International Standard Conference of Trustworthy Computing and Services最新文献

筛选
英文 中文
Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi Coprocessor Intel Xeon Phi协处理器负载执行的能效评估
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_34
Qi Zhao, Hailong Yang, Guang Wei, Zhongzhi Luan, D. Qian
{"title":"Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi Coprocessor","authors":"Qi Zhao, Hailong Yang, Guang Wei, Zhongzhi Luan, D. Qian","doi":"10.1007/978-3-662-43908-1_34","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_34","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116035672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Trustworthy Sensor Network Based on Zigbee Technology 基于Zigbee技术的可信传感器网络研究
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_25
Shuai Wang, J. Bøegh, Jincui Yang
{"title":"Research on Trustworthy Sensor Network Based on Zigbee Technology","authors":"Shuai Wang, J. Bøegh, Jincui Yang","doi":"10.1007/978-3-662-43908-1_25","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_25","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125151429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imbalanced Chinese Text Classification Based on Weighted Sampling 基于加权抽样的不平衡中文文本分类
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_5
Hu Li, Peng Zou, Weihong Han, Rongze Xia
{"title":"Imbalanced Chinese Text Classification Based on Weighted Sampling","authors":"Hu Li, Peng Zou, Weihong Han, Rongze Xia","doi":"10.1007/978-3-662-43908-1_5","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_5","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115969865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generation and Distribution of Decoy Document System 诱饵文件系统的生成与分发
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_16
Lei Wang, C. Li, Qingfeng Tan, Xuebin Wang
{"title":"Generation and Distribution of Decoy Document System","authors":"Lei Wang, C. Li, Qingfeng Tan, Xuebin Wang","doi":"10.1007/978-3-662-43908-1_16","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_16","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131562684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Design of Linkage Security Defense System Based on Honeypot 基于蜜罐的联动安全防御系统设计
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_9
Gangfu Feng, Chen Zhang, Quan Zhang
{"title":"A Design of Linkage Security Defense System Based on Honeypot","authors":"Gangfu Feng, Chen Zhang, Quan Zhang","doi":"10.1007/978-3-662-43908-1_9","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_9","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization 透明和语义共存:当恶意软件分析遇到硬件辅助虚拟化
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_4
Guofeng Wang, Chuanyi Liu, Jie Lin
{"title":"Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization","authors":"Guofeng Wang, Chuanyi Liu, Jie Lin","doi":"10.1007/978-3-662-43908-1_4","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_4","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127264448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching 降低Web代理缓存中弱一致性方法失败率的新方法
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_14
Cheng Chen, Qingyun Liu, Hongzhou Sha, Zhou-yu Zhou, Chao Zheng
{"title":"A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching","authors":"Cheng Chen, Qingyun Liu, Hongzhou Sha, Zhou-yu Zhou, Chao Zheng","doi":"10.1007/978-3-662-43908-1_14","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_14","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133954381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing and Comparing User Location Preference in an Urban Mobile Network 城市移动网络中用户位置偏好的表征与比较
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_48
Chengli Mei, Min Zhang, Zhongang Qi, Q. Bi
{"title":"Characterizing and Comparing User Location Preference in an Urban Mobile Network","authors":"Chengli Mei, Min Zhang, Zhongang Qi, Q. Bi","doi":"10.1007/978-3-662-43908-1_48","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_48","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Data Recovery for Cloud Storage 云存储数据恢复研究综述
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_23
Xiaohong Shi, Kun Guo, Yueming Lu, X. Chen
{"title":"Survey on Data Recovery for Cloud Storage","authors":"Xiaohong Shi, Kun Guo, Yueming Lu, X. Chen","doi":"10.1007/978-3-662-43908-1_23","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_23","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-layer CAPTCHA Based on Chinese Character Deformation 基于汉字变形的多层验证码
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_27
Tingting Wang, J. Bøegh
{"title":"Multi-layer CAPTCHA Based on Chinese Character Deformation","authors":"Tingting Wang, J. Bøegh","doi":"10.1007/978-3-662-43908-1_27","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_27","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116737049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信