Choi, Jinsu Kim, Seungjin Han, Jun-Hyeog Choi, K. Rim, Jung-Hyun Lee","doi":"10.1007/978-3-642-13577-4_14","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_14","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Pattern-Based Representation Approach for Online Discourses 基于模式的在线语篇表示方法
AST/UCMA/ISA/ACN Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13577-4_33
Hao Xu
{"title":"A Pattern-Based Representation Approach for Online Discourses","authors":"Hao Xu","doi":"10.1007/978-3-642-13577-4_33","DOIUrl":"https://doi.org/10.1007/978-3-642-13577-4_33","url":null,"abstract":"","PeriodicalId":347043,"journal":{"name":"AST/UCMA/ISA/ACN","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131196231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信