International Standard Conference of Trustworthy Computing and Services最新文献

筛选
英文 中文
A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering System 基于反馈的集群渲染系统动态负载均衡策略
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_6
Qian Li, Weiguo Wu, Liang Gao, Lei Wang, Jianhang Huang
{"title":"A Dynamic Load Balancing Strategy Based on Feedback for Cluster Rendering System","authors":"Qian Li, Weiguo Wu, Liang Gao, Lei Wang, Jianhang Huang","doi":"10.1007/978-3-662-47401-3_6","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_6","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extracting News Information Based on Webpage Segmentation and Parsing DOM Tree Reversely 基于网页分割和DOM树反向解析的新闻信息提取
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_7
Jing Li, Yueming Lu, Xi Zhang
{"title":"Extracting News Information Based on Webpage Segmentation and Parsing DOM Tree Reversely","authors":"Jing Li, Yueming Lu, Xi Zhang","doi":"10.1007/978-3-662-47401-3_7","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_7","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced AllJoyn Network with Centralized Management 集中式管理增强AllJoyn网络
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_24
Linghan Li, Yonghua Li, Jiaru Lin, Tianle Zhang
{"title":"Enhanced AllJoyn Network with Centralized Management","authors":"Linghan Li, Yonghua Li, Jiaru Lin, Tianle Zhang","doi":"10.1007/978-3-662-47401-3_24","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_24","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122140025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RayDroid: A Framework for Discovering Anomaly in Android RayDroid: Android异常发现框架
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_5
Fan Yang, Yue Li, Lidong Zhai
{"title":"RayDroid: A Framework for Discovering Anomaly in Android","authors":"Fan Yang, Yue Li, Lidong Zhai","doi":"10.1007/978-3-662-47401-3_5","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_5","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance-Aware Based Correlated Datasets Replication Strategy 基于性能感知的相关数据集复制策略
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_42
Lin Ye, Zhongzhi Luan, Hailong Yang
{"title":"Performance-Aware Based Correlated Datasets Replication Strategy","authors":"Lin Ye, Zhongzhi Luan, Hailong Yang","doi":"10.1007/978-3-662-47401-3_42","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_42","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS Detection Based on Second-Order Features and Machine Learning 基于二阶特征和机器学习的DDoS检测
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_26
Xiaowei He, Shuyuan Jin, Yunxue Yang, Huiqiang Chi
{"title":"DDoS Detection Based on Second-Order Features and Machine Learning","authors":"Xiaowei He, Shuyuan Jin, Yunxue Yang, Huiqiang Chi","doi":"10.1007/978-3-662-47401-3_26","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_26","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126546684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Network Coding Scheme in Two-relay OFDMA Networks 一种新的双中继OFDMA网络编码方案
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_38
H Zhao, Yueyun Chen, Xiaopan Yuan
{"title":"A New Network Coding Scheme in Two-relay OFDMA Networks","authors":"H Zhao, Yueyun Chen, Xiaopan Yuan","doi":"10.1007/978-3-662-47401-3_38","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_38","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Enumeration of NTFS Using USN Journals Under UEFI UEFI下使用USN期刊枚举NTFS的研究
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_22
Zilu Zhang, Jinqiao Shi, Lanlan Hu
{"title":"Towards Enumeration of NTFS Using USN Journals Under UEFI","authors":"Zilu Zhang, Jinqiao Shi, Lanlan Hu","doi":"10.1007/978-3-662-47401-3_22","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_22","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115682868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Security and Robustness of P2P Caching System 提高P2P缓存系统的安全性和鲁棒性
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_8
Huailiang Peng, Majing Su, Qiong Dai, Jianlong Tan
{"title":"Enhancing Security and Robustness of P2P Caching System","authors":"Huailiang Peng, Majing Su, Qiong Dai, Jianlong Tan","doi":"10.1007/978-3-662-47401-3_8","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_8","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115810800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Modeling of Software Automatic Test 软件自动测试建模研究
International Standard Conference of Trustworthy Computing and Services Pub Date : 2014-11-28 DOI: 10.1007/978-3-662-47401-3_49
Jincui Yang, Yuyu Yuan, Tianle Zhang
{"title":"Research on Modeling of Software Automatic Test","authors":"Jincui Yang, Yuyu Yuan, Tianle Zhang","doi":"10.1007/978-3-662-47401-3_49","DOIUrl":"https://doi.org/10.1007/978-3-662-47401-3_49","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信