DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...最新文献

筛选
英文 中文
Understanding Syntax Errors in C Sharp Using Game-Based Techniques at Tertiary Level 使用基于游戏的技术理解高级C语言中的语法错误
Ravishek Raj, Neeraj Anand Sharma
{"title":"Understanding Syntax Errors in C Sharp Using Game-Based Techniques at Tertiary Level","authors":"Ravishek Raj, Neeraj Anand Sharma","doi":"10.1007/978-981-99-2233-8_31","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_31","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"5 1","pages":"434-450"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88518660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of the Internet of Things (IoT) Applications in the Health Sector in Saudi Arabi 沙特阿拉伯卫生部门物联网(IoT)应用概述
F. Masmali, S. Miah, N. Noman
{"title":"An Overview of the Internet of Things (IoT) Applications in the Health Sector in Saudi Arabi","authors":"F. Masmali, S. Miah, N. Noman","doi":"10.1007/978-981-99-2233-8_40","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_40","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"54 1","pages":"547-557"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85621665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-platform Performance Analysis for CRUD Operations in Relational Databases from Java Programs Using Hibernate 关系型数据库中CRUD操作的多平台性能分析
Alexandru-Marius Bonteanu, C. Tudose
{"title":"Multi-platform Performance Analysis for CRUD Operations in Relational Databases from Java Programs Using Hibernate","authors":"Alexandru-Marius Bonteanu, C. Tudose","doi":"10.1007/978-981-99-2233-8_20","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_20","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"113 1","pages":"275-288"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81305219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication ADS-B数据认证的轻量级树链方案
Haoran Cui, Shibo Zhu, Meng Yue
{"title":"LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication","authors":"Haoran Cui, Shibo Zhu, Meng Yue","doi":"10.1007/978-981-99-2233-8_12","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_12","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"12 1","pages":"166-177"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89351509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Storage and Sharing of Big Data in Air Traffic Management System 空中交通管理系统中大数据的存储与共享
Yuan Zhang, Qing Wang, Jiahao Li, Zhijun Wu
{"title":"The Storage and Sharing of Big Data in Air Traffic Management System","authors":"Yuan Zhang, Qing Wang, Jiahao Li, Zhijun Wu","doi":"10.1007/978-981-99-2233-8_16","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_16","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"4173 6 1","pages":"215-229"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86772288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Malicious Node in VANETs Using Digital Twin 基于数字孪生的VANETs恶意节点检测
Varsha Arya, Akshat Gaurav, B. Gupta, Ching-Hsien Hsu, Hojjat Baghban
{"title":"Detection of Malicious Node in VANETs Using Digital Twin","authors":"Varsha Arya, Akshat Gaurav, B. Gupta, Ching-Hsien Hsu, Hojjat Baghban","doi":"10.1007/978-981-99-2233-8_15","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_15","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"34 1","pages":"204-212"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86460520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Algorithms Performance Investigation in Fake News Detection 机器学习算法在假新闻检测中的性能研究
Monesh Sami, A. B. M. S. Ali
{"title":"Machine Learning Algorithms Performance Investigation in Fake News Detection","authors":"Monesh Sami, A. B. M. S. Ali","doi":"10.1007/978-981-99-2233-8_7","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_7","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"4 1","pages":"95-110"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89644716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-user Service Placement in LEO Satellite Constellations 低轨道卫星星座中的多用户服务布局
Lei Yan, Chao Wang, Qibo Sun
{"title":"Multi-user Service Placement in LEO Satellite Constellations","authors":"Lei Yan, Chao Wang, Qibo Sun","doi":"10.1007/978-981-99-2233-8_34","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_34","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"47 1","pages":"475-486"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78556827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach of Securing Medical Cyber Physical Systems (MCPS) from DDoS Attacks 保护医疗网络物理系统(MCPS)免受DDoS攻击的新方法
B. B. Gupta, Kwok Tai Chui, Varsha Arya, Akshat Gaurav
{"title":"A Novel Approach of Securing Medical Cyber Physical Systems (MCPS) from DDoS Attacks","authors":"B. B. Gupta, Kwok Tai Chui, Varsha Arya, Akshat Gaurav","doi":"10.1007/978-981-99-2233-8_11","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_11","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"29 1","pages":"155-165"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90727845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Recognition and Classification of Cat Pain Through Deep Learning 基于深度学习的猫痛自动识别与分类
Yang Yang, R. Sinnott
{"title":"Automated Recognition and Classification of Cat Pain Through Deep Learning","authors":"Yang Yang, R. Sinnott","doi":"10.1007/978-981-99-2233-8_17","DOIUrl":"https://doi.org/10.1007/978-981-99-2233-8_17","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"490 1","pages":"230-240"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77334401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信